> On 22 Sep 2022, at 14:56, Ilari Liusvaara <[email protected]> wrote:
> 
> On Thu, Sep 22, 2022 at 07:49:06AM -0500, Orie Steele wrote:
>> I've been a part of some of those conversations, and I agree that if HPKE
>> is going to define a new key format, it should be possible to represent it
>> consistently across serializations... I suggest you share one of the JSON
>> like examples here to explain the concept, those really helped me grok it.
> 
> A HPKE X25519 public key could look like:
> 
> 
> {
>       "kty": "HPKE",
>       "kem": 32,
>       "kdf": 1,
>       "pub": "3p7bfXt9wbTTW2HC7OQ1Nz-DQ8hbeGdNrfx-FG-IK08"
> }
> 
> kem 32 is X25519, kdf 1 is SHA-256. One could add "aead": 1 to hint the
> sender to use AES-128-GCM.
> 
> Private keys have "priv" member containing base64url-encoded private
> key.
> 
> 
> This kind of format is totally generic for HPKE, requiring no
> maintenance.
> 

Why not use the existing okp key type with “alg”: “HPKE” or similar? You can 
define the additional HPKE-specific fields as you wish (although perhaps best 
to namespace them somehow to avoid conflicting with other future JWK 
extensions).

— Neil
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to