Skip to content

Commit

Permalink
a few more minor edits
Browse files Browse the repository at this point in the history
  • Loading branch information
Victor Graf committed Apr 1, 2022
1 parent df79a56 commit a8ef69a
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ Creating a backup file consists of a number of steps to derive the encryption ke

1. Generate a random nonce and hash it with the password or PIN input to get the initial key.
2. Generate a random fuse key and hash it with the initial key to get an updated key.
Encrypt this fuse key to the public key of the circuit breaker service and discard the fuse key.
Encrypt this fuse key to the public key of the circuit breaker service and discard the plaintext fuse key.
3. Send the key as a blinded message to the ODIS to be hashed under a [password hardening domain](/celo-codebase/protocol/odis/use-cases/key-hardening).
Use an authentication key derived from the backup nonce such that only a user with access to the backup can make queries to ODIS.
Hash the response from ODIS together with the key to generate the hardened key.
Expand Down
6 changes: 6 additions & 0 deletions docs/celo-codebase/protocol/odis/domains/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,12 @@ slug: /celo-codebase/protocol/odis/domains
---
import PageRef from '@components/PageRef'

::: caution

Domain API features described here are not deployed to Mainnet ODIS as of April 1, 2022.

:::

In order to support use cases such as password hardening, and future applications, ODIS implements Domains.
A Domain instance is structured message sent to ODIS along with the secret blinded message.
Unlike the blinded message, the Domain instance is visible to the ODIS service and allows the client to specify context information about their request.
Expand Down
2 changes: 1 addition & 1 deletion docs/celo-codebase/protocol/odis/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ The number of key holders ($$m$$) and threshold of signatures required ($$k$$) t
### Production setup

As of October 2021, ODIS operates with 7 signers and a threshold of 5 (i.e. $$m=7, k=5$$).
As a result, 5 of the 7 parties must cooperate in order to produce an output from the OPRF function, and as long as at least 3 are honest and secure, no unauthorized requests will be served.
As a result, 5 of the 7 parties must cooperate in order to produce an output from the (P)OPRF function, and as long as at least 3 are honest and secure, no unauthorized requests will be served.

<!-- TODO(victor): Once the new set is in production, information about the 7 operators should be included here -->

Expand Down

0 comments on commit a8ef69a

Please sign in to comment.