<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization>Lasker Consulting</organization>
      <address>
        <postal>
          <city>Seattle</city>
          <country>United States</country>
        </postal>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 89?>

<t>Traceability of physical and digital Artifacts in supply chains is a long-standing, but increasingly serious security concern.
The rise in popularity of verifiable data structures as a mechanism to make actors more accountable for breaching their compliance promises has found some successful applications to specific use cases (such as the supply chain for digital certificates), but lacks a generic and scalable architecture that can address a wider range of use cases.</t>
      <t>This document defines a generic, interoperable and scalable architecture to enable transparency across any supply chain with minimum adoption barriers.
It provides flexibility, enabling interoperability across different implementations of Transparency Services with various auditing and compliance requirements.
Producers can register their Signed Statements on any Transparency Service, with the guarantee that all Consumers will be able to verify them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        scitt Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document describes a scalable and flexible, decentralized architecture to enhance auditability and accountability across various existing and emerging supply chains.
It achieves this goal by enforcing the following complementary security guarantees:</t>
      <ol spacing="normal" type="1">
        <li>Statements made by Issuers about supply chain Artifacts must be identifiable, authentic, and non-repudiable;</li>
        <li>such Statements must be registered on a secure append-only Log, so that their provenance and history can be independently and consistently audited;</li>
        <li>Issuers can efficiently prove to any other party the Registration of their Signed Statements; verifying this proof ensures that the Issuer is consistent and non-equivocal when producing Signed Statements.</li>
      </ol>
      <t>The first guarantee is achieved by requiring Issuers to sign their Statements and associated metadata using a distributed public key infrastructure.
The second guarantee is achieved by storing the Signed Statement on an immutable, append-only Log.
The next guarantee is achieved by implementing the append-only Log using a verifiable data structure (such as a Merkle Tree <xref target="MERKLE"/>).
Lastly, the Transparency Service verifies the identity of the Issuer, and conformance to a Registration Policy associated with the instance of the Transparency Service.
As the Issuer of the Signed Statement and conformance to the Registration Policy are confirmed, an endorsement is made as the Signed Statement is added to the append-only Log.</t>
      <t>The guarantees and techniques used in this document generalize those of Certificate Transparency <xref target="RFC9162"/>, which can be re-interpreted as an instance of this architecture for the supply chain of X.509 certificates.
However, the range of use cases and applications in this document is much broader, which requires much more flexibility in how each Transparency Service is implemented and operates.
Each service <bcp14>MAY</bcp14> enforce its own Registration Policies for authorizing entities to register their Signed Statements to the append-only Log.
Some Transparency Services may also enforce authorization policies limiting who can write, read and audit specific Feeds or the full registry.
It is critical to provide interoperability for all Transparency Services instances as the composition and configuration of involved supply chain entities and their system components is ever-changing and always in flux, so it is implausible to expect all participants to choose a single vendor or registry.</t>
      <t>A Transparency Service provides visibility into Signed Statements associated with various supply chains and their sub-systems.
These Signed Statements (and corresponding Statement payload) make claims about the Artifacts produced by a supply chain.
A Transparency Service endorses specific and well-defined metadata about these Artifacts that is captured in Statements.
Some metadata is selected (and signed) by the Issuer, indicating, e.g., "who issued the Statement" or "what type of Artifact is described" or "what is the Artifact's version"; whereas additional metadata is selected (and countersigned) by the Transparency Services, indicating, e.g., "when was the Signed Statement about the Artifact registered in the Registry".
Producing a Transparent Statement may be considered a form of notarization.
A Statements payload content <bcp14>MAY</bcp14> be encrypted and opaque to the Transparency Services, if so desired: however the metadata <bcp14>MUST</bcp14> be transparent in order to warrant trust for later processing.
Transparent Statements provide a common basis for holding Issuers accountable for the Statement payload about Artifacts they release and (more generally) principals accountable for auxiliary Signed Statements from other Issuers about the original Signed Statement about an Artifact.
Issuers may Register new Signed Statements about Artifacts, but they cannot delete or alter Signed Statements previously added to the append-only Log.
A Transparency Service may restrict access to Signed Statements through access control policies. However, third parties (such as Auditors) would be granted access as needed to attest to the validity of the Artifact, Feed or the entirety of the Transparency Service.</t>
      <t>Trust in the Transparency Service itself is supported both by protecting their implementation (using, for instance, replication, trusted hardware, and remote attestation of a system's operational state) and by enabling independent audits of the correctness and consistency of its Registry, thereby holding the organization that operates it accountable.
Unlike CT, where independent Auditors are responsible for enforcing the consistency of multiple independent instances of the same global Registry, each Transparency Service is required to guarantee the consistency of its own Registry (for instance, through the use of a consensus algorithm between replicas of the Registry), but assume no consistency between different Transparency Services.</t>
      <t>Breadth of access is critical so the Transparency Service specified in this architecture cater to two types of audiences:</t>
      <ol spacing="normal" type="1">
        <li>Producers: organizations, stakeholders, and users involved in creating or attesting to supply chain artifacts, releasing authentic Statements to a definable set of peers; and</li>
        <li>Consumers: organizations, stakeholders, and users involved in validating supply chain artifacts, but can only do so if the Statements are known to be authentic.
Consumers <bcp14>MAY</bcp14> be producers, providing additional Signed Statements, attesting to conformance of various compliance requirements.</li>
      </ol>
      <t>Signed Statement Issuers rely on being discoverable and represented as the responsible parties for their registered Signed Statements via Transparency Services in a believable manner.
The issuer of a Signed Statement should be authenticated and authorized according to the registration policy of the Transparency Service.
Analogously, Transparent Statement Consumers rely on verifiable trustworthiness assertions associated with Transparent Statements and their processing provenance in a believable manner.
If trust can be put into the operations that record Signed Statements in a secure, append-only log via online operations, the same trust can be put into the resulting transparent statement,
issued by the Transparency Services and that can be validated in offline operations.</t>
      <t>The Transparency Services specified in this architecture can be implemented by various different types of services in various types of languages provided via various variants of API layouts.</t>
      <t>The interoperability guaranteed by the Transparency Services is enabled via core components (architectural constituents) that come with prescriptive requirements (that are typically hidden away from the user audience via APIs but can be relied upon as non functional requirements).
Many of the data elements processed by the core components are based on the Concise Signing and Encryption standard specified in <xref target="RFC9052"/>, which is used to produce Signed Statements about Artifacts and to build and maintain a Merkle tree that functions as an append-only Log for corresponding Signed Statements.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-use-cases">
      <name>Use Cases</name>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>Detailed use cases are maintained in a separate document <xref target="I-D.ietf-scitt-software-use-cases"/>.</t>
    </section>
    <section anchor="sec-terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <dl>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along the supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements issued by a Transparency Service.</t>
        </dd>
        <dt>Consumer of Signed Statements:</dt>
        <dd>
          <t>Define here.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata and an Issuer's signature is added to a Statement via a COSE Envelope by the Issuer to produce a Signed Statement.
An Envelope contains the identity of the Issuer and other information to help components responsible for validation that are part of a Transparency Services to identify the software Artifact referred to in a Signed Statement.
In essence, a Signed Statement is a COSE Envelope wrapped around a Statement binding the metadata included in the Envelope to a Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Feed:</dt>
        <dd>
          <t>an identifier chosen by the Issuer for the Artifact.
For every Issuer and Feed, the Registry on a Transparency Service contains a sequence of Signed Statements about the same Artifact.
In COSE, Feed is a dedicated header attribute in the protected header of the Envelope.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an entity that creates Signed Statements about software Artifacts in the supply chain.
An Issuer may be the owner or author of Artifacts, or an independent third party such as a reviewer or an endorser.</t>
        </dd>
        <dt>Append-only Log (converges Ledger and Registry):</dt>
        <dd>
          <t>the verifiable append-only data structure that stores Signed Statements in a Transparency Service.
SCITT supports multiple Log and Receipt formats to accommodate different Transparency Service implementations, such as historical Merkle Trees and sparse Merkle Trees.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a Receipt is a cryptographic proof that a Signed Statement is recorded in the Registry. Receipts are based on COSE Signed Merkle Tree Proofs <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>; they consist of a Registry-specific inclusion proof, a signature by the Transparency Service of the state of the Registry, and additional metadata (contained in the signature's protected headers) to assist in auditing.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, storing it in the Registry, producing a Receipt, and returning it to the submitting Issuer.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, rendering it a Signed Statement,
based on metadata contained in its COSE Envelope (notably the identity of its Issuer)
and on prior Signed Statements already added to a Registry.</t>
        </dd>
        <dt>Registry:</dt>
        <dd>
          <t>the verifiable append-only data structure that stores Signed Statements in a Transparency Service often referred to by the synonym log or ledger.
Since COSE Signed Merkle Tree Proofs (<xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>) support multiple Merkle Tree algorithms, SCITT supports different Transparency Service implementations of the Registry, such as historical Merkle Trees or sparse Merkle Trees.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact made by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the payload of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
For example, a Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, or some endorsement or attestation about an Artifact.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Registry, and endorses its state.
A Transparency Service is often referred to by its synonym Notary.
A Transparency Service can be a complex distributed system, and SCITT requires the Transparency Service to provide many security guarantees about its Registry.
The identity of a Transparency Service is captured by a public key that must be known by Verifiers in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service (the receipt is stored in the unprotected header of COSE Envelope of the Signed Statement).
A Transparent Statement remains a valid Signed Statement, and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>an entity that consumes Transparent Statements (a specialization of Signed Statement Consumer), verifying their proofs and inspecting their Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
      </dl>
    </section>
    <section anchor="mybody">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Registry and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt that countersigns the Signed Statement and witnesses its inclusion in the Registry of a Transparency Service.
By extension, the document may say an Artifact (e.g., a firmware binary) is transparent if it comes with one or more Transparent Signed Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable: any Artifact that may be used to target a particular user that checks for Receipts must have been recorded in the tamper-proof Registry, and will be subject to scrutiny and auditing by other parties.</t>
      <t>Transparency is implemented by a Registry that provides a consistent, append-only, cryptographically verifiable, publicly available record of entries.
Implementations of Transparency Services may protect their Registry using a combination of trusted hardware, replication and consensus protocols, and cryptographic evidence.
A Receipt is an offline, universally-verifiable proof that an entry is recorded in the Registry.
Receipts do not expire, but it is possible to append new entries (more recent Signed Statements) that subsume older entries (less recent Signed Statements).</t>
      <t>Anyone with access to the Registry can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.
However, the Registries of separate Transparency Services are generally disjoint, though it is possible to take a Transparent Statement from one Registry and register it again on another (if its policy allows it), so the authorization of the Issuer and of the Registry by the Verifier of the Receipt are generally independent.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Registry, as any inconsistency can easily be pinpointed by any Auditor with read access to the Registry.
Some Registry formats may also support consistency auditing (<xref target="sec-consistency"/>) through Receipts, that is, given two valid Receipts the Transparency Service may be asked to produce a cryptographic proof that they are consistent.
Failure to produce this proof can indicate that the Transparency Services operator misbehaved.</t>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="656" width="592" viewBox="0 0 592 656" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
            <path d="M 208,64 L 208,88" fill="none" stroke="black"/>
            <path d="M 208,128 L 208,144" fill="none" stroke="black"/>
            <path d="M 208,416 L 208,432" fill="none" stroke="black"/>
            <path d="M 216,224 L 216,240" fill="none" stroke="black"/>
            <path d="M 232,304 L 232,336" fill="none" stroke="black"/>
            <path d="M 264,176 L 264,200" fill="none" stroke="black"/>
            <path d="M 264,256 L 264,272" fill="none" stroke="black"/>
            <path d="M 264,368 L 264,392" fill="none" stroke="black"/>
            <path d="M 264,448 L 264,600" fill="none" stroke="black"/>
            <path d="M 312,224 L 312,240" fill="none" stroke="black"/>
            <path d="M 320,128 L 320,144" fill="none" stroke="black"/>
            <path d="M 320,416 L 320,432" fill="none" stroke="black"/>
            <path d="M 344,496 L 344,520" fill="none" stroke="black"/>
            <path d="M 376,496 L 376,520" fill="none" stroke="black"/>
            <path d="M 392,272 L 392,336" fill="none" stroke="black"/>
            <path d="M 416,144 L 416,192" fill="none" stroke="black"/>
            <path d="M 480,192 L 480,240" fill="none" stroke="black"/>
            <path d="M 496,336 L 496,472" fill="none" stroke="black"/>
            <path d="M 496,488 L 496,600" fill="none" stroke="black"/>
            <path d="M 512,272 L 512,336" fill="none" stroke="black"/>
            <path d="M 536,128 L 536,144" fill="none" stroke="black"/>
            <path d="M 536,192 L 536,464" fill="none" stroke="black"/>
            <path d="M 568,144 L 568,192" fill="none" stroke="black"/>
            <path d="M 176,32 L 248,32" fill="none" stroke="black"/>
            <path d="M 176,64 L 248,64" fill="none" stroke="black"/>
            <path d="M 176,96 L 240,96" fill="none" stroke="black"/>
            <path d="M 280,96 L 352,96" fill="none" stroke="black"/>
            <path d="M 112,112 L 128,112" fill="none" stroke="black"/>
            <path d="M 376,112 L 520,112" fill="none" stroke="black"/>
            <path d="M 176,128 L 240,128" fill="none" stroke="black"/>
            <path d="M 280,128 L 352,128" fill="none" stroke="black"/>
            <path d="M 416,144 L 568,144" fill="none" stroke="black"/>
            <path d="M 224,160 L 248,160" fill="none" stroke="black"/>
            <path d="M 280,160 L 304,160" fill="none" stroke="black"/>
            <path d="M 416,192 L 568,192" fill="none" stroke="black"/>
            <path d="M 232,208 L 296,208" fill="none" stroke="black"/>
            <path d="M 320,240 L 480,240" fill="none" stroke="black"/>
            <path d="M 232,256 L 296,256" fill="none" stroke="black"/>
            <path d="M 392,272 L 512,272" fill="none" stroke="black"/>
            <path d="M 280,288 L 384,288" fill="none" stroke="black"/>
            <path d="M 272,304 L 320,304" fill="none" stroke="black"/>
            <path d="M 112,320 L 128,320" fill="none" stroke="black"/>
            <path d="M 344,320 L 392,320" fill="none" stroke="black"/>
            <path d="M 272,336 L 320,336" fill="none" stroke="black"/>
            <path d="M 392,336 L 512,336" fill="none" stroke="black"/>
            <path d="M 224,400 L 304,400" fill="none" stroke="black"/>
            <path d="M 224,448 L 304,448" fill="none" stroke="black"/>
            <path d="M 280,480 L 328,480" fill="none" stroke="black"/>
            <path d="M 392,480 L 520,480" fill="none" stroke="black"/>
            <path d="M 304,528 L 472,528" fill="none" stroke="black"/>
            <path d="M 120,544 L 136,544" fill="none" stroke="black"/>
            <path d="M 280,576 L 448,576" fill="none" stroke="black"/>
            <path d="M 192,608 L 344,608" fill="none" stroke="black"/>
            <path d="M 400,608 L 544,608" fill="none" stroke="black"/>
            <path d="M 120,624 L 136,624" fill="none" stroke="black"/>
            <path d="M 176,640 L 328,640" fill="none" stroke="black"/>
            <path d="M 384,640 L 528,640" fill="none" stroke="black"/>
            <path d="M 176,640 L 192,608" fill="none" stroke="black"/>
            <path d="M 280,576 L 304,528" fill="none" stroke="black"/>
            <path d="M 328,640 L 344,608" fill="none" stroke="black"/>
            <path d="M 384,640 L 400,608" fill="none" stroke="black"/>
            <path d="M 448,576 L 472,528" fill="none" stroke="black"/>
            <path d="M 528,640 L 544,608" fill="none" stroke="black"/>
            <path d="M 176,32 C 167.16936,32 160,39.16936 160,48" fill="none" stroke="black"/>
            <path d="M 248,32 C 256.83064,32 264,39.16936 264,48" fill="none" stroke="black"/>
            <path d="M 176,64 C 167.16936,64 160,56.83064 160,48" fill="none" stroke="black"/>
            <path d="M 248,64 C 256.83064,64 264,56.83064 264,48" fill="none" stroke="black"/>
            <path d="M 176,96 C 167.16936,96 160,103.16936 160,112" fill="none" stroke="black"/>
            <path d="M 240,96 C 248.83064,96 256,103.16936 256,112" fill="none" stroke="black"/>
            <path d="M 280,96 C 271.16936,96 264,103.16936 264,112" fill="none" stroke="black"/>
            <path d="M 352,96 C 360.83064,96 368,103.16936 368,112" fill="none" stroke="black"/>
            <path d="M 520,112 C 528.83064,112 536,119.16936 536,128" fill="none" stroke="black"/>
            <path d="M 176,128 C 167.16936,128 160,120.83064 160,112" fill="none" stroke="black"/>
            <path d="M 240,128 C 248.83064,128 256,120.83064 256,112" fill="none" stroke="black"/>
            <path d="M 280,128 C 271.16936,128 264,120.83064 264,112" fill="none" stroke="black"/>
            <path d="M 352,128 C 360.83064,128 368,120.83064 368,112" fill="none" stroke="black"/>
            <path d="M 224,160 C 215.16936,160 208,152.83064 208,144" fill="none" stroke="black"/>
            <path d="M 248,160 C 256.83064,160 264,167.16936 264,176" fill="none" stroke="black"/>
            <path d="M 280,160 C 271.16936,160 264,167.16936 264,176" fill="none" stroke="black"/>
            <path d="M 304,160 C 312.83064,160 320,152.83064 320,144" fill="none" stroke="black"/>
            <path d="M 232,208 C 223.16936,208 216,215.16936 216,224" fill="none" stroke="black"/>
            <path d="M 296,208 C 304.83064,208 312,215.16936 312,224" fill="none" stroke="black"/>
            <path d="M 232,256 C 223.16936,256 216,248.83064 216,240" fill="none" stroke="black"/>
            <path d="M 296,256 C 304.83064,256 312,248.83064 312,240" fill="none" stroke="black"/>
            <path d="M 248,288 C 239.16936,288 232,295.16936 232,304" fill="none" stroke="black"/>
            <path d="M 248,288 C 256.83064,288 264,280.83064 264,272" fill="none" stroke="black"/>
            <path d="M 280,288 C 271.16936,288 264,280.83064 264,272" fill="none" stroke="black"/>
            <path d="M 272,304 C 263.16936,304 256,311.16936 256,320" fill="none" stroke="black"/>
            <path d="M 320,304 C 328.83064,304 336,311.16936 336,320" fill="none" stroke="black"/>
            <path d="M 272,336 C 263.16936,336 256,328.83064 256,320" fill="none" stroke="black"/>
            <path d="M 320,336 C 328.83064,336 336,328.83064 336,320" fill="none" stroke="black"/>
            <path d="M 248,352 C 239.16936,352 232,344.83064 232,336" fill="none" stroke="black"/>
            <path d="M 248,352 C 256.83064,352 264,359.16936 264,368" fill="none" stroke="black"/>
            <path d="M 280,352 C 271.16936,352 264,359.16936 264,368" fill="none" stroke="black"/>
            <path d="M 280,352 C 288.83064,352 296,344.83064 296,336" fill="none" stroke="black"/>
            <path d="M 224,400 C 215.16936,400 208,407.16936 208,416" fill="none" stroke="black"/>
            <path d="M 304,400 C 312.83064,400 320,407.16936 320,416" fill="none" stroke="black"/>
            <path d="M 224,448 C 215.16936,448 208,440.83064 208,432" fill="none" stroke="black"/>
            <path d="M 304,448 C 312.83064,448 320,440.83064 320,432" fill="none" stroke="black"/>
            <path d="M 280,480 C 271.16936,480 264,472.83064 264,464" fill="none" stroke="black"/>
            <path d="M 328,480 C 336.83064,480 344,487.16936 344,496" fill="none" stroke="black"/>
            <path d="M 392,480 C 383.16936,480 376,487.16936 376,496" fill="none" stroke="black"/>
            <path d="M 520,480 C 528.83064,480 536,472.83064 536,464" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="504,600 492,594.4 492,605.6 " fill="black" transform="rotate(90,496,600)"/>
            <path class="jump" d="M 496,488 C 502,488 502,472 496,472" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="392,288 380,282.4 380,293.6 " fill="black" transform="rotate(0,384,288)"/>
            <polygon class="arrowhead" points="384,520 372,514.4 372,525.6 " fill="black" transform="rotate(90,376,520)"/>
            <polygon class="arrowhead" points="384,112 372,106.4 372,117.6 " fill="black" transform="rotate(180,376,112)"/>
            <polygon class="arrowhead" points="352,520 340,514.4 340,525.6 " fill="black" transform="rotate(90,344,520)"/>
            <polygon class="arrowhead" points="352,320 340,314.4 340,325.6 " fill="black" transform="rotate(180,344,320)"/>
            <polygon class="arrowhead" points="328,240 316,234.4 316,245.6 " fill="black" transform="rotate(180,320,240)"/>
            <polygon class="arrowhead" points="272,600 260,594.4 260,605.6 " fill="black" transform="rotate(90,264,600)"/>
            <polygon class="arrowhead" points="272,392 260,386.4 260,397.6 " fill="black" transform="rotate(90,264,392)"/>
            <polygon class="arrowhead" points="272,200 260,194.4 260,205.6 " fill="black" transform="rotate(90,264,200)"/>
            <polygon class="arrowhead" points="216,88 204,82.4 204,93.6 " fill="black" transform="rotate(90,208,88)"/>
            <polygon class="arrowhead" points="144,624 132,618.4 132,629.6 " fill="black" transform="rotate(0,136,624)"/>
            <polygon class="arrowhead" points="144,544 132,538.4 132,549.6 " fill="black" transform="rotate(0,136,544)"/>
            <polygon class="arrowhead" points="136,320 124,314.4 124,325.6 " fill="black" transform="rotate(0,128,320)"/>
            <polygon class="arrowhead" points="136,112 124,106.4 124,117.6 " fill="black" transform="rotate(0,128,112)"/>
            <g class="text">
              <text x="212" y="52">Artifact</text>
              <text x="448" y="100">Decentralized</text>
              <text x="548" y="100">Identifier</text>
              <text x="28" y="116">Issuer</text>
              <text x="208" y="116">Statement</text>
              <text x="316" y="116">Envelope</text>
              <text x="440" y="164">DID</text>
              <text x="472" y="164">Key</text>
              <text x="524" y="164">Manifest</text>
              <text x="260" y="228">Signed</text>
              <text x="364" y="228">COSE</text>
              <text x="416" y="228">Signing</text>
              <text x="264" y="244">Statement</text>
              <text x="452" y="292">Transparency</text>
              <text x="52" y="324">Transparency</text>
              <text x="296" y="324">Receipt</text>
              <text x="448" y="324">Service</text>
              <text x="72" y="340">Service</text>
              <text x="264" y="420">Transparent</text>
              <text x="264" y="436">Statement</text>
              <text x="36" y="548">Verifier</text>
              <text x="332" y="548">Verify</text>
              <text x="408" y="548">Transparent</text>
              <text x="376" y="564">Statement</text>
              <text x="32" y="628">Auditor</text>
              <text x="224" y="628">Collect</text>
              <text x="292" y="628">Receipts</text>
              <text x="444" y="628">Replay</text>
              <text x="488" y="628">Log</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
                    .----------.
                   |  Artifact  |
                    '----+-----'
                         v
                    .----+----.  .----------.    Decentralized Identifier
Issuer       -->   | Statement ||  Envelope  +<------------------.
                    '----+----'  '-----+----'                     |
                         |             |           +--------------+---+
                          '----. .----'            | DID Key Manifest |
                                |                  |                  |
                                v                  +-------+------+---+
                           .----+----.                     |      |
                          |  Signed   |    COSE Signing    |      |
                          | Statement +<-------------------'      |
                           '----+----'                            |
                                |               +--------------+  |
                             .-' '------------->+ Transparency |  |
                            |   .-------.       |              |  |
Transparency -->            |  | Receipt +<-----+   Service    |  |
     Service                |   '---+---'       +------------+-+  |
                             '-. .-'                         |    |
                                |                            |    |
                                v                            |    |
                          .-----+-----.                      |    |
                         | Transparent |                     |    |
                         |  Statement  |                     |    |
                          '-----+-----'                      |    |
                                |                            |    |
                                |'-------.     .-------------)---'
                                |         |   |              |
                                |         v   v              |
                                |    .----+---+-----------.  |
Verifier      -->               |   / Verify Transparent /   |
                                |  /      Statement     /    |
                                | '--------------------'     |
                                v                            v
                       .--------+---------.      .-----------+-----.
Auditor       -->     / Collect Receipts /      /   Replay Log    /
                     '------------------'      '-----------------'
]]></artwork>
      </artset>
      <t>The SCITT architecture consists of a very loose federation of Transparency Services, and a set of common formats and protocols for issuing and registering Signed Statements, and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Merkle Tree Proof.
Most of the details of the Receipt's contents are specified in the COSE Signed Merkle Tree Proof document <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.</t>
      <t>This section describes at a high level, the three main roles and associated processes in SCITT: Issuers and the Signed Statement issuance process, Transparency Service and the Signed Statement Registration process, as well as Verifiers of the Transparent Statements and the Receipt validation process.</t>
      <section anchor="sec-signed-statement-issuance-and-registration">
        <name>Signed Statement Issuance and Registration</name>
        <section anchor="sec-issuer-identity">
          <name>Issuer Identity</name>
          <t>Before an Issuer is able to produce Signed Statements, it must first create its <xref target="DID-CORE">decentralized identifier</xref> (also known as a DID).
A DID can be <em>resolved</em> into a <em>key manifest</em> (a list of public keys indexed by a <em>key identifier</em>) using many different DID methods.</t>
          <t>Issuers <bcp14>MAY</bcp14> choose the DID method they prefer, but with no guarantee that all Transparency Services will be able to register their Signed Statements.
To facilitate interoperability, all Transparency Service implementations <bcp14>SHOULD</bcp14> support the <tt>did:web</tt> method <xref target="DID-WEB"/>.
For instance, if the Issuer publishes its manifest at <tt>https://sample.issuer/user/alice/did.json</tt>, the DID of the Issuer is <tt>did:web:sample.issuer:user:alice</tt>.</t>
          <t>Issuers <bcp14>SHOULD</bcp14> use consistent decentralized identifiers for all their Statements about Artifacts, to simplify authorization by Verifiers and auditing.
They <bcp14>MAY</bcp14> update their DID manifest, for instance to refresh their signing keys or algorithms, but they <bcp14>SHOULD NOT</bcp14> remove or change any prior keys unless they intend to revoke all Signed Statements that are registered as Transparent Statements issued with those keys.
This DID appears in the Issuer protected header of Signed Statements' Envelopes, while the version of the key from the manifest used to sign the Signed Statement is written in the <tt>kid</tt> header.</t>
          <t><tt>kid</tt> <bcp14>MUST</bcp14> either be an absolute URL,
or a relative URL. Relative URL <bcp14>MUST</bcp14> be
relative to an <tt>iss</tt> value. When relative URL is used,
<tt>iss</tt> <bcp14>MUST</bcp14> also be present in the protected header.</t>
          <t>Resolving <tt>kid</tt> <bcp14>MUST</bcp14> return an identity document of a registered content type (a set of public keys).
In the case of <tt>kid</tt> being an absolute DID URL, the identity document is called a DID Document,
and is expected ot have content type <tt>application/did+json</tt>.</t>
          <t>To dereference a DID URL, it first <bcp14>MUST</bcp14> be resolved. After that the fragment is processed according to the media type.</t>
          <t>For example, when resolving <tt>did:example:123#key-42</tt>,
first, the identity document for <tt>did:example:123</tt> is resolved as content type <tt>application/did+json</tt>,
next, the fragment <tt>#key-2</tt> is dereferenced to a verification method that contains a <tt>publicKeyJwk</tt> property.</t>
          <t>The content type of <tt>publicKeyJwk</tt> is expected to be <tt>application/jwk+json</tt>.</t>
          <t>The details of both <tt>DID resolution</tt> and <tt>DID dereferencing</tt> are out of scope for this document.</t>
          <t>The <tt>iss</tt> or <tt>kid</tt>, might not be DID URLs, however the following interfaces <bcp14>MUST</bcp14> be satisfied in order to ensure
issuer identity documents, and associated keys are discoverable in a consistent manner.</t>
          <section anchor="sec-resolving-identity-documents">
            <name>Resolving Identity Documents</name>
            <t>The value of <tt>id</tt> might be found the <tt>iss</tt> or <tt>sub</tt> claims if they are present in the protected header or payload.</t>
            <t><tt>
resolve = (id: string, accept: content_type = 'application/did+json') =&gt;
idDocument (of content type application/did+json).
</tt></t>
            <t>For example:</t>
            <t><tt>
did:example:123
</tt></t>
            <t>Might resolve to:</t>
            <t><tt>
{
  "id": "did:example:123",
  "verificationMethod": [{
    "id": "#key-42",
    "type": "JsonWebkey",
    "controller": "did:example:123",
    "publicKeyJwk": {
      "kty": "EC",
      "crv": "P-384",
      "alg": "ES384",
      "x": "LCeAt2sW36j94wuFP0gNEIHDzqR6Nh_Udu2ObLer3cKFBCaAHY1svmbPV69bP3RH",
      "y": "zz2SkcOGYM6PbYlw19tcbpzo6bEMYHIwGBnN5rd8QWykAprstPdxx4U0uScvDcYd"
    }
  }]
}
</tt></t>
            <t>Editor note, we might wish to eliminate this intermediate identity document content type,
by treating it as an alterative encoding of <tt>application/jwk-set+json</tt> or <tt>application/cose-key-set</tt>.</t>
            <t>However, there is no media type fragment processing directive
that would enable dereferencing the known key set content types, listed above.</t>
            <section anchor="sec-comment-on-oidc">
              <name>Comment on OIDC</name>
              <t>For well known token types, such as <tt>id_token</tt> or <tt>access_token</tt>.</t>
              <t><tt>iss</tt> <bcp14>MUST</bcp14> be a URL, and it <bcp14>MUST</bcp14> have keys discoverable in the following way:</t>
              <t><tt>iss</tt> can be used to build a <tt>.well-known</tt> URL to discovery the issuer's configuration.</t>
              <t>For example, <tt>iss</tt> <tt>contoso.example</tt> will have the following open id connect configuration URL.</t>
              <t><tt>https://contoso.example/.well-known/openid-configuration</tt>.</t>
              <t>This URL will resolve to a JSON document which contains the property:</t>
              <t><tt>jwks_uri</tt>, for example <tt>https://contoso.example/.well-known/jwks.json</tt></t>
              <t>This URL will resolve to a JSON document of content type <tt>application/jwk-set+json</tt>,
which will contain specific keys... for example:</t>
              <t>```json
{
  "keys": [
    {
      "alg": "RS256",
      "kty": "RSA",
      "use": "sig",
      "n": "wW9TkSbcn5FV3iUJ-812sqTvwTGCFrDm6vD2U-g23gn6rrBdFZQbf2bgEnSkolph6CanOYTQ1lKVhKjHLd6Q4MDVGidbVBhESxib2YIzJVUS-0oQgizkBEJxyHI4Zl3xX_sdA_yegLUi-Ykt_gaMPSw_vpxe-pBxu-jd14i-jDfwoPJUdF8ZJGS9orCPRiHCYLDgOscC9XibH9rUbTvG8q4bAPx9Ox6malx4OLvU3pXVjew6LG3iBi2YhpCWe6voMvZJYXqC1n5Mk_KOdGcCFtDgu3I56SGSfsF7-tI7qG1ZO8RMuzqH0LkJVirujYzXrnMZ7WgbMPXmHU8i4z04zw",
      "e": "AQAB",
      "kid": "NTBGNTJEMDc3RUE3RUVEOTM4NDcyOEFDNzEyOTY5NDNGOUQ4OEU5OA",
      "x5t": "NTBGNTJEMDc3RUE3RUVEOTM4NDcyOEFDNzEyOTY5NDNGOUQ4OEU5OA",
      "x5c": [
        "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"
      ]
    },
    {
      "alg": "RS256",
      "kty": "RSA",
      "use": "sig",
      "n": "ylgVZbNR4nlsU_AbU8Zd7ZhVfmYuwq-RB1_YQWHY362pAed-qgSXV1QmKwCukQ2WDsPHWgpPuEf3O_acmJcCiSxhctpBr5WKkji5o50YX2FqC3xymGkYW5NilvFznKaKU45ulBVByrcb3Vt8BqqBAhaD4YywZZKo7mMudcq_M__f0_tB4fHsHHe7ehWobWtzAW7_NRP0_FjB4Kw4PiqJnChPvfbuxTCEUcIYrshRwD6GF4D_oLdeR44dwx4wtEgvPOtkQ5XIGrhQC_sgWcb2jh7YXauVUjuPezP-VkK7Wm9mZRe758q43SWxwT3afo5BLa3_YLWazqcpWRXn9QEDWw",
      "e": "AQAB",
      "kid": "aMIKy_brQk3nLd0PKd9ln",
      "x5t": "-xcTyx47q3ddycG7LtE6QCcETbs",
      "x5c": [
        "MIIC/TCCAeWgAwIBAgIJH62yWyX7VxxQMA0GCSqGSIb3DQEBCwUAMBwxGjAYBgNVBAMTEWNvbnRvc28uYXV0aDAuY29tMB4XDTIwMDMxMTE5Mjk0N1oXDTMzMTExODE5Mjk0N1owHDEaMBgGA1UEAxMRY29udG9zby5hdXRoMC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDKWBVls1HieWxT8BtTxl3tmFV+Zi7Cr5EHX9hBYdjfrakB536qBJdXVCYrAK6RDZYOw8daCk+4R/c79pyYlwKJLGFy2kGvlYqSOLmjnRhfYWoLfHKYaRhbk2KW8XOcpopTjm6UFUHKtxvdW3wGqoECFoPhjLBlkqjuYy51yr8z/9/T+0Hh8ewcd7t6Fahta3MBbv81E/T8WMHgrDg+KomcKE+99u7FMIRRwhiuyFHAPoYXgP+gt15Hjh3DHjC0SC8862RDlcgauFAL+yBZxvaOHthdq5VSO497M/5WQrtab2ZlF7vnyrjdJbHBPdp+jkEtrf9gtZrOpylZFef1AQNbAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFPVdE4SPvuhlODV0GOcPE4QZ7xNuMA4GA1UdDwEB/wQEAwIChDANBgkqhkiG9w0BAQsFAAOCAQEAu2nhfiJk/Sp49LEsR1bliuVMP9nycbSz0zdp2ToAy0DZffTd0FKk/wyFtmbb0UFTD2aOg/WZJLDc+3dYjWQ15SSLDRh6LV45OHU8Dkrc2qLjiRdoh2RI+iQFakDn2OgPNgquL+3EEIpbBDA/uVoOYCbkqJNaNM/egN/s2vZ6Iq7O+BprWX/eM25xw8PMi+MU4K2sJpkcDRwoK9Wy8eeSSRIGYnpKO42g/3QI9+BRa5uD+9shG6n7xgzAPGeldUXajCThomwO8vInp6VqY8k3IeLEYoboJj5KMfJgOWUkmaoh6ZBJHnCogvSXI35jbxCxmHAbK+KdTka/Yg2MadFZdA=="
      ]
    }
  ]
}</t>
              <t>```</t>
              <t>If SCITT wanted to be interoperable with OIDC, we would define key dereferencing in a way that was compatible with how OIDC handles it today.</t>
            </section>
          </section>
          <section anchor="sec-dereferencing-public-keys">
            <name>Dereferencing Public Keys</name>
            <t><tt>kid</tt> is always present in the protected header.</t>
            <t>If <tt>iss</tt> is also present, <tt>kid</tt> <bcp14>MUST</bcp14> be a relative URL to <tt>iss</tt>,
otherwise <tt>kid</tt> <bcp14>MUST</bcp14> be an absolute URL that starts with <tt>iss</tt>.</t>
            <t><tt>id</tt> = <tt>kid</tt> if <tt>iss</tt> is undefined, or <tt>iss</tt> + <tt>#</tt> + <tt>kid</tt> when <tt>iss</tt> is defined.</t>
            <t>See also <eref target="https://datatracker.ietf.org/doc/draft-ietf-cose-cwt-claims-in-headers/">draft-ietf-cose-cwt-claims-in-headers</eref>.</t>
            <t><tt>
dereference = (id: string, accept: content_type = 'application/jwk+json') =&gt;
publicKeyJwk (of content type application/jwk+json).
