## <img src="https://i.imgur.com/QyDl5nK.png" width=192 height="192"><br/>
## Collaborative Seed Recovery<br/>Group Meeting
<font size=7>(2012-10-13)</font>
---
### <img src="https://i.imgur.com/QyDl5nK.png" width="256" height="256"></br> What is Blockchain Commons?
<font size=6>
* We bring together blockchain, Web3 and digital identity stakeholders to collaboratively develop interoperable infrastructure.
* We design decentralized solutions where everyone wins.
* We are a neutral "not-for-profit" that enables people to control their own digital destiny.
</font>
---
## Chatham House Rules Apply
* _"participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s) ... may be revealed."_
* We may record presentations and Q&A for YouTube, but not business discussions.
* We do make private recordings for member who miss a session. Just ask.
---
## Agenda <font size=6>(2012-10-13)
* Introductions & Reintroductions
* ___Since Last Session…___
* Rebooting Web of Trust
* Presented as advance readings:
* [Collaborative Seed Recovery](https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/collaborative-seed-recovery-csr.md)
* [Elision, Redaction, and Noncorrelation in Smart Documents](https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/elision-redaction-correlation-smart-documents.md)
* [Selective Correlation](https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/draft-documents/selective-correlation.md) became collaborative paper
* MVA of `envelope-cli` nearing feature complete
* [Playlist of demo videos](https://www.youtube.com/playlist?list=PLCkrqxOY1FbooYwJ7ZhpJ_QQk8Az1aCnG)
* [Existence proofs](https://github.com/BlockchainCommons/BCSwiftSecureComponents/blob/master/Docs/09-EXISTENCE-PROOFS.md) and [video](https://www.youtube.com/watch?v=LUQ-n9EZa0U&list=PLCkrqxOY1FbooYwJ7ZhpJ_QQk8Az1aCnG&index=11)
* Other progress reports?
</font>
---
## Agenda <font size=6> (continued)
* @WolfMcNally walk-through an MVP for CSR
* Goal review: Public CSR Servers EoQ4?
* Discussion on next steps:
* Is our MVA sufficiently complete?
* SCIDs
* Event receipts
* Scripting ("Smart signatures")
* Security architecture review?
* What languages does the community need to port envelopes and SSKR to?
* Do we want to pursue W3C or IETF standardization
* Future Collaborative Key Management plans?
* Other agenda items
</font>
---
# END OF SESSION
---
## Agenda <font size=5>(2012-08-07)
* ___Since Last Session…___
* Seed Tool 1.6 Alpha TestFlight (iOS & Mac)
* first Crypto-Requests for UR:Envelope, using updated spec
* testing reference seeds/keys/derivations/output descriptors
* Silicon Salon 2 for Sept. 14th
* Secure Boot, Firmware, Updates & Supply Chain
---
* This Session:
* ***Bitmark*** Scenario Question
* MVA for Gordian Architecture:
* Opinionated Cryptographic Choices
* Non-Correlation, Elision (Redaction & Reference), CID Features
* Updated Request/Response Architecture for Envelopes
* …
---
* Updated Request/Response Architecture for Envelopes
* No longer called crypto-request
* Distributed Function Calls
* We need to create spec & reference for sharding and encrypted shares
* We need to understand your auth scenarios
* Swimlanes?
---
## MVA for Gordian Architecture
* What is MVA?
* Minimum Viable architecture
* Focuses on larger strategy, ecosystem viability & future expansion
* But then constrains them for release
* Think of it as "Future Proofing" an MVP
---
#### Cryptographic Choices for MVA
* **Organization:** Suites
* Carefully combine opinionated decisions about cryptography
* Not kitchen sink! (Avoid footguns!)
* Initially useful constraints for test code using in:
* envelope-cli app in Swift
* Security Architecture Review release
---
### MVA Suite
* Data Size: 256
* Hash: Black3
* AEAD cipher: ChachaPoly
* Curve: Secp256k1
* Signing: Schnorr
* Sharding: Shamir Secret Sharing
* Non-Correlation & Selective Disclosure: Redaction Hash Tree
* Data Architecture: Directed Graph
---
* **Data Size:** 256 Bit (when possible)
* Input & ouput values are indistinguishable
* Hashes, public keys, other values
* non-correalation techniques are easier
* see CID
* 256 bit matches Bitcoin security
* CON: Not 256 now
* nonce for chacha, Schnorr sig is 2x (512 bytes)
---
* **Hash Function:** BLAKE3
* 256 bit version.
* New, but worthwhile!
* Allows streaming, incremental updates
* BLAKE2 is mature, BLAKE3 is well-supported
* CON: No hardware acceleration
---
* **AEAD Cipher Function:** ChaChaPoly
* ChaCha20 cipher + Poly1305 MAC
* Modern, robust, IETF standard, overcomes AES weaknesses
* Faster in software than AES
* CON: But is it too strong?
* ? Proxy to test ?
* CON: No hardware acceleration
* Alt: AES-XTS (block cipher but tweakable, used by Apple's FileVault)
---
* **Curve:** Secp256k1
* Familiar, well-tested with Bitcoin
* Curve25519 is not multisig safe
* Curve25519 has other inconsistencies
* CON: Not IETF/NIST/chip, etc.
---
* **Signing:** Schnorr (x-only)
* Also new, but worthwhile!
* Public keys aren't embedded in signature
* Signatures are 512 bits
* plus 256 for x-only public key
* Features for future:
* FROST quorum, adapter sigs, etc.)
* CON: No silicon support (yet!)
* CON: x-only signatures may bite us in future for some advanced protocols. TBD.
---
* **Sharding:** Shamir with Groups
* Shamir's Secret Sharing is mature & limitations well known
* SSKR implementation also allows groups
* Groups offers scenarios with increased resilience against collusion
* Blockchain Commons SSS & SSKR have security review
* VSS is emerging, and plan to integrate in SSKR, but feels unstable today.
---
* **Non-Correlation & Selective Disclosure:** Redaction Hash Tree
* Data can be redacted with a hash tree (using BLAKE3)
* Not just issuers, but holders can redact information
* Alternative ZKPs (often complex and use new curves like BLS)
* CONS: some cryptographic questions on variable salts and malleable signing
---
* **Data Architecture:** Directed Graph
* Data storage is triples (subject / predicate / object)
* Deterministic CBOR address canonicalization problems of JSON
* Schema-less, but Envelopes are designed with option for quads (i.e. RDF and schemas are possible)
* Should overcome historic problems such as RDF
* CON: Purist RDF (JSON-LD) proponents may object to no requirement schema
---
### Other Possible Suites
* optimized for constrained hardware
* for instance AES-XTS, SHA-256, ECDSA)
* zk-optimized
* (Ciminion AEAD, Poseidon hash, BLS12-381 or Halo curves, Pairing signature, BBS+ redaction)
---
# Old Agendas
---
## Agenda
<font size=4>(2012-08-03)</font>
* Since Last Session
* Refactored [BCSwiftSecureComponents](https://github.com/BlockchainCommons/BCSwiftSecureComponents) out of [BCSwiftFoundation](https://github.com/BlockchainCommons/BCSwiftFoundation)
* Update [envelope test vectors](https://github.com/BlockchainCommons/BCSwiftSecureComponents/blob/master/Docs/7-ENVELOPE-TEST-VECTORS.md) & [SSKR Test Vectors](https://github.com/BlockchainCommons/BCSwiftSecureComponents/blob/master/Docs/8-ENVELOPE-SSKR-TEST-VECTORS.md)
* Proposal for [envelope-cli](https://hackmd.io/@wolfmcnally/SyWqN9Dp5)
* Bitmark Demo
* Proxy SSKR Doc Page
* Wolf overview envelop tool
* Questions
* Blake3 vs SHA256
* Priorities?
{"metaMigratedAt":"2023-06-17T06:11:04.027Z","metaMigratedFrom":"YAML","title":"Collaborative Seed Recovery Group Meeting Agendas","breaks":false,"description":"View the presentation with \"Slide Mode\"","robots":"noindex, nofollow","contributors":"[{\"id\":\"408a260c-90cf-4399-836c-fa045d136c3f\",\"add\":10549,\"del\":2638},{\"id\":\"45cfea48-88de-44ae-8ab6-719baceab3d3\",\"add\":1,\"del\":0},{\"id\":\"0b0d4b7e-e9c8-49f0-9ef4-13bc8cb215c4\",\"add\":26,\"del\":0}]"}