<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title>COSE Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-09"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="25"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    CBOR Object Signing and Encryption Working Group mailing list (cose@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proves that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="param-list">
      <name>New COSE Header Parameters</name>
      <t>This document defines three new COSE header parameters, which are introduced up-front in this Section and elaborated on later in this document.</t>
      <dl>
        <dt>TBD_0 (requested assignment 394):</dt>
        <dd>
          <t>A COSE header parameter named <tt>receipts</tt> with a value type of array where the array contains one ore more COSE Receipts as specified in this document.</t>
        </dd>
        <dt>TBD_1 (requested assignment 395):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vds</tt> with a value type of integer where the integer is a verifiable data structure (VDS) algorithm identifier as specified in this document. Correspondingly, this document introduces a new verifiable data structure algorithm identifier registry that registers the integers used as values for this COSE header parameter.</t>
        </dd>
        <dt>TBD_2 (requested assignment 396):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vdp</tt> with a value type of map where the map contains verifiable data structure proofs (VDP) as specified in this this document. Correspondingly, this document introduces a new verifiable data structure proof registry that registers the integers that are used as labels in the map of this COSE header parameter.</t>
        </dd>
      </dl>
      <t>The other codepoints in this document are assigned from the registries established in this draft, they are therefore not marked TBD.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Verifiable Data Structure Parameters.
This property describes an algorithm used to maintain a verifiable data structure, for example a binary merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Parameters (VDP):</dt>
        <dd>
          <t>Parameters to a verifiable data structure that are used to prove properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A verifiable process, that proves properties of a Verifiable Data Structure.
For example, a VDS, such as a binary merkle tree, can support multiple proofs of type "inclusion" where each proof confirms that a given entry is included in a merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR <xref target="RFC7049"/>.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in <xref target="RFC7049"/>.
For example, construction of a merkle tree leaf, or an inclusion proof from a leaf to a merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.
As EC2 keys (1: 2) support both digital signature and key agreement algorithms, RFC9162_SHA256 (TBD_1 : 1) supports both inclusion and consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Reserved</td>
              <td align="left">0</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-parameters">
        <name>Parameters</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures-parameters">
          <name>COSE Verifiable Data Structure Parameters</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types.
For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion.
Security analysis <bcp14>SHOULD</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.</t>
      </section>
      <section anchor="receipt-spec">
        <name>Usage</name>
        <t>This document registered a new COSE Header Parameter <tt>receipts</tt> (394) to enable this Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs <bcp14>MUST</bcp14> match entries present in the registries established in this specification.</t>
        <t>The following informative CDDL is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl"><![CDATA[
Receipt = #6.18(COSE_Sign1)

Protected_Header = {
  * cose-label => cose-value
}

Unprotected_Header = {
  &(receipts: 394)  => [+ Receipt]
  * cose-label => cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
]]></sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>A COSE Signature with multiple receipts</name>
          <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / key / 4 : "vCl7UcS0ZZY99VpRthDc-0iUjLdfLtnmFqLJ2-Tt8N4",
    / algorithm / 1 : -7,  # ES256
  }>>,
  / unprotected / {
    / receipts / 394 : {
      <</ cose-sign1 / 18([
        / protected   / <<{
          / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }>>,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              <<[
                / size / 9, / leaf / 8,
                / inclusion path /
                h'7558a95f...e02e35d6'
              ]>>
            ],
          },
        },
        / payload     / null,
        / signature   / h'02d227ed...ccd3774f'
      ])>>,
      <</ cose-sign1 / 18([
        / protected   / <<{
          / key / 4 : "ajOkeBTJou_wPrlExLMw7L9OTCD5ZIOBYc-O6LESe9c",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }>>,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              <<[
                / size / 6, / leaf / 5,
                / inclusion path /
                h'9352f974...4ffa7ce0',
                h'54806f32...f007ea06'
              ]>>
            ],
          },
        },
        / payload     / null,
        / signature   / h'36581f38...a5581960'
      ])>>
    },
  },
  / payload     / h'0167c57c...deeed6d4',
  / signature   / h'2544f2ed...5840893b'
])
]]></sourcecode>
        </figure>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure identifier and its parameters (also called proof types) in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, an IANA registration must be made for each individually supported algorithm.
For example, to provide for both SHA256 and SHA3_256 with <xref target="RFC9162"/>,
both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/> are mapped to the terminology defined in this document, using <xref target="RFC7049"/> and <xref target="RFC9053"/>.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".
See <xref target="cose-verifiable-data-structures"/>.
See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl"><![CDATA[
inclusion-proof = bstr .cbor [

    ; tree size at current merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current merkle root
    inclusion-path: [ + bstr ]
]
]]></sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref target="RFC9162"/></t>
        <t>Note that <xref target="RFC9162"/> defines that verification <bcp14>MUST</bcp14> fail if leaf-index is &gt;= tree-size, and inclusion proofs are defined only for leaf nodes.
The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the merkle tree root which corresponds to the log at size <tt>tree-size</tt>.
Specifications are encouraged to make payloads detached when possible, forcing validation-time comparison.
Profiles of proof signatures are encouraged to make additional protected header parameters mandatory, to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="RFC9596"/> and the similar guidance provided in <xref target="RFC9597"/>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl"><![CDATA[
protected-header-map = {
  &(alg: 1) => int
  &(vds: 395) => int
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</t>
            </li>
            <li>
              <t>vds (label: 395): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl"><![CDATA[
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &(inclusion-proof: -1) => inclusion-proofs
}

unprotected-header-map = {
  &(vdp: 396) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</t>
            </li>
            <li>
              <t>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the inclusion proof, this protects against implementation errors where the signature is verified but the merkle root does not match the inclusion proof.
The EDN for a Receipt containing an inclusion proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Receipt of Inclusion</name>
            <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }>>,
  / unprotected / {
    / proofs / 396 : {
      / inclusion / -1 : [
        <<[
          / size / 20, / leaf / 17,
          / inclusion path /
          h'fc9f050f...221c92cb',
          h'bd0136ad...6b28cf21',
          h'd68af9d6...93b1632b'
        ]>>
      ],
    },
  },
  / payload     / null,
  / signature   / h'de24f0cc...9a5ade89'
])
]]></sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifiers applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl"><![CDATA[
consistency-proof =  bstr .cbor [

    ; older merkle root tree size
    tree-size-1: uint

    ; newer merkle root tree size
    tree-size-2: uint

    ; path from older merkle root to newer merkle root.
    consistency-path: [ + bstr ]

]
]]></sourcecode>
        </figure>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer merkle tree root (proven to be consistent with an older merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl"><![CDATA[
protected-header-map = {
  &(alg: 1) => int
  &(vds: 395) => int
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</t>
            </li>
            <li>
              <t>vds (label: TBD_1): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl"><![CDATA[
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &(consistency-proof: -2) => consistency-proofs
}

unprotected-header-map = {
  &(vdp: 396) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          <ul spacing="normal">
            <li>
              <t>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</t>
            </li>
            <li>
              <t>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the consistency proof, this protects against implementation errors where the signature is verified but the merkle root does not match the proof.</t>
          <t>The EDN for a Receipt containing a consistency proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }>>,
  / unprotected / {
    / proofs / 396 : {
      / consistency / -2 : [
        <<[
          / old / 20, / new / 104,
          / consistency path /
          h'e5b3e764...c4a813bc',
          h'87e8a084...4f529f69',
          h'f712f76d...92a0ff36',
          h'd68af9d6...93b1632b',
          h'249efab6...b7614ccd',
          h'85dd6293...38914dc1'
        ]>>
      ],
    },
  },
  / payload     / null,
  / signature   / h'94469f73...52de67a1'
])
]]></sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>See the privacy considerations section of:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9162"/></t>
        </li>
        <li>
          <t><xref target="RFC9053"/></t>
        </li>
      </ul>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
A privacy analysis <bcp14>MUST</bcp14> be performed for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9162"/></t>
        </li>
        <li>
          <t><xref target="RFC9053"/></t>
        </li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis <bcp14>MUST</bcp14> be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to add the COSE header parameters defined in <xref target="param-list"/>, as listed in <xref target="iana-header-params"/>, to the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> in the 'Integer values from 256 to 65535' range ('Specification Required' Registration Procedure).
All new entries use https://www.iana.org/assignments/cose/cose.xhtml#header-parameters as the value for the "Value Registry" column.</t>
        <table anchor="iana-header-params">
          <name>Newly registered COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>receipts</tt></td>
              <td align="left">TBD_0 (requested assignment: 394)</td>
              <td align="left">array</td>
              <td align="left">Priority ordered sequence of CBOR encoded Receipts</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vds</tt></td>
              <td align="left">TBD_1 (requested assignment: 395)</td>
              <td align="left">int</td>
              <td align="left">Algorithm identifier for verifiable data structure, used to produce verifiable data structure proofs</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vdp</tt></td>
              <td align="left">TBD_2 (requested assignment: 396)</td>
              <td align="left">map</td>
              <td align="left">Location for verifiable data structure proofs in COSE Header Parameters</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="verifiable-data-structure-registry">
        <name>COSE Verifiable Data Structures</name>
        <t>IANA will be asked to establish a registry of verifiable data structure identifiers, named "COSE Verifiable Data Structures" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Name: The name of the verifiable data structure</t>
          </li>
          <li>
            <t>Value: The identifier for the verifiable data structure</t>
          </li>
          <li>
            <t>Description: A brief description of the verifiable data structure</t>
          </li>
          <li>
            <t>Reference: Where the verifiable data structure is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
        <section anchor="expert-review">
          <name>Expert Review</name>
          <t>This IANA registries is established under a Specification Required policy.</t>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>
              <t>Experts are advised to assign the next available positive integer for verifiable data structures.</t>
            </li>
            <li>
              <t>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</t>
            </li>
            <li>
              <t>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</t>
            </li>
            <li>
              <t>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structure Parameters registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure Parameters entries exist.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="verifiable-data-structure-parameters-registry">
        <name>COSE Verifiable Data Structure Parameters</name>
        <t>IANA will be asked to establish a registry of verifiable data structure parameters, named "COSE Verifiable Data Structure Parameters" to be administered under a Specification Required policy <xref target="RFC8126"/>.</t>
        <t>Template:</t>
        <ul spacing="normal">
          <li>
            <t>Verifiable Data Structure: The identifier for the verifiable data structure</t>
          </li>
          <li>
            <t>Name: The name of the proof type</t>
          </li>
          <li>
            <t>Label: The integer of the proof type</t>
          </li>
          <li>
            <t>CBOR Type: The cbor data type of the proof</t>
          </li>
          <li>
            <t>Description: The description of the proof type</t>
          </li>
          <li>
            <t>Reference: Where the proof type is defined</t>
          </li>
        </ul>
        <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures-parameters"/></t>
        <section anchor="expert-review-1">
          <name>Expert Review</name>
          <t>This IANA registries is established under a Specification Required policy.</t>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>
              <t>Experts are advised to assign the next available negative integer for proof types.</t>
            </li>
            <li>
              <t>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</t>
            </li>
            <li>
              <t>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.
Provisional assignments to expired drafts <bcp14>MUST</bcp14> be removed from the registry.</t>
            </li>
            <li>
              <t>Points assigned in this registry <bcp14>MUST</bcp14> have references that match the COSE Verifiable Data Structures registry.
It is not permissible to assign points in this registry, for which no Verifiable Data Structure entry exists.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Michael B. Jones,
Mike Prorock,
Ilari Liusvaara,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7049">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7049"/>
          <seriesInfo name="DOI" value="10.17487/RFC7049"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9597"/>
          <seriesInfo name="DOI" value="10.17487/RFC9597"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present
   // revision (–16) addresses the first half of the WGLC comments,
   // except for the issues around the specific way how to best achieve
   // pluggable ABNF grammars for application-extensions.  It is
   // intended for use as a reference document for the mid-WGLC CBOR WG
   // interim meeting on 2025-01-08.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-16"/>
        </reference>
      </references>
    </references>
    <?line 650?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.
An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#transparent-statement">COSE SCITT Receipts</eref></t>
        <t>Implementation URL: https://github.com/transmute-industries/cose
Maturity: The code's level of maturity is considered to be "prototype".
Coverage and Version Compatibility: The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.
License: The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.
Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
