This project is open source under an Apache 2.0 licence. That means you can submit PRs to fix bugs and add new features if they are not currently available.
In this version of confidential identities we do not store X.509 certificates for confidential identities. This significantly reduces the memory overhead for node operators that may want to host multiple accounts and anonymise transaction participation.
Instead, we still store a mapping between a newly generated PublicKey
for a confidential identity and a CordaX500Name
.
This CorDapp contains three flows which can be used to generate, share and synchronise data required for use of confidential identities in an application.
First, add a variable for the confidential identities version you wish to use and set the corda version that works with this version of confidential indentities:
buildscript {
ext {
corda_release_version = '5.0.0-DevPreview-1.*'
confidential_id_release_version = '2.0.0-DevPreview-1.*'
confidential_id_release_group = 'com.r3.corda.lib.ci'
}
}
Now, you can add the confidential identities dependencies to the dependencies
block
in each module of your CorDapp. In your workflow build.gradle
add:
cordaCompile "$confidential_id_release_group:ci-workflows:$confidential_id_release_version"
We define the ChallengeResponse
type alias of SecureHash.SHA256
to be used to guard against a possible replay attack.
This flow can be used to register a mapping in the IdentityService
between the PublicKey
and the CordaX500Name
for
a confidential identity. This mapping is required for the node operator to be able to resolve the confidential identity.
The initiating node will generate a ChallengeResponse
that is sent to the counter-party. The counter-party creates a
new key pair for an external ID given by a UUID
. Alternatively, a node can provide the owning key for
confidential identity that will be registered in the IdentityService
. The counter-party will generate an additional ChallengeResponse
parameter which is then concatenated with the first and signed over to prevent signing over a malicious transaction.
After node requests a new confidential key, the counter-party sends back the SignedKeyForAccount
object that
wraps the confidential identity PublicKey
and a serialized and signed version of the ChallengeResponse
. The signing key
and challenge response are verified before registering the mapping in the IdentityService
.
This flow should be used when a node wishes to synchronise the PublicKey
to CordaX500Name
mapping of a confidential
identity with another node. This confidential participants of a transaction can be extracted from a given WireTransaction
if this is passed as a parameter to the flow. Alternatively, the node can bypass the need for a transaction and accept a
list of AbstractParty
that it wishes to synchronize with another node.