Author: Stepan Snigirev 2019-06-26 04:07:50
Published on: 2019-06-26T04:07:50+00:00
In this email conversation, Stepan suggests two improvements to Nadav's proposal concerning encrypted data and payment protocols. First, he recommends using authenticated encryption with HMAC-SHA256 to ensure that even if an insecure connection is used, the encrypted data cannot be changed by an attacker. Second, he proposes a modified payment protocol where only the buyer can decrypt the data. This involves Bob generating a random private key and corresponding public key, sharing the public key with Sally, who in turn generates her own keys and calculates a secret key to encrypt the data. The invoice includes the preimage, which is the x-coordinate of a point to make it 32-bytes long. When Bob pays the invoice, he learns the value of the public key and can use his private key to derive the encryption key and decrypt the data. No one else will learn the key.
Updated on: 2023-06-02T19:10:23.287913+00:00