You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This signature scheme requires public keys to be known before verification.
Proposed Solution
ECDSA (using the secp256k1 curve) does not have this issue, as the public key can be derived from the signature (vertex.signature), the original data (vertex.hash), and the recovery ID (which is typically embedded in the signature).
The public key then will be verified against vertex.peerId. In order to do that,
Problem Description
Currently we're using EdDSA (using the ed25519 curve) for vertex signing.
ts-drp/packages/node/src/store/credential.ts
Lines 45 to 51 in a6c4705
This signature scheme requires public keys to be known before verification.
Proposed Solution
ECDSA (using the secp256k1 curve) does not have this issue, as the public key can be derived from the signature (
vertex.signature
), the original data (vertex.hash
), and the recovery ID (which is typically embedded in the signature).The public key then will be verified against
vertex.peerId
. In order to do that,ts-drp/packages/network/src/node.ts
Lines 84 to 85 in a6c4705
should be changed to
secp256k1
.Implementation PR
No response
Reference Issues
No response
Unresolved questions
No response
Additional Information
No response
The text was updated successfully, but these errors were encountered: