diff --git a/index.html b/index.html index c951eab..c13e7f3 100644 --- a/index.html +++ b/index.html @@ -1849,11 +1849,11 @@

DataIntegrityProof

One of the design patterns seen in Data Integrity cryptosuites from 2012 to 2020 was use of the `type` property to establish a specific type for a -cryptographic suite. For example, the +cryptographic suite; the Ed25519Signature2020 cryptographic suite was one such specification. This led to a greater burden on cryptographic suite implementations, where every new -cryptographic suite required a new JSON-LD Context to be specified, resulting +cryptographic suite required specification of a new JSON-LD Context, resulting in a sub-optimal developer experience. A streamlined version of this design pattern emerged in 2020, such that a developer would only need to include a single JSON-LD Context to support all modern cryptographic suites. This @@ -1881,7 +1881,7 @@

Algorithms

The algorithms defined below operate on documents represented as JSON objects. This specification follows the -[[[JSON-LD11-API]]] specification in representing a JSON object as an [=map=]. +[[[JSON-LD11-API]]] specification in representing a JSON object as a [=map=]. An unsecured data document is a [=map=] that contains no proof values. An input document is an [=map=] that has not yet had the current proof added to it, but it MAY contain a proof value that was added @@ -1923,7 +1923,7 @@

Processing Model

disclosure, using acceptable cryptographic key material.
  • -The software uses the applicable algorithms in either Section [[[#add-proof]]] +The software uses the applicable algorithm(s) provided in Section [[[#add-proof]]] or Section [[[#add-proof-set-chain]]] to add one or more proofs.
  • @@ -1940,11 +1940,11 @@

    Processing Model

    [[[#verify-proof-sets-and-chains]]].
  • -The software uses JSON Schema or equivalent mechanism to validate that the +The software uses JSON Schema or an equivalent mechanism to validate that the incoming document follows an expected schema used by the application.
  • -The software uses the applicable algorithms provided in Section [[[#verify-proof]]] +The software uses the applicable algorithm(s) provided in Section [[[#verify-proof]]] or Section [[[#verify-proof-sets-and-chains]]] to verify the integrity of the incoming document.