- From: Dmitri Zagidulin <dzagidulin@gmail.com>
- Date: Sun, 13 Jul 2025 16:42:07 -0400
- To: Leonard Rosenthol <lrosenth@adobe.com>
- Cc: Manu Sporny <msporny@digitalbazaar.com>, W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CANnQ-L7TBbd5j=9VrtkWenXrX-Jk7upi2NkF0c4DG8_m7tjmPQ@mail.gmail.com>
Hi Leonard, I'm wholly with you -- evaluating existing solutions for fit is incredibly important when developing new specs! Huge fan of that approach. And hey, who doesn't like hearing that somebody has already done the hard work (of spec writing and library implementation) for them, and so we can move on to other projects! :) Since you mentioned that the Content Credentials C2PA spec would fit the use case (a general purpose cryptographic event log), I read through it (and the related Attestations spec), to see if we can use any pieces from it. So, what we're talking about when we say cryptographic event log is a linked list of objects, with each entry having hash-bound pointers to the previous entry in the list. The closest thing I could find to this, a general purpose hash chain, would probably be the Update Manifests section of the Content Credentials spec? https://spec.c2pa.org/specifications/specifications/2.2/specs/C2PA_Specification.html#_update_manifests Is that accurate, or where would you recommend we look instead? If that's the section you meant, I'm not sure it would fit our purpose for the event log. Partly because - I couldn't figure out how backwards hash links are expressed, for the update manifest. And also, the entries to the manifest seem fairly constrained to C2PA stuff, including strict restrictions to the c2pa.actions property, etc? For comparison, this is what a hash chain / cryptographically bound event log looks like in the did:webvh spec: https://identity.foundation/didwebvh/next/#the-did-log-file A pretty basic list of objects, with flexible properties in 'parameters', and the 'entryHash' of the previous object being placed in the 'versionId' object. Would we be able to model something like that with C2PA manifests data models or something similar? Thanks, Dmitri On Sun, Jul 13, 2025 at 2:19 PM Leonard Rosenthol <lrosenth@adobe.com> wrote: > >Today, there is no standardized data structure for a cryptographic event > log. > > > > > While we refer to it as a content provenance system, I would strongly > argue that the Content Credentials technology from C2PA (https://c2pa.org) > serves the purpose you describe : > > *express changes to data over time and the means for a verifier > tocryptographically verify those changes.’* > > > > Perhaps, before creating a new specification, evaluation of this (and > possibly other solutions in use today) would be the right approach. > > > > Leonard >
Received on Sunday, 13 July 2025 20:42:28 UTC