github hashgraph/hedera-services v0.21.2
Hedera Services v0.21.2

latest releases: v0.49.7, v0.50.0-alpha.1, v0.49.6...
2 years ago

In Hedera Services 0.21.2 we are pleased to announce support for ECDSA(secp256k1) keys and auto-account creation.

The Ethereum network makes heavy use of ECDSA cryptography with the secp256k1 curve, and by supporting these keys we ease the developer experience of migrating a dApp to Hedera. Anywhere a Ed25519 key can be used in the Hedera API, it is now possible to substitute a ECDSA(secp256k1) key.

Auto-account creation lets a new user receive ℏ via a CryptoTransfer without having already created an 0.0.X id on the network. The new user only needs to provide their public key, and when a sponsor account sends ℏ "to" their key via a new AccountID.alias field, the network automatically creates an account with their key. Additional transfers to and from an auto-created account may also use its alias instead of the account id.

An alias may also be used to get the account balance and account info for the account. You will be able to use the alias in all other transactions and queries in a future release.

📝   This tag includes fixes for the following issues:

  • #2653 - A getAccountInfo response to a query made with an alias now returns the AccountID instead of echoing the alias.
  • #2674 - A getScheduleInfo query now returns the correct Key type for a schedule signed with ECDSA(secp256k1) keys.
  • #2688 - An updateTopic transaction that uses an 0.0.<alias> id for a new auto-renew account is now rejected with INVALID_ACCOUNT_ID, instead of this id being interpreted as the 0.0.0 sentinel used to remove a topic's auto-renew account. (Note that in release 0.22, it will be valid to use an 0.0.<alias> id here.)

Contributors

We'd like to thank all the contributors who worked on this release!

Don't miss a new hedera-services release

NewReleases is sending notifications on new releases.