-
-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement group-agent countersigning for EconomicEvent #83
Comments
I think we'll need to consider role-based signing, at some level of complexity. But I totally agree we should be driven by the requirements of the economic networks. I suspect we will eventually want different "plug in" kinds of things that a group can choose to implement, and can develop these first-come-first-served.... |
Maybe writing some use cases will help. |
The way I see it: Admin: can add users to the group For supply chains that are sensitive, these transactions need to be private, similar to how double-entry accounting is now. Everyone is sensitive to the value they have sold for becoming public knowledge and come supply chains are sensitive about the knowledge of the origin of their supply becoming public knowledge as the R&D into the finding a supplier that can meet the specifications is considered intellectual property. However, legislation like Modern Slavery and the potential for GHG emissions tracking is enclosing on these types of supply chains and the old guard is looking for solutions to still maintain this level of privacy while being compliant. The benefits that REA brings is traceability so having origins, or certifications like modern slavery or carbon being passed to the recipient would be desirable, how this is possible? by an oracle, or an even better solution is if this could be passed via a zero-knowledge proof if the architecture can handle that. I also see problematic issues with all of this data being stored on the node’s source chain to provide the privacy with access granted above should be possible via capability tokens? this can have issues of being able to access the data due to network partitioning or node just being offline. The architecture will require high availability super-agent nodes for the group that hold all data for the group. |
We might need the ability to send commands to delete the data held on one of the group devices, for when an agent leaves the group, or their device is lost. Similar to what Android and iOS can do when a device is lost. |
Once single-agent countersigning is completed in #82 we will need to do the same for group agents. This will also require #9 to be completed first.
The issue with signing and groups comes down to when
receiver
is a group agent- the group agent then must sign for the event; which means some human or "oracle" agent(s) with authority to do so must sign on behalf of the group.Like timestamping, the correct approach here will depend on the requirements of the economic network. Some options could be:
provider
can sign asreceiver
, and vice-versaLetting us know of any other options we should consider here would be much appreciated (:
The text was updated successfully, but these errors were encountered: