Skip to content
This repository has been archived by the owner on Dec 23, 2024. It is now read-only.

Move from embedded FHE keys to configurable keys #15

Closed
dartdart26 opened this issue Oct 19, 2023 · 1 comment
Closed

Move from embedded FHE keys to configurable keys #15

dartdart26 opened this issue Oct 19, 2023 · 1 comment
Assignees

Comments

@dartdart26
Copy link
Contributor

dartdart26 commented Oct 19, 2023

Currently, FHE keys are embedded in the go binaries. We should move to keys that can be read at runtime.

There are 3 FHE keys:

  • evaluation key (sks) - this is a key that should be available to all nodes and should be public. I think it is fine if node just read it from disk. It could also be made available publicly or somehow in the KMS (because it corresponds to a particular public/secret keypair - please correct if wrong).
  • public key (pks) - also public and should be available to all nodes such that they can serve it to clients over Eth RPC. Also, could be made publicly available in a different manner and also be part of the KMS interface.
  • secret key (cks) - currently, we want it to be available to all nodes such that they can do decryption/reencryption. However, once there is a KMS, these operations will be done in the KMS. We should find a way to abstract that such that we use the KMS interface, but still make the full secret key available to every node (until the KMS is available).

Add a functionality to generate the keys such that tests can run with them. Also, keys can be used by users of fhemv-go.

@dartdart26 dartdart26 added this to the fhevm-avalanche beta milestone Oct 19, 2023
@youben11 youben11 self-assigned this Oct 25, 2023
@youben11
Copy link
Member

youben11 commented Nov 9, 2023

solved in #20

@youben11 youben11 closed this as completed Nov 9, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants