Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Output NetworkInfo from Dynamic Honey Badger #106

Closed
wants to merge 1 commit into from
Closed

Conversation

afck
Copy link
Collaborator

@afck afck commented Jul 4, 2018

This allows the user to use current cryptographic keys and key shares.

An example use case would be if we want to make the sequence of batches
verifiable for third parties, like a blockchain. We would have each
batch signed by the set of validators that produced it, and whenever a
validator changes, sign the new public key using the old key shares.

To a third party that would then look like the owner of the secret key
signed each batch, and occasionally changed their key.

Closes #102

This allows the user to use current cryptographic keys and key shares.

An example use case would be if we want to make the sequence of batches
verifiable for third parties, like a blockchain. We would have each
batch signed by the set of validators that produced it, and whenever a
validator changes, sign the new public key using the old key shares.

To a third party that would then look like the owner of the secret key
signed each batch, and occasionally changed their key.
@afck
Copy link
Collaborator Author

afck commented Jul 4, 2018

This is not a nice solution and I'm open for suggestions! I've thought of three alternatives:

  • Adding a netinfo getter instead of outputting it with each batch wouldn't work: It's conceivable that a single call to handle_message produces several batches with key changes, so we would miss one, and be unable to complete the chain of signatures.
  • Adding the network info to the Batch itself seems dangerous: I think the batches should be considered the public agreement, i.e. they shouldn't contain a secret key share, and they should be equal in each node.
  • Putting the NetworkInfo into an Option and only cloning it when it has actually changed instead of every time seems less wasteful. But it makes the type more complicated, and one clone per batch is negligible overhead.

/cc @c0gent

@c0gent
Copy link
Contributor

c0gent commented Jul 4, 2018

It seems like NetworkInfo may be pulling double duty here. Perhaps create a separate, PublicNetworkInfo type that is similar but contains no secret key?

@afck
Copy link
Collaborator Author

afck commented Jul 4, 2018

That's true, that would make sense anyway, and then we could make the PublicNetworkInfo part of the Batch itself. But what about the private one? That needs to be passed back to the caller after a validator change, too. I guess we'd still have a tuple then?

type Output = (Batch<Tx, NodeUid>, SecretKey);

@c0gent
Copy link
Contributor

c0gent commented Jul 4, 2018

You could store it as a struct with three fields then assemble it into a tuple or a two-field struct when needed. I'm not completely clear on the nuances of how this is used though so take my advice with a grain of salt.

@afck
Copy link
Collaborator Author

afck commented Jul 5, 2018

I'm not completely clear on the nuances of how this is used though

I'm not sure yet either. I'm happy to postpone this until we have a clearer picture of what we need from Parity's side.

@afck
Copy link
Collaborator Author

afck commented Jul 5, 2018

I'll close this for now. Needs some API design.

@afck afck closed this Jul 5, 2018
@afck afck deleted the afck-dhb-netinfo branch July 17, 2018 13:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants