-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encryption details for OpenID4VP over the digital credentials API #131
Comments
there is also option 3: define a new encryption mechanism that does not use JWE (see openid/OpenID4VP#310) we need to document pros and cons of each and make a decision
update: the issue for lazy verifier problem openid/OpenID4VP#65 |
There are many requirements that are mentioned in /pull/122 that talk about ISO standards. Could we list here what are the exact requirements that we should keep in mind and in which ISO standard they are listed? |
I'm fine either with option 1 (use an existing JWE algorithm) or option 2 (use https://github.com/ietf-wg-jose/draft-ietf-jose-hpke-encrypt/). I'm not fine with option 3 because as much as I love the OpenID Foundation, we don't have the cryptographers as members that the IETF does to do cryptographic reviews of a new cryptographic spec. |
WG discussion:
|
Hi, if you wish to get JOSE HPKE to RFC faster, it will need more engagement from implementers. I've done implementations for compact and json serialization of both integrated encryption and key encryption. I am not sure which of these options you plan to use / need, but if I can understand what you need, I am happy to generate you some examples. Do you need to support multiple recipients or JSON serialization? |
Thanks Orie!
We're using compact serialisation currently, but we do have preference for being able to exclude the AAD or part of the AAD from being communicated to the decryptor in the message. (see openid/OpenID4VP#347 ) I'm not sure about integrated encryption vs key encryption.
We do not currently. |
WG discussion:
next step (@bc-pi volunteered):
|
What's the specific requirement to address encryption in high assurance? |
@Sakurann @martijnharing @selfissued issue created here ietf-wg-jose/draft-ietf-jose-hpke-encrypt#13 |
Discussed on today's WG call; consensus on P-256 (which matches what new part 7 draft browser profile uses). |
agreement to encrypt the response. agreement to start with using JWE. agreement to have the same JWE requirements regardless of the credential format. discussion point is how to generate JWE.
does not seem to be agreement to use JWE as defined in 18103-7 already. there seem to be some alignment on detached apu and apv being valuable?
option 1: improve how JWE with ECDH-ES is done. - change apu and apv values?
option 2: define how to do JWE with HPKE. draft in IETF (https://datatracker.ietf.org/doc/html/draft-ietf-jose-hpke-encrypt-02) is not exactly stable. AAD can be set to the combination of [origin, clientId and nonce and encryption public key of the verifier].
Originally posted by @Sakurann in #122 (comment)
The text was updated successfully, but these errors were encountered: