-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proofHash is underspecified #265
Comments
@jparyani I think we should take this opportunity to define a clear spec around formatting and salting. Current thoughts on proofhash specification: sha256 hash of following json object: {
"version": "1.0.0",
"creator": "0x1234...89",
"salt": "0x12345",
"format": [ .csv, .txt, ... ],
"data": "my data"
} Where
|
@fulldecent This is our first dip into specification of standards for erasure. Would be great to get your thoughts on where to specify. Separate Erasure Improvement Proposal repo? |
For the issue at hand, perhaps
This is vague (extensible) enough that we don't need to specify it right now. But it is prescriptive enough that it identifies the problems we are trying to solve. That solves the issue and allows this project to proceed. I did not see any use cases where the information to be hashed is machine readable. Therefore, even a hashed Word .docx file can meet all requirements. If you will have machine readable files then there is already a mature project to talk about how to hash JSON objects where you want to validate parts of it while possibly keeping other parts secret. That is 0xcert Conventions (I advise 0xcert). Another option is possible if zero-knowledge proofs is needed. That is part of EY Nightfall (Ernst & Young is my client). Basically I'm saying you have a lot of options and you're in good company. As for Erasure-IP. I'm not sure what the scope of that project would be but I am heavily involved with the equivalents for Ethereum, Aion and 0xcert and can bring it home. |
The specification is given:
This leaves the prepending of data optional. Instead this should be required:
Or at a minimum:
Recommendation: add specification to achieve the favorable defense against impersonation / spoofing attacks
References:
The text was updated successfully, but these errors were encountered: