docs: cryptography deep dives#214
Conversation
|
Review notes This PR is clean. No broken links, no banned patterns, frontmatter complete (including One optional improvement (not blocking): Ready to merge. |
|
Two issues to address before merging: 1. Em-dashes in
|
| File | Current order | Proposed order |
|---|---|---|
certified-data.md |
11 | 10 |
| chain-fusion | (current) | 11 |
vetkeys.md |
11 | 12 |
| security | (current) | 13 |
| governance | (current) | 14 |
Please verify the full ordering in the concepts sidebar before adjusting, as the right numbers depend on what other pages occupy orders 10 and above.
|
Content accuracy follow-up — The new subsection on key resharing states:
The Learn Hub source material only describes resharing occurring when subnet membership changes (e.g., node rotation). It does not describe periodic intra-subnet resharing as an adaptive adversary defense mechanism. This claim may be accurate — it is consistent with how proactive secret sharing works in threshold cryptography — but it goes beyond what the migration source supports. Please verify it against the IC interface spec or If not verifiable from available sources, the sentence should be narrowed to what is confirmed:
|
|
Feedback addressed:
|
dabad66 to
d191270
Compare
cd6cbbb to
155259a
Compare
Add docs/concepts/certified-data.md covering the certified query response mechanism: single public key verification, certified state tree, certified variables interface, and applications (certified assets, Internet Identity). Expand docs/concepts/chain-key-cryptography.md with context on why threshold ECDSA is harder than BLS (asynchronous network, robustness requirements, protocol papers) and how Schnorr/EdDSA protocols are simplified variants. Link to new certified-data.md. Update docs/concepts/index.md and docs/guides/backends/certified-variables.md to reference certified-data.md. All 4 staging files under .migration/learn-hub/.../chain-key-cryptography/ consumed and deleted.
- Replace 4 em-dashes in certified-data.md with commas, colon, or parentheses - Resolve sidebar order collision: vetkeys 11->12, security 12->13 (certified-data stays at 11 in the sequence after chain-fusion at 10) - Narrow the resharing claim in chain-key-cryptography.md to what is confirmed from source material: resharing runs on membership changes, not described as periodic proactive secret sharing
… pages Remove "blockchain" comparisons from certified-data.md intro paragraphs. Replace "cross-chain" with "crosschain" and "other blockchains" with "other chains" in chain-key-cryptography.md. Replace "blockchain address" with "network address". Fix DAO reference in security.md. Remove em-dashes from Upstream comments. Fix "learn hub staging:" Upstream comment format.
…benefit, security cross-link - certified-data.md: expand NNS on first use - chain-key-cryptography.md: expand NNS on first use in Deployed keys section; add DKG research paper link (eprint.iacr.org/2021/339) from Subnet Keys source; add VetKeys to 'Why threshold cryptography matters' benefits list - security.md: add link to certified-data.md where certified variables are first explained
9055473 to
55d600c
Compare
Summary
docs/concepts/certified-data.md— concept page explaining: the verification problem (compare to Bitcoin SPV / Ethereum light clients), how ICP's single root public key enables chain-wide certificate verification, the certified state tree mechanism, certified variables interface, and applications (certified assets, Internet Identity)docs/concepts/chain-key-cryptography.md:eprint.iacr.org/2021/339) to the DKG sectiondocs/concepts/security.md— adds link tocertified-data.mdwhere certified variables are first explained (cross-referencing the concept page from the security model page)docs/guides/backends/certified-variables.md— links to the new concept page for background.migration/learn-hub/.../chain-key-cryptography/Completeness audit (staff technical writer sign-off)
Source articles audited element-by-element via Zendesk API raw HTML:
Cross-referencing
security.mdnow links tocertified-data.mdat the point where certified variables are introduced as the solution to query call integritycertified-variables.md(guide) links to bothcertified-data.md(concept) andsecurity.md(security implications)chain-key-cryptography.mdlinks tocertified-data.mdandvetkeys.mdSync recommendation
hand-written