-
Notifications
You must be signed in to change notification settings - Fork 998
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Transfers checklist #1343
Comments
This would imply supporting both current-style and new-style withdrawal credentials, right? Seems reasonable, as I do expect we'll see more types of withdrawal credentials (eg. authorize withdrawal direct to EE with pre-specified data only) in the future. |
I understood it more in the sense of supporting commitment to such a secret, so that protocol support could be introduced if necessary. Wouldn't supporting arbitrary withdrawals require coding the credentials as a script in a VM? |
My suggestion is to abandon current-style withdrawal credentials. One concrete possibility is to have a class Credentials(Container):
withdrawal_credentials: Bytes32 # 1 byte version prefix
quantum_credentials: Vector[Bytes32, 512] # Lamport secrets Notice that operations that authenticate class Credentials(Container):
version: Bytes1
withdrawal_credentials: Hash # Unversioned
quantum_credentials: Vector[Bytes32, 512] By moving the 1-byte outside of |
A few more thoughts:
|
Yet another way to stick with the current |
Closing this issue for now as Transfers are to be added in some later (to be determined) phase |
0_beacon-chain.md
to1_beacon-chain-misc.md
. See Starting on phase 1 misc beacon changes #1323.recipient
aBLSPubkey
instead of aValidatorIndex
.assert state.slot == transfer.slot
) with one based on atransfer_roots
list/vector in theBeaconState
keeping track of recent transfer roots over many epochs.withdrawal_credentials
to include a commitment to secrets (see Quantum-secure backup infrastructure for BLS signatures #1342).The text was updated successfully, but these errors were encountered: