Designing the Certificate #133
bpfarmer
started this conversation in
Pessimistic-proof
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I want to propose a view regarding function and design of the
Certificate
. I don't think that we necessarily need to make changes at the moment, but I more want to be sure that we're on the same page for future iterations.First, I'm not sure that
Certificate
is the proper name for this data structure. A Certificate in TLS, for example, is used to authenticate an identity/public key, not to authenticate data sent by a website. The way that we useCertificate
is to authenticate data that's sent from chains after each block or batch, not to authenticate a distributed signing key or some validator set.That aside, there are multiple contexts in which the state transition of a chain might need to be authenticated. For example, if Chain A receives a message from Chain B, it will need to determine whether the
LET_B
that includes the message is valid. This might involve checking a validity proof or a consensus proof.At the same time, chains need to submit more data to the pessimistic prover service - a complete set of new leaves added to the
LET
, a complete set ofImportedClaims
, etc.There are three desired properties for the data structure that we use to authenticate :
I think that the minimal version of the certificate would be something like:
This should be a minimal version that can be used to verify additional data, but I don't think it makes sense to include every argument to the pessimistic proof as part of the certificate. Given this information, the pessimistic proof can also receive and verify additional data, like the preimage of commitments.
Beta Was this translation helpful? Give feedback.
All reactions