You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 18, 2023. It is now read-only.
Estonian e-Identity keys sign using ECDSA on secp384r1.
It's unethical to place human identifying keys on a transparent blockchain of course, like say https://github.com/LogvinovLeon/estid-sig proposes, but people could've off-chain usages, so perhaps secp384r1 makes sense here?
We could also identify pairing friendly curves whose group order agreed with the base field of secp384r1, so that some ECDSA gadget could verify an Estonian e-Identity signature in zero-knowledge. It's still tricky to use this on-chain, but much less awful..
What do people think?
For Admin Use
Not duplicate issue
Appropriate labels applied
Appropriate contributors tagged
Contributor assigned/self-assigned
The text was updated successfully, but these errors were encountered:
Estonian e-Identity keys sign using ECDSA on secp384r1.
It's unethical to place human identifying keys on a transparent blockchain of course, like say https://github.com/LogvinovLeon/estid-sig proposes, but people could've off-chain usages, so perhaps secp384r1 makes sense here?
We could also identify pairing friendly curves whose group order agreed with the base field of secp384r1, so that some ECDSA gadget could verify an Estonian e-Identity signature in zero-knowledge. It's still tricky to use this on-chain, but much less awful..
What do people think?
For Admin Use
The text was updated successfully, but these errors were encountered: