Summary
- Revocation Scheme Proposal ALLOSAUR - Presentation - Mike Lodder
- Request: Support for Arrays and Nested data in AnonCreds
- Open Discussion
Recording of Call:
Notices:
This specification creating group operates under the Linux Foundation Community Specification License v1.0.
Hyperledger is committed to creating a safe and welcoming community for all. For more information please visit the Hyperledger Code of Conduct. |
---|
Meeting Attendees
Stephen Curran (BC Gov / Cloud Compass Computing Inc.) <swcurran@cloudcompass.ca>
Related Repositories:
- Mike Lodder's proposed Data Models: https://hackmd.io/ZlsnLoclSveePJOZljgMfA
- AnonCreds v2.0 Specification Repository: https://github.com/hyperledger/anoncreds-spec-v2/
- AnonCreds v1.0 Specification: https://hyperledger.github.io/anoncreds-spec/
- AnonCreds Methods Registry: https://hyperledger.github.io/anoncreds-methods-registry
- AnonCreds Rust Open Source Code: https://github.com/hyperledger/anoncreds-rs
Goals of the Working Group:
The goal of AnonCreds v2.0 is to retain and extend the privacy-preserving features of AnonCreds v1.0, while improving capabilities, performance, extensibility, and security.
Meeting Preliminaries:
- Welcome and Introductions
- Announcements:
- IIW – April 18-20 – Let's plan some presentations.
- Next AnonCreds V2.0 Meeting will be cancelled because of IIW
- AnonCreds Workshop presented by Hyperledger is planned for May 31, 2023, 8:00 Pacific / 17:00 Central Europe. Details to be shared.
- I'll be talking at the Linux Foundation Open Source Summit, Metaverse Conference about Hyperledger AnonCreds and ZKPs.
- Updates to the Agenda?
Agenda
- Mike Lodder will continue the discussion of his proposal for AnonCreds v2.0, this time talking about the proposed ALLOSAUR accumulator/ZKP revocation scheme.
- Request: Support for Arrays and Nested data in AnonCreds – Kyle Robinson
- Plans for IIW?
- Next Meeting (two weeks):
- ALLOSAUR Revocation
- Suspension vs./as well as revocation?
Future Calls
- Collect some use case specific examples and continue the discussions:
- Applying the data structures to a real use case or two
- What concrete uses other than link-secret is there for blinded data in a credential?