What is Nostr?
George Tsagkarelis [ARCHIVE] /
npub1ay3…raj8
2023-06-09 13:06:18
in reply to nevent1q…9a0h

George Tsagkarelis [ARCHIVE] on Nostr: πŸ“… Original date posted:2022-06-16 πŸ“ Original message: # DataSig -- Data ...

πŸ“… Original date posted:2022-06-16
πŸ“ Original message:
# DataSig -- Data signatures over Lightning

## Introduction

Greetings, Lightning devs

This mail serves as an introduction to one of the two specs
that we want to propose to the community.
The scope of these specs is transmitting data over the Lightning
Network (over HTLC custom records). This is a use-case already used
by a few projects ([1], [2], [3], [4]), and in this context
we do not intend to debate the validity of it.

As mentioned, DataSig is one of the two specs we aim in proposing:
* DataSig: Concerns the authentication of some data with regards to
the source and destination of the transmission.
* DataStruct: Concerns the outer layer of the data structure,
mainly focusing on the data fragmentation aspect of transmission.

We seek feedback on the two specs as we want to improve and tweak
them before proceeding with a BLIP proposal.

## DataSig

This spec's aim is to describe the format of a structure representing
a signature over some arbitrary data.

Before proceeding, a few clarifications must be made:
* The DataSig structure is placed inside a custom TLV record
* DataSig allows the receiving end validate that:
* Data were authored by the source node
* Data were meant to be received by the receiving node.

The main scope of DataSig is assisting with data verification
independently of what medium one chooses for data transmission.
Nevertheless, for simplicity, in the follow-up DataStruct spec
we assume the data to be transmitted over custom TLV records as well.

We consider a compact encoding to be used for representing the
DataSig structure over a TLV, so it is expressed as the following
protobuf message:

```protobuf
message DataSig {
uint32 version = 1;
bytes sig = 2;
bytes senderPK = 3;
}
```

* `version`: The version of DataSig spec used.
* `sig`: The bytes of the signature.
* `senderPK`: The sender's public key.

### Generation

In order to instantiate a DataSig signing the data `D`, one needs
to follow these steps:

1. Populate `version` with the version that is going to be used.
2. Prepend the desired destination address (`A`) to `D`,
creating a new byte array (`AD`).
3. Sign the byte array `AD`, generating a signature encoded in
fixed-size LN wire format.
4. Populate the `sig` field with the generated signature.
5. Populate `senderPK` with own address.
6. Encode the resulting DataSig structure to wire format
(byte array `S`).

### Verification

Assuming that the destination node has retrieved:
* The byte array of the data `D`
* The byte array of the encoded signature struct `S`

The data should be verified against the signature
by following the below procedure:

1. Decode bytes `S` according to DataSig protobuf message definition.
2. If signature `version` is not supported or unknown, consider data
to be unsigned.
3. Prepend own address (`A`) to byte array `D`, generating the byte
array `AD`.
4. Verify the signature provided in `sig` field against the message
`AD` and sender public key `senderPK`.

### Notes / Remarks

* The scope of this spec is to deal with the verification
of the author and intended recipient of transmitted data.
We do not intend to solve the issue of associating a DataSig
to the corresponding data (signed by it), in case they are
not transmitted in pairs.
For now, we assume that data and signature are transmitted
over an HTLC's custom records in pairs.

* You can find a formatted version of this document on
[hackmd](https://hackmd.io/2pzHLslkRkGytfjKROv3AQ?view).

--------------

[1]: https://sphinx.chat
[2]: https://github.com/joostjager/whatsat
[3]: https://github.com/alexbosworth/balanceofsatoshis
[4]: https://github.com/c13n-io/c13n-go


--
George Tsagkarelis | @GeorgeTsag | c13n.io
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20220616/b33f8a43/attachment.html>;
Author Public Key
npub1ay3frldenqcrtwamf75djy2apwaz9s3aqqkzr0td7tcwkkl3l7uqh6raj8