Verifiable

所属分类:加密解密
开发工具:C#
文件大小:2025KB
下载次数:0
上传日期:2023-05-03 20:25:24
上 传 者sh-1993
说明:  NET实现了去中心化的标识符和可验证的证书,一些相关的协议和密码...
(A .NET implementation of decentralized identifiers and verifiable credentials, some associated protocols and cryptographic routines.)

文件列表:
.config (0, 2023-05-04)
.config\dotnet-tools.json (871, 2023-05-04)
.editorconfig (11707, 2023-05-04)
.vscode (0, 2023-05-04)
.vscode\extensions.json (165, 2023-05-04)
.vscode\launch.json (1096, 2023-05-04)
.vscode\settings.json (115, 2023-05-04)
.vscode\tasks.json (1225, 2023-05-04)
BannedSymbols.txt (137, 2023-05-04)
CHANGELOG.md (592, 2023-05-04)
Directory.Build.props (4135, 2023-05-04)
LICENSE (11344, 2023-05-04)
NuGet.config (228, 2023-05-04)
Verifiable.sln (7458, 2023-05-04)
bom-analysis.ps1 (61, 2023-05-04)
create-nugets.ps1 (1711, 2023-05-04)
resources (0, 2023-05-04)
resources\diagram.svg (50939, 2023-05-04)
resources\verifiable-github-logo.svg (237856, 2023-05-04)
resources\verifiable-nuget-logo.png (4458, 2023-05-04)
src (0, 2023-05-04)
src\Verifiable.BouncyCastle (0, 2023-05-04)
src\Verifiable.BouncyCastle\BouncyCastleAlgorithms.cs (2174, 2023-05-04)
src\Verifiable.BouncyCastle\BouncyCastleKeyGenerator.cs (1667, 2023-05-04)
src\Verifiable.BouncyCastle\Verifiable.BouncyCastle.csproj (737, 2023-05-04)
... ...

