-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Instead of the symmetric ciphertext, pass its hash when creating/checking the auth_tag #147
Comments
This allows for 2 formats:
Unsure on how to expose this through the API yet. Thoughts? |
This seems plausible on its face, but what then does the other side the API look like in your mind? If a user (or our depending libraries) adopt the 'thin' version, what do they do with the bulk ciphertext once they have the hash? |
My 2 cents:
|
Perfect. But to make the process iterative, let's start by hacking together the format up above until we find something we like, and then later codifying it in |
This is being explored in nucypher/nucypher#3194 Still WIP, but thus far:
|
One of the steps of the creating and checking the
Ciphertext
authentication tag is to compute a G2 hash element as follows (in pseudocode):However, this forces that anyone performing ciphertext validation (e.g. Ursula) must pass the symmetric ciphertext, which can be very inefficient. Instead, let's just pass a hash of the ciphertext:
With this change, the consumer would never have to include the bulk of the symmetric ciphertext in the decryption request, but only it's hash, which even has a known size.
The text was updated successfully, but these errors were encountered: