Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support proper Neo N3 accounts #305

Open
roman-khimov opened this issue Aug 21, 2024 · 0 comments
Open

Support proper Neo N3 accounts #305

roman-khimov opened this issue Aug 21, 2024 · 0 comments
Labels
feature Completely new functionality I0 Maximum impact S0 Critically significant U2 Seriously planned

Comments

@roman-khimov
Copy link
Member

Is your feature request related to a problem? Please describe.

I'm always frustrated when we can't use proper multisig and contract-based accounts in NeoFS. This severely limits us, we can't have a container owned by a set of keys (hi, neo-project/neo#3463), we can't have users with dynamic keys managed by some contract.

Describe the solution you'd like

Looks like this can be retrofitted into the protocol relatively easily given the current definition of Signature. What we need in its essence is a good old pair of invocation and verification scripts, so the first one could go into key and the second one into sign fields. Then an additional scheme type would allow to distinguish between the two. The main thing is that we can add it without any additional binary fields, just extending the meaning of the old ones.

Then verification would be a standard N3 script run against the current state of the FS chain checking the hash of the payload (network id included).

Describe alternatives you've considered

I don't see a lot of them.

@roman-khimov roman-khimov added U2 Seriously planned S0 Critically significant I0 Maximum impact feature Completely new functionality labels Aug 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Completely new functionality I0 Maximum impact S0 Critically significant U2 Seriously planned
Projects
None yet
Development

No branches or pull requests

1 participant