You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current AuthServerRespond function in the OPAQUE specification receives client_public_key as a separate parameter, even though this same value is already available in the cleartext_credentials parameter. This creates unnecessary redundancy in the API.
Current implementation:
defAuthServerRespond(cleartext_credentials, server_private_key,
client_public_key, ke1, credential_response):
# client_public_key used only in:dh3=DiffieHellman(server_private_keyshare, client_public_key)
Proposed change:
defAuthServerRespond(cleartext_credentials, server_private_key,
ke1, credential_response):
# Use the client_public_key from cleartext_credentials:dh3=DiffieHellman(server_private_keyshare,
cleartext_credentials.client_public_key)
Cleaner API: Reduces parameter count in AuthServerRespond
Removes Redundancy: Eliminates passing the same value twice
Better Maintainability: Reduces the chance of errors where the two values might accidentally differ
Simpler Implementation: Makes implementation cleaner across different languages
No Security Impact: Maintains all security properties of the protocol
This change is purely structural and doesn't affect the protocol's security properties. The same client_public_key value is used, just accessed from cleartext_credentials instead of as a separate parameter.
The text was updated successfully, but these errors were encountered:
The current AuthServerRespond function in the OPAQUE specification receives client_public_key as a separate parameter, even though this same value is already available in the cleartext_credentials parameter. This creates unnecessary redundancy in the API.
Current implementation:
Proposed change:
This affects the GenerateKE2 function as well:
Current:
Proposed:
Benefits:
This change is purely structural and doesn't affect the protocol's security properties. The same client_public_key value is used, just accessed from cleartext_credentials instead of as a separate parameter.
The text was updated successfully, but these errors were encountered: