When encrypting claims using holder_ecies, we symmetrically encrypt the claim attestations and issue a key to both the vivid and user identity for ownership. In a number of cases, these keys are unable to decrypt the attestation. There are also some occurences of non-deterministic behavior where the vivid and user decrypted keys will be different from eachother. Example:
in the example above for claim_id = 8uIECytlSjB4NbVa in stage, we have two different keys for the attestation. The vivid one successfully decrypts the payload and the user one does not.
While this is acceptable given the different initiation vectors, there is some peculiarity that one works and the other doesnt. There are also cases where both keys are different and neither works.
When encrypting claims using holder_ecies, we symmetrically encrypt the claim attestations and issue a key to both the vivid and user identity for ownership. In a number of cases, these keys are unable to decrypt the attestation. There are also some occurences of non-deterministic behavior where the vivid and user decrypted keys will be different from eachother. Example:
in the example above for claim_id = 8uIECytlSjB4NbVa in stage, we have two different keys for the attestation. The vivid one successfully decrypts the payload and the user one does not.
While this is acceptable given the different initiation vectors, there is some peculiarity that one works and the other doesnt. There are also cases where both keys are different and neither works.