-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V2: Verification and Signature #25
Comments
# EXAMPLE 4: A signature chain in a Linked Data document
{
"@context": "https://w3id.org/identity/v1",
"title": "Hello World!",
"signatureChain": [{
"type": "RsaSignature2015",
"creator": "http://example.com/i/pat/keys/5",
"created": "2011-09-23T20:21:34Z",
"domain": "example.org",
"nonce": "2bbgh3dgjg2302d-d2b3gi423d42",
"signatureValue": "OGQzNGVkMzVm4NTIyZTkZDY...NmExMgoYzI43Q3ODIyOWM32NjI="
}, {
"type": "RsaSignature2015",
"creator": "http://bank.example.com/notary/keys/7f3j",
"created": "2011-09-23T20:24:12Z",
"domain": "example.org",
"nonce": "83jj4hd62j49gk38",
"signatureValue": "yZTkZDYOGzNGVkMVm4NTIQz...M32NjINmExMDIyOWgoYzI43Q3O="
}]
} [edit] # EXAMPLE 5: A complete example of a signature suite
{
"id": "https://w3id.org/security#LinkedDataSignature2015",
"type": "SignatureSuite",
"canonicalizationAlgorithm": "https://w3id.org/security#URDNA2015",
"digestAlgorithm": "http://example.com/digests#sha512",
"signatureAlgorithm": "http://www.w3.org/2000/09/xmldsig#rsa-sha256"
} |
updated to clarify use of EcdsaKoblitzSignature2016 |
per this pyld issue, we can use vocab to create a fallback context to flag unmapped properties
|
|
.
|
Thanks @westurner! I'm catching up on the references you included. I wanted to confirm one takeaway I had, which is that our terminology is sometimes lax. For example, above I use "certificate" in the informal sense instead of the more precise "Credential". I agree that I should update that, but I also wanted to see if there are other nuances I missed. |
"Credential" as the super type:
WebID
The Cert Ontology 1.0 :
|
Per decision at RWoT 2017, there will be a separate signature suite for Merkle Proofs, using the Chainpoint v2.0 proof format. Details coming soon. In blockcerts it will look like this:
|
v2 updates are in all branches |
Updated per RWoT 2017 conference, where it was decided to create a MerkleProof2017 signature suite. That spec is still in draft, but this new proposal will fit the proposed structure.
See comment on 4/24.
Goals
Non-goals
Verification
Blockcerts verification types will be added as OBI extensions
Signature
This is out of date. See updated version of signature, comment on 4/24/2017
About signature type
Signature will use the blockcerts type
LinkedDataEcdsaKoblitzSignature
. This is an extension to EcdsaKoblitzSignature2016 type, but adapted for OBI extension.This type is also heavily borrowed from Proof of Publication; however, the latter is still in draft and Blockcerts requires slight variations including the ability to continue using chainpoint for the Merkle proof. Therefore, this currently (re)defines elements in the blockcerts context.
Example Signatures
Signature with chainpoint
Example Signature with PoP
Clarifications and TBD
verification
node? This would prevent fraud in the cause of an attacker creating a fake "signature suite" that allows the signature to validate.The text was updated successfully, but these errors were encountered: