Re: [Sat] Question about asset-identifiers

Denis Avrilionis <denis@compell.io> Thu, 21 March 2024 17:46 UTC

Return-Path: <denis@compell.io>
X-Original-To: sat@ietfa.amsl.com
Delivered-To: sat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 458CDC151088 for <sat@ietfa.amsl.com>; Thu, 21 Mar 2024 10:46:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=compell.io
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O37srZucsSKB for <sat@ietfa.amsl.com>; Thu, 21 Mar 2024 10:46:31 -0700 (PDT)
Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C13C0C14F6BD for <sat@ietf.org>; Thu, 21 Mar 2024 10:46:19 -0700 (PDT)
Received: by mail-lj1-x22d.google.com with SMTP id 38308e7fff4ca-2d68c6a4630so16722341fa.3 for <sat@ietf.org>; Thu, 21 Mar 2024 10:46:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=compell.io; s=google; t=1711043177; x=1711647977; darn=ietf.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:from:to:cc:subject:date:message-id :reply-to; bh=zO8gudMe7ALDT8BXDxSuR+MCVVV10zNGkN9Gmsu0GIM=; b=abgiM+2/og4WiLllxGNWrtHdbn+3bU1AecFm5TG1anl3eRB9OB+t8if3K4rUE/I60y wQs/g8Vanac1mD/S8DS80N32tBXb2OHT6J3oeVXon64A5hKj9qWnTnwwukiGEenrNwF3 ocH+pdXuOrVu3d21u86xGi3x6aagUdTwibVPqBA2Rkg7t+me6vZcYpiorlrCa/AnfCBc Xt4wZwmRO6aj7m5VvvmVpol50KaI72/wfpnV9LS2AY+qHWi7SjCg7vk8xf5g9kqwRSzA WoBQFXEVtkIE4IpN9WqeDZJA0mwl480aVY7roH/qffN9dWfgKlaChhBOq28xAXd7y7Mn Cm5w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711043177; x=1711647977; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zO8gudMe7ALDT8BXDxSuR+MCVVV10zNGkN9Gmsu0GIM=; b=vTsl19Md1R4hxPDp75QyizF1UE/AxacGtacKQhUuKKTR56K5W9Dxp5CX/MkljPhGkf 4Pdi8BDC8v0XO+Yfz9u4N8QkQcSHWAaNNqxTAdaUW8EQRTh+1yZ7hvCLPlmG7QHF5/U2 80ynZWR0TpfiKj9Kyb626gyt3ocez71gb2cgXKkAMHwpqFY8SS6I5JtaRxW+4AkxMbyD V+VIkNcOH1gef/8qaluFkZtUFW4nvIIgHxhuaPniw+Qr33rizXOhlUSyejk6qFX985aj ukTxxSHWWbZgb0GrQKWineyLMHUQFznfwJvuFUrR3YUPWCcfYy9gU6ul0WWrSOCs4UWj Wbnw==
X-Forwarded-Encrypted: i=1; AJvYcCUifzJyf0wItHZOoQCMHA0sPxovVfjUcR6GBERsSXbW2MzgBNzRdvYHu7HM5/e+xI0R8gkZB6RfsAXPmcI=
X-Gm-Message-State: AOJu0Yx+NwVnYvd9jRmTMnXFKNENGQcAfFbkzRw9w5HoDdKq/5LjQCXL h5cN8SGaxNnes6e/fSjdC/SnY9X21VGoTn1AW6OetCLQKT6ur6v9wxInC+ftSfh2NSodYBm6Tfe 2CH8=
X-Google-Smtp-Source: AGHT+IE8rp8w7BGNx7sFz8LnG91FYFB/kLrSuPJsmouyyFuU9eUTy2m+zUlPgKqBV5wtlW4vLexiYQ==
X-Received: by 2002:a2e:9c96:0:b0:2d4:529c:f490 with SMTP id x22-20020a2e9c96000000b002d4529cf490mr156143lji.35.1711043177389; Thu, 21 Mar 2024 10:46:17 -0700 (PDT)
Received: from smtpclient.apple ([88.207.128.72]) by smtp.gmail.com with ESMTPSA id p11-20020a056000018b00b0033e75e5f280sm109469wrx.113.2024.03.21.10.46.16 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 21 Mar 2024 10:46:17 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-952EBFC3-5328-4A57-BEF4-32D70F1BB759"
Content-Transfer-Encoding: 7bit
From: Denis Avrilionis <denis@compell.io>
Mime-Version: 1.0 (1.0)
Date: Thu, 21 Mar 2024 19:46:05 +0200
Message-Id: <DA90D263-5675-4779-916C-99E5179D0A4F@compell.io>
References: <DM6PR01MB43958C3D102A6332CAE513BACB322@DM6PR01MB4395.prod.exchangelabs.com>
Cc: Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>, sat@ietf.org
In-Reply-To: <DM6PR01MB43958C3D102A6332CAE513BACB322@DM6PR01MB4395.prod.exchangelabs.com>
To: Thomas Hardjono <hardjono@mit.edu>
X-Mailer: iPhone Mail (21D61)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sat/va82KqXWV8DaEsXH2JtWMgG7Ky8>
Subject: Re: [Sat] Question about asset-identifiers
X-BeenThere: sat@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "The purpose of this mailing-list is to discuss the secure asset transfer \(SAT\) protocol and related aspects." <sat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sat>, <mailto:sat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sat/>
List-Post: <mailto:sat@ietf.org>
List-Help: <mailto:sat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sat>, <mailto:sat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Mar 2024 17:46:36 -0000

