Skip to content

Commit

Permalink
Merge pull request #26 from uma-universal-money-address/jklein24-patch-1
Browse files Browse the repository at this point in the history
Fix a couple more cert field references.
  • Loading branch information
jklein24 authored Apr 1, 2024
2 parents fdc5e47 + b949fa5 commit d5625f7
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions umad-02-keys-and-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,13 +78,13 @@ revalidate the certificates, in addition to periodic validation.

Some messages in the UMA protocol must be signed by the VASP who created the message using ECDSA and the secp256k1 keys
as described above. Signatures are created using a VASP's private signing key. The signature is then verified by the
receiving VASP using the sending VASP's signing public key from the `signingCertificate`. The signature is included in
receiving VASP using the sending VASP's signing public key from the `signingCertChain`. The signature is included in
the message itself, along with the sending VASP's domain if needed. The receiving VASP can then verify the signature
using the public key and ensure that the message was not tampered with.

## Encryption

VASPs encrypt sensitive information like payment and Travel Rule information using the receiving VASP's encryption
public key from the `encryptionCertificate` via
public key from the `encryptionCertChain` via
[ECIES](https://cryptobook.nakov.com/asymmetric-key-ciphers/ecies-public-key-encryption). The receiving VASP can then
decrypt the data using their private encryption key only when required for compliance reasons.

0 comments on commit d5625f7

Please sign in to comment.