<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-08" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title>COSE Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-08"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="21"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proves that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="param-list">
      <name>New COSE Header Parameters</name>
      <t>This document defines three new COSE header parameters, which are introduced up-front in this Section and elaborated on later in this document.</t>
      <dl>
        <dt>TBD_0 (requested assignment 394):</dt>
        <dd>
          <t>A COSE header parameter named <tt>receipts</tt> with a value type of array where the array contains one ore more COSE Receipts as specified in this document.</t>
        </dd>
        <dt>TBD_1 (requested assignment 395):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vds</tt> with a value type of integer where the integer is a verifiable data structure (VDS) algorithm identifier as specified in this document. Correspondingly, this document introduces a new verifiable data structure algorithm identifier registry that registers the integers used as values for this COSE header parameter.</t>
        </dd>
        <dt>TBD_2 (requested assignment 396):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vdp</tt> with a value type of map where the map contains verifiable data structure proofs (VDP) as specified in this this document. Correspondingly, this document introduces a new verifiable data structure proof registry that registers the integers that are used as labels in the map of this COSE header parameter.</t>
        </dd>
      </dl>
      <t>The other codepoints in this document are assigned from the registries established in this draft, they are therefore not marked TBD.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Proof Types.
This property is conceptually similar to "alg" (1), it described an algorithm used to maintain the verifiable data structure, for example a binary merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Parameters (VDP):</dt>
        <dd>
          <t>Parameters to a verifiable data structure that are used to prove properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).
This property is conceptually similar to COSE Header Parameter "epk" (-1) or CBOR Web Token (CWT) claim "cnf" (8), it is applied to a verifiable data structure, to confirm a property.
For example an encrypted message might be decrypted using epk and a private key, a digital signature for authentication might be verified using cnf and the (CWT) claim "nonce" and "audience", and an inclusion proof for a binary merkle tree might be verified with VDP and some entry that is being tested or inclusion in the tree.</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A verifiable process, that proves properties of a Verifiable Data Structure.
For example, a VDS, such as a binary merkle tree, can support multiple proofs of type "inclusion" where each proof confirms that a given entry is included in a merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR <xref target="RFC7049"/>.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in <xref target="RFC7049"/>.
For example, construction of a merkle tree leaf, or an inclusion proof from a leaf to a merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <t>During testing and development the experimental range <bcp14>SHOULD</bcp14> be used, unless early assignment for a provisional entry has been completed.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.
As EC2 keys (1: 2) support both digital signature and key agreement algorithms, RFC9162_SHA256 (TBD_1 : 1) supports both inclusion and consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">11</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">22</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">EXPERIMENTAL</td>
              <td align="left">33</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>When designing new verifiable data structures, please request the next available positive integer as your requested assignment, for example:</t>
        <table align="left" anchor="cose-verifiable-data-structures-registration-guidance">
          <name>How to register new structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">N/A</td>
              <td align="left">0</td>
              <td align="left">N/A</td>
              <td align="left">N/A</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
            <tr>
              <td align="left">Your name</td>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">tbd</td>
              <td align="left">Your specification</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-parameters">
        <name>Parameters</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters">
          <name>COSE Verifiable Data Structure Parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
            <tr>
              <td align="left">11</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">22</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">33</td>
              <td align="left">unknown</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Unknown</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types.
For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion.
Security analysis <bcp14>SHOULD</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.
When designing new verifiable data structure parameters (or proof types), please start with -1, and count down for each proof type supported by your verifiable data structure:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters-registration-guidance">
          <name>How to register new parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-1</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-2</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
            <tr>
              <td align="left">TBD (requested assignment 2)</td>
              <td align="left">new proof type</td>
              <td align="left">-3</td>
              <td align="left">tbd</td>
              <td align="left">tbd</td>
              <td align="left">Your_Specification</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="receipt-spec">
        <name>Usage</name>
        <t>This document registered a new COSE Header Parameter <tt>receipts</tt> (394) to enable this Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs <bcp14>MUST</bcp14> match entries present in the registries established in this specification.</t>
        <t>The following informative CDDL is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl">
Receipt = #6.18(COSE_Sign1)

Protected_Header = {
  * cose-label =&gt; cose-value
}

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ Receipt]
  * cose-label =&gt; cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
</sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>A COSE Signature with multiple receipts</name>
          <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / key / 4 : "vCl7UcS0ZZY99VpRthDc-0iUjLdfLtnmFqLJ2-Tt8N4",
    / algorithm / 1 : -7,  # ES256
  }&gt;&gt;,
  / unprotected / {
    / receipts / 394 : {
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 9, / leaf / 8,
                / inclusion path /
                h'7558a95f...e02e35d6'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'02d227ed...ccd3774f'
      ])&gt;&gt;,
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "ajOkeBTJou_wPrlExLMw7L9OTCD5ZIOBYc-O6LESe9c",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 6, / leaf / 5,
                / inclusion path /
                h'9352f974...4ffa7ce0',
                h'54806f32...f007ea06'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'36581f38...a5581960'
      ])&gt;&gt;
    },
  },
  / payload     / h'0167c57c...deeed6d4',
  / signature   / h'2544f2ed...5840893b'
])
</sourcecode>
        </figure>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure and its parameters (also called proof types) in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, an IANA registration must be made for each individually supported algorithm.
For example, to provide for both SHA256 and SHA3_256 with <xref target="RFC9162"/>,
both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/> are mapped to the terminology defined in this document, using <xref target="RFC7049"/> and <xref target="RFC9053"/>.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".
See <xref target="cose-verifiable-data-structures"/>.
See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl">
inclusion-proof = bstr .cbor [

    ; tree size at current merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current merkle root
    inclusion-path: [ + bstr ]
]
</sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref target="RFC9162"/></t>
        <t>Note that <xref target="RFC9162"/> defines that verification <bcp14>MUST</bcp14> fail if leaf-index is &gt;= tree-size, and inclusion proofs are defined only for leaf nodes.
The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the merkle tree root which corresponds to the log at size <tt>tree-size</tt>.
Specifications are encouraged to make payloads detached when possible, forcing validation-time comparison.
Profiles of proof signatures are encouraged to make additional protected header parameters mandatory, to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="I-D.ietf-cose-typ-header-parameter"/> and the similar guidance provided in <xref target="I-D.ietf-cose-cwt-claims-in-headers"/>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: 395): <bcp14>REQUIRED</bcp14>. verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl">
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &amp;(inclusion-proof: -1) =&gt; inclusion-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the inclusion proof, this protects against implementation errors where the signature is verified but the merkle root does not match the inclusion proof.
The EDN for a Receipt containing an inclusion proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Receipt of Inclusion</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / inclusion / -1 : [
        &lt;&lt;[
          / size / 20, / leaf / 17,
          / inclusion path /
          h'fc9f050f...221c92cb',
          h'bd0136ad...6b28cf21',
          h'd68af9d6...93b1632b'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'de24f0cc...9a5ade89'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifiers applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl">
consistency-proof =  bstr .cbor [

    ; older merkle root tree size
    tree-size-1: uint

    ; newer merkle root tree size
    tree-size-2: uint

    ; path from older merkle root to newer merkle root.
    consistency-path: [ + bstr ]

]
</sourcecode>
        </figure>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer merkle tree root (proven to be consistent with an older merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: TBD_1): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl">
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &amp;(consistency-proof: -2) =&gt; consistency-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the consistency proof, this protects against implementation errors where the signature is verified but the merkle root does not match the proof.</t>
          <t>The EDN for a Receipt containing a consistency proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / consistency / -2 : [
        &lt;&lt;[
          / old / 20, / new / 104,
          / consistency path /
          h'e5b3e764...c4a813bc',
          h'87e8a084...4f529f69',
          h'f712f76d...92a0ff36',
          h'd68af9d6...93b1632b',
          h'249efab6...b7614ccd',
          h'85dd6293...38914dc1'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'94469f73...52de67a1'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>See the privacy considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
A privacy analysis <bcp14>MUST</bcp14> be performed for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis <bcp14>MUST</bcp14> be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Mike Jones,
Mike Prorock,
Ilari Liusvaara,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to add the COSE header parameters defined in <xref target="param-list"/>, as listed in <xref target="iana-header-params"/>, to the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> in the 'Integer values from 256 to 65535' range ('Specification Required' Registration Procedure).
All new entries use https://www.iana.org/assignments/cose/cose.xhtml#header-parameters as the value for the "Value Registry" column.</t>
        <table anchor="iana-header-params">
          <name>Newly registered COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>receipts</tt></td>
              <td align="left">TBD_0 (requested assignment: 394)</td>
              <td align="left">array</td>
              <td align="left">Priority ordered sequence of CBOR encoded Receipts</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vds</tt></td>
              <td align="left">TBD_1 (requested assignment: 395)</td>
              <td align="left">int</td>
              <td align="left">Algorithm identifier for verifiable data structure, used to produce verifiable data structure proofs</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vdp</tt></td>
              <td align="left">TBD_2 (requested assignment: 396)</td>
              <td align="left">map</td>
              <td align="left">Location for verifiable data structure proofs in COSE Header Parameters</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="verifiable-data-structure-registry">
        <name>COSE Verifiable Data Structures</name>
        <t>IANA will be asked to establish a registry of verifiable data structure identifiers, named "COSE Verifiable Data Structures" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>Name: The name of the verifiable data structure</li>
          <li>Value: The identifier for the verifiable data structure</li>
          <li>Description: A brief description of the verifiable data structure</li>
          <li>Reference: Where the verifiable data structure is defined</li>
        </ul>
        <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
        <section anchor="expert-review">
          <name>Expert Review</name>
          <t>This IANA registries is established under a Specification Required policy.</t>
          <t>This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
            <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</li>
            <li>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structure Parameters registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure Parameters entries exist.</li>
          </ul>
        </section>
      </section>
      <section anchor="verifiable-data-structure-parameters-registry">
        <name>COSE Verifiable Data Structure Parameters</name>
        <t>IANA will be asked to establish a registry of verifiable data structure parameters, named "COSE Verifiable Data Structure Parameters" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>Verifiable Data Structure: The identifier for the verifiable data structure</li>
          <li>Name: The name of the proof type</li>
          <li>Label: The integer of the proof type</li>
          <li>CBOR Type: The cbor data type of the proof</li>
          <li>Description: The description of the proof type</li>
          <li>Reference: Where the proof type is defined</li>
        </ul>
        <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures-parameters"/></t>
        <section anchor="expert-review-1">
          <name>Expert Review</name>
          <t>This IANA registries is established under a Specification Required policy.</t>
          <t>This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason, so they should be given substantial latitude.</t>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
            <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</li>
            <li>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structures registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure entry exists.</li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC7049"/>
            <seriesInfo name="RFC" value="7049"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9053"/>
            <seriesInfo name="RFC" value="9053"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <seriesInfo name="DOI" value="10.17487/RFC7120"/>
            <seriesInfo name="RFC" value="7120"/>
            <seriesInfo name="BCP" value="100"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="BCP" value="26"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <seriesInfo name="DOI" value="10.17487/RFC7942"/>
            <seriesInfo name="RFC" value="7942"/>
            <seriesInfo name="BCP" value="205"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-16"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present
   // revision (-16) addresses the first half of the WGLC comments,
   // except for the issues around the specific way how to best achieve
   // pluggable ABNF grammars for application-extensions.  It is
   // intended for use as a reference document for the mid-WGLC CBOR WG
   // interim meeting on 2025-01-08.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-cwt-claims-in-headers">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cose-typ-header-parameter">
          <front>
            <title>COSE "typ" (type) Header Parameter</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-typ-header-parameter-05"/>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="3" month="April" year="2024"/>
            <abstract>
              <t>   This specification adds the equivalent of the JSON Object Signing and
   Encryption (JOSE) typ (type) header parameter to CBOR Object Signing
   and Encryption (COSE).  This enables the benefits of explicit typing,
   as defined in the JSON Web Token Best Current Practices BCP, to be
   brought to COSE objects.  The syntax of the COSE type header
   parameter value is the same as the existing COSE content type header
   parameter.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 676?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.
An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#transparent-statement">COSE SCITT Receipts</eref></t>
        <t>Implementation URL: https://github.com/transmute-industries/cose
Maturity: The code's level of maturity is considered to be "prototype".
Coverage and Version Compatibility: The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.
License: The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.
Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