</tt></t>
            <t>For example, when DIDs are used:</t>
            <t><tt>
did:example:123#key-42
</tt></t>
            <t>Might dereference to:</t>
            <t><tt>
{
  "kty": "EC",
  "crv": "P-384",
  "alg": "ES384",
  "x": "LCeAt2sW36j94wuFP0gNEIHDzqR6Nh_Udu2ObLer3cKFBCaAHY1svmbPV69bP3RH",
  "y": "zz2SkcOGYM6PbYlw19tcbpzo6bEMYHIwGBnN5rd8QWykAprstPdxx4U0uScvDcYd"
}
</tt></t>
          </section>
        </section>
        <section anchor="sec-naming-artifacts">
          <name>Naming Artifacts</name>
          <t>Many Issuers issue Signed Statements about different Artifacts under the same DID, so it is important for everyone to be able to immediately recognize by looking at the Envelope of a Signed Statements what Artifact it is referring to.
This information is stored in the Feed header of the Envelope.
Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the resolved key manifest) for different Artifacts, or sign all Signed Statements under the same key.</t>
        </section>
        <section anchor="sec-signed-statement-metadata">
          <name>Signed Statement Metadata</name>
          <t>Besides Issuer, Feed and kid, the only other mandatory metadata in a Signed Statement is the type of the Payload, indicated in the <tt>cty</tt> (content type) Envelope header.
However, this set of mandatory metadata is not sufficient to express many important Registration Policies.
For example, a Registry may only allow a Signed Statement to be registered, if it was signed recently.
While the Issuer is free to add any information in the payload of the Signed Statements, the Transparency Services (and most of its Auditors) can only be expected to interpret information in the Envelope.</t>
          <t>Such metadata, meant to be interpreted by the Transparency Services during Registration Policy evaluation, should be added to the <tt>reg_info</tt> header.
While the header <bcp14>MUST</bcp14> be present in all Signed Statements, its contents consist of a map of named attributes.
Some attributes (such as the Issuer's timestamp) are standardized with a defined type, to help uniformize their semantics across Transparency Services.
Others are completely customizable and may have arbitrary types.
In any case, all attributes are optional; so the map <bcp14>MAY</bcp14> be empty.</t>
        </section>
      </section>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>The role of Transparency Service can be decomposed into several major functions.
The most important is maintaining a Registry, the verifiable data structure that records Signed Statements, and enforcing a Registration Policy.
It also maintains a service key, which is used to endorse the state of the Registry in Receipts.
All Transparency Services <bcp14>MUST</bcp14> expose standard endpoints for Registration of Signed Statements and Receipt issuance, which is described in <xref target="sec-messages"/>.
Each Transparency Service also defines its own Registration Policies, which <bcp14>MUST</bcp14> apply to all entries in the Registry.</t>
        <t>The combination of Registry, identity, Registration Policy evaluation, and Registration endpoint constitute the trusted part of the Transparency Service.
Each of these components <bcp14>SHOULD</bcp14> be carefully protected against both external attacks and internal misbehavior by some or all of the operators of the Transparency Service.
For instance, the code for policy evaluation, Registry extension and endorsement may be protected by running in a TEE; the Registry may be replicated and a consensus algorithm such as Practical Byzantine Fault Tolerance (pBFT <xref target="PBFT"/>) may be used to protect against malicious or vulnerable replicas; threshold signatures may be use to protect the service key, etc.</t>
        <t>Beyond the trusted components, Transparency Services may operate additional endpoints for auditing, for instance to query for the history of Signed Statements registered by a given Issuer via a certain Feed.
Implementations of Transparency Services <bcp14>SHOULD</bcp14> avoid using the service identity and extending the Registry in auditing endpoints; as much as practical, the Registry <bcp14>SHOULD</bcp14> contain enough evidence to re-construct verifiable proofs that the results returned by the auditing endpoint are consistent with a given state of the Registry.</t>
        <section anchor="sec-service-identity-remote-attestation-and-keying">
          <name>Service Identity, Remote Attestation, and Keying</name>
          <t>Every Transparency Service <bcp14>MUST</bcp14> have a public service identity,
associated with public/private key pairs for signing on behalf of the service.
In particular, this identity must be known by Verifiers when validating a Receipt.</t>
          <t>This identity should be stable for the lifetime of the service, so that all Receipts remain valid and consistent.
The Transparency Service operator <bcp14>MAY</bcp14> use a distributed identifier as their public service identity if they wish to rotate their keys, if the Registry algorithm they use for their Receipt supports it.
Other types of cryptographic identities, such as parameters for non-interactive zero-knowledge proof systems, may also be used in the future.</t>
          <t>A Transparency Services <bcp14>SHOULD</bcp14> provide evidence that it is securely implemented and operated, enabling remote authentication of the hardware platforms and/or software TCB that run the Transparency Service.
This additional evidence <bcp14>SHOULD</bcp14> be recorded in the Registry and presented on demand to Verifiers and Auditors.
Examples for Statements that can improve trustworthy assessments of Transparency Services are RATS Conceptual Messages, such as Evidence, Endorsements, or corresponding Attestation Results (see <xref target="RFC9334"/>.</t>
          <t>For example, consider a Transparency Service implemented using a set of replicas, each running within its own hardware-protected trusted execution environments (TEEs).
Each replica <bcp14>SHOULD</bcp14> provide a recent attestation report for its TEE, binding their hardware platform to the software that runs the Transparency Service, the long-term public key of the service, and the key used by the replica for signing Receipts.
This attestation evidence <bcp14>SHOULD</bcp14> be supplemented with transparency Receipts for the software and configuration of the service, as measured in its attestation report.</t>
        </section>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>A Transparency Service that accepts to register any valid Signed
Statement offered by anonymous Issuers would only provide
limited value, or no value, to verifiers. As a consequence, some form of
authorization is needed prior to registration of Signed Statements to
ensure completeness of audit. More advanced use case will rely on the
Transparency Service performing additional domain-specific checks before
a Signed Statement is accepted. For example, some Transparency Services
may validate the content of Signed Statements.</t>
          <t>We use the term "registration policies" to refer to the checks that are
performed before a Signed Statement is registered given a set of input
values. This baseline specification leaves the implementation of the
registration policy to the provider of the Transparency Services and its
users.</t>
          <t>As a minimum we expect that a deployment authenticates the Issuer of the
Signed Statement, which requires some form of trust anchor. As defined
in <xref target="RFC6024"/>, "A trust anchor represents an authoritative
entity via a public key and associated data. The public key is used to
verify digital signatures, and the associated data is used to constrain
the types of information for which the trust anchor is authoritative."
The Trust Anchor may be a certificate, a raw public key or other
structure, as appropriate. It can be a non-root certificate when it is a
certificate.</t>
          <t>A provider of a Transparency Service is, however, expected to indicate
what registration policy is used in a given deployment and inform its
users about changes to the registration policy.</t>
        </section>
        <section anchor="sec-registry-security-requirements">
          <name>Registry Security Requirements</name>
          <t>There are many different candidate verifiable data structures that may be used to implement the Registry, such as chronological Merkle Trees, sparse/indexed Merkle Trees, full blockchains, and many other variants.
The Registry is only required to support concise Receipts (i.e., whose size grows at most logarithmically in the number of entries in the Registry) that can be encoded as a COSE Signed Merkle Tree Proof.</t>
          <t>It is possible to offer multiple signature algorithms for the COSE signature of receipts' Signed Merkle Tree, or to change the signing algorithm at later points. However, the Merkle Tree algorithm (including its internal hash function) cannot easily be changed without breaking the consistency of the Registry. It is possible to maintain separate Registries for each algorithm in parallel but the Transparency Service is then responsible for proving their mutual consistency.</t>
          <section anchor="sec-finality">
            <name>Finality</name>
            <t>A Registry is append-only: once a Signed Statement is registered and becomes a Transparent Statement, it cannot be modified, deleted, or moved.
In particular, once a Receipt is returned for a given Signed Statement, the registered Signed Statement and any preceding entry in the Registry become immutable, and the Receipt provides universally-verifiable evidence of this property.</t>
          </section>
          <section anchor="sec-consistency">
            <name>Consistency</name>
            <t>There is no fork in the Registry: everyone with access to its contents sees the same sequence of entries, and can check its consistency with any Receipts they have collected.
Transparency Service implementations <bcp14>SHOULD</bcp14> provide a mechanism to verify that the state of the Registry encoded in an old Receipt is consistent with the current Registry state.</t>
          </section>
          <section anchor="sec-replayability-and-auditing">
            <name>Replayability and Auditing</name>
            <t>Everyone with access to the Registry can check the correctness of its contents.
In particular,</t>
            <ul spacing="normal">
              <li>the Transparency Service defines and enforces deterministic Registration Policies that can be re-evaluated based solely on the contents of the Registry at the time of Registration, and must then yield the same result.</li>
              <li>the ordering of entries, their cryptographic contents, and the Registry governance may be non-deterministic, but they must be verifiable.</li>
              <li>a Transparency Service <bcp14>SHOULD</bcp14> store evidence about the resolution of distributed identifiers into manifests.</li>
              <li>a Transparency Service <bcp14>MAY</bcp14> additionally support verifiability of client authentication and access control.</li>
            </ul>
          </section>
          <section anchor="sec-governance-and-bootstrapping">
            <name>Governance and Bootstrapping</name>
            <t>The Transparency Service needs to support governance, with well-defined procedures for allocating resources to operate the Registry (e.g., for provisioning trusted hardware and registering their attestation materials in the Registry) and for updating its code (e.g., relying on Transparent Statement about code updates, secured on the Registry itself, or on some auxiliary Transparency Service).</t>
            <t>Governance procedures, their auditing, and their transparency are implementation specific.
A Transparency Service <bcp14>SHOULD</bcp14> document them.</t>
            <ul spacing="normal">
              <li>Governance may be based on a consortium of members that are jointly responsible for the Transparency Services, or automated based on the contents of an auxiliary governance Transparency Service.</li>
              <li>Governance typically involves additional records in the Registry to enable its auditing.
Hence, the Registry may contain both Transparent Statements and governance entries.</li>
              <li>Issuers, Verifiers, and third-party Auditors may review the Transparency Service governance before trusting the service, or on a regular basis.</li>
            </ul>
          </section>
        </section>
      </section>
      <section anchor="validation">
        <name>Verifying Transparent Statements</name>
        <t>For a given Artifact, Verifiers take as trusted inputs:</t>
        <ol spacing="normal" type="1">
          <li>the distributed identifier of the Issuer (or its resolved key manifest),</li>
          <li>the expected name of the Artifact (i.e., the Feed),</li>
          <li>the list of service identities of trusted Transparency Services.</li>
        </ol>
        <t>When presented with a Transparent Statement for an Artifact, Consumers verify its Issuer identity, signature, and Receipt.
They may additionally apply a validation policy based on the protected headers present both in the Envelope, the Receipt, or the Statement itself, which may include security-critical or Artifact-specific details.</t>
        <t>Some Verifiers may systematically resolve Issuer DIDs to fetch the latest corresponding DID documents.
This behavior strictly enforces the revocation of compromised keys: once the Issuer has updated its Statement to remove a key identifier, all Signed Statements include the corresponding <tt>kid</tt> will be rejected.
However, others may delegate DID resolution to a trusted third party and/or cache its results.</t>
        <t>Some Verifiers may decide to skip the DID-based signature verification, relying on the Transparency Service's Registration Policy and the scrutiny of other Verifiers.
Although this weakens their guarantees against key revocation, or against a corrupt Transparency Services, they can still keep the Receipt and blame the Issuer or the Transparency Services at a later point.</t>
      </section>
    </section>
    <section anchor="sec-signed-statement-issuance-registration-and-verification">
      <name>Signed Statement Issuance, Registration, and Verification</name>
      <t>This section details the interoperability requirements for implementers of Signed Statements issuance and validation libraries, and of Transparency Services.</t>
      <section anchor="sec-envelope-and-signed-statement-format">
        <name>Envelope and Signed Statement Format</name>
        <t>The formats of Signed Statements and Receipts are based on CBOR Object Signing and Encryption (COSE <xref target="RFC9052"/>).
The choice of CBOR <xref target="RFC8949"/> is a trade-off between safety (in particular, non-malleability: each Signed Statement has a unique serialization), ease of processing and availability of implementations.</t>
        <t>At a high-level that is the context of this architecture, a Signed Statement is a COSE single-signed object (i.e., a <tt>COSE_Sign1</tt>) that contains the correct set of protected headers.
Although Issuers and relying parties may attach unprotected headers to Signed Statements, Transparency Services and Verifiers <bcp14>MUST NOT</bcp14> rely on the presence or value of additional unprotected headers in Signed Statements during Registration and validation.</t>
        <t>All Signed Statements <bcp14>MUST</bcp14> include the following protected headers:</t>
        <ul spacing="normal">
          <li>algorithm (label: <tt>1</tt>): Asymmetric signature algorithm used by the Issuer of a Signed Statement, as an integer, for example <tt>-35</tt> for ECDSA with SHA-384, see <xref target="IANA.cose">COSE Algorithms Registry</xref>;</li>
          <li>Issuer (label: <tt>TBD</tt>, temporary: <tt>391</tt>): DID (Decentralized Identifier <xref target="DID-CORE"/>) of the signer, as a string, for example <tt>did:web:example.com</tt>;</li>
          <li>Feed (label: <tt>TBD</tt>, temporary: <tt>392</tt>): the Issuer's name for the Artifact, as a string;</li>
          <li>payload type (label: <tt>3</tt>): media-type of Statement payload as a string, for example <tt>application/spdx+json</tt></li>
          <li>Registration Policy info (label: <tt>TBD</tt>, temporary: <tt>393</tt>): a map of additional attributes to help enforce Registration Policies;</li>
          <li>Key ID (label: <tt>4</tt>): Key ID, as a bytestring.</li>
        </ul>
        <t>Additionally, Signed Statements <bcp14>MAY</bcp14> carry the following unprotected headers:</t>
        <ul spacing="normal">
          <li>Receipts (label: <tt>TBD</tt>, temporary: <tt>394</tt>): Array of Receipts, defined below. This allows the Receipt to be attached to the Signed Statement, thus making a Transparent Statement.</li>
        </ul>
        <t>In CDDL <xref target="RFC8610"/> notation, the Envelope is defined as follows:</t>
        <sourcecode type="cddl">
SCITT_Envelope = COSE_Sign1_Tagged

COSE_Sign1_Tagged = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload : bstr,
  signature : bstr
]

Reg_Info = {
  ? "register_by": uint .within (~time),
  ? "sequence_no": uint,
  ? "issuance_ts": uint .within (~time),
  ? "no_replay": null,
  * tstr =&gt; any
}

; All protected headers are mandatory, to protect against faulty implementations of COSE
; that may accidentally read a missing protected header from the unprotected headers.
Protected_Header = {
  1 =&gt; int               ; algorithm identifier
  3 =&gt; tstr              ; payload type
  4 =&gt; bstr              ; Key ID
  ; TBD, Labels are temporary
  391 =&gt; tstr            ; DID of Issuer
  392 =&gt; tstr            ; Feed
  393 =&gt; Reg_Info        ; Registration Policy info
}

Unprotected_Header = {
  ; TBD, Labels are temporary
  ? 394 =&gt; [+ Receipt]
}
</sourcecode>
      </section>
      <section anchor="sec-receipts">
        <name>Receipts</name>
        <t>Receipts are based on COSE Signed Merkle Tree Proofs (<xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>) with an additional wrapper structure that adds the following information:</t>
        <ul spacing="normal">
          <li>version: Receipt version number; this should be set to <tt>0</tt> for implementation of this document. We envision that future version of SCITT may add support for more complex receipts; for instance, registrations on multiple TS, receipts for dependency graphs and endorsements of Signed Claims, etc.</li>
          <li>ts_identifier: The DID of the Transparency Service that issued the claim. Verifiers <bcp14>MAY</bcp14> use this DID as a key discovery mechanism to verify the COSE Merkle Root signature; in this case the verification is the same as for Signed Claims and the signer should include the Key ID header. Verifiers <bcp14>MUST</bcp14> support the <tt>did:web</tt> method, all other methods are optional.</li>
        </ul>
        <t>We also introduce the following requirements for the COSE signature of the Merkle Root:</t>
        <ul spacing="normal">
          <li>The SCITT version header <bcp14>MUST</bcp14> be included and its value match the <tt>version</tt> field of the Receipt stucture.</li>
          <li>The DID of issuer header (like in Signed Claims) <bcp14>MUST</bcp14> be included and its value match the <tt>ts_identifier</tt> field of the Receipt structure.</li>
          <li>TS <bcp14>MAY</bcp14> include the Registration policy info header to indicate to verifiers what policies have been applied at the registration of this claim.</li>
          <li>Since <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/> uses optional headers, the <tt>crit</tt> header (id: 2) <bcp14>MUST</bcp14> be included and all SCITT-specific headers (version, DID of TS and Registration Policy) <bcp14>MUST</bcp14> be marked critical.</li>
        </ul>
        <t>The TS may include the registration time to help verifiers decide about the trustworthiness of the Transparent Statement.
The registration time is defined as the timestamp at which the TS has added this Signed Statement to its Registry.</t>
        <sourcecode type="cddl">
Receipt = [
    version: int,
    ts_identifier: tstr,
    proof: SignedMerkleTreeProof
]

; Additional protected headers in the COSE signed_tree_root of the SignedMerkleTreeProof
Protected_Header = {
  390 =&gt; int                 ; SCITT Receipt Version
  394 =&gt; tstr                ; DID of Transparency Service (required)
  ? 395 =&gt; RegistrationInfo  ; Registration policy information (optional)

  ; Other COSE Signed Merkle Tree headers
  ; (e.g. tree algorithm, tree size)

  ; Additional standard COSE headers
  2 =&gt; [+ label]            ; Critical headers
  ? 4 =&gt; bstr               ; Key ID (optional)
  ? 33 =&gt; COSE_X509         ; X.509 chain (optional)
}

; Details of the registration info, as provided by the TS
RegistrationInfo = {
  ? "registration_time": uint .within (~time),
  * tstr =&gt; any
}
</sourcecode>
      </section>
      <section anchor="sec-signed-statement-issuance">
        <name>Signed Statement Issuance</name>
        <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format to serialize the Statement payload. For a software supply chain, payloads describing the software artifacts may, for example, include</t>
        <ul spacing="normal">
          <li>JSON-SPDX</li>
          <li>CBOR-SPDX</li>
          <li>SWID</li>
          <li>CoSWID</li>
          <li>CycloneDX</li>
          <li>in-toto</li>
          <li>SLSA</li>
        </ul>
        <t>Once the Statement is serialized with the correct media-type/content-format, an Issuer should fill in the attributes for the Registration Policy information header.
From the Issuer's perspective, using attributes from named policies ensures that the Signed Statement may only be registered on Transparency Services that implement the associated policy.
For instance, if a Signed Statement is frequently updated, and it is important for Verifiers to always consider the latest version, Issuers <bcp14>SHOULD</bcp14> use the <tt>sequence_no</tt> or <tt>issuer_ts</tt> attributes.</t>
        <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement (the SCITT tag of <tt>COSE_Sign1_Tagged</tt> is outside the scope of COSE, and used to indicate that a signed object is a Signed Statement).</t>
      </section>
      <section anchor="sec-registering-signed-statements">
        <name>Registering Signed Statements</name>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services.
To register a Signed Statement, the service performs the following steps:</t>
        <ol spacing="normal" type="1">
          <li>Client authentication.
This is implementation-specific and <bcp14>MAY</bcp14> be unrelated to the Issuer identity.
Signed Statements may be registered by a different party than their Issuer.</li>
          <li>Issuer identification.
The Transparency Service <bcp14>MUST</bcp14> store evidence of the DID resolution for the Issuer protected header of the Envelope and the resolved key manifest at the time of Registration for auditing.
This <bcp14>MAY</bcp14> require that the service resolves the Issuer DID and record the resulting document, or rely on a cache of recent resolutions.</li>
          <li>Envelope signature verification, as described in COSE signature, using the signature algorithm and verification key of the Issuer DID document.</li>
          <li>Envelope validation.
The service <bcp14>MUST</bcp14> check that the Envelope includes a Statement payload and the protected headers listed above.
The service <bcp14>MAY</bcp14> additionally verify the Statement payload format and content.</li>
          <li>Apply Registration Policy: for named policies, the Transparency Service should check that the required Registration info attributes are present in the Envelope and apply the check described in Table 1.
A Transparency Service <bcp14>MUST</bcp14> reject Signed Statements that contain an attribute used for a named policy that is not enforced by the service.
Custom Signed Statements are evaluated given the current Registry state and the entire Envelope, and <bcp14>MAY</bcp14> use information contained in the attributes of named policies.</li>
          <li>Commit (register) the new Signed Statement to the Registry</li>
          <li>Sign and return the Receipt.</li>
        </ol>
        <t>The last two steps <bcp14>MAY</bcp14> be shared between a batch of Signed Statements recorded in the Registry.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt, so that it can always back up the Receipt by releasing the corresponding entry (the now Transparent Statement) in the Registry.
Conversely, the service <bcp14>MAY</bcp14> re-issue Receipts for the Registry content, for instance after a transient fault during Signed Statement Registration.</t>
      </section>
      <section anchor="sec-validation-of-transparent-statements">
        <name>Validation of Transparent Statements</name>
        <t>This section provides additional implementation considerations.
The high-level validation algorithm is described in <xref target="validation"/>; the Registry-specific details of checking Receipts are covered in <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.</t>
        <t>Before checking a Transparent Statement, the Verifier must be configured with one or more identities of trusted Transparency Services.
If more than one service is configured, the Verifier <bcp14>MUST</bcp14> return which service the Transparent Statement is registered on.</t>
        <t>In some scenarios, the Verifier already expects a specific Issuer and Feed for the Transparent Statement, while in other cases they are not known in advance and can be an output of validation.
