<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title>COSE Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-06"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="09"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proves that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="cbor-tags">
      <name>CBOR Tags</name>
      <t>Editorial Note (To be removed by RFC Editor).</t>
      <t>This section will be removed before the document is completed, its purpose is to track the TBD code points references throughout the draft.</t>
      <dl>
        <dt>395 is TBD_1:</dt>
        <dd>
          <t>A requested cose header parameter representing the verifiable data structure used.</t>
        </dd>
        <dt>396 is TBD_2:</dt>
        <dd>
          <t>A requested cose header parameter representing the verifiable data structure parameters map (proofs map).</t>
        </dd>
      </dl>
      <t>The other codepoints are assigned from the registries established in this draft, they are therefore not marked TBD.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Proof Types.
This property is conceptually similar to "alg" (1), it described an algorithm used to maintain the verifiable data structure, for example a binary merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Parameters (VDP):</dt>
        <dd>
          <t>Parameters to a verifiable data structure that are used to prove properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).
This property is conceptually similar to COSE Header Parameter "epk" (-1) or CBOR Web Token (CWT) claim "cnf" (8), it is applied to a verifiable data structure, to confirm a property.
For example an encrypted message might be decrypted using epk and a private key, a digital signature for authentication might be verified using cnf and the (CWT) claim "nonce" and "audience", and an inclusion proof for a binary merkle tree might be verified with VDP and some entry that is being tested or inclusion in the tree.</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A verifiable process, that proves properties of a Verifiable Data Structure.
For example, a VDS, such as a binary merkle tree, can support multiple proofs of type "inclusion" where each proof confirms that a given entry is included in a merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in CBOR.
For example, construction of a merkle tree leaf, or an inclusion proof from a leaf to a merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <t>During testing and development the experimental range <bcp14>SHOULD</bcp14> be used, unless early assignment for a provisional entry has been completed.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.
As EC2 keys (1: 2) support both digital signature and key agreement algorithms, RFC9162_SHA256 (TBD_1 : 1) supports both inclusion and consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">11</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">22</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">33</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>When designing new verifiable data structures, please request the next available positive integer as your requested assignment, for example:</t>
        <table align="left" anchor="cose-verifiable-data-structures-registration-guidance">
          <name>How to register new structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
            <tr>
              <td align="left">Your name</td>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">tbd</td>
              <td align="left">Your specification</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-parameters">
        <name>Parameters</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters">
          <name>COSE Verifiable Data Structure Parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">22</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">33</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types.
For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion.
Security analysis <bcp14>SHOULD</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.
When designing new verifiable data structure parameters (or proof types), please start with -1, and count down for each proof type supported by your verifiable data structure:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters-registration-guidance">
          <name>How to register new parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-1</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-2</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-3</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="usage">
        <name>Usage</name>
        <t>This document registered a new COSE Header Parameter <tt>receipts</tt> (394) to enable this Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts parameter is present, the associated verifiable data structure and verifiable data structure proofs <bcp14>MUST</bcp14> match entries present in the registries established in RFC XXXX.</t>
        <t>The following informative CDDL is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl">
Receipt = #6.18(COSE_Sign1)

Protected_Header = {
  * cose-label =&gt; cose-value
}

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ Receipt]
  * cose-label =&gt; cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
</sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>EDN for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1                   /
    [
      h'a4012603...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        394: [                      / Receipts (2)                  /
          h'd284586c...4191f9d2'    / Receipt 1                     /
          h'c624586c...8f4af97e'    / Receipt 2                     /
        ]
      },
      nil,                          / Detached payload              /
      h'79ada558...3a28bae4'        / Signature                     /
    ]
)
</sourcecode>
        </figure>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure and its parameters (also called proof types) in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, an IANA registration must be made for each individually supported algorithm.
For example, to provide for both SHA256 and SHA3_256 with <xref target="RFC9162"/>,
both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/> are mapped to the terminology defined in this document, using CBOR and COSE.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".
See <xref target="cose-verifiable-data-structures"/>.
See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl">
inclusion-proof = bstr .cbor [

    ; tree size at current merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current merkle root
    inclusion-path: [ + bstr ]
]
</sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref target="RFC9162"/></t>
        <t>Note that <xref target="RFC9162"/> defines that verification <bcp14>MUST</bcp14> fail if leaf-index is &gt;= tree-size, and inclusion proofs are defined only for leaf nodes.
The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the merkle tree root which corresponds to the log at size <tt>tree-size</tt>.
Specifications are encouraged to make payloads detached when possible, forcing validation-time comparison.
Profiles of proof signatures are encouraged to make additional protected header parameters mandatory, to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="I-D.ietf-cose-typ-header-parameter"/> and the similar guidance provided in <xref target="I-D.ietf-cose-cwt-claims-in-headers"/>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: 395): <bcp14>REQUIRED</bcp14>. verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl">
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &amp;(inclusion-proof: -1) =&gt; inclusion-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>MUST</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the inclusion proof, this protects against implementation errors where the signature is verified but the merkle root does not match the inclusion proof.
The EDN for a Receipt containing an inclusion proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Example inclusion receipt</name>
            <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1                   /
    [
      h'a4012604...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        396: {                      / Proofs                        /
          -1: [                     / Inclusion proofs (1)          /
            h'83080783...32568964', / Inclusion proof 1             /
          ]
        },
      },
      nil,                          / Detached payload              /
      h'2e34df43...8d74d55e'        / Signature                     /
    ]
)
</sourcecode>
          </figure>
          <t>The EDN for the Protected Header in the example above is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt_header">
            <name>Example inclusion receipt decoded protected header</name>
            <sourcecode type="cbor-diag">
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'4930714e...7163316b',        / Key identifier                /
  395: 1,                           / Verifiable Data Structure     /
}
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the VDP in the unprotected header.</t>
          <t>The EDN for the inclusion proof in the Unprotected Header is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt_inclusion_proof">
            <name>Example inclusion receipt decoded inclusion proof</name>
            <sourcecode type="cbor-diag">
[                                   / Inclusion proof 1             /
  8,                                / Tree size                     /
  7,                                / Leaf index                    /
  [                                 / Inclusion hashes (3)          /
     h'2a8d7dfc...15d10b22'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
     h'0bdaaed3...32568964'         / Intermediate hash 3           /
  ]
]
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifiers applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl">
consistency-proof =  bstr .cbor [

    ; older merkle root tree size
    tree-size-1: uint

    ; newer merkle root tree size
    tree-size-2: uint

    ; path from older merkle root to newer merkle root.
    consistency-path: [ + bstr ]

]
</sourcecode>
        </figure>
        <t>Editors note: tree-size-1, could be omitted, if an inclusion-proof is always present, since the inclusion proof contains, tree-size-1.</t>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer merkle tree root (proven to be consistent with an older merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: TBD_1): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl">
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &amp;(consistency-proof: -2) =&gt; consistency-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>MUST</bcp14> be attached.</t>
          <t>The EDN for a Receipt containing a consistency proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1                   /
    [
      h'a3012604...392b6601',       / Protected                     /
      {                             / Unprotected                   /
        396: {                      / Proofs                        /
          -2: [                     / Consistency proofs (1)        /
            h'83040682...2e73a8ab', / Consistency proof 1           /
          ]
        },
      },
      h'430b6fd7...f74c7fc4',       / Payload (Attached)            /
      h'd97befea...f30631cb'        / Signature                     /
    ]
)
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the VDP in the unprotected header.</t>
          <t>The EDN for the Protected Header in the example above is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt_header">
            <name>Example consistency receipt decoded protected header</name>
            <sourcecode type="cbor-diag">
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'68747470...6d706c65',        / Key identifier                /
  395: 1,                           / Verifiable Data Structure     /
}
</sourcecode>
          </figure>
          <t>The EDN for the consistency proof in the Unprotected Header is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt_consistency_proof">
            <name>Example consistency receipt decoded consistency proof</name>
            <sourcecode type="cbor-diag">
[                                   / Consistency proof 1           /
  4,                                / Tree size 1                   /
  6,                                / Tree size 2                   /
  [                                 / Consistency hashes (2)        /
     h'0bdaaed3...32568964'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
  ]
]
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>See the privacy considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
A privacy analysis <bcp14>MUST</bcp14> be performed for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis <bcp14>MUST</bcp14> be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Mike Jones,
Mike Prorock,
Ilari Liusvaara,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="additions-to-existing-registries">
        <name>Additions to Existing Registries</name>
        <section anchor="new-entries-to-the-cose-header-parameters-registry">
          <name>New Entries to the COSE Header Parameters Registry</name>
          <t>This document requests IANA to add new values to the 'COSE Header Parameters' registries in the 'Integer values between 1 and 255' range with 'Specification Required' Registration Procedure.</t>
          <section anchor="cose-header-parameters">
            <name>COSE Header Parameters</name>
            <section anchor="receipts">
              <name>Receipts</name>
              <ul spacing="normal">
                <li>Name: receipts</li>
                <li>Label: TBD_0 (requested assignment 394)</li>
                <li>Value type: array (of bstr)</li>
                <li>Value registry: https://www.iana.org/assignments/cose/cose.xhtml#header-parameters</li>
                <li>Description: Priority ordered list of CBOR encoded Receipts.</li>
                <li>Reference: RFC XXXX</li>
              </ul>
            </section>
            <section anchor="verifiable-data-structure-1">
              <name>Verifiable Data Structure</name>
              <ul spacing="normal">
                <li>Name: vds</li>
                <li>Label: TBD_1 (requested assignment 395)</li>
                <li>Value type: int</li>
                <li>Value registry: https://www.iana.org/assignments/cose/cose.xhtml#header-parameters</li>
                <li>Description: Algorithm name for verifiable data structure, used to produce verifiable data structure proofs.</li>
                <li>Reference: RFC XXXX</li>
              </ul>
            </section>
            <section anchor="verifiable-data-structure-proofs">
              <name>Verifiable Data Structure Proofs</name>
              <ul spacing="normal">
                <li>Name: vdp (requested assignment 396)</li>
                <li>Label: TBD_2</li>
                <li>Value type: map</li>
                <li>Value registry: https://www.iana.org/assignments/cose/cose.xhtml#header-parameters</li>
                <li>Description: Location for verifiable data structure proofs in COSE Header Parameters.</li>
                <li>Reference: RFC XXXX</li>
              </ul>
            </section>
          </section>
        </section>
        <section anchor="verifiable-data-structure-registry">
          <name>COSE Verifiable Data Structures</name>
          <t>IANA will be asked to establish a registry of verifiable data structure identifiers, named "COSE Verifiable Data Structures" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
          <t>Template:</t>
          <ul spacing="normal">
            <li>Name: The name of the verifiable data structure</li>
            <li>Value: The identifier for the verifiable data structure</li>
            <li>Description: A brief description of the verifiable data structure</li>
            <li>Reference: Where the verifiable data structure is defined</li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
          <section anchor="expert-review">
            <name>Expert Review</name>
            <t>This IANA registries is established under a Specification Required policy.</t>
            <t>This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
            <t>Expert reviewers should take into consideration the following points:</t>
            <ul spacing="normal">
              <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
              <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</li>
              <li>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structure Parameters registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure Parameters entries exist.</li>
            </ul>
          </section>
        </section>
        <section anchor="verifiable-data-structure-parameters-registry">
          <name>COSE Verifiable Data Structure Parameters</name>
          <t>IANA will be asked to establish a registry of verifiable data structure parameters, named "COSE Verifiable Data Structure Parameters" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
          <t>Template:</t>
          <ul spacing="normal">
            <li>Verifiable Data Structure: The identifier for the verifiable data structure</li>
            <li>Name: The name of the proof type</li>
            <li>Label: The integer of the proof type</li>
            <li>CBOR Type: The cbor data type of the proof</li>
            <li>Description: The description of the proof type</li>
            <li>Reference: Where the proof type is defined</li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures-parameters"/></t>
          <section anchor="expert-review-1">
            <name>Expert Review</name>
            <t>This IANA registries is established under a Specification Required policy.</t>
            <t>This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
            <t>Expert reviewers should take into consideration the following points:</t>
            <ul spacing="normal">
              <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
              <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</li>
              <li>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structures registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure entry exists.</li>
            </ul>
          </section>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7049"/>
            <seriesInfo name="RFC" value="7049"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9053"/>
            <seriesInfo name="RFC" value="9053"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <seriesInfo name="DOI" value="10.17487/RFC7120"/>
            <seriesInfo name="RFC" value="7120"/>
            <seriesInfo name="BCP" value="100"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="BCP" value="26"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <seriesInfo name="DOI" value="10.17487/RFC7942"/>
            <seriesInfo name="RFC" value="7942"/>
            <seriesInfo name="BCP" value="205"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-12"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="September" year="2024"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR) (STD 94, RFC 8949) is
   a data format whose design goals include the possibility of extremely
   small code size, fairly small message size, and extensibility without
   the need for version negotiation.

   In addition to the binary interchange format, CBOR from the outset
   (RFC 7049) defined a text-based "diagnostic notation" in order to be
   able to converse about CBOR data items without having to resort to
   binary data.  RFC 8610 extended this into what is known as Extended
   Diagnostic Notation (EDN).

   This document consolidates the definition of EDN, sets forth a
   further step of its evolution, and is intended to serve as a single
   reference target in specifications that use EDN.

   It specifies an extension point for adding application-oriented
   extensions to the diagnostic notation.  It then defines two such
   extensions that enhance EDN with text representations of epoch-based
   date/times and of IP addresses and prefixes (RFC 9164).

   A few further additions close some gaps in usability.  The document
   modifies one extension originally specified in Appendix G.4 of RFC
   8610 to enable further increasing usability.  To facilitate tool
   interoperation, this document specifies a formal ABNF grammar, and it
   adds media types.


   // The present revision -12 reflects the branch "roll-up" in the
   // repository, an attempt to contain the entire specification of EDN
   // in this document, instead of describing updates to the existing
   // documents RFC 8949 and RFC 8610.  While the WG hasn't taken a
   // decision to follow this updated editorial approach, the feedback
   // has been sufficiently positive that the author believes it is not
   // misleading to make this revision available as the current WG
   // Internet-Draft as well.  That said, this is still a snapshot.  The
   // editorial work on the branch "roll-up" is not complete.  Content
   // will continue to move between sections.  The exact reflection of
   // this document being a replacement for both Section 8 of RFC 8949
   // and Appendix G of RFC 8610 needs to be recorded in the metadata
   // and in abstract and introduction.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cwt-claims-in-headers">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-typ-header-parameter">
          <front>
            <title>COSE "typ" (type) Header Parameter</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-typ-header-parameter-05"/>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="3" month="April" year="2024"/>
            <abstract>
              <t>   This specification adds the equivalent of the JSON Object Signing and
   Encryption (JOSE) typ (type) header parameter to CBOR Object Signing
   and Encryption (COSE).  This enables the benefits of explicit typing,
   as defined in the JSON Web Token Best Current Practices BCP, to be
   brought to COSE objects.  The syntax of the COSE type header
   parameter value is the same as the existing COSE content type header
   parameter.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 696?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="implementer">
        <name>Implementer</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.</t>
      </section>
      <section anchor="implementation-name">
        <name>Implementation Name</name>
        <t>An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#scitt-receipts">COSE SCITT Receipts</eref></t>
      </section>
      <section anchor="implementation-url">
        <name>Implementation URL</name>
        <t>An open-source implementation is available at:</t>
        <ul spacing="normal">
          <li>https://github.com/transmute-industries/cose</li>
        </ul>
      </section>
      <section anchor="maturity">
        <name>Maturity</name>
        <t>The code's level of maturity is considered to be "prototype".</t>
      </section>
      <section anchor="coverage-and-version-compatibility">
        <name>Coverage and Version Compatibility</name>
        <t>The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.</t>
      </section>
      <section anchor="license">
        <name>License</name>
        <t>The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.</t>
      </section>
      <section anchor="implementation-dependencies">
        <name>Implementation Dependencies</name>
        <t>The implementation uses the Concise Binary Object Representation <xref target="RFC7049"/> (https://cbor.io/).</t>
        <t>The implementation uses the CBOR Object Signing and Encryption <xref target="RFC9053"/>, maintained at:
- https://github.com/erdtman/cose-js</t>
        <t>The implementation uses an implementation of <xref target="RFC9162"/>, maintained at:</t>
        <ul spacing="normal">
          <li>https://github.com/transmute-industries/rfc9162/tree/main/src/CoMETRE</li>
        </ul>
      </section>
      <section anchor="contact">
        <name>Contact</name>
        <t>Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
