Skip to content

Commit b222473

Browse files
authored
add references to about (#39)
1 parent 9bed312 commit b222473

File tree

1 file changed

+13
-5
lines changed

1 file changed

+13
-5
lines changed

src/pages/about.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,28 @@ TLSNotary is a protocol which allows people to export data from any web applicat
1515
![](../../diagrams/dark/overview_prover_verifier.svg#gh-dark-mode-only)
1616

1717

18-
### Step 1: "Multiparty TLS Request"
18+
### 1 - TLS Transcript Commitment
1919

20-
The Prover requests data from a Server over TLS. The verifier cooperates in secure and privacy-preserving multi-party computation (MPC). This cooperation guaranties that the Prover can not cheat and allows the Verifier to check the authenticity of the data in step 3.",
20+
The Prover requests data from a Server over TLS. The verifier cooperates in secure and privacy-preserving multi-party computation (MPC). This cooperation guarantees that the Prover can not cheat and allows the Verifier to check the authenticity of the data in step 3.
2121

22-
### Step 2: "Selective Disclosure"
22+
### 2 - Selective Disclosure
2323

2424
The Prover selectively discloses the data to the Verifier by redacting sensitive information prior to sharing it. Selective disclosure may involve simple redactions, or more advanced techniques such as a zero-knowledge proofs that can prove properties of redacted data without revealing the data itself.
2525

26-
### Step 3: "Data Verification"
26+
### 3 - Data Verification
2727

2828
The Verifier verifies that the prover did not tamper with the data and also verifiers the data origin, by inspecting the Server certificate through trusted certificate authorities (CAs). The Verifier can now make assertions about the non-redacted content of the transcript.
2929

3030
## Get involved
3131

3232
An alpha version of the TLSNotary protocol is available for testing. We welcome folks to start playing around with it, including trying to break it!
3333

34-
Both codebases are 100% Rust and compile to WASM targets with an eye on deployment into browser environments. All our code is and always will be open source! Dual-licensed under Apache 2 and MIT, at your choice.\n\nWe've invested effort into making sure our code is modular and capable of evolving. We hope that others may find some of the components independently interesting and useful. Contributions are welcome!
34+
Both codebases are 100% Rust and compile to WASM targets with an eye on deployment into browser environments. All our code is and always will be open source! Dual-licensed under Apache 2 and MIT, at your choice.
35+
36+
## References
37+
38+
TLSNotary draws inspiration and ideas from academic literature, including but not limited to:
39+
40+
- DECO: Liberating Web Data Using Decentralized Oracles for TLS [(paper)](https://arxiv.org/abs/1909.00938)
41+
- Lightweight Authentication of Web Data via Garble-Then-Prove [(paper)](https://eprint.iacr.org/2023/964)
42+
- Janus: Fast Privacy-Preserving Data Provenance For TLS [(paper)](https://eprint.iacr.org/2023/1377)

0 commit comments

Comments
 (0)