Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encode public key in dids (rather than nillion1 address) #132

Open
tim-hm opened this issue Feb 24, 2025 · 1 comment
Open

Encode public key in dids (rather than nillion1 address) #132

tim-hm opened this issue Feb 24, 2025 · 1 comment
Assignees
Labels
enhancement New feature or request

Comments

@tim-hm
Copy link
Collaborator

tim-hm commented Feb 24, 2025

Currently dids follow the format: did:nil:mainnet|testnet:nillion1_rest_of_address. This approach requires the receiver to hold the associated public key to validate the signature (this is because the nillion address is a hash of the public address).

There are advantages to removing this state. For example, it makes it easier to have stateless requests to some services in the nillion network, allows an account that doesn't exist in nilDB, with delegate permissions, to run a query or upload data, and it would make it easier to support requests from other chains.

Additionally, the NUC spec is adopting this format for similar reasons.

So, we should migrate NilDB to use dids shaped as did:nil:public_key_as_hex.

@tim-hm tim-hm added the enhancement New feature or request label Feb 24, 2025
@tim-hm tim-hm assigned tim-hm and pablojhl and unassigned tim-hm Feb 26, 2025
@tim-hm
Copy link
Collaborator Author

tim-hm commented Feb 26, 2025

@pablojhl as this relates to the NUC and NilVM signature work i've assigned it to you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants