Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extend Flexible Privacy feature to support Tessera's EC encryptor #4262

Closed
freemanzMrojo opened this issue Aug 16, 2022 · 0 comments · Fixed by #4282
Closed

Extend Flexible Privacy feature to support Tessera's EC encryptor #4262

freemanzMrojo opened this issue Aug 16, 2022 · 0 comments · Fixed by #4282

Comments

@freemanzMrojo
Copy link
Contributor

freemanzMrojo commented Aug 16, 2022

Description

As a user, I want to extend the Flexible Privacy feature so that I am able to use it along with Tessera's EC encryptor mode.

The Flexible Privacy feature relies on these Smart Contracts and the Java wrappers "above" them. As we can see, they expect a bytes32 argument for the participants (Tessera's enclave public key).

For the EC encryptor mode of Tessera, we expect enclave public keys to be longer than 32. This means that we need to somehow adapt the code so we can use these keys as identifiers of the participants as well. For instance, we could modify the contracts so they take a bytes parameter. This option has pros and cons so there is still some analysis to carry out in this regard, which includes exploring other options.

Looping in @NicolasMassart and @pinges since I discussed this issue with him a couple of months ago. It would be the follow-up of this other solved issue.

If you think it makes sense, I would like to be the assignee of the issue.

Thanks in advance!

Acceptance Criteria

  • We are able to use the Flexible Privacy Group feature along with Tessera's EC encryptor
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant