<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-17" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title>COSE (CBOR Object Signing and Encryption) Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-17"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Tradeverifyd</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@or13.io</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="10"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 89?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for Merkle inclusion and consistency proofs.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proofs that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase the burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="param-list">
      <name>New COSE Header Parameters</name>
      <t>This document defines three new COSE header parameters, which are introduced up-front in this Section and elaborated on later in this document.</t>
      <dl>
        <dt>TBD_0 (requested assignment 394):</dt>
        <dd>
          <t>A COSE header parameter named <tt>receipts</tt> with a value type of array where the array contains one or more COSE Receipts as specified in this document.</t>
        </dd>
        <dt>TBD_1 (requested assignment 395):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vds</tt> (Verifiable Data Structure), which conveys the algorithm identifier for a verifiable data structure.
Correspondingly, this document introduces a new registry (<xref target="verifiable-data-structure-registry"/>) defining the integers used to identify verifiable data structures.</t>
        </dd>
        <dt>TBD_2 (requested assignment 396):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vdp</tt> (short for "verifiable data structure proofs"), which conveys a map containing verifiable data structure proofs organized by proof type.
Correspondingly, this document introduces a new registry (<xref target="verifiable-data-structure-proofs-registry"/>) defining the integers used to identify verifiable data structure proof types.</t>
        </dd>
      </dl>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Verifiable Data Structure Proof Types.
This property describes an algorithm used to maintain a verifiable data structure, for example a binary Merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Proofs (VDP):</dt>
        <dd>
          <t>A data structure used to convey proof types for proving different properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A property that can be obtained by verifying a given proof over one or more entries in a Verifiable Data Structure.
For example, a VDS, such as a binary Merkle tree, can support proofs of type "inclusion" where each proof confirms that a given entry is included in a Merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR <xref target="RFC8949"/>.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in <xref target="RFC8949"/>.
For example, construction of a Merkle tree leaf, or an inclusion proof from a leaf to a Merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref section="2.1.3" sectionFormat="of" target="RFC9162"/> and <xref section="2.1.4" sectionFormat="of" target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, see <xref target="verifiable-data-structure-registry"/> for details.</t>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-proofs">
        <name>Proofs</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 (requested assignment 395) : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithm proofs, see <xref target="verifiable-data-structure-proofs-registry"/> for details.</t>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures".
Security analysis <bcp14>MUST</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.</t>
      </section>
      <section anchor="receipt-spec">
        <name>Usage</name>
        <t>This document registers a new COSE Header Parameter <tt>receipts</tt> (TBD_0 (requested assignment 394)) to enable Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts header parameter is present, the verifier <bcp14>MUST</bcp14> confirm that the associated verifiable data structure and verifiable data structure proofs match entries present in the registries established in this specification, including values added in subsequent registrations..</t>
        <t>Receipts <bcp14>MUST</bcp14> be tagged as COSE_Sign1.</t>
        <t>The following <xref target="RFC8610"/> definition is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl">
Receipt = #6.18(COSE_Sign1)

cose-value = any

Protected_Header = {
  * cose-label =&gt; cose-value
}

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ bstr .cbor Receipt]
  * cose-label =&gt; cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
</sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>An example COSE Signature with multiple receipts</name>
          <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / key / 4 : "vCl7UcS0ZZY99VpRthDc-0iUjLdfLtnmFqLJ2-Tt8N4",
    / algorithm / 1 : -7,  # ES256
  }&gt;&gt;,
  / unprotected / {
    / receipts / 394 : {
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 9, / leaf / 8,
                / inclusion path /
                h'7558a95f...e02e35d6'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'02d227ed...ccd3774f'
      ])&gt;&gt;,
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "ajOkeBTJou_wPrlExLMw7L9OTCD5ZIOBYc-O6LESe9c",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 6, / leaf / 5,
                / inclusion path /
                h'9352f974...4ffa7ce0',
                h'54806f32...f007ea06'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'36581f38...a5581960'
      ])&gt;&gt;
    },
  },
  / payload     / h'0167c57c...deeed6d4',
  / signature   / h'2544f2ed...5840893b'
])
</sourcecode>
        </figure>
        <t>The specific structure of COSE Receipts is dependent on the structure of the COSE_Sign1 payload and the verifiable data structure proofs contained in the COSE_Sign1 unprotected header.
The CDDL definition for verifiable data structure proofs is specific to each verifiable data structure.
This document describes proofs for RFC9162_SHA256 in the following sections.</t>
      </section>
      <section anchor="profiles-def">
        <name>Profiles</name>
        <t>New verifiable data structures can require the definition of a profile.
The payload in such definitions <bcp14>SHOULD</bcp14> be detached.
Detached payloads force verifiers to recompute the root from the proof and protect against implementation errors where the signature is verified but the payload is incompatible with the proof.
Profiles of proof signatures that define additional protected header parameters are encouraged to make their presence mandatory to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="RFC9596"/> and the similar guidance provided in <xref target="RFC9597"/>.</t>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each verifiable data structure specification applying for inclusion in this registry <bcp14>MUST</bcp14> define how to encode the verifiable data structure identifier and its proof types in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, a separate IANA registration must be made for each supported algorithm.
For example, to provide support for SHA256 and SHA3_256 with Merkle Consistency and Inclusion Proofs defined respectively in <xref section="2.1.3" sectionFormat="of" target="RFC9162"/> and <xref section="2.1.4" sectionFormat="of" target="RFC9162"/>, both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.
This document only defines "RFC9162_SHA256".</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structure described in <xref section="2.1" sectionFormat="of" target="RFC9162"/> is mapped to the terminology defined in this document, using <xref target="RFC8949"/> and <xref target="RFC9053"/>.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256", a Merkle Tree where SHA256 is used as the hash algorithm.
See <xref target="verifiable-data-structure-proofs-registry"/>.
See <xref section="2.1.1" sectionFormat="of" target="RFC9162"/> (Definition of the Merkle Tree), for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref section="2.1.3.1" sectionFormat="of" target="RFC9162"/> (Generating an Inclusion Proof), for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl">
inclusion-proof = bstr .cbor [

    ; tree size at current Merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current Merkle root
    inclusion-path: [ + bstr ]
]
</sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref section="2.1.3.2" sectionFormat="of" target="RFC9162"/>.</t>
        <t>Note that <xref target="RFC9162"/> defines inclusion proofs only for leaf nodes, and that:</t>
        <ul empty="true">
          <li>
            <t>If leaf_index is greater than or equal to tree_size, then fail the proof verification.</t>
          </li>
        </ul>
        <t>The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the Merkle tree root that corresponds to the log at size <tt>tree-size</tt>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: TBD_1 (requested assignment 395)): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl">
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &amp;(inclusion-proof: -1) =&gt; inclusion-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>vdp (label: TBD_2 (requested assignment 396)): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.</t>
          <t>An EDN example for a Receipt containing an inclusion proof for RFC9162_SHA256 with a detached payload (see <xref target="profiles-def"/>) is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Receipt of Inclusion</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / inclusion / -1 : [
        &lt;&lt;[
          / size / 20, / leaf / 17,
          / inclusion path /
          h'fc9f050f...221c92cb',
          h'bd0136ad...6b28cf21',
          h'd68af9d6...93b1632b'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'de24f0cc...9a5ade89'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifier applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a Merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref section="2.1.4.1" sectionFormat="of" target="RFC9162"/> (Generating a Consistency Proof), for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl">
consistency-proof =  bstr .cbor [

    ; older Merkle root tree size
    tree-size-1: uint

    ; newer Merkle root tree size
    tree-size-2: uint

    ; path from older Merkle root to newer Merkle root.
    consistency-path: [ + bstr ]

]
</sourcecode>
        </figure>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer Merkle tree root (proven to be consistent with an older Merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: TBD_1 (requested assignment 395)): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl">
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &amp;(consistency-proof: -2) =&gt; consistency-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          <ul spacing="normal">
            <li>vdp (label: TBD_2 (requested assignment 396)): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.</t>
          <t>An example EDN for a Receipt containing a consistency proof for RFC9162_SHA256 with a detached payload (see <xref target="profiles-def"/>) is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / consistency / -2 : [
        &lt;&lt;[
          / old / 20, / new / 104,
          / consistency path /
          h'e5b3e764...c4a813bc',
          h'87e8a084...4f529f69',
          h'f712f76d...92a0ff36',
          h'd68af9d6...93b1632b',
          h'249efab6...b7614ccd',
          h'85dd6293...38914dc1'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'94469f73...52de67a1'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations section of <xref target="RFC9162"/> and <xref target="RFC9053"/> apply to this document.</t>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
The receipt producer <bcp14>MUST</bcp14> perform a privacy analysis for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis ought to be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to add the COSE header parameters defined in <xref target="param-list"/>, as listed in <xref target="iana-header-params"/>, to the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> in the 'Integer values from 256 to 65535' range ('Specification Required' Registration Procedure).
The Value Registry for "vds" is the COSE Verifiable Data Structure registry.
The map labels in the "vdp" are assigned from the COSE Verifiable Data Structure Proofs registry.</t>
        <table anchor="iana-header-params">
          <name>Newly registered COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Value Registry</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>receipts</tt></td>
              <td align="left">TBD_0 (requested assignment: 394)</td>
              <td align="left">array</td>
              <td align="left">&nbsp;</td>
              <td align="left">Priority ordered sequence of CBOR encoded Receipts</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vds</tt></td>
              <td align="left">TBD_1 (requested assignment: 395)</td>
              <td align="left">int</td>
              <td align="left">COSE Verifiable Data Structure</td>
              <td align="left">Algorithm identifier for verifiable data structures, used to produce verifiable data structure proofs</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vdp</tt></td>
              <td align="left">TBD_2 (requested assignment: 396)</td>
              <td align="left">map</td>
              <td align="left">map key in COSE Verifiable Data Structure Proofs</td>
              <td align="left">Location for verifiable data structure proofs in COSE Header Parameters</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="verifiable-data-structure-registries">
        <name>Verifiable Data Structure Registries</name>
        <t>IANA established the COSE Verifiable Data Structure Algorithms and COSE Verifiable Data Structure Proofs registries under a Specification Required policy as described in <xref section="4.6" sectionFormat="of" target="RFC8126"/>.</t>
        <section anchor="expert-review">
          <name>Expert Review</name>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>Experts are advised to assign the next available positive integer for verifiable data structures.</li>
            <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
            <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.</li>
            <li>It is not permissible to assign points in COSE Verifiable Data Structure Algorithms, for which no corresponding COSE Verifiable Data Structure Proofs entry exists, and vice versa.</li>
            <li>The Change Controller for related registrations of structures and proofs should be the same.</li>
          </ul>
        </section>
        <section anchor="verifiable-data-structure-registry">
          <name>COSE Verifiable Data Structure Algorithms</name>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>Name:
This is a descriptive name for the verifiable data structure that enables easier reference to the item.</li>
            <li>Value:
This is the value used to identify the verifiable data structure.</li>
            <li>Description:
This field contains a brief description of the verifiable data structure.</li>
            <li>Reference:
This contains a pointer to the public specification for the verifiable data structure.</li>
            <li>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
          </ul>
          <t>Initial contents:</t>
          <table align="left" anchor="verifiable-data-structure-proofs-registry">
            <name>COSE Verifiable Data Structure Algorithms</name>
            <thead>
              <tr>
                <th align="left">Name</th>
                <th align="left">Value</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Reserved</td>
                <td align="left">0</td>
                <td align="left">Reserved</td>
                <td align="left">Reserved</td>
              </tr>
              <tr>
                <td align="left">RFC9162_SHA256</td>
                <td align="left">1</td>
                <td align="left">SHA256 Binary Merkle Tree</td>
                <td align="left">
                  <xref section="2.1" sectionFormat="of" target="RFC9162"/></td>
              </tr>
            </tbody>
          </table>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>Verifiable Data Structure:
This value used identifies the related verifiable data structure.</li>
            <li>Name:
This is a descriptive name for the proof type that enables easier reference to the item.</li>
            <li>Label:
This is the value used to identify the verifiable data structure proof type.</li>
            <li>CBOR Type:
This contains the CBOR type for the value portion of the label.</li>
            <li>Description:
This field contains a brief description of the proof type.</li>
            <li>Reference:
This contains a pointer to the public specification for the proof type.</li>
            <li>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
          </ul>
          <t>Initial contents:</t>
          <table align="left" anchor="cose-verifiable-data-structure-proofs">
            <name>COSE Verifiable Data Structure Proofs</name>
            <thead>
              <tr>
                <th align="left">Verifiable Data Structure</th>
                <th align="left">Name</th>
                <th align="left">Label</th>
                <th align="left">CBOR Type</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">1</td>
                <td align="left">inclusion proofs</td>
                <td align="left">-1</td>
                <td align="left">array (of bstr)</td>
                <td align="left">Proof of inclusion</td>
                <td align="left">RFCthis, <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">consistency proofs</td>
                <td align="left">-2</td>
                <td align="left">array (of bstr)</td>
                <td align="left">Proof of append only property</td>
                <td align="left">RFCthis, <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Michael B. Jones,
Mike Prorock,
Ilari Liusvaara,
Amaury Chamayou,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9053"/>
            <seriesInfo name="RFC" value="9053"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9597"/>
            <seriesInfo name="RFC" value="9597"/>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <seriesInfo name="DOI" value="10.17487/RFC9596"/>
            <seriesInfo name="RFC" value="9596"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <seriesInfo name="DOI" value="10.17487/RFC7120"/>
            <seriesInfo name="RFC" value="7120"/>
            <seriesInfo name="BCP" value="100"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="BCP" value="26"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <seriesInfo name="DOI" value="10.17487/RFC7942"/>
            <seriesInfo name="RFC" value="7942"/>
            <seriesInfo name="BCP" value="205"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-18"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -18
   // corrects a few omissions from -17; it is not intended to make
   // technical changes from -17.  It is intended for use as an input
   // document for the CBOR WG meeting at IETF 123.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 684?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.
An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#transparent-statement">COSE SCITT Receipts</eref></t>
        <t>Implementation URL: https://github.com/transmute-industries/cose
Maturity: The code's level of maturity is considered to be "prototype".
Coverage and Version Compatibility: The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.
License: The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.
Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="A." surname="Chamayou" fullname="Amaury Chamayou">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>amaury.chamayou@microsoft.com</email>
        </address>
      </contact>
      <contact initials="S." surname="Lasker" fullname="Steve Lasker">
        <organization/>
        <address>
          <email>stevenlasker@hotmail.com</email>
        </address>
      </contact>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <contact initials="M." surname="Wiseman" fullname="Monty Wiseman">
        <organization/>
        <address>
          <postal>
            <country>USA</country>
          </postal>
          <email>mwiseman32@acm.org</email>
        </address>
      </contact>
      <contact initials="R." surname="Williams" fullname="Roy Williams">
        <organization/>
        <address>
          <postal>
            <country>USA</country>
          </postal>
          <email>roywill@msn.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIANBBwWgAA+U9a3PbyJHf8Svm6KpIypGUSD3Ji52VJTmrjWwpkpy9zZbL
HgJDEhEIcAGQMiMrv+V+y/2y68fMYACQlJz15a4qW6lYBObR09Pd069ptFot
b94Xu56Xh3mk+uLk8uZMbJ68vrwWl4O/Kj8XN+EoDuORkHEgzmI/XUzzMIm3
xLXyVTjNMy9I/FhOoG+QymHeClU+bPlJploTld5FqpWnSrWmaZIMs1bn0Mty
GOmjjJIYuuTpTHnhNKW/sry7s9Pb6XoyVbIvbpQ/S8N84d2PGC7v7r4vzuNc
pbHKW6c4m+fLvC+yPPCy2WASZhmAli+mMPL52e0bbxr2PSHyxO+LhcrgzyxJ
AZxhZn8vJsVPT87ycZL2vZYIY3h22RY3uVKRgoa8wss0VMWzJB3JOPybRHz0
xW0qAzVXaThcBPBSTWQY9aFNqL5L0s5uO0zgqZ/M4jxd9MX7OMxVAGPJHGbW
E37fFq/D9G6cRH+zU36v4jv3KUzaF29SOYvHyVCl4ub8Fp7KwSBV8yUvNBhj
GKU90KN8h1vU9gFT0s8RCbhDgMbrsQIw8lRmmRKH+wRuACBsHOx1e/sb+Bu2
oy9OZTqBXQxyd0F/UOlExguzlOO2OFURkI7MWxdyLmeBXdFxnCdhrJa8LyP0
beinSZYM82IZMs6D6LuJeQFrmJSQ+kcz/UlbvElmSCd22hMVpKHvPH5ytiE3
XTufh2hMw8EsR8IRolj+yVhO5CKZwUO78omcpYvym9VQFKumbm1fd6vBUyer
PwLDBvROw3PTFhcyu1OpAw3Q8Vy5j/V0GT6PI3r+3TjJ8ameSY923cYFvpVp
HsbOgNfJQKW5+7yyuPPb6zNxkqTTJKVH7qwpLA77weqAHNvQc+nKNMNYUN62
xY9hBmO4gLxFIVB6jlxTGe/m2J1+cs+td7vfSX+ipy+W+2MYRaGcZKXVLsqP
n5wjTRb30OG7SRYTPr04AZ7Jw7nCftdvTo4OOjtAqKenF/p3b68Hv0EY8+/e
zv6uFoX8u3PQ1V17+73DvvDv89ZYgRxKW34kQwKMXx7AS5TJIBw9L4yHlZkP
O92dvp3EDHrU6UK/UMYSBHqchTAu7VvWGs3gBzR6fXLV3dnv0xC9va7uttvr
Apg/ovw5b5223XNhkKQtFcStCHYzlRFgt/bI8zwV5yhpoP/N2cWbvmjAqPk4
zBqe12q1QNqhlALZ5X39cSXgJAKyh/+fArGGKhPJUEhBgjuUg0iJQOYSZeLM
z2epgtPDvlZp2/vzqoYZTQmyM/FDiaRKR57A0ygTKqYemT7SnOmbIpv5Y+gn
JmEcTmQkgjDzoySDIZtwKso4m8J5GPsLGj9O4pb6ZRbOE5+2ou3duk3GKprC
SDIE2R7GfKgKWG8q8nAC4+EQY5hroFQs5HQahQAorNBHYIahj8zVBGjpIf6j
GIXQaqKyTI4QtdkCRMQk49GyGYyyECCcYD6zPoAKdktkU+XzqACpxkEGdBj7
wGzlteE5GeM0dvDBQgxmYRTgjNCb9njzRPd9HcYSJKne82s1BfxDf8l7jXAh
ZSAYSqjPuQLiHYQRYh63BB7C2tNEAuIBzEBNEjr3cP4Bbc48pHlpUoAvwV8Z
HAipeEtKDQgGP5qhtkGTEXcA3LgS1nTaTKmTMAhAV/BeoN6SJgGQCso9pltL
koADkQHdGqLJAESZ8xyBAszDYYu0JgfJLKe9ImSTKHyKfDf/fHqzxePhNKhw
iXtQBwgLLhjiHugCNKiZCtoV+HwZW2BcAKUA3W82AcQjGgEkSbMPJOzQJpM/
/M+iaqtpu5lW0A12AgktiYGKik4ORotuGbBHBLScqRzbEAJwdsYgKTQhIpEg
iWQ6UkuaFnO4jCaZWIH9fIQL3i6FHwhAszVCZHaCUA5LiZMcFMlcaGpcihHa
MOBiZ9i2dxoOQWXDLrBbhO4pEQvspn2zeov1uLDTV1tM8nC6DIBDiO1gurTE
HwTBXKZhMstoPqRg6EvzIhkSy8Y57AfACKo48ioMOpilAdANMkE4mUaETpWy
2MNmOXIFPEHJJjW3gViAHYtHipmnxPKZSuehrzItLCwpBSrzQaOCLuPknoRT
Es/VwoLqiFiEmgUsoHqGgCvmfGDauYoAEmTEFy+AlEFmppoC3iWMCI9wdQdD
3ydpkInG2/c3t40m/yveXdLf12d/en9+fXaKf998f3xxYf/wdIub7y/fX5wW
fxU9Ty7fvj17d8qd4akoPfIab49/arAUbVxe3Z5fvju+aOBK8hI+JB9CA41e
2EpcugTDSyOKCB5O4v/+r86eeHj4Nzgsu51O7/FR/zjqHO7BD+R6no14jX/C
xi48ZEGZErlGyADTMIdzuImHUgZ7EMOxAiqZ5/32Z8TMh7743cCfdvZe6Qe4
4NJDg7PSQ8JZ/UmtMyNxyaMl01hslp5XMF2G9/in0m+Dd+fh734foXnS6hz9
/pWHovudumei+p5UK3ElQVlVRPsPL6b4A3SXLH/0aoQ8hIFQVoJ9JWIzCito
YmpHacJehKgDpLTFzPmBmE1bwzRhMUIUAQZxbk4cFcFhwCcWPIngj7RGObBj
t69PP+6IzRTIX2VMNsjhBN5ub2+r73lgliyHi/TcQHxK9THwSdyH+RgPGxnB
IYJ8R4dPmkqippTFBP/WwhhkDaASOH+SpOXjJiPqYgWBKXgZ7J2VsO8/C/Z5
AGBvOjrbKYrOGyM6twzqWcRkvIBoBNpIPp4I0HHjnPQ+kl5rjtk2qKpg2ICU
nSYxKgvRollhY7uzsHIihlSNgGpAi9l8eCgGbuHALTtwy7R6fNxigkK9BMFE
YTBCGpxlrMNpaBerocw0VrsrsXrwTKxOAasgGsDaQ8Q0njqbGjVES1BSp4ZK
cElPHm/alrQqmtat//cwr11W33IDXJsADyZxq1JQ+5MoGS1AKQTDrw/YN0ou
0eopTUl8fyHj0UyCUrOJLbdYdR0ajefhQVuQj48w9NnpOxoKFdgzVIADaHUa
ylGcZHno2zNQbELL5UOB8fn42NScHZKKlypQRlJeLbBvIygGjPWA+kCjxvMw
MwPWLT8CcyVnst6qibGCRKYkNDyAAMsSZvV4V4T5W8a8ECSptRW2cFQOGTv8
bzbW2lNrJECTOEF9lqgaQcMBWyjaXEAPWzHw2oVfOdrc8vUbsLRe5NqZQ1ZQ
50ijheq4zNpEXyeSKxtnzUIdbbq6N2/mELhrDCcZYc45/Vy7YDKL8hCXXmi5
UozCOVoaABqpzrYNA2uV7M2V1hTos16xcxoddttYCQcgQDdKBlr5H2j+W5AX
QIOglXk0hF1yUei7U9p0WbkluOo3xeaisQDE6aByyWY3WZtmGnVwQqdmw663
odlLoSnKQMLqh2E6sSYWLwAhXbCVRfjWRo6eETrmFlN/xuOZURVb45X3o0Al
difhAKyJ/7LQILeV7UkzriV6ojdmR71EvRtwbADYYEh6+rh3j5WErHZSL6tC
B51PKHScgwFFbU1lAjHuoz8CIHQNhCs+p+OyjXBDonbl9mYFLl5kym+NVAxN
/dbKkyEzml6mFbJCfCyztJ462Fg+mk0oEZpPfgl2GvAOuvIkUnJIfCUda1JT
EWiOEzSCoQl7sBxKaYpJOBrnYiznaCDPURw70qKyhiYsDy107YfB7Vi9JBRN
hTnrM26rSEE9t7R/hk3UECzPsDB2jWwCyw60lcJ7RkIunEu/7EgjUQXvwPqd
Qk9tgpLSajxRheXKsNRtT62y3yfGb4QoTUK0G0nAoxNrrb6S8YxE6QgRe5O0
3wttN7O92iQGfFZ8iJouSrxhdP9uu9PeRVLQ7l+w67BLucFeqQG7BAACUPO0
+ysrzUlSZQhCI/ZZfubkQgCeinnDQFHEVWdjxQimtf0R1Dg2rh1OYg4iT/Na
9rkJJ2EEJids/s9mND6cP2yO83ya9be37+/v2+h7Rmf8dqGlZts4PP1f+/M4
n0QvwIJHvzZq889wl2SW3IrG9mQmDblEEcXaUdBbzXEtYxfDwSEBjPo8/Z5Q
GyiQe5FGrFYFnoNUra2uQ61zcv8KJLcKIbxFIvzspIs+FNBYOn3R3eK/U/a3
EG3iASYmSrI0TwpedC1gc5a2wOLz0zkM3QIr5TP+uys20QfY2hObAfyr6frj
zffH3f0DsfmUmSj6orNVaIuDBJhzswWPykrHZgtgX+rH/Yb0oAd9mipqtkeF
OK4cnY+8xwangF/g3jB1T8DV5lmjpLW67OOcM5k+Lupss+S0a1QOogYK60YN
r422d+76EMGWnEUBOVDV5yn69GuuRIlBz2zNYjIY1OQMwJbKaAFzCnJQDUie
ofedXOxhQuwBy8J4FlMl2oWOjKDwRzbTPg16WQwd2OMHsDybTItjTfq+muYE
nBHucCSST5lZ+n2GBtzDC+1UaeHG1RxHvO3kWy3cRlXnk+uY2XzKz7PFCyLA
rAOGnYqsPBkXDGkluSJE4UJncfGbtTDaZoKIoy9Ijj+agIIBqe46IHOLiKXp
6BDwgjZIK72s85ITpiDfNXwVr3urj9GJzEG0GE3fcc0zvMRg+MY95Iw3qhTA
0jYSKULkAoPtCbQmns0GGeLebp4OlLYLDbggxVyORrRFhMaPGLHstNkZPUyi
KLnHGVAlBCsfOD8oPABss6I6EYBC/fe//134QRCZGcRL8eKg3TnaLIbdwgQF
PDfIZfdSYIYGCg/e0Y+apl6KBzBxfssR4kgOVCRevhJFRw8o9H1BCOVuv9k0
m94nUhPY9+d/FxijFW00+w3FfXhykgJwGPxnaF4QnwA57gxZXUMTGru0igkD
VYCxzVQuokTicHbAbRGHEb7LKB0FSce88z4gkr2HvngxDEcts9AWYl1QxtTL
Bu6Sdg8SVzD47CrNc7DrABrTsfFY3WYnFC/OTt8t22F0nKCjxdtmbGU0wbaA
jUYUbZeQtC1+97sHSjrYpsjGttiDtTTmJ9Hhe/9m5y9/+anX+/P0Oh+f+q2d
8P1fL4LhRR5P3vxy8UO3dZsfvdtrNHX34tSCuWCQ1mFTiBfi7AaOXWjy+OpV
k6Z30b4tzORWEmwjVUB3fiEAvuXr4P9Wrca8ddY0+Xy898fw8u5Pb/7SCu4u
1OAm2Z1cXJ5dXR+m747+M/9894Pa2/88W/xwp9dkBnliZUXDeZDZv0GXQFWi
CQ21CiJABWm5XTRKTI9liHFWicIJhz1wkGNeF6foNqpEffFzqQFisfoEu2Xh
3xT802vC/5Hpty2OmkvaOYe0BDrdrjUZbxzu7x/J3v6w3W6rna7a3Q8ONirN
Prx6VXrywZ3qsfjx6CLFZUDgvFkUuW9dFtwGKHa6Qbd7CDZlu+37we7h4d7Q
QPFhq8D2N6Mp+dfLO/X69odk9vH+Ko3OPl+8vT+86F3enpzu/+X88vVPfuvy
4OLsRvX8fzGaOnBoav8fpKne7n532Dvcg93cGw7loa92NupDjTf29452Doa7
XWg33Nk5VHLn/4L2dg/2jzrD3SOAQgIzdHoHOy7teXb4R5aD5dGBdjsHh/7+
oQ/9A6VUcBDsbXDL6kzd/b29YZeofP9ob+eotzvY8D5sLT97VBCbowe9dNrh
bI8eHpeOH+turR4/1loolCWj01llhSIC6PdBnUb7fUrNTf6IPq/N6lEnW+8j
Mp5CN12jMlhd62QnBp21jj6Ex+7T/rWsZB6Rq3VNIG9VMoIeDaesmKAa/uJQ
137BwoofhhE5R6b6zxasAfYCA8tr/BToSzWGdE4uHLtw8gXq0Rg1Bv+kjMIK
i8aZ0PFz8suyRtL2TvVfpiOtzC/0cjIPgHCSyXSW8/zoO2THorYTEAr2V+Fe
CTnCiG9e8bEJlaYJDFdEiAvyB0zr+QIxmLHmbxdCvm7tyos0SduJ255Fqw0j
2HG175wdaKikEx5kJKpU5XqUJcUD/GSWypEJ+9wpbU2z2QDomcCCZZ6w39Ja
iBiGoHxLGgVmQecmDGJgDlOyZykIR2mmeegDdVwCdPeShjJhFDI7rFJIaUJF
plZB2iFFHQ0b5oup2CQPWM1KNK6Glsn+1A5D3gf2FGEyp8TFGc3ThOyq2aQU
JHhB6TSFjVPKrfG8s7XsVUkJxAxEitNQUpE9QIz5Zb0rZDnp7dRJQRTYUE+I
GieAT0HJPCtFy7Tfv81Al0FbMqXJyTIxKpAQjEd2jJRTPtEXgYhH11069Fso
MNa47wp2xQ2iOKQW7Wxeo7VbgdC6tKTwx0noEzmMZTYudBHKa1NI5MDC58fv
jkvWKRwQwK0DJOqA/RUkG4vlOAHLUliCcYGkYp1C2FuLQ0QP/Ln7EX8QB2hn
0onjBcJG53bDr8oebwzmowidK8pB+3Xu7ya7/Bplod3gtCvnIcHbsALXCQ2y
oyBSc+DbEhbDevIapVaZKEJ1TopDVQ4Pdu5+HYXUwk88HZHpuMYEpTSxEqbK
iAzRVzKdsuwjsVIkJ7jBiFJyRRPkkHFXUARL70cLBZaWF6tDb6yO6ESKaroN
zbM6Tg4vO3z04U6gKf213avb0yzCZLcYX+MTyxzyOs9DcpJQmc8Ms3+FQ9d0
cQm3siGbp6UDH6d1wNtqaq8DnpERxpV4o6dFe3u8LlV0cGcqLFhQIxFjNpaw
9JYVzLwKjDHUQN+tAf8HDKOyexWEWWWiXwl8Kf+HNUOM35b90aQkLYmMLlHg
Mva1aHdaZb3ipet4+tkjxf8/OARLxhGe/rPUdZujpkTN6O4bNuqLGZC56RuC
JvAZ4SODihL1laJ3+KBFr8s9yKYi3cuEdFdN6UAPfcDKE9oX94G9WWxSVLaY
nEzVdUu8n/WyEalh3rDeLkooorM3sDZrZXONmYHyQ3wqVvTJMhHtfWQc1Faz
Q5Wm4oatUlm3Etr03iW51sA4gYCpz4jEyuZnLJ9xekJjDMvQgWMcAqjglTjn
XfnIewQQjyi3GQUKUBMeg7/MQJVEGQmb9hE3lzzaYI3IMHJUYzeGranUZIix
50/TgCxg4bSpiN2BGLaPIobRHEMF0RWZF8WMmMFv8mCspsauYXhrd8nzzjGr
Q984qKCoWVXCHbFDs5MVwCqvTbvLzJEBZwWyA0H4yRL/J22iVLVvnaxRM6fK
DOuaCyU+teMZLRVTCo1TGmQzBf5evsLzhR7NA3JR7zsP17qjLbNAR6Bghz9M
9KYKwVKWsa5qo5yz5Fu2M8g5LTxWxCaBhCvoC5NO3XYM/GVJqm1O/RF8ATbE
JNoWuZvMYE+FSktzrbzo9Ny5ac/rlvyv3fWqeM4wVAAyriq9Pniecxzbpkwd
lcZ90TKkUh4bgxLOEpYR2jyY9ilzFvvXZvwKGpsijdUnW0pTx09lOnJOW+xG
QTT5MY3BdCWyWJcS/Eyy0AHzEiG8ldM23ckt742ZuVUm7/OKtC6PdUyJ5dAb
TzNNXkZO8VH/FSRVE2us0C3JSDMHzXFMARrjcCszsZOv9jyVQ6fSBxUvjNhk
c73kKHrccnngHw4HPemh/grf9BPBnxWe6LU+6LL32fqduzuO47lzWHa6r/E5
jzdAwxnu7O9gBKPb7fi9rj8oeZvHG4Ngp7N7INHvejDoHvnDbqfSIjg4ksNe
cAAteruDzsFud1B4ogsftPY+r/YGG19z3fcbqO7ecMdHL3FP7gODHvWM77ek
qX1kTe2jXfJHfQgtlQ+rDhfkGbxHVYv1a1kTVjIrZzFG/HPjMapxVGFO8YDL
HLfaxiv3pKujxWmWqsIRGKKWRT3fhDB3OVuA76xmS6GhPMdpAsILpRPnr27i
BcCJmgxUuiUGixwt9nNtXmg/HeltWXPpkBOQOJQmSRdmc2B9lWq/Xn2cbOb7
SgV6KFCNZhFlzVeSL1lr0wizIWJtVzohZE1BlNSSlLzqgAfo499lFXeq45UX
OqvgfOgAQ75p21qPpcE1FIO3g9G5U9IM9cA2JXit123tpEGi+J4k52g3KytY
i280WF0f0hqT1Uk4WmO07q01WutzfXOrlSzKJVZrPRHtGWZrbc2goiy1XJMI
Wd2hycKsKButrU7ZCI3V/TM7dldZr0vmTurjtnUdBWdBVVt2iTFrRKTT7+NX
WrK1LUehWbGjnDZlS6q2aU2TPFasrjChNonL4iILi/tqcxhNTRdVth/d1cEM
97yiObBXeq1F5uyP0Z+ep5zXyfH/jVHmEsk3Nsucjf4XNsy+Yu/rIsgYZ3XZ
tNY8qzUHbbW7xbRQneGfY6L9002mOsas0dQtjX5Sz1n+dWbTUxt+u1SmPcd+
MrYT2lGr7afnHX7/ogaUi5ttzJFfZ0LBCWItKMwjBrB39soWVAnXdRtK7Q92
1eEBZuz4e/KoszvwKxbS0aE6kjtHnNOz3+0ND3qVFsPDTnd4eIBWVq8rd4bD
3YNnWFnlFt29nhrKAbYYHB509nw/qMKxHwQH3d4utNg96nX2Ar/zjS213t7e
QW94iDPsdwN1cCg7ay01Vw1ZZ6udaa5wt0K3/wYm2xJufrbR5hhoy4rcrDLb
ltlty+2VeJW94vrOXfusDoMuu0Ljq7KxtLSxbojXnGz2AabSqDnVQ6l7w5Pl
Yz0JqlvXZmpurCbD9baTWQ7eK0hxORTodYsVualMZZH4zNtPaGLhFCZyv+zO
y7m+7Q12zoSzVrggUfnyHDSAIVkBjkcw1SBJIkVJS2T6DovU7zKW6FqHvlxI
WUaUVkFoHlMiCtIW3aTg3YGTOHTdBXSPl/xs/GbJ5niYd8V3NE5KpcuM3svv
ymXNbEQdzcqHaoqBDmkz2TBdlAtWgJlwAdr2hYpH+RjszWSy6mofYOlO88Lf
rNmuNXUK84QTVSo91EZDgxDE1XjoZjB2IPLK8oTyxXQ5orsQ9X/qbvOIdE0E
TimbK7zwyZeJTCgHr9/A/kqfrvXMch22KuV9hGialmr4lEEArkophQToCyv7
NOmGFBMAn/el9+KeZtXwkKk0Q0cNZ3RphuQeiD4HNdRWj4GV0zB/pYBL70Wt
WgvoIEUqWD0BzMGNm4DFRbc4+FavXoQBQUwrQkTolBEOdpl166Qhfc8FCB9H
JomjbxCZi0ocE42cDDMQnFFAjnyjzQgsJBWw3KxeTyGat/efqkSPzg8iONNg
JeX3Udd1qJ9+adpnF4xNNiqsnmN74xGQ7F6V0otLZniDjE1djQMVVFPoKHcl
HGHxIffosVrXJ/jzEzmobAU3wCKmNgGXEdPR9UKcvMh5BbQskWbYLMKcxSXz
aJaAUxyLimH1u2SUyukYZC76fZKYikjZoPX6y9ClC3Z97zWmIlU0WapUiDqk
Tri12bZjicoia9bDWeybXX6B+n0YIIKvYPIkIDdEhuIGxQOwnb188fb4J5ta
iGkysOK56TulvlnlCqDEvCum/Ji8MwkcaqnNcZ1xrQvqMQ1TLVuWtJzKLG9b
svsE2/SpKT7Fg+Enjrd/gv6fTNakvgL/4y2mayE4SZEZCQcBetvCbExEb24z
s/ACIoRxQPhl+lZWaWmkoCD3otbjw6lTJAaVxTZWFQVZ834aUHXRlejU1xSB
iBsgKRIfd51vOGazjC7J4wNY4BATBgaK4vxUUg8HGck0iNBRzAI/TKsAr1tb
RiCq566J89SqUgC5d9ldQlgxNg/54i5btIj6ICgUtLrALJl6Th2sR7oXjH+a
l1RCVBvm1DDDRlq1aiyvrdUo0j8fHv4N4WujufbRHYYaYuoa09zGuc4k09fz
yOOILAQzHezv7+5vCBDhWEBn46aUSqlTWIONcmbrFTr2A6wTxTvDZvW1AYtL
HwUAaeg471cHZs16eDB0UJBFb5M7YKxpg6+RZtqlaLOtnxhax3yLGbwv4h3g
R9s/X8QFuTbW/fdFL4+uin+prvWLOHVc3f+M/77A5LqKRP2d96Xl/Ff6seK/
9R2eM8K3/W/djLA893bvF7Hmeq++dPlF113TqKvh8govPXPtjIBCKnxdlc/x
oswpusKNsPuVu/fw8Bss3ouMXpYOgpZHldl00zXuT+0b/oKey2LsJ7jhS6GP
VLNCVxtGTVtXyeR5P3mz5BmLnJYWucJlqJ2TX0gm2EXiD7yahlnqz+J+4PLE
2KHPuhgTrypr+Ot3GP0hdalvXB7v1H20sNfcTc3O+hHwuD592IinkM5sPMHc
7MFniM1CbbU1g58tZDEKTb4WUOaXnyZimkQhFQlYlYO91z7QAUgstW2vV5x9
Rm8BjDMP1b2nf6X0yymWkOP1FGCLpKzLV+4ice0aUup5IF2oIODibFTIjSrD
cKjqMxiWc1A/aP3TJAspFdFkaK/nIKx5LK5wPpH9MpM5h36tyoTldvXtmrZ3
bVdTv3czUuidsLWAXGNsSPFS54jW7JQtsyVmVGtBe1RGiS70EMxAmcRC16Rk
sl8DoIjAzgxcmizSQlmfpXWFqNfcKbb/B7oUG1YAVtMoWdAVGMJCiSB4jamh
CmPo8YhOzRW8h5LC0Mewd5qUMLsAs/A5p4Ev89gItnVTYPV2Ip6WYFsHF+z0
c3ZZlzJ6WqYcOzVsilzTOHFijFQh+1ksw4kD6jOgVqfbku0MpJRJAptSuMek
m53gBxUSqvPMux1RFYhSWQXhujFLnpWC3MiEAkGieer5kuDhxTOq9WBZB4cM
bxWYKAAn8RkqXn1TY5DyP2yaAPAS1tC0xUHWlJ1HwjMl05XM8ABLrUKkVecw
VxPCn675VsxJg5MKV6tO+UTyBozmqHp2THJGFGVd0ZUTqmE9AeKpsa1SZ0d2
xiTqVKlZ3nQGstyvXHt6EnU0TY2Y+rqI3w16xiWWe75NpX+HshdIEs8t1sHx
uzGNNrcFY52KE1EFI5KPcmLddcwEzF9wuuUL6HSJHawBt6nao3YTpSh6NMCY
QluuyV+DKH6O0dCcoqR6f32+Re5ZGWW63jPX+kMfBt4DwerkCd4jJIFe0vD1
kcxa+zOUdUe7Jl3awwfo01JB0WTHNi2/WToaN8Fxyu4NeNnRjfST16VqiXTV
xtEpVt1P4qD/cy/YLE/5eK4MaDxLZlyZ8lzPv/azTmysnMhyisPQVq3NzPW0
9bVy2l8pmIpUpa+URGRofgtJVM6WarGRwlVAq4IjNxeACF4rIGhSjHE4woks
7m8g5CrAfTOpVl30v4IYW2fIVUWcKJwZXwqSKF6tF3xLpF5njVCr3R7Ch60O
v2R7e1MnVmyxkV39ZER5vJLB9IyLdo9PwFcP3SF83afhWxqbfBq+elYlS+Vn
lSb8RyQyS1gyA8Wxfxcn95EKRvozDg8vqo+g3Y8mqoRqOnOcjO+8tzIEHgmV
D4SdN70fYGf+QLe6mt5b0GslkNPrtoDHKsMndzR1mvh3Te88kmkoLsJZNpdg
mTa9yle8mp7m3TAV9mNgpKRukg8Z72XpgtUDDMsj/W8V4UP8NhJbGlqQag7R
Hy6p1Sulz8oMgOXJyVuutMBubHMnjuLD4iwI8dNk4iqiD3mkapLMdZkBE/MB
+/RegUEis0Kuk0H18MDfdwKLfqCGWDD5+P3t93tH7coFZAytoCgilZtd6QA6
7k1cixkX8jNP/CSyTmQqO1r7ZlAlHooySBczpsbljwHayuM2SkY1MqAThTtL
FrhZmC2O6gr4Ksy2HJxeL5VoyG0oCU0rLXdR7GJzDAkGsBAjPKgehAnljYxP
nzY/0zsFe6v3KLZXGunECu2aZYzeoCCchwFeQazU2aDbyja/Gl8u8BNOSZpR
I1PYFUFse29mKQp5rIKN4RssvYvJAPbbUBjNoIAd52lr0iwMcZ2yTBkjxlrB
UCx9Dirk/SRkON/HM5fltYFqUSi1TUjlCPCNzofFbxUFbGhjJBlIQlK8eei4
KGrkZVhxqKR2SlzrsoUVt0eBZTofayPhCUYWK+au+Ujg2oFQEE9TNIgu8Ktu
aNIn946XBld0n6R32GuUJrNp5pjhwUxVvTaJjd/oACTlwSPeByoGJiFxkM5i
SpJDV625SYCAkvKNDKywKoN266ICREjCkpppWFAKFUpWKkAx4szFYfSxg1Qu
aUGMmnHF9InUKf7kZ5hNC7FlybK+6Fm2pLAJh3EX5NKA1TU4EkdfM5tgxRnM
z01QEaLUQTij4laWzLBETYXu6btVJDVN0cqw+ARaUdC4GPk8DmbagXce+23R
Kt61cS66Y6IFUPFtMFOLHMs4K10hqaBDwCFX2705Ob+9tU70otDuCAyL2QC/
+7edm9nwWrSGhErt/j6Xg5foh5qoVjJvYcj/hZPW0LJfsdryvIrof3990Rdf
MxcciTkF6fvkfEGC2sDElDkchXTxhd8KVmWJUA0zisbU7A3s2glm46DeR5+R
AspHcE7cEtx6Bn1ffa6bbG7gHm1sFduZPWEQOGVNll0nqqd72a0y5wUJ3LZ3
EfoqzhTDBU3pI3L0aSn8/FHJv0VFZvAVweJQFWoQYf79bGBK/nDlHPYI4zqO
p5i3IvRcTbvuLqKMPr1a+p4saGr4qVi7X+1iv7a8/wHC+wm1p3cAAA==

-->

</rfc>
