Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[feature request] allow for disclosure of response digests #566

Open
sunny-g opened this issue Aug 14, 2024 · 2 comments
Open

[feature request] allow for disclosure of response digests #566

sunny-g opened this issue Aug 14, 2024 · 2 comments

Comments

@sunny-g
Copy link

sunny-g commented Aug 14, 2024

The selective disclosure of subsets of an HTTP response is very useful when the responses contain structured data, but when they are otherwise non-human readable or simply just binary data (images, PDFs, protobufs, etc), it would be very convenient to provide an option for hashing the data and instead disclosing just its digest.

As that computation would (probably) have to run within the prover, perhaps Poseidon is a sane default?

Likely depends on fixing #461

@themighty1
Copy link
Member

@sunny-g , could you give some more details how the digest will be used?

Currently the API allows the prover to create a salted hash commitment to arbitrary data. (although under the hood it is not exactly a standard blake3 hash of the data). The produced hash commitment can then be verified efficiently.

Are you looking for something that can be efficiently verified on the blockchain?

@sunny-g
Copy link
Author

sunny-g commented Aug 26, 2024

@themighty1 in the use case I'm thinking about, the digest of the raw response body could be used as a content-addressable identifier (CID), and the response body could then be disseminated over IPFS or another content-addressable store. So an indexing server could host the verifiable proofs and could point users to decentralized stores to fetch the underlying content.

Does that make sense? I've played tlsn a bit locally, but must have missed part where the salted hash commitments are generated - I'll look into it and see if that satisfies my needs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants