Hi,

the topic was already presented twice at IETF, so I will link the slides here, or have a look into the video material from those sessions:

- IETF 121: https://datatracker.ietf.org/meeting/121/materials/slides-121-jose-designated-verifier-signatures-00

- IETF 123: https://datatracker.ietf.org/meeting/123/materials/slides-123-jose-designated-verifier-signatures-for-jose-00

In very short: privacy through repudiation and scalability in HSM-based systems through easier key derivation

Is it possible that chairs link those drafts together in the datatracker? To my knowledge and extensive search, I don't think its possible for the author itself to do so?

https://datatracker.ietf.org/doc/draft-bastian-dvs-jose/
https://datatracker.ietf.org/doc/draft-bastian-jose-dvs/
https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/

Best, Paul

On 10/28/25 16:11, Simo Sorce wrote:
On Mon, 2025-10-27 at 23:10 +0100, Karen ODonoghue wrote:
8.  Public Key Derived HMAC for JOSE

https://datatracker.ietf.org/doc/draft-bastian-jose-pkdh/
I fail to understand what is the point of this mechanism.

Does anyone have more information than what is available in the
abstract, which does not seem to give any good rationale about
why this mechanism would be useful ?

What is the point of using an ECDH exchange to derive a symmetric key
to then perform a HMAC signature on a message, when the premise is that
both parties must already have each other Public Keys anyway and
therefore could simply apply an ECDSA signature ?

Simo.


_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to