Standard ECDSA signature schemes are vulnerable to public key recovery attacks that allow an adversary to recover the signer's public verification key from any signature, linking all pseudonymous messages authored under different one-time pseudonyms back to a single user identity. This attack succeeds without any side-channel — it operates solely on the message and its ECDSA signature.
From 2025-kamali-anix — Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing
· §4.2
· 2025
· Symposium on Security \& Privacy
Implications
Any mesh or circumvention protocol that uses ECDSA to sign per-session or per-message pseudonyms must replace it with a public-key-blinded signing scheme (e.g., Denis et al. 2023) to prevent passive adversaries from linking pseudonyms across sessions.
The blinding factor should be derived deterministically from the message content and the signer's long-term public key so verifiers can recompute it locally without an out-of-band channel, avoiding the common assumption that bk must be transmitted separately.