Secondary Key-Pair Statement
Last updated
Last updated
We use ed25519 to generate the secondary key-pair (for more information on ed25519, please refer to https://ed25519.cr.yp.to/) on user's client device and the secret key will be only stored on user's device. Then we will prompt the user to sign the following message with their EVM address.
Then we will upload the original message and signature on Arweave. After that, the client will use the secondary key-pair to sign the engagement data without prompting the user every time.
As this key-pair will not be used to do any on-chain transaction. It is safe to discard the key-pair any time. Users may choose to declare new key-pair while still be able to verify the existing data.
Parameter | Definition |
---|---|
We need to generate two signatures in this statement
personal_sign (EIP-191) on the "message", the result will be stored in the signature field.
ed25519 signature on the "message" using secondary_key, the result will be stored in the secondary_signature field.
Please refer to the API section for statement related API.
message
The statement message which the user is signing. It is in free-text format and should contain the public key and connected address.
address
The address of the user
address_type
The type of the above address, right now, "evm" is supported.
secondary_key
The proxy key used in the statement
signature
The personal sign of the message using the address
secondary_signature
The signature using secondary_key for the entire message, more details in the Signature Generation Process below
provider
The name of SDK or software for making this statement
version
The version of SDK or software for making this statement