Skip to content

Commit

Permalink
Merge branch 'main' into feat/ecdsa-vul
Browse files Browse the repository at this point in the history
  • Loading branch information
sander authored Oct 12, 2024
2 parents f7d6ef1 + 229b846 commit c8312a6
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion draft-dijkhuis-cfrg-hdkeys.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@ author:
surname: Dijkhuis
organization: Cleverbase
email: [email protected]
contributor:
- fullname: Micha Kraus
organization: Bundesdruckerei
ipr: trust200902
normative:
I-D.draft-bradleylundberg-cfrg-arkg-02:
Expand All @@ -40,6 +43,7 @@ normative:
date: 2019-09
RFC7800:
RFC8017:
RFC8235:
RFC9380:
SEC2:
title: "SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0"
Expand Down Expand Up @@ -550,7 +554,7 @@ Some issuers could require evidence from a solution provider of the security of

The Wallet Trust Evidence public key is the root HDK public key. To achieve reader unlinkability, the wallet SHOULD limit access to a trusted person identification document provider only.

To prevent association across identities, the solution provider MUST before issuing Wallet Trust Evidence ensure that the root HDK public key is associated with a newly generated device key pair. For example, the solution provider could rely on freshness of a key attestation and ensure that each device public key is attested only once.
To prevent association across identities, the solution provider MUST before issuing Wallet Trust Evidence ensure that (a) a newly generated device key pair is used and (b) the wallet follows the protocol so that the HDK-Root output is bound to exactly this key. For (a), the solution provider could rely on freshness of a key attestation and ensure that each device public key is attested only once. For (b), the wallet could proof knowledge of `sk'` with a Schnorr non-interactive zero-knowledge proof [RFC8235] with base point `pk_device`. This would ensure,that the root blinding key `sk'` is not shared with the solution provider to reduce the risk of the solution provider unblinding future derived keys.

### Issuer Trust Evidence

Expand Down

0 comments on commit c8312a6

Please sign in to comment.