Replies: 5 comments 14 replies
-
There is a pull request open (#245) that we currently deploy. It includes more information on a new proof endpoint Perhaps that pull request, which has not yet been accepted in the master branch, could serve as an initial basis for the discussion here. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
For what it's worth, I always had in the back of my mind to at some point unify the distinction between the two session types as follows:
Such a setup would offer maximum flexibility to the requestor, by offering the possiblity of signing a message and getting a timestamp as orthogonal features, while simultaneously simplifying the session request types. I think I would not enable timestamps across every session, not only for the extra load on the timstamp server, but also because in the majority of the sessions, which are disclosure sessions, the timestamp is just not necessary: in such sessions the disclosure resulting out of a session is useful only during the session, and not afterwards. In such a scenario the timestamp is not necessary, because the time of creation of the disclosure (now) and the time of verifying it (now) coincide. I would say that that argument is more important than the consistency that always including it would bring (but your opinion may differ). As to the |
Beta Was this translation helpful? Give feedback.
-
If you drop backwards compatibility, would it then not be a good idea to move to the international standards currently mentioned by the ARF? |
Beta Was this translation helpful? Give feedback.
-
I was thinking, maybe we should clarify which type of keyshare JWT we include. Otherwise that might be confusing. So |
Beta Was this translation helpful? Give feedback.
-
We are currently looking into the message format of the proofs response. We have to make a change here, because we want to add the responses of the keyshare server to the actual proof. In #240 we change the keyshare JWT format and remove all information from the JWT that verifiers don't need to know. This enables us to make this change.
Currently, there is a difference in message format between regular disclosure sessions and attribute-based signature sessions. In short, the key differences are:
"proofs"
and in attribute-based signatures"signature"
."message"
and a"timestamp"
fields are included extra. As a consequence, the 'realnonce' value is a hash of message, timestamp and nonce, whereas in regular disclosure sessions the realnonce is equal to just the"nonce"
."@context"
field)"context"
field) is included explicitlyThe keyshare JWTs that we add also includes a
iat
, so for sessions that use a keyshare server two timestamps might be involved (one in the keyshare JWT and one in the"timestamp"
field). The"timestamp"
is meant to realize non-repudiation in attribute based signature sessions, and the keyshare JWT is meant to verify that the wallet was authentic at the time of the session. So, both timestamps have a different purposes.Below I made a proposal how the new format looks like in the most simple form. Maybe we can improve it even more.
Ideas:
"nonce"
and"context"
for regular disclosure sessions (Q: how do we then clearly explain that the"nonce"
in the regular disclosure session needs to be used as-is, whereas in attribute based signature sessions it needs to be combined with other values?)I'd like to hear your opinions.
Regular disclosure sessions:
Attribute based signature:
Beta Was this translation helpful? Give feedback.
All reactions