-
Notifications
You must be signed in to change notification settings - Fork 25
Updating to JWE compliant data model #8
Comments
Please be aware, this issue is also posted on the Aries-RFC repo in Hyperledger. I'll facilitate communication across the groups if you don't want to track both conversations. |
Yes please, there needs to be a very clear encoding and signature documentation. I would say starting with JWE is a requirement for adoption of any sort. Regarding bloat/size... its more important that the schema be well defined and support existing systems, like jose. I suggest a well defined json schema be adopted as a first step, then you can get more compact representations for free later... https://news.ycombinator.com/item?id=18189473 I don't see why we can't implement this entirely with did + jose and then add support for none jose crypto via case by case basis. |
I'm looking into this now to make sure that the JWE header field
As far as I'm aware, there's no other schema formats that are attempting to protect the sender's key. The additional bloat is coming from having to compact JWE encode a JWK in order to keep sender anonymity.
This is something I've been looking at so far. The tradeoffs to this is that it introduces a lot of confusing aspects for developers that leads to them shooting themselves in the foot. Here's a good blog post on the topic. This is one of the reasons that I've focused on being compliant with the JWE data model, but haven't been trying to build a compliant JWE library. It allows the implementation to be compatible (once everything get's registered) without all the downsides. |
Related work on edv using JWE as well... would be nice to sync all of this: digitalbazaar/encrypted-data-vaults#5 |
JFYI, we're using this library to generate JWEs with our edv work: |
Note the kid format...
I think we really need to get this id handling stuff into the did spec with some |
Recently there's been discussion to update this work to be fully JWE compliant. One of the proposed solutions that's come up is to generate the following format:
Here's a provided example of what this would look like:
I'm curious what other's opinions are on this approach. I personally am not a fan of the bloat the compact JWE adds in order to encrypt the sender's public key. However, I've not found another approach yet that seems satisfactory. If anyone has some suggestions it would be appreciated.
@csuwildcat @awoie @christianlundkvist @dstrockis
The text was updated successfully, but these errors were encountered: