Summary:
Planned topics
- Work updates (5 mins)
- Grooming (20 mins)
- Design discussion (20 mins)
- Open Discussion (10 mins)
...
(7:30AM Los Angeles, 10:30AM Toronto/New York, 3:30PM London, 17:30H Moscow)
Remember the Hyperledger Code of Conduct
Anti-Trust Policy:
Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.
...
- Sudesh Shetty (SecureKey) sudesh.shetty@securekey.com
- George Aristy (SecureKey) <george.aristy@securekey.com>
- Андрій Солук (Euristiq) <andrii.soluk@euristiq.com>
- Andriy Holovko (Euristiq) <andrii.holovko@euristiq.com>
- Dmitriy Kinoshenko (Euristiq) <dmytro.kinoshenko@euristiq.com>
- Rolson Quadras (SecureKey) <rolson.quadras@securekey.com>
- derektrider (SecureKey) <derek.trider@securekey.com>
Welcome / Introductions
Announcements
...
- Credential Status Check over DIDComm: #1454 George Aristy
- Issue Credential - adds REST support (in progress) Андрій Солук #1650
- Present Proof - adds command support (on review) Андрій Солук #1633
- Fixed minor issues: Present Proof unit tests, BDD test. Андрій Солук
- Completed with did:key method support Andriy Holovko #1537
- Improve Presentation.SetCredentials() #1620 - Dmitriy Kinoshenko
- Support `publicKeyHex` verification key in EcdsaSecp256k1Signature2019 signature suite #1609 - Dmitriy Kinoshenko
- Multiple proof array in VC #1645 - Dmitriy Kinoshenko
- Check all verification relationships of DID when resolving public key of VC #1652 - Dmitriy Kinoshenko
- Fix JWK.PublicKeyBytes() for ed25519 and ecdsa #1660 - Dmitriy Kinoshenko
Add Default implementation for JWE Anoncrypt SPI#987 Baha A Shaaban
- Create new Key types to support ECDH-ES primitives (using NIST approved keys) #1469
- Replace HKDF with ConcatKDF in new ECDH-ES Tink primitive #1472
- Update created Tink Key types to return JWE components from crypto primitives #1470
- Add JWE build/parse support with new Tink key type created above #1638
- Increase unit test coverage in tinkcrypto HMAC once panic in Tink is fixed #1512 derektrider
Grooming updates (from the previous week)
...
Other business
- TBD
Upcoming work
- Follow-up tickets on did:key method (e.g. #1659, need discussion) Andriy Holovko
- Integration DIDComm protocols with edge-service Andriy Holovko
- Present Proof - need to add REST support Андрій Солук
- VC BDD tests extension - need to add new KMS/Crypto support Dmitriy Kinoshenko
- Improvements in JWS, VC JWS Dmitriy Kinoshenko
- New JWE deserialize function #1507 derektrider
Future topics
- TBD
Action items
...