You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-jose-json-proof-algorithms.md
+4-3Lines changed: 4 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -273,7 +273,7 @@ Prior to the issuer creating a new JWP, it must have presentation binding inform
273
273
274
274
The presentation key used by the holder must be transferred to the issuer and verified, likely through a challenge and self-signing mechanism. If the holder requires unlinkability, it must also generate a new key that is verified and bound to each new JWP.
275
275
276
-
How these holder presentation keys are transferred and verified is out of scope of this specification. Protocols such as OpenID Connect can be used to accomplish this. What is required by this definition is that the holder's presentation key MUST be included in the issuer's protected header using the `pjwk` parameter with a JWK as the value.
276
+
How these holder presentation keys are transferred and verified is out of scope of this specification. Protocols such as OpenID Connect can be used to accomplish this. What is required by this definition is that the holder's presentation key MUST be included in the issuer's protected header using the `presentation_jwk` parameter with a JWK as the value.
277
277
278
278
### Issuer Setup
279
279
@@ -283,7 +283,7 @@ The Shared Secret is used by both the issuer and holder as the MAC method's key
The holder's presentation key JWK MUST be included in the issuer protected header using the `pjwk` parameter. The issuer MUST validate that the holder has possession of this key through a trusted mechanism such as verifying the signature of a unique nonce value from the holder.
286
+
The holder's presentation key JWK MUST be included in the issuer protected header using the `presentation_jwk` parameter. The issuer MUST validate that the holder has possession of this key through a trusted mechanism such as verifying the signature of a unique nonce value from the holder.
287
287
288
288
### Combined MAC Representation
289
289
@@ -317,7 +317,7 @@ See the JWS [Presentation Protected Header](#presentation-protected-header) sect
317
317
318
318
> Editor's Note: The current definition here is incomplete, the holder's signature needs to also incorporate the presented proof.
319
319
320
-
The first value in the presentation proof is the presentation signature. This is a signature over the presentation protected header, using the key specified by the `pjwk` parameter in the issuer protected header.
320
+
The first value in the presentation proof is the presentation signature. This is a signature over the presentation protected header, using the key specified by the `presentation_jwk` parameter in the issuer protected header.
321
321
322
322
The second value is the issuer signature over the Combined MAC Representation provided with the issued form.
323
323
@@ -802,6 +802,7 @@ The BBS examples were generated using the library at https://github.com/mattrglo
802
802
803
803
* Update reference to new repository home
804
804
* Fixed #77: Removed vestigial use of `presentation_header`.
0 commit comments