Dear Thomas, Rafael,
We should take in account the possibility for a network to define IDs that are specific to the structure of the network and may not be transferable to another network. Suppose for example CAIP-19 type of identification where the smart contract that manages the identification of the asset is part of the ID. In such cases it may not be possible to use the sand ID in the target network. I believe we should assume that the scope of the asset ID may be limited to the scope of a specific network. The ID resolution may need navigating in a chain of IDs from the very first network that created the asset to the latest network that currently hosts the asset.

Hope this helps 
--
Denis

> On 21 Mar 2024, at 16:01, Thomas Hardjono <hardjono@mit.edu> wrote:
> 
> 
> Hi Rafael,
>  
> I think this could be an option (flag) that could be negotiated between G1 and G2 in the setup stage Stage-0.
>  
> So, for example, G1 could request to G2 that “privacy-preserving identifiers” be used in the current transfer.
>  
> If the users (asset owners) are not concerned about privacy, then this option could be turned-off (i.e. G1 does not request this from G2 during Stage-0).
>  
>  
> --thomas
>  
>  
>  
> From: Rafael Belchior <rafael.belchior@tecnico.ulisboa.pt>
> Date: Thursday, March 21, 2024 at 9:38 AM
> To: Thomas Hardjono <hardjono@mit.edu>
> Cc: sat@ietf.org <sat@ietf.org>
> Subject: Re: [Sat] Question about asset-identifiers
> 
> Hello Thomas,
> 
> Is there a possibility that the asset on NW02 preserves its original ID (DAI01)? This would eliminate the issues you are describing. We could also create a history of the IDs the asset has on the proofs that are returned from the gateways (to ensure traceability).
> 
> Rafael
> 
> A 2024-03-21 15:19, Thomas Hardjono escreveu:
> 
>  
> 
> Folks,
> 
>  
> 
> Earlier this week I received a question about SATP-core, specifically about digital asset identifiers in the origin network (NW1) and in the destination network (NW2).
> 
>  
> 
> The digital asset identifier (DAI) is described very briefly in Section 5.2.3 of draft-core-03 as a UUID.
> 
>  
> 
> The question looks simple, but has some twists related to traceability of asset transfers (i.e. regulated assets and taxation) and privacy: 
> 
>  
> 
> -- Assume the digital-asset is recorded in NW1 (i.e. in the ledger or database) as having an identifier DAI01.  After a successful transfer to NW2, the asset is assigned a new identifier DAI02 in NW2.
> 
>  
> 
> -- Question: should NW1 be aware of the new identifier DAI02 in NW2?   (for example, the new identifier DAI02 is reported back from gateway G2 to gateway G1 within the ACK-Final-Receipt message (message 3.7 of draft-core-03)).
> 
>  
> 
> -- The implication concerns privacy:  if the new identifier DAI02 is also copied (recorded as plaintext data) in NW1, this may permit other participants (other asset holders) in NW1 to know the new owner of the asset in NW2.
> 
>  
> 
>  
> 
> My response was that only the hash-of-DAI02 should be recorded in NW1.
> 
>  
> 
> So, the ACK-Final-Receipt message sent from gateway G2 to G1 should have the following parameters (where these will be recorded as data onto NW1 by G1):
> 
>  
> 
> Identifier of G1 and G2 (who handled the transfer instance).
> 
> The network identifier NW2 (to where the asset was transferred).
> 
> The asset identifier DAI01 (which is already known in NW1).
> 
> The hash of the asset identifier DAI02 (as it is known in NW2).
> 
> Date/timestamp.
> 
>  
> 
>  
> 
> As a corollary, when gateway G2 mints and assigns the new asset in NW2 (i.e. assign asset to Bob in NW2 immediately following the Commit-Final-Assertion message 3.5), gateway G2 should also record the hash of identifier DAI01 to NW2:
> 
>  
> 
> Identifier of G1 and G2 (who handled the transfer instance).
> 
> The network identifier NW1 (where the asset originated from).
> 
> The asset identifier DAI02 (the new identifier in NW2).
> 
> The hash of the asset identifier DAI01 (as it was known in NW1)
> 
> Date/timestamp.
> 
>  
> 
>  
> 
> Any thoughts?
> 
>  
> 
>  
> 
> --thomas
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
> 
>  
>  
>  
> 
> --
> -- Rafael Belchior
> 
> Ph.D. student in Computer Science and Engineering, Blockchain - Técnico Lisboa
> https://rafaelapb.github.io/
> https://www.linkedin.com/in/rafaelpbelchior/
> --
> sat mailing list
> sat@ietf.org
> https://www.ietf.org/mailman/listinfo/sat