Verifiable project logo: A shield in blue hues with a rounded top that narrows downwards in a 'V' like shape. In the center there is the tip of white 'V' that elongates across the left corner of the shield to white background. Undernath the lower side of 'V' there is a stylistic key handle also elongating over the edge of the shield. #### Decentralized identifiers, verifiable credentials, associated protocols and key management with hardware security elements. ![Main build workflow](https://github.com/lumoin/Verifiable/actions/workflows/main.yml/badge.svg) [![Mutation testing badge](https://img.shields.io/endpoint?style=for-the-badge&url=https%3A%2F%2Fbadge-api.stryker-mutator.io%2Fgithub.com%2Flumoin%2FVerifiable%2Fmain)](https://dashboard.stryker-mutator.io/reports/github.com/lumoin/Verifiable/main)
## Features - Decentralized identifiers (DID). - Verifiable credentials (VC). - Various related protocols to DIDs and VCs. - Key and secrets management. - A simple [.NET tool](https://docs.microsoft.com/en-us/dotnet/core/tools/dotnet-tool-install), Verifiable, to use the libraries. | Library | NuGet | |---------------- | :------:| | Verifiable | [![NuGet](https://img.shields.io/nuget/v/Verifiable.svg?style=flat)](https://www.nuget.org/packages/Verifiable/) | Verifiable.NSec | [![NuGet](https://img.shields.io/nuget/v/Verifiable.NSec.svg?style=flat)](https://www.nuget.org/packages/Verifiable.NSec/) | | Verifiable.Core | [![NuGet](https://img.shields.io/nuget/v/Verifiable.Core.svg?style=flat)](https://www.nuget.org/packages/Verifiable.Core/) | | Verifiable.BouncyCastle | [![NuGet](https://img.shields.io/nuget/v/Verifiable.BouncyCastle.svg?style=flat)](https://www.nuget.org/packages/Verifiable.BouncyCastle/) | | Verifiable.Tpm | [![NuGet](https://img.shields.io/nuget/v/Verifiable.Tpm.svg?style=flat)](https://www.nuget.org/packages/Verifiable.Tpm/) | | Verifiable.Sidetree | [![NuGet](https://img.shields.io/nuget/v/Verifiable.Sidetree.svg?style=flat)](https://www.nuget.org/packages/Verifiable.Sidetree/) | | Verifiable.Security.Windows | [![NuGet](https://img.shields.io/nuget/v/Verifiable.Security.Windows.svg?style=flat)](https://www.nuget.org/packages/Verifiable.Security.Windows/) | | Verifiable.Security.DataStorage | [![NuGet](https://img.shields.io/nuget/v/Verifiable.DataStorage.svg?style=flat)](https://www.nuget.org/packages/Verifiable.DataStorage/) |
### Quickly about practicalities Please, open an issue if you have a suggestion, improvement (e.g. even fixing a typo) or something in mind that could be useful and worth considering. Pressing **.** on keyboard on this repository page or when viewing any file to open this codebase in VS Code web editor is also a good way to get a feel of the code. See more great tips at [10 Fun Things You Can Do With GitHub.dev](https://dev.to/lostintangent/10-awesome-things-you-can-do-with-github-dev-5fm7) by [@lostintangent](https://github.com/lostintangent). Otherwise the usual things about forking and sending pull requests work too. :) #### This is an early version under development. All will be breaking.
This repository contains projects that implement .NET libraries for [W3C decentralized identifier specification (DID)](https://www.w3.org/TR/did-core/), [Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) and related technologies from [Decentralized Identity Foundation (DIF)](https://identity.foundation/). In simple terms these libraries implement a specification for documents that have distinquishing identifier, can be signed, linked, timestamped, managed and combined into representations without the necessity of a central, governing party but can also function well with such parties ([eIDAS](https://en.wikipedia.org/wiki/EIDAS) may be one). Since this technology and its likely applications rely on cryptography, these libraries include basic implementation for management of secrets such as the created documents and their material. Technologies include _trusted platform modules_ (TPM), _hardware security modules_ (HSM) and other potential technology such secure enclaves. #### Quick links - [Decentralized Identifiers data model](https://www.w3.org/TR/did-core/) - [Decentralized Identifiers conformance and test suite](https://w3c.github.io/did-test-suite/) - [Verifiable Credentials data model](https://w3c.github.io/vc-data-model/) - [Verifiable Credentials conformance and test suite](https://w3c.github.io/vc-test-suite/implementations/) - [Trusted Platform Module (TPM 2.0) specifications](https://trustedcomputinggroup.org/resource/tpm-library-specification/)
## The design principles - **Agnostic to serialization and deserialization library.** The design principles for DIDs and VCs and other data elements do not rely on specific deserialization and serialization (e.g. no library specific attributes on types) libraries. Current implementation uses [System.Text.Json](https://www.nuget.org/packages/System.Text.Json/) converters. [CBOR](https://github.com/dotnet/runtime/issues/32121) could be interesting. - **Data oriented programming**. Or leaning towards it. The code is structured around the idea of parameters going in functions and results from return values. Or in more length: code is separate from (immutable) data, leaning generic data structures and general-purpose functions (extenstions methods and static methods). - **Sensitive memory is ring-fenced using types.** The goal is to recognize sensitive key material and handle it appropriately (noting security practices and regulations). Currently public, private and other key material is ring-fenced to types. The types are wrappes that know how to point to and and unwrap material to operations. The material can be allocated using [MemoryPool<T>](https://docs.microsoft.com/en-us/dotnet/api/system.buffers.memorypool-1) and so a custom allocator can be provided (e.g. for [mlocked](https://man7.org/linux/man-pages/man2/mlock.2.html) memory regions). - **Agnostic to underlying cryptographic implementation**. The design should allow using external, special libraries. Currently [BouncyCastle](https://www.nuget.org/packages/Portable.BouncyCastle/), [NSec.Cryptography](https://www.nuget.org/packages/NSec.Cryptography) and [.NET standard cryptography](https://docs.microsoft.com/en-us/dotnet/standard/security/cryptography-model) are included (TPM is in progress). - **Hardware security elements**. It should be possible to use hardware security elements, such as [trusted platform modules](https://en.wikipedia.org/wiki/Trusted_Platform_Module). - **Developer experience**. Writing against an evolving specification or some specific specifications can be difficult. It takes time to learn. So code shoud link in comments to W3C and RFCs where appropriate (see code for examples). - **Tests and tests that use real data**. There should be as much tests as possible. Also thests that use as test vectors data from other implementations to cross-check. ## Vulnerability disclosure If you find a vulnerability in this project please let us know as soon as possibly. For secure disclosure, please see the [security policy](.github/SECURITY.md). ## Contributing Please, read [contribution guidelines](.github/contributing.md) for technicalities. For development, the code and project should run on Windows, Linux and MacOS. Some hardware specific elements may work on only some operating systems. Community at [TPM.DEV](https://developers.tpm.dev/) for TPM related study materials and discussions could be great, they have also. Taking something from contribution guide and adding specific ideas. #### The usual things :) :eyes: Please, do write issues. :raised_hands: By all means, do create pull requests (see [contribution guidelines](.github/contributing.md)). :star: Stars are always nice. :) #### The code things :white_check_mark: Adding tests is really good, of course. :computer: adding TPM functionality (signing, encryption, permissions) – and tests. :thought_balloon: Issue templates and other improvements to project. :rocket: improve continuous integration automation is always good! :closed_lock_with_key: Add more cryptographic and security capabilities. :key: As a corollary, add X509 related functionality. :blue_book: Support for more protocols (see at https://identity.foundation/). #### The things writing code :memo: Threat and privacy modelling diagrams and explanations would be cool! [LINDDUN](https://www.linddun.org/) is a great one! But not the only one! A nice compilation to choose from is [SEI: Threat Modeling: 12 Available Methods](https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/). These really need to be written down at some point. :book: Draft plans, add documents and [eIDAS](https://en.wikipedia.org/wiki/EIDAS) data objects and some algorithms. ## Repository visualization ![Visualization of this repo](./resources/diagram.svg)

近期下载者

相关文件


收藏者