diff --git a/index.html b/index.html index 7224f19..09d7c5a 100644 --- a/index.html +++ b/index.html @@ -221,7 +221,7 @@

Terminology

A conforming proof is any concrete expression of the data model that complies with the normative statements in this specification. Specifically, all relevant normative statements in Sections - and +[[[#data-model]]] and [[[#algorithms]]] of this document MUST be enforced.

@@ -602,7 +602,7 @@

Transformation (eddsa-rdfc-2022)

The following algorithm specifies how to transform an unsecured input document into a transformed document that is ready to be provided as input to the -hashing algorithm in Section . +hashing algorithm in Section [[[#hashing-eddsa-rdfc-2022]]].

@@ -646,8 +646,8 @@

Hashing (eddsa-rdfc-2022)

The following algorithm specifies how to cryptographically hash a transformed data document and proof configuration into cryptographic hash data that is ready to be provided as input to the -algorithms in Section or -Section . +algorithms in Section [[[#proof-serialization-eddsa-rdfc-2022]]] or +Section [[[#proof-verification-eddsa-rdfc-2022]]].

@@ -855,7 +855,7 @@

Create Proof (eddsa-jcs-2022)

  • Let |transformedData| be the result of running the algorithm in Section - with |unsecuredDocument| +[[[#transformation-eddsa-jcs-2022]]] with |unsecuredDocument| and |options| passed as parameters.
  • @@ -964,7 +964,7 @@

    Transformation (eddsa-jcs-2022)

    The following algorithm specifies how to transform an unsecured input document into a transformed document that is ready to be provided as input to the -hashing algorithm in Section . +hashing algorithm in Section [[[#hashing-eddsa-jcs-2022]]].

    @@ -1005,8 +1005,8 @@

    Hashing (eddsa-jcs-2022)

    The following algorithm specifies how to cryptographically hash a transformed data document and proof configuration into cryptographic hash data that is ready to be provided as input to the -algorithms in Section or -Section . +algorithms in Section [[[#proof-serialization-eddsa-jcs-2022]]] or +Section [[[#proof-verification-eddsa-jcs-2022]]].

    @@ -1944,13 +1944,13 @@

    Add Proof (Ed25519Signature2020)

    For that algorithm, the cryptographic suite specific transformation algorithm is defined in Section -, the +[[[#transformation-ed25519signature2020]]], the hashing algorithm is defined in Section -, and the +[[[#hashing-ed25519signature2020]]], and the proof serialization algorithm is defined in Section -. +[[[#proof-serialization-ed25519signature2020]]].

    @@ -1965,13 +1965,13 @@

    Verify Proof (Ed25519Signature2020)

    For that algorithm, the cryptographic suite specific transformation algorithm is defined in Section -, the +[[[#transformation-ed25519signature2020]]], the -hashing algorithm is defined in Section , +hashing algorithm is defined in Section [[[#hashing-ed25519signature2020]]], and the proof verification algorithm is defined in Section -. +[[[#proof-verification-ed25519signature2020]]].

    @@ -1981,7 +1981,7 @@

    Transformation (Ed25519Signature2020)

    The following algorithm specifies how to transform an unsecured input document into a transformed document that is ready to be provided as input to the -hashing algorithm in Section . +hashing algorithm in Section [[[#hashing-ed25519signature2020]]].

    @@ -2026,8 +2026,8 @@

    Hashing (Ed25519Signature2020)

    The following algorithm specifies how to cryptographically hash a transformed data document and proof configuration into cryptographic hash data that is ready to be provided as input to the -algorithms in Section or -Section . +algorithms in Section [[[#proof-serialization-ed25519signature2020]]] or +Section [[[#proof-verification-ed25519signature2020]]].