diff --git a/docs/index.html b/docs/index.html index d039715..a706f5e 100644 --- a/docs/index.html +++ b/docs/index.html @@ -2108,16 +2108,178 @@
Generate a random 592-bit number for each (unrevealed attributes)
+For each credential and issuer’s public key :
++
+
and add them to .
++
and add them to
+Load from issuer’s public key
+For each predicate where operator * is one of :
++
+
+
Generate random 2128-bit numbers .
+Blind values of and by computing:
++
+
and add these values to in the order .
+Generate random 592-bit numbers , random 672-bit numbers , and random 2787-bit .
+Compute:
++
+
+
and add these values to in order .
+Finally, the holder computes the Fiat-Shamir challenge hash():
++
where is the nonce sent by verifier in proof request.
Each primary eq_proof
is generated as follows:
To Do: Add algorithm for generating a eq_proof
and the data values in the proof.
+
+
+where is the set of unrevealed attributes.
eq_proof
are:"eq_proof": {
+ "revealed_attrs": {
+ "jti_unique_identifier": "46414468020333259158238797309781111434265856695713363124410805958145233348633"
+ },
+ "a_prime": "52825780315318905340996188008133401356826233601375100674436798295026172087388431332751168238882607201020021795967828258295811342078457860422414605408183505911891895360825745994390769724939582542658347473498091021796952186290990181881158576706521445646669342676592451422000320708168877298354804819261007033664223006892049856834172427934815827786052257552492013807885418893279908149441273603109213847535482251568996326545234910687135167595657148526602160452192374611721411569543183642580629352619161783646990187905911781524203367796090408992624211661598980626941053749241077719601278347846928693650092940416717449494816",
+ "e": "40342480172543061520030194979861449480343743039487113094246205723322643070249538229638327935935486373873622430409109409257546971244601965",
+ "v": "217871997575635857881367472262154388060800564043554848081521162883333745687724235201324121915821236796357195214089699645741515836727882126142579489701412861659136426497703162695983681701205672924385915403141611021784136285588350763399255203187442277784718461565122805239422370067600654500115262174706580098147603414365915243447789285877195068031630371954678432401446457453517813298670236942253026249413255471803997869331683293818651006043399070308083119054618677128448043841313844695654424369871669436628257531643623230026240200330490039607166147891705813033761093730859310423856156850596341547950105490585959768382544221555877471751940512766452511773683786023245283041103270102119125303027835868565240336923422734962345750992898991606841120358203160628015844345063465293475128118937815965000466081345494616126511595974927544434058100817176268040385848789013718618727873445834393897904247054897801708217939187593785671914",
+ "m": {
+ "iat_consent_timestamp": "7919242808448912829024078929834347184203169048480606699350973804205285806978474375691141504249426249676222104091995582731720654507393708298132400435805626192291975477967402460279",
+ "master_secret": "3455871040557234123393960708120725061759594951341120214330342075748561632734634451036095543889895409812764789858455375956895105746442946098665140470124325622343440794421325163223",
+ "data_controller": "16070549690575784944224634793654539357398383214512772967411296056738507137421264813779497172425030465490587794790393434847583852932544021088761347641812155158324233253206392974293",
+ "notice": "2790610958721083178459621377821800672322230987466716467063649577108407884592339521820875278264969393963213925568888672412150769438560815981777952572004955362915245795447078373509",
+ "sensitive": "13552814315985495030467505807226704038231487014593307078913973520081443107274508887651839292151852713782653522711975492131914644109941607616672243509214979259100892541150351227883",
+ "services": "14860984314279608355643170908802532226194914773406547259519961082467311361623076451869406343140860447342041426195737612897540117192702117380288330928866665314831926780606136352645",
+ "sub_subject_identifier": "11736177517163751882849070942823049196298287414132249166618760803125435466270948777194044507635346721244111946358927525083691171695431736819244809221351813271261283779276670885101",
+ "moc_method_of_collection": "10026360820367693771310999595495505533281326977349798360729122862705999157070660881611421445424239119786180921960380892002204780026072600494332540208429642332890963846523547470729",
+ "jurisdiction_data_processing": "15829143141425514118932461858094583045441924952665872659029333578019676797278419825311275014912077620757631693167948665554731430154156737419706553672424812320891308795411687679270",
+ "iss_internet_processing_uri": "6900796243066434651671715348976599009606292569990892886896520779618011026060325075822786686418461731663661832508437549373109822105600719490952253743950241384782222356411498407620",
+ "version_consent_specification": "7796257942256624260327966366702213561879098947042014532961291550019706546662478888172243088973621029223408695289700984802154645011280488167967047321149956253054269901250137513345",
+ "policy_url": "12241676508867847022708464707584814145889660003604359058532137895063826021524887759921830911553663255421852525705197991376264187781979066233701110706958983099645275940668404311601"
+ },
+ "m2": "6509130065158989037891281073557909501783443634141673890142284302459280804904096303151728187237486991775852971807701594247754409108836089746736345158069365449802597798950172729241"
+},
+
+revealed_attrs
: The mapping of revealed attributes with their values.a_prime
: This is the value generated during init proof and challenge hash calculatione
: The value of in the proof.v
: The value of in the proof.m
: The hashmap containing hidden attribute name with calculated value.m2
: The value of in the proof.Each primary ge_proof
is generated as follows:
To Do: Add algorithm for generating a ge_proof
and the data values in the proof.
+
+
+
+
ge_proof
are:ge_proofs: [
+ {
+ u,
+ r,
+ mj,
+ alpha,
+ t,
+ predicate
+ }
+]
+
+u
: The hashmap containing values of in the proof.r
: The hashmap containing values of , and in the proof.mj
: of the concerned predicate obtained from the equality proof.alpha
: The value of in the proof.t
: The hashmap containing values of , and from the init proof.predicate
: The concerned predicate from the proof request.The aggregated_proof
proves that the same linked secret was used to
issue all of the source verifiable credentials in the presentation.
The aggregated_proof
is generated as follows:
To Do: Add algorithm for generating the aggregate proof and the data values in the proof.
+To Do: Add algorithm for generating the aggregate proof and the data values in the proof.
The requested_proof
is the mapping from the presentation request attributes
and predicates to the data in the presentation that satisfies the request. This
@@ -2168,13 +2330,13 @@
Self Attested Attributes
-To Do: Describe self-attested attributes data structure
+To Do: Describe self-attested attributes data structure
Unrevealed Attributes
-To Do: Describe unrevealed attributes data structure
+To Do: Describe unrevealed attributes data structure
Predicatees
-To Do: Describe predicates data structure
+To Do: Describe predicates data structure
Identifiers
The identifiers
contains a list of the identifiers to be resolved by the
@@ -2293,7 +2455,7 @@
To Do: Add more detail about the calculation of C
u
and
+
To Do: Add more detail about the calculation of C
u
and
C
b
in the following.
The values in the data model are:
-To Do: Enumerate each of the items in each NRP section of the presentation.
+To Do: Enumerate each of the items in each NRP section of the presentation.
x_list
" is …
@@ -2478,9 +2640,9 @@ To Do: Outline the NRP verification calculation.
+To Do: Outline the NRP verification calculation.
To Do: Is there a separate process to bind the NRP to the credential?
+To Do: Is there a separate process to bind the NRP to the credential?
The verification code MUST surface to the verifier if any part of the presentation, including any NRP(s), fail cryptographic verification. The @@ -2894,17 +3056,17 @@
Cover conventions like encoding claims, date handling for predicates and revocation status requests
+Cover conventions like encoding claims, date handling for predicates and revocation status requests
This document has no IANA actions.
Add security considerations related to CL signatures
+Add security considerations related to CL signatures
Add security considerations related to cryptographic accumulators and AnonCreds revocation
+Add security considerations related to cryptographic accumulators and AnonCreds revocation
The underlying signature algorithm of AnonCreds is not known to be a post-quantum computing resistant. As new signature algorithms evolve for the post-quantum computing security, the underlying signature algorithm of AnonCreds shall keep privacy-preserving features such as selective disclosure and non-correlatability.
Add privacy considerations.
+Add privacy considerations.
Add normative references
+Add normative references
Add informative references
+Add informative references
Add authors’ addresses.
+Add authors’ addresses.