Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Selective Disclosure ZKPs for Supply Chain #20

Closed
OR13 opened this issue Feb 23, 2021 · 18 comments
Closed

Selective Disclosure ZKPs for Supply Chain #20

OR13 opened this issue Feb 23, 2021 · 18 comments
Assignees

Comments

@OR13
Copy link
Collaborator

OR13 commented Feb 23, 2021

We added support for https://github.com/w3c-ccg/ldp-bbs2020

to the vc-http-api here: https://vc.transmute.world/api/docs

We should come up with some exemplar credentials that would be good to provide examples of using this proof suite.

An almost complete working PoC here: http://didme.me/

@mprorock
Copy link
Collaborator

mprorock commented Feb 23, 2021 via email

@OR13 OR13 self-assigned this Apr 28, 2021
@OR13
Copy link
Collaborator Author

OR13 commented May 11, 2021

Discussed on call. Proposal is move this to the interop repo when it exists.

@OR13 OR13 transferred this issue from w3c-ccg/traceability-vocab Jun 15, 2021
@OR13
Copy link
Collaborator Author

OR13 commented Jul 6, 2021

@mprorock can you add a flow chart / example covering multiple parties.

@OR13
Copy link
Collaborator Author

OR13 commented Jul 6, 2021

2 actions remain on this issue:

  • example flow (real world use case)
  • update vc-http-api tests to cover deriveCredential

@OR13
Copy link
Collaborator Author

OR13 commented Jul 6, 2021

Proposal: we should make deriveCredential a MUST for trace-interop

@TallTed
Copy link
Contributor

TallTed commented Jul 6, 2021

This was the nearest issue to the discussion in IRC, but I'm not sure it's actually what we were talking about, where I said mock PROPOSAL: trace-interop implementations MUST negotiate encryption mechanisms by requesting ____ and replying ____

Candidate response header, available in HTTP/1.x and HTTP/2; will presumably persist to HTTP/3 --

Pragma
Pragma: no-cache
Implementation-specific fields that may have various effects anywhere along the request-response chain.

Could also dive much deeper and go with 5.5. Extending HTTP/2.

Neither of these is quite what I was thinking of, so I'll be digging a bit more, too.

@TallTed
Copy link
Contributor

TallTed commented Jul 6, 2021

Issuing HEAD against specific URIs can get returned Link: headers which have complex values, such as --

Link: <{ URI of encryption endpoint }>; rel="{ plain-literal as registered with IANA (registration recommended but not absolutely required), or URI as defined by this spec; e.g., "BBS+" or "https://github.com/w3c-ccg/ldp-bbs2020" }"; anchor="#if_needed"

The rel value may be open-ended, allowing for extension as required by deployments, without requiring that they go through a registry -- allowing high-speed evolution when necessary, as well as private extensions that may not be understood by those not directly involved.

@OR13
Copy link
Collaborator Author

OR13 commented Jul 20, 2021

On the call today, we discussed the need to support discovery of both "issuer" ids and "credential suites".

We discussed the proposal to use the Link header, and .well-known resources.

@OR13
Copy link
Collaborator Author

OR13 commented Jul 20, 2021

We agreed, to open an issue on the vc-http-api to tackle these issues.

@mprorock
Copy link
Collaborator

big fan of http accept headers for http calls, as well as use of .well-known for capabilities discovery

@brianorwhatever
Copy link
Contributor

We could also include this within a did:web document on the issuer .well-known/did.json endpoint. For example this did could include a service block that contains the endpoint and what crypto suites it uses and issuer ids managed at that endpoint

@OR13
Copy link
Collaborator Author

OR13 commented Jul 20, 2021

I opened this issue: w3c-ccg/vc-api#218

@mkhraisha
Copy link
Collaborator

Discussed on call waiting on vc-http-api group action

@nissimsan
Copy link
Collaborator

Keep open, blocked by VC-API

@OR13
Copy link
Collaborator Author

OR13 commented Nov 16, 2021

There are known issues with BBS+, we should close this issue until its possible to use any LD Proof format that supports derivation.

See w3c/vc-di-bbs#62

@OR13 OR13 closed this as completed Nov 16, 2021
@brianorwhatever
Copy link
Contributor

This issue is closed because the upstream problem needs to be resolved. We will open a new issue once that has been resolved.

@TallTed
Copy link
Contributor

TallTed commented Nov 16, 2021

My concern is "What triggers a new issue creation, upon resolution of the blocker?" which flows to "Who or what is watching for resolution of that blocker?"

@brianorwhatever
Copy link
Contributor

@TallTed I definitely see where you're coming from and have opened a new issue. I will continue to monitor this issue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants