You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our current BTCR docs reference public key type EdDsaSAPublicKeySecp256k1 and mention encoding the key material according to the Koblitz Elliptic Curve Signature 2016 signature suite.
We also need to note that when you extract the signature from the transaction, there are multiple public keys possible that could have generated it. Given a signature (an (r,s) pair), and the message it signs, there can be up to 4 different public keys for which it is valid.
To know which one, the number is encoded along the signature. The first byte is this recovery parameter plus 27. If the corresponding public key is to be a compressed one, 4 is added. The next 32 bytes encode r. The last 32 bytes encode s.
@ChristopherA Do you have a reference regarding the above comment that I can look at? I'm starting to get into all of this for our C++ library and need to come up to speed. thanks!
Our current BTCR docs reference public key type
EdDsaSAPublicKeySecp256k1
and mention encoding the key material according to the Koblitz Elliptic Curve Signature 2016 signature suite.We should ensure we're consistent with the latest registry versions (or add a new entry if not already present): https://w3c-ccg.github.io/ld-cryptosuite-registry.
Also, ensure we're using
proof
instead ofsignature
consistently.The text was updated successfully, but these errors were encountered: