-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Build a Passkey Proof of Concept with the WebAuthn API for a Ed25519 Key Pair #5
Comments
@oceans404 please see https://github.com/orgs/NillionNetwork/discussions/99 for my submission |
hi @oceans404, please check my submission: https://github.com/orgs/NillionNetwork/discussions/103 |
Hey @oceans404 this is my submission: https://github.com/orgs/NillionNetwork/discussions/105 |
Hey @oceans404 this is my submission: https://github.com/orgs/NillionNetwork/discussions/107 |
Hey @oceans404, please check my submission: https://github.com/orgs/NillionNetwork/discussions/110 |
Bounty Objective
A Nillion Network user has a Ed25519 key pair consisting of a public and private key.
Implement a passkey system using the WebAuthn API with Ed25519 key pairs so that a user can authenticate their ED25519 key pair without revealing it. The proof of concept implementation should include both registration and authentication processes, allowing users to create and use passkeys on supported devices. The final deliverable will be a fully functional example that demonstrates the complete backend and frontend flow, including proper handling of the WebAuthn API and storage of necessary public key data.
Resources
Bounty Requirements
Build an open source backend that:
Build an open source frontend that:
Document your solution:
How to Submit
Review the Terms and Conditions for Nillion Builder Bounties here.
Open source your repo and submit your bounty by creating a new discussion in Nillion’s “Show and Tell” Github Discussions Forum. For project type, choose “Builder Bounty Submission”
The text was updated successfully, but these errors were encountered: