You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is it possible to pass in a public key as a customParameter when decrypting, and for the decrypted message to be re-encrypted using the public key before being received?
I have a particular use case, where I have a typescript function running on a public node where all communication in and out is insecure (decentralised compute). Therefore I can only send/receive encrypted data. I generate a new public/private key pair at runtime and then I should be able to be able to pass in a public key with my decrypt request, where the result is re-encrypted using the public key.
I feel like this shouldn't actually be that difficult to achieve. On a "privateDecrypt" request on the client-side, a new public/private key pair could be generated, then the public key is provided with the request. The TACo nodes check the access conditions and then re-encrypt the fragments using the public key before sending them. Then where the fragments are collected client-side, they could each be decrypted using the private key previously generated before constructing the final decrypted message.
The text was updated successfully, but these errors were encountered:
Is it possible to pass in a public key as a customParameter when decrypting, and for the decrypted message to be re-encrypted using the public key before being received?
I have a particular use case, where I have a typescript function running on a public node where all communication in and out is insecure (decentralised compute). Therefore I can only send/receive encrypted data. I generate a new public/private key pair at runtime and then I should be able to be able to pass in a public key with my decrypt request, where the result is re-encrypted using the public key.
Example code to decrypt:
I feel like this shouldn't actually be that difficult to achieve. On a "privateDecrypt" request on the client-side, a new public/private key pair could be generated, then the public key is provided with the request. The TACo nodes check the access conditions and then re-encrypt the fragments using the public key before sending them. Then where the fragments are collected client-side, they could each be decrypted using the private key previously generated before constructing the final decrypted message.
The text was updated successfully, but these errors were encountered: