Skip to content

Integrity of the JWK used for Credential Response encryption #507

@GarethCOliver

Description

@GarethCOliver

Currently, there is nothing that ensures the integrity of the JWK used for Credential Response encryption. When not using credential request encryption, a party in the middle that can mutate the request can easily replace the jwk without the Client or the Issuer being aware. Credential Request encryption helps, but in principle encryption should not be used for integrity.

Conceptually, there are two solutions here:

  1. provide a proof over the key (a key_attestation or other proof mechanism as used for other credential keys could work.)

  2. provide an optional signature over the request using an already known key (dpop key would be an example)

Metadata

Metadata

Labels

No labels
No labels

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions