<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.5) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-15" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title>COSE Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-15"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="07"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    CBOR Object Signing and Encryption Working Group mailing list (cose@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proofs that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="param-list">
      <name>New COSE Header Parameters</name>
      <t>This document defines three new COSE header parameters, which are introduced up-front in this Section and elaborated on later in this document.</t>
      <dl>
        <dt>TBD_0 (requested assignment 394):</dt>
        <dd>
          <t>A COSE header parameter named <tt>receipts</tt> with a value type of array where the array contains one or more COSE Receipts as specified in this document.</t>
        </dd>
        <dt>TBD_1 (requested assignment 395):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vds</tt> (Verifiable Data Structure), which conveys the algorithm identifier for a verifiable data structure.
Correspondingly, this document introduces a new <xref target="verifiable-data-structure-registry"/> that registers the integers used to identify verifiable data structures.</t>
        </dd>
        <dt>TBD_2 (requested assignment 396):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vdp</tt> (short for "verifiable data structure proofs"), which conveys a map containing verifiable data structure proofs organized by proof type.
Correspondingly, this document introduces a new <xref target="verifiable-data-structure-proofs-registry"/> that registers the integers used to identify verifiable data structure proof types.</t>
        </dd>
      </dl>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Verifiable Data Structure Proof Types.
This property describes an algorithm used to maintain a verifiable data structure, for example a binary Merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Proofs (VDP):</dt>
        <dd>
          <t>A data structure used to convey proof types for proving different properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A property that can be obtained by verifying a given proof over one or more entries in a Verifiable Data Structure.
For example, a VDS, such as a binary Merkle tree, can support proofs of type "inclusion" where each proof confirms that a given entry is included in a Merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR <xref target="RFC8949"/>.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in <xref target="RFC8949"/>.
For example, construction of a Merkle tree leaf, or an inclusion proof from a leaf to a Merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Reserved</td>
              <td align="left">0</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-proofs">
        <name>Proofs</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 (requested assignment 395) : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structure-proofs">
          <name>COSE Verifiable Data Structure Proofs</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types.
For example, 2 different Merkle tree based verifiable data structures might both support proofs of inclusion.
Security analysis <bcp14>MUST</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.</t>
      </section>
      <section anchor="receipt-spec">
        <name>Usage</name>
        <t>This document registers a new COSE Header Parameter <tt>receipts</tt> (TBD_0 (requested assignment 394)) to enable this Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs <bcp14>MUST</bcp14> match entries present in the registries established in this specification.</t>
        <t>Receipts <bcp14>MUST</bcp14> be tagged as COSE_Sign1.</t>
        <t>The following <xref target="RFC8610"/> definition is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl"><![CDATA[
Receipt = #6.18(COSE_Sign1)

cose-value = any

Protected_Header = {
  * cose-label => cose-value
}

Unprotected_Header = {
  &(receipts: 394)  => [+ bstr .cbor Receipt]
  * cose-label => cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
]]></sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>An example COSE Signature with multiple receipts</name>
          <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / key / 4 : "vCl7UcS0ZZY99VpRthDc-0iUjLdfLtnmFqLJ2-Tt8N4",
    / algorithm / 1 : -7,  # ES256
  }>>,
  / unprotected / {
    / receipts / 394 : {
      <</ cose-sign1 / 18([
        / protected   / <<{
          / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }>>,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              <<[
                / size / 9, / leaf / 8,
                / inclusion path /
                h'7558a95f...e02e35d6'
              ]>>
            ],
          },
        },
        / payload     / null,
        / signature   / h'02d227ed...ccd3774f'
      ])>>,
      <</ cose-sign1 / 18([
        / protected   / <<{
          / key / 4 : "ajOkeBTJou_wPrlExLMw7L9OTCD5ZIOBYc-O6LESe9c",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }>>,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              <<[
                / size / 6, / leaf / 5,
                / inclusion path /
                h'9352f974...4ffa7ce0',
                h'54806f32...f007ea06'
              ]>>
            ],
          },
        },
        / payload     / null,
        / signature   / h'36581f38...a5581960'
      ])>>
    },
  },
  / payload     / h'0167c57c...deeed6d4',
  / signature   / h'2544f2ed...5840893b'
])
]]></sourcecode>
        </figure>
        <t>The specific structure of COSE Receipts are dependent on the structure of the COSE_Sign1 payload and the verifiable data structure proofs contained in the COSE_Sign1 unprotected header.
The CDDL for specific verifiable data structure proofs is verifiable data structure specific.
This document describes proofs for RFC9162_SHA256 in the following sections.</t>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure identifier and its proof types in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, an IANA registration must be made for each individually supported algorithm.
For example, to provide for both SHA256 and SHA3_256 with <xref target="RFC9162"/>,
both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/> are mapped to the terminology defined in this document, using <xref target="RFC8949"/> and <xref target="RFC9053"/>.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".
See <xref target="cose-verifiable-data-structures"/>.
See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl"><![CDATA[
inclusion-proof = bstr .cbor [

    ; tree size at current Merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current Merkle root
    inclusion-path: [ + bstr ]
]
]]></sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref target="RFC9162"/></t>
        <t>Note that <xref target="RFC9162"/> defines that verification <bcp14>MUST</bcp14> fail if leaf-index is &gt;= tree-size, and inclusion proofs are defined only for leaf nodes.
The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the Merkle tree root which corresponds to the log at size <tt>tree-size</tt>.
Specifications are encouraged to make payloads detached when possible, forcing validation-time comparison.
Profiles of proof signatures are encouraged to make additional protected header parameters mandatory, to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="RFC9596"/> and the similar guidance provided in <xref target="RFC9597"/>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl"><![CDATA[
protected-header-map = {
  &(alg: 1) => int
  &(vds: 395) => int
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</t>
            </li>
            <li>
              <t>vds (label: TBD_1 (requested assignment 395)): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl"><![CDATA[
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &(inclusion-proof: -1) => inclusion-proofs
}

unprotected-header-map = {
  &(vdp: 396) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>vdp (label: TBD_2 (requested assignment 396)): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</t>
            </li>
            <li>
              <t>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the inclusion proof, this protects against implementation errors where the signature is verified but the Merkle root does not match the inclusion proof.
The EDN for a Receipt containing an inclusion proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Receipt of Inclusion</name>
            <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }>>,
  / unprotected / {
    / proofs / 396 : {
      / inclusion / -1 : [
        <<[
          / size / 20, / leaf / 17,
          / inclusion path /
          h'fc9f050f...221c92cb',
          h'bd0136ad...6b28cf21',
          h'd68af9d6...93b1632b'
        ]>>
      ],
    },
  },
  / payload     / null,
  / signature   / h'de24f0cc...9a5ade89'
])
]]></sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifiers applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a Merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl"><![CDATA[
consistency-proof =  bstr .cbor [

    ; older Merkle root tree size
    tree-size-1: uint

    ; newer Merkle root tree size
    tree-size-2: uint

    ; path from older Merkle root to newer Merkle root.
    consistency-path: [ + bstr ]

]
]]></sourcecode>
        </figure>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer Merkle tree root (proven to be consistent with an older Merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl"><![CDATA[
protected-header-map = {
  &(alg: 1) => int
  &(vds: 395) => int
  * cose-label => cose-value
}
]]></sourcecode>
          </figure>
          <ul spacing="normal">
            <li>
              <t>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</t>
            </li>
            <li>
              <t>vds (label: TBD_1 (requested assignment 395)): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</t>
            </li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl"><![CDATA[
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &(consistency-proof: -2) => consistency-proofs
}

unprotected-header-map = {
  &(vdp: 396) => verifiable-proofs
  * cose-label => cose-value
}
]]></sourcecode>
          <ul spacing="normal">
            <li>
              <t>vdp (label: TBD_2 (requested assignment 396)): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</t>
            </li>
            <li>
              <t>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</t>
            </li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the consistency proof, this protects against implementation errors where the signature is verified but the Merkle root does not match the proof.</t>
          <t>The EDN for a Receipt containing a consistency proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag"><![CDATA[
/ cose-sign1 / 18([
  / protected   / <<{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }>>,
  / unprotected / {
    / proofs / 396 : {
      / consistency / -2 : [
        <<[
          / old / 20, / new / 104,
          / consistency path /
          h'e5b3e764...c4a813bc',
          h'87e8a084...4f529f69',
          h'f712f76d...92a0ff36',
          h'd68af9d6...93b1632b',
          h'249efab6...b7614ccd',
          h'85dd6293...38914dc1'
        ]>>
      ],
    },
  },
  / payload     / null,
  / signature   / h'94469f73...52de67a1'
])
]]></sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations section of <xref target="RFC9162"/> and <xref target="RFC9053"/> apply to this document.</t>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
A privacy analysis <bcp14>MUST</bcp14> be performed for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="RFC9162"/></t>
        </li>
        <li>
          <t><xref target="RFC9053"/></t>
        </li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis <bcp14>MUST</bcp14> be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to add the COSE header parameters defined in <xref target="param-list"/>, as listed in <xref target="iana-header-params"/>, to the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> in the 'Integer values from 256 to 65535' range ('Specification Required' Registration Procedure).
The Value Registry for "vds" is the COSE Verifiable Data Structure registry.
The map labels in the "vdp" are assigned from the COSE Verifiable Data Structure Proofs registry.</t>
        <table anchor="iana-header-params">
          <name>Newly registered COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Value Registry</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>receipts</tt></td>
              <td align="left">TBD_0 (requested assignment: 394)</td>
              <td align="left">array</td>
              <td align="left"> </td>
              <td align="left">Priority ordered sequence of CBOR encoded Receipts</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vds</tt></td>
              <td align="left">TBD_1 (requested assignment: 395)</td>
              <td align="left">int</td>
              <td align="left">COSE Verifiable Data Structure</td>
              <td align="left">Algorithm identifier for verifiable data structures, used to produce verifiable data structure proofs</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vdp</tt></td>
              <td align="left">TBD_2 (requested assignment: 396)</td>
              <td align="left">map</td>
              <td align="left">map key in COSE Verifiable Data Structure Proofs</td>
              <td align="left">Location for verifiable data structure proofs in COSE Header Parameters</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="verifiable-data-structure-registries">
        <name>Verifiable Data Structure Registries</name>
        <t>IANA established the COSE Verifiable Data Structures and COSE Verifiable Data Structure Proofs registries under a Specification Required policy as described in <xref target="RFC8126"/>.</t>
        <section anchor="expert-review">
          <name>Expert Review</name>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>
              <t>Experts are advised to assign the next available positive integer for verifiable data structures.</t>
            </li>
            <li>
              <t>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</t>
            </li>
            <li>
              <t>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.</t>
            </li>
            <li>
              <t>It is not permissible to assign points in COSE Verifiable Data Structures, for which no corresponding COSE Verifiable Data Structure Proofs entry exists, and vice versa.</t>
            </li>
            <li>
              <t>The Change Controller for related registrations of structures and proofs should be the same.</t>
            </li>
          </ul>
        </section>
        <section anchor="verifiable-data-structure-registry">
          <name>COSE Verifiable Data Structures</name>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>
              <t>Name:
This is a descriptive name for the verifiable data structure that enables easier reference to the item.</t>
            </li>
            <li>
              <t>Value:
This is the value used to identify the verifiable data structure.</t>
            </li>
            <li>
              <t>Description:
This field contains a brief description of the verifiable data structure.</t>
            </li>
            <li>
              <t>Reference:
This contains a pointer to the public specification for the verifiable data structure.</t>
            </li>
            <li>
              <t>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
        </section>
        <section anchor="verifiable-data-structure-proofs-registry">
          <name>COSE Verifiable Data Structure Proofs</name>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>
              <t>Verifiable Data Structure:
This value used identifies the related verifiable data structure.</t>
            </li>
            <li>
              <t>Name:
This is a descriptive name for the proof type that enables easier reference to the item.</t>
            </li>
            <li>
              <t>Label:
This is the value used to identify the verifiable data structure proof type.</t>
            </li>
            <li>
              <t>CBOR Type:
This contains the CBOR type for the value portion of the label.</t>
            </li>
            <li>
              <t>Description:
This field contains a brief description of the proof type.</t>
            </li>
            <li>
              <t>Reference:
This contains a pointer to the public specification for the proof type.</t>
            </li>
            <li>
              <t>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structure-proofs"/></t>
        </section>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Michael B. Jones,
Mike Prorock,
Ilari Liusvaara,
Amaury Chamayou,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9597"/>
          <seriesInfo name="DOI" value="10.17487/RFC9597"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -18
   // corrects a few omissions from -17; it is not intended to make
   // technical changes from -17.  It is intended for use as an input
   // document for the CBOR WG meeting at IETF 123.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-18"/>
        </reference>
      </references>
    </references>
    <?line 656?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.
An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#transparent-statement">COSE SCITT Receipts</eref></t>
        <t>Implementation URL: https://github.com/transmute-industries/cose
Maturity: The code's level of maturity is considered to be "prototype".
Coverage and Version Compatibility: The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.
License: The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.
Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
