Authenticating secp256k1 and other keys

Has anyone looked into Tyk Authenticating users sowlly based on them controling a BitCoin or Ethereium private key?

I have seen some work on converting the typical hex keys into JWK and then generating JWT’s but on the verification side most JWT libraries do not suppor the curve secp256k1 .

Related work links:

GitHub - decentralized-identity/did-jwt: Create and verify DID verifiable JWT's in Javascript works for DID-key which is secp256k1
from a priv key in hex to pem encoding and decoding back to hex for both public and private key using EC secp256k1 · GitHub secp256k1 hex to JWK

3 Likes

Hey is there any updates on this? I am also interested

Yes, there has been some exploration into authenticating users in systems like Tyk using ownership of a Bitcoin or Ethereum private key, typically via the secp256k1 curve. However, this approach is not natively supported in Tyk at the moment. One key limitation is that Go’s standard JWT and crypto libraries, which Tyk relies on, do not support secp256k1 out of the box.