<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="CoMETRE">Concise Encoding of Signed Merkle Tree Proofs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-02"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="17"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>

<t>This specification describes verifiable data structures and associated proof types for use with COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    CBOR Object Signing and Encryption Working Group mailing list (cose@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Merkle trees are one of many verifiable data structures that enable tamper evident secure information storage,
through their ability to protect the integrity of batches of documents or collections of statements.</t>
      <t>Merkle trees can be constructed from simple operations such as concatenation and digest via a cryptographic hash function,
however, more advanced constructions enable proofs of different properties of the underlying verifiable data structure.</t>
      <t>Verifiable data structure proofs can be used to prove a document is in a database (proof of inclusion),
that a database is append only (proof of consistency), that a smaller set of statements are contained
in a large set of statements (proof of disclosure, a special case of proof of inclusion),
or proof that certain data is not yet present in a database (proofs of non inclusion).</t>
      <t>Differences in the representation of verifiable data structures, and verifiable data structure proof types,
can increase the burden for implementers, and create interoperability challenges for transparency services.</t>
      <t>This document describes how to convey verifiable data structures, and associated proof types in COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="cbor-tags">
      <name>CBOR Tags</name>
      <t>This section will be removed before the document is completed,
its purpose is to track the TBD code points references throughout the draft.</t>
      <dl>
        <dt>-111 is TBD_1:</dt>
        <dd>
          <t>A requested cose header parameter representing the verifiable data structure used.</t>
        </dd>
        <dt>-222 is TBD_2:</dt>
        <dd>
          <t>A requested cose header parameter representing the verifiable data structure parameters map (proofs map)</t>
        </dd>
      </dl>
      <t>The other codepoints are assigned from the registries established in this draft, they are therefore not marked TBD.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>A data structure which supports one or more Proof Types.</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A verifiable process, that proves properties of one or more Verifiable Data Structures.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR.</t>
        </dd>
        <dt>Proof Signature:</dt>
        <dd>
          <t>A COSE Sign1 encoding of a specific Proof Type for a specific Verifiable Data Structure.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs structures in CBOR.</t>
      <t>Different verifiable data structures support the same proof types,
but the representations of the proofs varies greatly.</t>
      <t>For example, construction of a merkle tree leaf, or an inclusion proof from a leaf to a merkle root,
might have several different representations, depending on the verifiable data structure used.</t>
      <t>Some differences in representations are necessary to support efficient
verification of different kinds of proofs and for compatibility with specific implementations.</t>
      <t>Some proof types benefit from standard envelope formats for signing and encryption, whilst others require no further cryptographic intervention at all.</t>
      <t>In order to improve interoperability we define two extension points for
enabling verifiable data structures with COSE, and we provide concrete examples for
the structures and proofs defined in <xref target="RFC9162"/>.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>COSE Verifiable Data Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>,
different verifiable data structures support different algorithms.
As EC2 keys (1: 2) support both digital signature and key agreement algorithms,
RFC9162_SHA256 (TBD_1 : 1) supports both inclusion and consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms,
with the following initial contents:</t>
        <ul spacing="normal">
          <li>
            <t>Name: The name of the verifiable data structure</t>
          </li>
          <li>
            <t>Value: The identifier for the verifiable data structure</t>
          </li>
          <li>
            <t>Description: The identifier for the verifiable data structure</t>
          </li>
          <li>
            <t>Reference: Where the verifiable data structure is defined</t>
          </li>
        </ul>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
          </tbody>
        </table>
        <t>When desigining new verifiable data structures,
please request the next available positive integer as your requested assignment,
for example:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
            <tr>
              <td align="left">Your name</td>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">tbd</td>
              <td align="left">Your specification</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-parameters">
        <name>COSE Verifiable Data Structure Parameters</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>,
As EC2 keys (1: 2) keys require and give meanding to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d),
RFC9162_SHA256 (TBD_1 : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms,
with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters">
          <name>COSE Verifiable Data Structure Parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure",
for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".</t>
        <t>Implementers should not expect interoperability accross "verifiable data structures",
but they should expect conceptually similar properties across the different registered proof type.</t>
        <t>For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion.</t>
        <t>Protocols requiring proof of inclusion ought to be able to preserve their functionality,
while switching from one verifiable data structure to another, so long as both structures support the same proof types.</t>
        <t>When desigining new verifiable data structure parameters (or proof types),
please start with -1, and count down for each proof type supported by your verifiable data structure:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-1</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-2</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-3</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
          </tbody>
        </table>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure and its parameters (also called proof types) in CBOR.</t>
          <t>Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.</t>
          <t>See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/>
are mapped to the terminology defined in this document, using cbor and cose.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".</t>
        <t>See <xref target="cose-verifiable-data-structures"/>.</t>
        <t>See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree,
for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof,
for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <sourcecode type="cddl"><![CDATA[
inclusion-proof = [
    tree-size: int
    leaf-index: int
    inclusion-path: [ + bstr ]
]
]]></sourcecode>
        <section anchor="inclusion-proof-signature">
          <name>Inclusion Proof Signature</name>
          <t>In a signed inclusion proof, the previous merkle tree root, maps to tree-size-1, and is a detached payload.</t>
          <t>Other specifications refer to signed inclusion proofs as "receipts",
profiles of proof signatures are encouraged to make additional protected header parameters mandatory.</t>
          <t>TODO: reference to scitt receipts.</t>
          <t>The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int / tstr.</t>
            </li>
            <li>
              <t>verifiable-data-structure (label: -111): <bcp14>REQUIRED</bcp14>. verifiable data structure algorithm identifier. Value type: int / tstr.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <sourcecode type="cddl"><![CDATA[
inclusion-proofs = [ + bstr ]

verifiable-proofs = {
  &(inclusion-proof: -1) => inclusion-proofs
}

unprotected-header-map = {
  &(verifiable-data-proof: -222) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          <ul spacing="normal">
            <li>
              <t>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the previous Merkle tree hash as defined in <xref target="RFC9162"/>.</t>
          <t>The payload <bcp14>MUST</bcp14> be detached.</t>
          <t>Detaching the payload forces verifiers to recompute the root from the inclusion proof signature,
this protects against implementation errors where the signature is verified but the root does not match the inclusion proof.</t>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012604...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        -222: {                     / Proofs                        /
          -1: [                     / Inclusion proofs (1)          /
            h'83080783...32568964', / Inclusion proof 1             /
          ]
        },
      },
      h'',                          / Detached payload              /
      h'2e34df43...8d74d55e'        / Signature                     /
    ]
)
]]></sourcecode>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'4930714e...7163316b',        / Key identifier                /
  -111: 1,                          / Verifiable Data Structure     /
}
]]></sourcecode>
          <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1             /
  8,                                / Tree size                     /
  7,                                / Leaf index                    /
  [                                 / Inclusion hashes (3)          /
     h'2a8d7dfc...15d10b22'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
     h'0bdaaed3...32568964'         / Intermediate hash 3           /
  ]
]
]]></sourcecode>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof,
for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <sourcecode type="cddl"><![CDATA[
consistency-proof = [
    tree-size-1: int ; size of tree, at previous root
    tree-size-2: int ; size of tree, at latest root
    consistency-path: [ + bstr ] ; path from previous to latest root.
]
]]></sourcecode>
        <t>Editors note: tree-size-1, could be ommited, if an inclusion-proof is always present, since the inclusion proof contains, tree-size-1.</t>
        <section anchor="consistency-proof-signature">
          <name>Consistency Proof Signature</name>
          <t>In a signed consistency proof, the latest merkle tree root, maps to tree-size-2, and is an attached payload.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int / tstr.</t>
            </li>
            <li>
              <t>verifiable-data-structure (label: TBD_1): <bcp14>REQUIRED</bcp14>. verifiable data structure algorithm identifier. Value type: int / tstr.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl"><![CDATA[
consistency-proofs = [ + bstr ]

verifiable-proofs = {
  &(consistency-proof: -2) => consistency-proofs
}

unprotected-header-map = {
  &(verifiable-data-proof: -222) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          <ul spacing="normal">
            <li>
              <t>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:</t>
          <t>The latest Merkle tree hash as defined in <xref target="RFC9162"/>.</t>
          <t>The payload <bcp14>MUST</bcp14> be attached.</t>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a3012604...392b6601',       / Protected                     /
      {                             / Unprotected                   /
        -222: {                     / Proofs                        /
          -2: [                     / Consistency proofs (1)        /
            h'83040682...2e73a8ab', / Consistency proof 1           /
          ]
        },
      },
      h'430b6fd7...f74c7fc4',       / Payload                       /
      h'd97befea...f30631cb'        / Signature                     /
    ]
)
]]></sourcecode>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'68747470...6d706c65',        / Key identifier                /
  -111: 1,                          / Verifiable Data Structure     /
}
]]></sourcecode>
          <sourcecode type="cbor-diag"><![CDATA[
[                                   / Consistency proof 1           /
  4,                                / Tree size 1                   /
  6,                                / Tree size 2                   /
  [                                 / Consistency hashes (2)        /
     h'0bdaaed3...32568964'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
  ]
]
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>See the privacy considerations section of:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9162"/></t>
        </li>
        <li>
          <t><xref target="RFC9053"/></t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9162"/></t>
        </li>
        <li>
          <t><xref target="RFC9053"/></t>
        </li>
      </ul>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Mike Jones,
Mike Prorock,
Ilari Liusvaara,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="additions-to-existing-registries">
        <name>Additions to Existing Registries</name>
        <section anchor="new-entries-to-the-cose-header-parameters-registry">
          <name>New Entries to the COSE Header Parameters Registry</name>
          <t>This document requests IANA to add new values to the 'COSE
Algorithms' and to the 'COSE Header Algorithm Parameters' registries
in the 'Standards Action With Expert Review category.</t>
          <section anchor="cose-header-algorithm-parameters">
            <name>COSE Header Algorithm Parameters</name>
            <ul spacing="normal">
              <li>
                <t>Name: verifiable-data-structure</t>
              </li>
              <li>
                <t>Label: TBD_1</t>
              </li>
              <li>
                <t>Value type: int / tstr</t>
              </li>
              <li>
                <t>Value registry: https://www.iana.org/assignments/cose/cose.xhtml#header-parameters</t>
              </li>
              <li>
                <t>Description: Algorithm name for verifiable data structure, used to produce verifiable data structure proofs.</t>
              </li>
              <li>
                <t>Name: verifiable-data-structure-parameters</t>
              </li>
              <li>
                <t>Label: TBD_2</t>
              </li>
              <li>
                <t>Value type: int / tstr</t>
              </li>
              <li>
                <t>Value registry: https://www.iana.org/assignments/cose/cose.xhtml#header-parameters</t>
              </li>
              <li>
                <t>Description: Location for verifiable data structure proofs in COSE Header Parameters.</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="verifiable-data-structure-registry">
          <name>COSE Verifiable Data Structures</name>
          <t>IANA will be asked to establish a registry of verifiable data structure identifiers,
named "COSE Verifiable Data Structures" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
          <t>Template:</t>
          <ul spacing="normal">
            <li>
              <t>Name: The name of the verifiable data structure</t>
            </li>
            <li>
              <t>Value: The identifier for the verifiable data structure</t>
            </li>
            <li>
              <t>Description: The identifier for the verifiable data structure</t>
            </li>
            <li>
              <t>Reference: Where the verifiable data structure is defined</t>
            </li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
        </section>
        <section anchor="verifiable-data-structure-parameters-registry">
          <name>COSE Verifiable Data Structure Parameters</name>
          <t>IANA will be asked to establish a registry of verifiable data structure parameters,
named "COSE Verifiable Data Structure Parameters" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
          <t>Template:</t>
          <ul spacing="normal">
            <li>
              <t>Verifiable Data Structure: The identifier for the verifiable data structure</t>
            </li>
            <li>
              <t>Name: The name of the proof type</t>
            </li>
            <li>
              <t>Label: The integer of the proof type</t>
            </li>
            <li>
              <t>CBOR Type: The cbor data type of the proof</t>
            </li>
            <li>
              <t>Description: The description of the proof type</t>
            </li>
            <li>
              <t>Reference: Where the proof type is defined</t>
            </li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures-parameters"/></t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin"/>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7049"/>
          <seriesInfo name="DOI" value="10.17487/RFC7049"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-cose-countersign">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="Jim Schaad" initials="J." surname="Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="20" month="September" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR.  This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE.  This document updates RFC 9052.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-countersign-10"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
              <organization>RKVST</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.  Issuers
   can register their Signed Statements on any Transparency Service,
   with the guarantee that all Consumers will be able to verify them.

   Within the SCITT Architecture, a producer is known as an Issuer, and
   a consumer is known as a Verifier.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-04"/>
        </reference>
      </references>
    </references>
    <?line 509?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>,
"this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="implementer">
        <name>Implementer</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.</t>
      </section>
      <section anchor="implementation-name">
        <name>Implementation Name</name>
        <t>An application demonstrating the concepts is available at <eref target="https://scitt.xyz">https://scitt.xyz</eref>.</t>
      </section>
      <section anchor="implementation-url">
        <name>Implementation URL</name>
        <t>An open-source implementation is available at:</t>
        <ul spacing="normal">
          <li>
            <t>https://github.com/transmute-industries/cose</t>
          </li>
        </ul>
      </section>
      <section anchor="maturity">
        <name>Maturity</name>
        <t>The code's level of maturity is considered to be "prototype".</t>
      </section>
      <section anchor="coverage-and-version-compatibility">
        <name>Coverage and Version Compatibility</name>
        <t>The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.</t>
      </section>
      <section anchor="license">
        <name>License</name>
        <t>The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.</t>
      </section>
      <section anchor="implementation-dependencies">
        <name>Implementation Dependencies</name>
        <t>The implementation builds on concepts described in SCITT <xref target="I-D.ietf-scitt-architecture"/> (https://scitt.io/).</t>
        <t>The implementation uses the Concise Binary Object Representation <xref target="RFC7049"/> (https://cbor.io/).</t>
        <t>The implementation uses the CBOR Object Signing and Encryption <xref target="RFC9053"/>, maintained at:
- https://github.com/erdtman/cose-js</t>
        <t>The implementation uses an implementation of <xref target="RFC9162"/>,
maintained at:</t>
        <ul spacing="normal">
          <li>
            <t>https://github.com/transmute-industries/rfc9162/tree/main/src/CoMETRE</t>
          </li>
        </ul>
      </section>
      <section anchor="contact">
        <name>Contact</name>
        <t>Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
