Skip to content

Commit

Permalink
Update ERCS/erc-7857.md
Browse files Browse the repository at this point in the history
Co-authored-by: Mercy Boma Naps Nkari <96525594+bomanaps@users.noreply.github.com>
  • Loading branch information
Wilbert957 and bomanaps authored Jan 30, 2025
1 parent 4bae812 commit 271fbdb
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion ERCS/erc-7857.md
Original file line number Diff line number Diff line change
Expand Up @@ -298,7 +298,7 @@ For the reference implementation, please refer to 0G Labs' [0G Agent NFT](https:
1. **Proof Verification**
- Implementations must carefully verify all assertions in the proof
- Replay attacks must be prevented
- Different verfication systems have their own security considerations, and distinct capabilities regarding key management: TEE can securely handle private keys from multi-parties, enabling direct data re-encryption. However, ZKP, due to its cryptographic nature, cannot process private keys from multi-parties. As a result, the re-encryption key is also from the prover (i.e., the sender), so tokens acquired through transfer or cloning must undergo re-encryption during their next update, otherwise the new update is still visible to the previous owner. This distinction in key handling capabilities affects how data transformations are managed during later usage
- Different verification systems have their own security considerations, and distinct capabilities regarding key management: TEE can securely handle private keys from multi-parties, enabling direct data re-encryption. However, ZKP, due to its cryptographic nature, cannot process private keys from multi-parties. As a result, the re-encryption key is also from the prover (i.e., the sender), so tokens acquired through transfer or cloning must undergo re-encryption during their next update, otherwise the new update is still visible to the previous owner. This distinction in key handling capabilities affects how data transformations are managed during later usage
2. **Data Privacy**
- Only hashes and sealed keys are stored on-chain, actual functional data must be stored and transmitted securely off-chain
- Key management is crucial for secure data access
Expand Down

0 comments on commit 271fbdb

Please sign in to comment.