Replies: 1 comment 4 replies
-
Stardust provides a simple and elegant solution to this problem: data published in the Tangle via What this means in practice, is that a data-generating application can publish data to an application defined
to obtain the output object(s) holding the actual data. The protocol ensures that such data was indeed published by whoever holds the keys to |
Beta Was this translation helpful? Give feedback.
-
Many data-generating applications can benefit from the IOTA network as a transport layer. The STREAM protocol/library is designed to fulfill this purpose, ensuring that the sender is identified and thus that messages containing false data cannot be created.
However, for many low-cost applications STREAM can be too expensive and complex while writing data into the generic payload of a Tange Message (TIP-6) is very simple.
The receiver, however, has only one element to distinguish a message containing data of interest to him from all others: the tag.
The tag is ignored by the network protocol, yet it is part of the L1 specification, i.e., the protocol itself.
Problem: anyone can publish a message with a tag, making it more complicated for the receiver to distinguis from valid and invalid messages.
To solve this problem I propose three alternative solutions:
(a) add to the format of the Tangle Message (TIP-6) an additional (optional) protocol-ignored field that can be used to contain a signature, using the contents of the tag as a private key.
b) extend the maximum size of the tag so, if required, it can contain a public key and an ED25529 signature of the generic paylod
(c) define a generic payload type (L2 message type) consisting of:
There are multiple use cases where being able to immediately verify that the payload of a message is valid is advantageous. The simplest is the implementation of a Selective Permanode Plug-in that instructed to store messages with a given TAG, can distinguish valid ones from malicious ones.
Beta Was this translation helpful? Give feedback.
All reactions