- From: Nikos Fotiou <fotiou@aueb.gr>
- Date: Thu, 6 Jan 2022 22:49:21 +0200
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: W3C Credentials CG <public-credentials@w3.org>
- Message-Id: <E90A7EBE-FF0E-495B-851A-2DECF2D88F11@aueb.gr>
Since this is food for thought, here is a thought :)
Since JWS supports multi signatures, can’t we claim that jwt encoded VCs (kind of) already support this feature?
Best,
Nikos
> 6 Ιαν 2022, 5:33 μμ, ο χρήστης «Manu Sporny <msporny@digitalbazaar.com>» έγραψε:
>
> Hey folks,
>
> Just throwing this out there as food for thought for now. There has been a bit
> of debate in the VCWG about when certain signature formats will be standardized.
>
> These have raised some questions, including: "When will BBS+ be through the
> IETF process?", "What are we going to do about post-quantum crypto?", "What
> about long-lived VCs?", "How do we enable stability and innovation at the same
> time in a VC wrt. the signature format?".
>
> Historically, when developers have to sign data, we've been forced to pick a
> signature format and stick with it. So, historically, when you sign some data,
> you have to pick ONE signature format.
>
> This is changing, both with VCs and the Data Integrity specs (was: Linked Data
> Proofs/Signatures), as well as with things like HTTP Signatures. You can now
> support multiple signatures on a piece of data.
>
> For example, this is supported (but not officially standardized) today with VCs:
>
> {
> ... standard VC goes here ...,
> proofs: [
> {Ed25519Signature2020 goes here},
> {BbsBlsSignature2020 goes here},
> {PostQuantumSignature2022 goes here}
> ]
> }
>
> Here's a full example for a Verifiable Driver's License that has both an
> Ed25519 signature, BBS+ signature, and a (yet to be specified) post-quantum
> signature:
>
> https://gist.github.com/msporny/ab415042ffd9c06ea3ad1ebd1df1da0a
>
> What this means is that it is now possible to not have to depend on one
> signature format, and instead use multiple to meet different needs. The VC
> above supports NIST-approved cryptography today, while enabling the advanced
> use of BBS+ (if an organization would like to use it /before/ it is
> standardized at IETF), and also enabling protection if a quantum computer were
> to break both Ed25519 and BBS+... all on the same VC in a fairly compact
> format. The likelihood of all three signature formats being broken at the same
> time are exceedingly low. Couple this with the new VC refresh feature, and you
> can narrow the window in which a VC might be vulnerable even lower. So the
> answers to the questions above become the following:
>
>> "When will BBS+ be through the IETF process?"
>
> It matters less if you can put two signatures on the VC... one using crypto
> accepted by both IETF and NIST, and one with BBS+. This allows verifiers that
> want a IETF/NIST-approved signature to request it, while allowing other
> verifiers that want to live a bit more on the bleeding edge to do so by
> requesting BBS+ proof.
>
>> "What are we going to do about post-quantum crypto?",
>
> We can add schemes while they're being standardized at IETF/NIST and those
> that want to use them can, while those that don't can ask for an alternative
> signature on the VC.
>
>> "What about long-lived VCs?"
>
> Adding multiple signature types (elliptic curve, pairing friendly, and
> post-quantum) on the same VC increases the chances of that long-lived VC
> surviving the technical failure of one of the signature formats.
>
>> "How do we enable stability and innovation at the same time in a VC wrt.
>> the signature format?".
>
> If organizations want to support stability and innovation at the same time,
> they can do so by including multiple signatures on a VC.
>
> Again, food for thought...
>
> -- manu
>
> --
> Manu Sporny - https://www.linkedin.com/in/manusporny/
> Founder/CEO - Digital Bazaar, Inc.
> News: Digital Bazaar Announces New Case Studies (2021)
> https://www.digitalbazaar.com/
>
>
Attachments
- application/pkcs7-signature attachment: smime.p7s
Received on Thursday, 6 January 2022 20:49:38 UTC