Verifiers <bcp14>SHOULD</bcp14> offer a configuration to decide if the Issuer's signature should be locally verified (which may require a DID resolution, and may fail if the manifest is not available or if the key is revoked), or if it should trust the validation done by the Transparency Service during Registration.</t>
        <t>Some Verifiers <bcp14>MAY</bcp14> decide to locally re-apply some or all of the Registration Policies, if they have limited trust in the Transparency Services.
In addition, Verifiers <bcp14>MAY</bcp14> apply arbitrary validation policies after the signature and Receipt have been checked.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
        <t>Verifiers <bcp14>SHOULD</bcp14> offer options to store or share Receipts in case they are needed to audit the Transparency Services in case of a dispute.</t>
      </section>
    </section>
    <section anchor="sec-federation">
      <name>Federation</name>
      <t>This topic is still under discussion, see <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture/issues/79">issue 79</eref></t>
      <t>Multiple, independently-operated Transparency Services can help secure distributed supply chains, without the need for a single, centralized service trusted by all parties.
For example, multiple Transparency Service instances may be governed and operated by different organizations that do not trust one another.</t>
      <t>This may involve registering the same Signed Statements at different Transparency Services, each with their own purpose and Registration Policy.
This may also involve attaching multiple Receipts to the same Signed Statements, each Receipt endorsing the Issuer signature and a subset of prior Receipts, and each Transparency Service verifying prior Receipts as part of their Registration Policy.</t>
      <t>For example,
a supplier's Transparency Service may provide a complete, authoritative Registry for some kind of Signed Statements, whereas a Consumer's Transparency Service may collect different kinds of Signed Statements
to ensure complete auditing for a specific use case, and possibly require additional reviews before registering some of these Signed Statements.</t>
    </section>
    <section anchor="sec-transparency-service-api">
      <name>Transparency Service API</name>
      <section anchor="sec-messages">
        <name>Messages</name>
        <t>All messages are sent as HTTP GET or POST requests.</t>
        <t>If the Transparency Service cannot process a client's request, it <bcp14>MUST</bcp14> return an HTTP 4xx or 5xx status code, and the body <bcp14>SHOULD</bcp14> be a JSON problem details object (<xref target="RFC7807"/>) containing:</t>
        <ul spacing="normal">
          <li>type: A URI reference identifying the problem.
To facilitate automated response to errors, this document defines a set of standard tokens for use in the type field within the URN namespace of: "urn:ietf:params:scitt:error:".</li>
          <li>detail: A human-readable string describing the error that prevented the Transparency Service from processing the request, ideally with sufficient detail to enable the error to be rectified.</li>
        </ul>
        <t>Error responses <bcp14>SHOULD</bcp14> be sent with the <tt>Content-Type: application/problem+json</tt> HTTP header.</t>
        <t>As an example, submitting a Signed Statement with an unsupported signature algorithm would return a <tt>400 Bad Request</tt> status code and the following body:</t>
        <sourcecode type="json">
{
  "type": "urn:ietf:params:scitt:error:badSignatureAlgorithm",
  "detail": "The Statement was signed with an algorithm the server does not support"
}
</sourcecode>
        <t>Most error types are specific to the type of request and are defined in the respective subsections below.
The one exception is the "malformed" error type, which indicates that the Transparency Service could not parse the client's request because it did not comply with this document:</t>
        <ul spacing="normal">
          <li>Error code: <tt>malformed</tt> (The request could not be parsed).</li>
        </ul>
        <t>Clients <bcp14>SHOULD</bcp14> treat 500 and 503 HTTP status code responses as transient failures and <bcp14>MAY</bcp14> retry the same request without modification at a later date.
Note that in the case of a 503 response, the Transparency Service <bcp14>MAY</bcp14> include a <tt>Retry-After</tt> header field per <xref target="RFC7231"/> in order to request a minimum time for the client to wait before retrying the request.
In the absence of this header field, this document does not specify a minimum.</t>
        <section anchor="sec-register-signed-statement">
          <name>Register Signed Statement</name>
          <section anchor="sec-request">
            <name>Request</name>
            <artwork><![CDATA[
POST <Base URL>/entries
]]></artwork>
            <t>Headers:</t>
            <ul spacing="normal">
              <li>
                <tt>Content-Type: application/cose</tt></li>
            </ul>
            <t>Body: SCITT COSE_Sign1 message</t>
          </section>
          <section anchor="sec-response">
            <name>Response</name>
            <t>One of the following:</t>
            <ul spacing="normal">
              <li>
                <t>Status 201 - Registration is successful.
                </t>
                <ul spacing="normal">
                  <li>Header <tt>Location: &lt;Base URL&gt;/entries/&lt;Entry ID&gt;</tt></li>
                  <li>Header <tt>Content-Type: application/json</tt></li>
                  <li>Body <tt>{ "entryId": "&lt;Entry ID"&gt; }</tt></li>
                </ul>
              </li>
              <li>
                <t>Status 202 - Registration is running.
                </t>
                <ul spacing="normal">
                  <li>Header <tt>Location: &lt;Base URL&gt;/operations/&lt;Operation ID&gt;</tt></li>
                  <li>Header <tt>Content-Type: application/json</tt></li>
                  <li>(Optional) Header: <tt>Retry-After: &lt;seconds&gt;</tt></li>
                  <li>Body <tt>{ "operationId": "&lt;Operation ID&gt;", "status": "running" }</tt></li>
                </ul>
              </li>
              <li>
                <t>Status 400 - Registration was unsuccessful due to invalid input.
                </t>
                <ul spacing="normal">
                  <li>Error code <tt>badSignatureAlgorithm</tt></li>
                  <li>TBD: more error codes to be defined, see <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture/issues/17">#17</eref></li>
                </ul>
              </li>
            </ul>
            <t>If 202 is returned, then clients should wait until Registration succeeded or failed by polling the Registration status using the Operation ID returned in the response.
Clients should always obtain a Receipt as a proof that Registration has succeeded.</t>
          </section>
        </section>
        <section anchor="sec-retrieve-operation-status">
          <name>Retrieve Operation Status</name>
          <section anchor="sec-request-1">
            <name>Request</name>
            <artwork><![CDATA[
GET <Base URL>/operations/<Operation ID>
]]></artwork>
          </section>
          <section anchor="sec-response-1">
            <name>Response</name>
            <t>One of the following:</t>
            <ul spacing="normal">
              <li>
                <t>Status 200 - Registration is running
                </t>
                <ul spacing="normal">
                  <li>Header: <tt>Content-Type: application/json</tt></li>
                  <li>(Optional) Header: <tt>Retry-After: &lt;seconds&gt;</tt></li>
                  <li>Body: <tt>{ "operationId": "&lt;Operation ID&gt;", "status": "running" }</tt></li>
                </ul>
              </li>
              <li>
                <t>Status 200 - Registration was successful
                </t>
                <ul spacing="normal">
                  <li>Header: <tt>Location: &lt;Base URL&gt;/entries/&lt;Entry ID&gt;</tt></li>
                  <li>Header: <tt>Content-Type: application/json</tt></li>
                  <li>Body: <tt>{ "operationId": "&lt;Operation ID&gt;", "status": "succeeded", "entryId": "&lt;Entry ID&gt;" }</tt></li>
                </ul>
              </li>
              <li>
                <t>Status 200 - Registration failed
                </t>
                <ul spacing="normal">
                  <li>Header <tt>Content-Type: application/json</tt></li>
                  <li>Body: <tt>{ "operationId": "&lt;Operation ID&gt;", "status": "failed", "error": { "type": "&lt;type&gt;", "detail": "&lt;detail&gt;" } }</tt></li>
                  <li>Error code: <tt>badSignatureAlgorithm</tt></li>
                  <li/>
                </ul>
              </li>
              <li>
                <t>Status 404 - Unknown Operation ID
                </t>
                <ul spacing="normal">
                  <li>Error code: <tt>operationNotFound</tt></li>
                  <li>This can happen if the operation ID has expired and been deleted.</li>
                </ul>
              </li>
            </ul>
            <t>If an operation failed, then error details <bcp14>SHOULD</bcp14> be embedded as a JSON problem details object in the <tt>"error"</tt> field.</t>
            <t>If an operation ID is invalid (i.e., it does not correspond to any submit operation), a service may return either a 404 or a <tt>running</tt> status.
This is because differentiating between the two may not be possible in an eventually consistent system.</t>
          </section>
        </section>
        <section anchor="sec-retrieve-signed-statement">
          <name>Retrieve Signed Statement</name>
          <section anchor="sec-request-2">
            <name>Request</name>
            <artwork><![CDATA[
GET <Base URL>/entries/<Entry ID>
]]></artwork>
            <t>Query parameters:</t>
            <ul spacing="normal">
              <li>(Optional) <tt>embedReceipt=true</tt></li>
            </ul>
            <t>If the query parameter <tt>embedReceipt=true</tt> is provided, then the Signed Statement is returned with the corresponding Registration Receipt embedded in the COSE unprotected header.</t>
          </section>
          <section anchor="sec-response-2">
            <name>Response</name>
            <t>One of the following:</t>
            <ul spacing="normal">
              <li>
                <t>Status 200.
                </t>
                <ul spacing="normal">
                  <li>Header: <tt>Content-Type: application/cose</tt></li>
                  <li>Body: COSE_Sign1</li>
                </ul>
              </li>
              <li>
                <t>Status 404 - Entry not found.
                </t>
                <ul spacing="normal">
                  <li>Error code: <tt>entryNotFound</tt></li>
                </ul>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="sec-retrieve-registration-receipt">
          <name>Retrieve Registration Receipt</name>
          <section anchor="sec-request-3">
            <name>Request</name>
            <artwork><![CDATA[
GET <Base URL>/entries/<Entry ID>/receipt
]]></artwork>
          </section>
          <section anchor="sec-response-3">
            <name>Response</name>
            <t>One of the following:</t>
            <ul spacing="normal">
              <li>
                <t>Status 200.
                </t>
                <ul spacing="normal">
                  <li>Header: <tt>Content-Type: application/cbor</tt></li>
                  <li>Body: SCITT_Receipt</li>
                </ul>
              </li>
              <li>
                <t>Status 404 - Entry not found.
                </t>
                <ul spacing="normal">
                  <li>Error code: <tt>entryNotFound</tt></li>
                </ul>
              </li>
            </ul>
            <t>The retrieved Receipt may be embedded in the corresponding COSE_Sign1 document in the unprotected header.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Unless advertised by a Transparency Service, every Issuer should treat Signed Statements it registered (rendering them Transparent Statements) as public.
In particular, Signed Statements' Envelopes and Statement payload should not carry any private information in plaintext.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>On its own, verifying a Transparent Statement does not guarantee that its Envelope or contents are trustworthy---just that they have been signed by the apparent Issuer and counter-signed by the
Transparency Service.
If the Verifier trusts the Issuer, it can infer that an Issuer's Signed Statement was issued with this Envelope and contents, which may be interpreted as the Issuer saying the Artifact is fit for its intended purpose.
If the Verifier trusts the Transparency Service, it can independently infer that the Signed Statement passed the Transparency Service Registration Policy and that has been persisted in the Registry.
Unless advertised in the Transparency Service Registration Policy, the Verifier should not assume that the ordering of Signed Statements in the Registry matches the ordering of their issuance.</t>
      <t>Similarly, the fact that an Issuer can be held accountable for its Transparent Statements does not on its own provide any mitigation or remediation mechanism in case one of these Transparent Statements turned out to be misleading or malicious---just that signed evidence will be available to support them.</t>
      <t>Issuers <bcp14>SHOULD</bcp14> ensure that the Statement payloads in their Signed Statements are correct and unambiguous, for example by avoiding ill-defined or ambiguous formats that may cause Verifiers to interpret the Signed Statement as valid for some other purpose.</t>
      <t>Issuers and Transparency Services <bcp14>SHOULD</bcp14> carefully protect their private signing keys and avoid these keys being used for any purpose not described in this architecture document.
In cases where key re-use is unavoidable, keys <bcp14>MUST NOT</bcp14> sign any other message that may be verified as an Envelope as part of a Signed Statement.</t>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>The document provides a generic threat model for SCITT, describing its residual security properties when some of its actors (identity providers, Issuers, Transparency Services, and Auditors) are corrupt or compromised.</t>
        <t>This model may need to be refined to account for specific supply chains and use cases.</t>
        <section anchor="sec-signed-statement-authentication-and-transparency">
          <name>Signed Statement Authentication and Transparency.</name>
          <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
These guarantees are meant to hold for extensive periods of time, possibly decades.</t>
          <t>It can never be assumed that some Issuers and some Transparency Services will not be corrupt.</t>
          <t>SCITT entities explicitly trust one another on the basis of their long-term identity, which maps to shorter-lived cryptographic credentials.
Hence, a Verifier would usually validate a Transparent Statement originating from a given Issuer, registered at a given Transparency Service (both identified in the Verifier's local authorization policy) and would not depend on any other Issuer or Transparency Services.</t>
          <t>Authorized supply chain actors (Issuers) cannot be stopped from producing Signed Statements including false assertions in their Statement payload (either by mistake or by corruption), but these Issuers can made accountable by ensuring their Signed Statements are systematically registered at a trustworthy Transparency Service.</t>
          <t>Similarly, providing strong residual guarantees against faulty/corrupt Transparency Services is a SCITT design goal.
Preventing a Transparency Service from registering Signed Statements that do not meet its stated Registration Policy, or to issue Receipts that are not consistent with their append-only Log is not possible.
In contrast Transparency Services can be hold accountable and they can be called out by any Auditor that replays their Registry against any contested Receipt.
Note that the SCITT Architecture does not require trust in a single centralized Transparency Service: different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.</t>
          <t>In both cases, the SCITT Architecture provides generic, universally-verifiable cryptographic proof to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who issue contradictory Signed Statements to different entities (Verifiers, Auditors, Issuers), otherwise known as 'equivocation'.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT Architecture.</t>
          <t>Verifiers and Auditors need not be trusted by other actors.
In particular, so long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
          <section anchor="sec-append-only-log">
            <name>Append-only Log</name>
            <t>If a Transparency Service is honest, then a Transparent Statement including a correct Receipt ensures that the associated Signed Statement passed its Registration Policy and was recorded appropriately.</t>
            <t>Conversely, a corrupt Transparency Service may
1. refuse or delay the Registration of Signed Statements,
2. register Signed Statements that do not pass its Registration Policy (e.g., Signed Statement with Issuer identities and signatures that do not verify),
3. issue verifiable Receipts for Signed Statements that do not match its Registry, or
4. refuse access to its Registry (e.g., to Auditors, possibly after storage loss).</t>
            <t>An Auditor granted (partial) access to a Registry and to a collection of disputed Receipts will be able to replay it, detect any invalid Registration (2) or incorrect Receipt in this collection (3), and blame the Transparency Service for them.
This ensures any Verifier that trusts at least one such Auditor that (2,3) will be blamed to the Transparency Service.</t>
            <t>Due to the operational challenge of maintaining a globally consistent append-only Log,
some Transparency Services may provide limited support for historical queries on the Signed
Statements they have registered, and accept the risk of being blamed for inconsistent
Registration or Issuer equivocation.</t>
            <t>Verifiers and Auditors may also witness (1,4) but may not be able to collect verifiable evidence for it.</t>
          </section>
          <section anchor="sec-availability-of-transparent-signed-statement">
            <name>Availability of Transparent Signed Statement</name>
            <t>Networking and Storage are trusted only for availability.</t>
            <t>Auditing may involve access to data beyond what is persisted in the Transparency Services.
For example, the registered Transparency Service may include only the hash of a detailed SBOM, which may limit the scope of auditing.</t>
            <t>Resistance to denial-of-service is implementation specific.</t>
            <t>Actors should independently keep their own record of the Signed Statements they issue, endorse, verify, or audit.</t>
          </section>
        </section>
        <section anchor="sec-confidentiality-and-privacy">
          <name>Confidentiality and privacy.</name>
          <t>According to Zero Trust Principles any location in a network is never trusted.
All contents exchanged between actors is protected using secure authenticated channels (e.g., TLS) but, as usual, this may not exclude network traffic analysis.</t>
          <section anchor="sec-signed-statements-and-their-registration">
            <name>Signed Statements and Their Registration</name>
            <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Some Transparency Services may publish every Signed Statement in their logs, to facilitate their dissemination and auditing.
Others may just return Receipts to clients that present Singed Statements for Registration, and disclose the Append-only Log only to Auditors trusted with the confidentiality of its contents.</t>
            <t>A collection of Signed Statements must not leak information about the contents of other Signed Statements registered on the Transparency Service.</t>
            <t>Nonetheless, Issuers should carefully review the inclusion of private/confidential materials in their Statements.
For example, issuers should remove Personally Identifiable Information (PII) as clear text in the statement.
Alternatively, Issuers may include opaque cryptographic statements, such as hashes.</t>
          </section>
          <section anchor="sec-queries-to-the-registry">
            <name>Queries to the Registry</name>
            <t>The confidentiality of queries is implementation-specific, and generally not guaranteed.
For example, while offline Envelope validation of Signed Statements is private, a Transparency Service may monitor which of its Transparent Statements are being verified from lookups to ensure their freshness.</t>
          </section>
        </section>
        <section anchor="sec-cryptographic-assumptions">
          <name>Cryptographic Assumptions</name>
          <t>SCITT relies on standard cryptographic security for signing schemes (EUF-CMA: for a given key, given the public key and any number of signed messages, an attacker cannot forge a valid signature for any other message) and for Receipts schemes (log collision-resistance: for a given commitment such as a Merkle-tree root, there is a unique log such that any valid path authenticates a Signed Statement in this log.)</t>
          <t>The SCITT Architecture supports cryptographic agility: the actors depend only on the subset of signing and Receipt schemes they trust.
This enables the gradual transition to stronger algorithms, including e.g. post-quantum signature algorithms.</t>
        </section>
        <section anchor="sec-transparency-service-clients">
          <name>Transparency Service Clients</name>
          <t>Trust in clients that submit Signed Statements for Registration is implementation-specific.
Hence, an attacker may attempt to register any Signed Statement it has obtained, at any Transparency Service that accepts them, possibly multiple times and out of order.
This may be mitigated by a Transparency Service that enforces restrictive access control and Registration Policies.</t>
        </section>
        <section anchor="sec-identity">
          <name>Identity</name>
          <t>The identity resolution mechanism is trusted to associate long-term identifiers with their public signature-verification keys.
(Transparency Services and other parties may record identity-resolution evidence to facilitate its auditing.)</t>
          <t>If one of the credentials of an Issuer gets compromised, the SCITT Architecture still guarantees the authenticity of all Signed Statements signed with this credential that have been registered on a Transparency Service before the compromise.
It is up to the Issuer to notify Transparency Services of credential revocation to stop Verifiers from accepting Signed Statements signed with compromised credentials.</t>
          <t>The confidentiality of any identity lookup during Signed Statement Registration or Transparent Statement Verification is out of scope.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD; <xref target="mybody"/>.</t>
      <section anchor="sec-urn-sub-namespace-for-scitt-urnietfparamsscitt">
        <name>URN Sub-namespace for SCITT (urn:ietf:params:scitt)</name>
        <t>IANA is requested to register the URN sub-namespace <tt>urn:ietf:params:scitt</tt>
in the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers"
Registry <xref target="IANA.params"/>, following the template in <xref target="RFC3553"/>:</t>
        <artwork><![CDATA[
   Registry name:  scitt

   Specification:  [RFCthis]

   Repository:  http://www.iana.org/assignments/scitt

   Index value:  No transformation needed.
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6024">
          <front>
            <title>Trust Anchor Management Requirements</title>
            <seriesInfo name="DOI" value="10.17487/RFC6024"/>
            <seriesInfo name="RFC" value="6024"/>
            <author fullname="R. Reddy" initials="R." surname="Reddy"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>A trust anchor represents an authoritative entity via a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative. A relying party uses trust anchors to determine if a digitally signed object is valid by verifying a digital signature using the trust anchor's public key, and by enforcing the constraints expressed in the associated data for the trust anchor. This document describes some of the problems associated with the lack of a standard trust anchor management mechanism and defines requirements for data formats and push-based protocols designed to address these problems. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7807">
          <front>
            <title>Problem Details for HTTP APIs</title>
            <seriesInfo name="DOI" value="10.17487/RFC7807"/>
            <seriesInfo name="RFC" value="7807"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Wilde" initials="E." surname="Wilde"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document defines a "problem detail" as a way to carry machine- readable details of errors in a HTTP response to avoid the need to define new error response formats for HTTP APIs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7231">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
            <seriesInfo name="DOI" value="10.17487/RFC7231"/>
            <seriesInfo name="RFC" value="7231"/>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <seriesInfo name="DOI" value="10.17487/RFC6838"/>
            <seriesInfo name="RFC" value="6838"/>
            <seriesInfo name="BCP" value="13"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC3553">
          <front>
            <title>An IETF URN Sub-namespace for Registered Protocol Parameters</title>
            <seriesInfo name="DOI" value="10.17487/RFC3553"/>
            <seriesInfo name="RFC" value="3553"/>
            <seriesInfo name="BCP" value="73"/>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document describes a new sub-delegation for the 'ietf' URN namespace for registered protocol items. The 'ietf' URN namespace is defined in RFC 2648 as a root for persistent URIs that refer to IETF- defined resources. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.params" target="https://www.iana.org/assignments/params">
          <front>
            <title>Uniform Resource Name (URN) Namespace for IETF Use</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose" target="https://www.iana.org/assignments/cose">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="DID-CORE" target="https://www.w3.org/TR/did-core/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2022" month="July" day="22"/>
          </front>
        </reference>
        <reference anchor="DID-WEB" target="https://w3c-ccg.github.io/did-method-web/">
          <front>
            <title>did:web Decentralized Identifiers Method Spec</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.draft-steele-cose-merkle-tree-proofs">
          <front>
            <title>Concise Encoding of Signed Merkle Tree Proofs</title>
            <seriesInfo name="Internet-Draft" value="draft-steele-cose-merkle-tree-proofs-01"/>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This specification describes verifiable data structures and
   associated proof types for use with COSE.  The extensibility of the
   approach is demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="PBFT">
          <front>
            <title>Practical byzantine fault tolerance and proactive recovery</title>
            <seriesInfo name="DOI" value="10.1145/571637.571640"/>
            <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 20, no. 4, pp. 398-461"/>
            <author fullname="Miguel Castro" initials="M." surname="Castro">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Barbara Liskov" initials="B." surname="Liskov">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
        </reference>
        <reference anchor="MERKLE">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <seriesInfo name="DOI" value="10.1007/3-540-48184-2_32"/>
            <seriesInfo name="Advances in Cryptology - CRYPTO '87" value="pp. 369-378"/>
            <author fullname="Ralph C. Merkle" initials="R." surname="Merkle">
              <organization/>
            </author>
            <date year="1988"/>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-scitt-software-use-cases">
          <front>
            <title>Detailed Software Supply Chain Uses Cases for SCITT</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-software-use-cases-00"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Dick Brooks (REA)" initials="D." surname="Brooks">
              <organization>REA</organization>
            </author>
            <author fullname="Bob Martin" initials="B." surname="Martin">
              <organization>MITRE</organization>
            </author>
            <author fullname="Brian Knight" initials="B." surname="Knight">
              <organization>Microsoft</organization>
            </author>
            <date day="14" month="March" year="2023"/>
            <abstract>
              <t>   This document includes a collection of representative Software Supply
   Chain Use Case Descriptions.  These use cases aim to identify
   software supply chain problems that the industry faces today and acts
   as a guideline for developing a comprehensive solution for these
   classes of scenarios.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIABRorGQAA8W96XbaWvYv+p2n0M3+ELsCuG9Te1eB+8S9sR27Ro1YIAGy
QcKSMCbZOc9yn+U+2ZndaiQkJ7tOnf/dY1TFgJrVzDX7+Zu1Wq3ysu2sVCpp
kA78bacROo240w9Sv5OOY9/pRrHTisdJOonitD913NCDz26YjNzYD1NnN+gF
qTtwrsaj0WDq7PTdIEwqbrsd+/Dcq52jVivzwIoXdUJ3CG/yYreb1gI/7daS
TpCmNde6rLa4XKnAG1x4ht8Zx0E6rUx68sDK02TbOQpTPw79tLaLz6l03HTb
SVKv0onCxA+TcbLtTP2kkozbwyBJgihMpyN469Fea79SeYrdoRdNwq/RKIWf
ku2K47jjNPoaeF9Hsd8NXuFhfqcGYxin/SjertQcHvWhHz45zSB+6keDb3BX
FMOo9mN3HPajrh87V0ctfJbMf+YHf+gGg22nD0+pt+Up/0yCtN7VV9Y9Hy5M
0tj3YUqXfR8WNI3dJPGdjTX4pRN5MI7366vLW2vv8TOszbaz68bDJHW9lK4Y
h2kMXx748dANp3rwjTCNgtB3dv1B0AvdtHbsvrhjj6fhhsE3F1dj2zkJOnGU
RN3UufQTH/fFGtHyknOV0oXOZeR6ZkQ7zSVneb9pxrTjDttx4PV8M3E3TL3B
P4fq+fVONLQHfP1Zj3XH9+Kg4+xHY9zl/8EhdvmNvzTIu6jnJ31Yz6Q/gpPh
zwyzcXlijWtpadHZHw/a+IaCkW2dfnpzZFN6G9CHvO2fsOeFgwOKgaNSd47d
5MmP4Wce7VXqv/jmSyJd/uTswCEYD9Ig7JnXJXh5OKAL/tmPUvxWvY6GeOW7
KTCNzOtDOMEerT4cvkoYAQGmwYuPB+xyf2dzfWkRpra7e8yftxbXluHz2dWe
/L61ugWfm2eXld/UBSt8Qa1xfHBlvl2Vbw8bV4fyrKV1fFaLP60vLq/KSzc2
FzfUn8srS/Ln+ubKpvy5sgYvgT+PGqeNOvA1d5joj50oocHvHu3Wds4u9/Bv
x0nduIcb2k/TUbK9sDCZTOqTlTqs6ELrcsELvFoniv0FvpYZ667fAX4Zu4Pg
GyzQkQcfgm7gx4kzB89O5p2Xpfoi3aBYjkP/0S7druzQRw+WFch7cXm5trhR
W16Wgd3uNUvGtdKpdTq9OvDo/rhdDyIa29CHF3i1id/OjBB+2obv3hjpCd3o
XI38TiUIu/bmHtV268zRgWz8gV/DhYM3xU/wN5J/bRRHUTfBbTvZa13ihp83
91uwMGdH9aXF+tLS6trC2sbS+spGHf9ZxcU42bv8fLxnrllc3FhYqa2tLtZW
N5c2V2vLX1eWZfdXVoAkYjdNasIMcESWdMGTPAGJUhvDuDpu4sMeV4C+xzR8
oXi88p94E24lfM3rtu3QcyY9ftTCm5KrUqnVaiAAkGd30koFhGXHd9vBAI6M
E3WdUX+aBB2QmChJPZGejRiWGC5P4Og6CYvSDolSJ0gc1xlEIbw8hVvghFad
9jiFCzsgHhP4DNcmfhxE4wRlFslKOJBhB8RjvdLq+04cgOyAB4+i0XjgxjKQ
F7inG7jtgY9k5SKTGtMM4IX4zqEPIwiDZOikEazPk+/AACOggiGQNvxNZ55u
Rx0B5J0LixD2nBQkVgwDGI4GgQujcGDjQQTDY/vwXOCuMO8kGvowz07HT5Lu
GNYCZgyLQrIYX5cAhcHgOg5slkOb5czB5X0cGTw/s0T0erWQMGkk1g6yn3le
qIHbecL59PzQR4mC657ABtDQ7Z2DJ7spvC10XM+DZcCbJoEH3BH0nZ6Pa6aH
U4eN7cPWgDYzHqIe5IHSEPrWe6qw4qChRCM/5jeVvzZy/JC+TrVi1QFNC8UP
PDCcZqc7AZp0hkEYDMdDGClrME7bjWM8o/XKUYor/gIDh9Ue+K8B016VX4I7
ZA2MyVJe5QVd0D9wNgFsno/zki2BqbfssV358UsAm8eDeXGZ+kCVCFCE0Fwt
Aoj953EQ0/NgfOdx5I07yE5wqWO/FwDHiIVsrkAvUfKDrndgbrgERa+v8uuR
IHpjYNswLdlEdzBgkTbE90wC+NiGVac1jpjyp3jfsM7HdRh4HggyEC+gVtL4
cN6ze5x04qBNu2y2EubKyzyAAXkZ3jm7zX1aEFoovfjwAH2aMvuh1hUenuh1
hWWJe/ghwyZo2/EAgsjGIwLD7kVwHtpTeCkckI6cTDgsg0E0wU+0QbzJ8dRw
Dr2SyB+X6vZWDF3PxyceJckY19UFRSbNEqdhZEOwGXDRA5EfLq0Pyjb8DMcD
JxNGYS32R7Ac+PPHynLdoWNuv1SeowgFlhVJggfsI+fwQ68WhTCE4wh4YxIx
CTA94UkAuqdFh/fBugALmxLl4dhAicLb4UWDqVBtmOBr+AvcJt/7WFmp6znj
nX4XOEzA19ALcG+RSCN4KbzTjVOiLlBNccwxa6Jwhkpo/KNQJO8RbB2JSget
mJh2k6cjY0CJYIaplxHP2EuEgmUCK4yPACrGJ868jngXUEIQw8qag4OChgnI
w03mQ4sPUFNHvgzPUrMwW0QUnCRRJ3BR+QP1wiWJMk6IaIGvwCIEwIvhx9EY
eFDHefKnsPpg9Gipw6IKdjWCp5WOCrdPkXJ+YswqgHcNx6lQW5Y4+BWh//rG
tDXnU2/JPUNPqlR8GknlgsKE+g8wL3jR9++szfz4MV+vgNoN1FOlNxSxNnm8
z+KOzxCLbUMIVUWxpIghiSMZZonuPILVntq7o1kmmpV0lzy0aBj1SiOxSU8u
nVn5goHM0L8aCqwQXhrEQ9/DKQCde6BW8IMC4TIi52dehLvlefCVvGFmh2mL
DQ+jkQEH7ofB8xg+ggD3UBVKM4ydRDbxbPgB9Fac547RJLJL8/17baf14wcI
n34A+yysBBRLEquj2MdVxt0Pc0uMY8+7VmaUGbjyS31tcSujydQrh9EEKDRm
gplVR/gI2krUzBxxZZEu2zHYnfgkHr7IZvmRVDtLacDH9KOJg7pdMZ3CY/WR
wXnDOEizoFHv4W2JXHnSuBNZBHehYJ+EBQSCJI8Lw0ZQ8A0PGxE/nYXo5/pC
GWFcocpZrMQMXSDLQRLp4amX87hGalyDYMj6zaQf0b5PQGICmwHVl2dOAsMo
r/u+78E8eZdBzR3I6OMpiWvk4/AAMgZg1KK0zWpntBxwc/HgFY0l6sygXI+S
gIauzmXQGxspFIQv0QDZXYbw9CLTiaHFTaaw0kN+YEiLC0NGMqyhZdBTGok7
mLhTorjuYPxKEjhIFWG4wC9F7fJfYWFYN0MRCWs6cmXHOv0Ijx1wUbRnkPsh
T8ClMytWaRRToFZ2X4LEkC08dJY28mxQKVhZi8tagHG7xouQkOxIZjkSGCa8
yDEcIlgmj0Su5lcjdzqA8zbPBlRn4AZDpTfhXhl1ieU1yyA3M6B62cSFbyaG
4HAkE38wqLE1Yoli/crEfilpFkiG7gg5EnFGW0+gM6OfEaB9OYAthAtp0gmt
xTwO2ZZKoFURG0JL1a/36lXnHR6YAH/2mK2rd7zDLYZfUcGZjoinqdHh65TC
7VnXBUlm5d4nKCrRv/vuI2o+aBOjiCD6h4NVPnrSuPHWzCQKD1nJnEDNmpQJ
qtk9tjVY4s5aPk7fKauIVQvbv26eiFyq7bPq59FTXGQNQ1y0MAIlXvgV0otF
nkKBeB/pi8iG20g8nXg6MizbBfGoeGfZGnTxaMOegLzwtlEuIC+gO/Qqn1xf
tfDxqTUFlGoxmtHw+AmYqXDo4XdU65GzDVzk5kD+6AuA+dcrhdNPNH90kSEN
yeQFHZie0Y8Gnq2p5p0TGZrTK8JbZJ8GH9XeAVAQWwtzJA5FORhM52EIQYhc
azD7Cnf8CqwHLalZDtGNo6HYBlnTCccFcgY4KUZQiknINUYVSA25HWnhUknC
0J8U8brs7NgXQlMEyQX0Ahs5AFXFIeGCj5l9BOgyL8gf0RR6U+kqYVA4SuCK
oPsj2ydnj1PIl9N+HI17fXUNkmocDbTgrTuW+hPEHosP2yfUQMELzHDemUTj
gYcU2CMN0FPPhItCEMc8CTcF9SRV03kBzc+ztGu1ZlUS4Ep+o3wE3W76trpc
oViZOt/FGlMKfKhL/Ai4fBTjINtAHciBgMZROzRutKwjxpkj66NKFKcEP+of
WvGr8smCR/bd2EN/J1sJsT+EJ8vEtSbgiogHJspKG/NMvMKfp/vIf6DdRtpa
Zk0nUWtB0q+ThrTQthXdoeXCKxWrIw029uG56tDyITBBE5ZKSolEVcI6a/XK
dTgIQJTutKrM7jPDUnRAVgYLZFY/cMGyjpDcGIcY/YC1zjzO6FYy0cQFgdgb
RG1YJTOjN7VjUbCJ7mwv1cwIcjrx1JnL7rI6JHjrmG0U19HRTjjEPWAlaX8I
xJ9OfD9UZKEHrx4sflFQhsAyANGRGYi62fgCC6UBUHoT1V4gWxwHnzFboU3K
RYnSVyxLLGMXdUgi4OGcRKQW0AyQ4nzcC3ZLaS/idoZ4gM/Bej35SFzwIxM/
rFacGLUXXoquczplyP3oTBBZRFmV2DXMk8UCiWflwcoZHS67gEkgJH5Krn4f
3vsRh4COLe2P/I9GTEyKx1w2RtxUtEqIL3sR6eHdrOzjg/EUIp3BmNu+mU69
YhymoiOM1BpXRfjS/I1uNcPIq9nFtD0CGHAQbbvUM1yZEYFK3sHyT9G90/bx
0V6QdKIXy68OlA6HXSxQVsjsw6/EhagCQWyrYrPS6CVwS20t2Oa2Pwj8F3o3
TA10A3YrBdpD4s6K8qSvxJJeb1fpXsrYZFkFmpKsHs/Cso9H7EB5210D+xL1
SGZXS/RIs81qVS1XVqpTPQLm5kmCfgj0KOSNpxI1zVhPRqez3bBla3jUFaVQ
HCojinHJOmjpJDYLSBtYqIK9C4xrOOv+g1WhjYUPmAFhHlg1jL38/UBNHB3P
KLaJem+1IsbNW0aErIyr3yBHms931O3mBia+rOJn/ZSFsn/b8szA0NQBNLxd
c9fEInF1mf5xAMb+2O35Wgf3aCnVdfgvGfJovZ0fweVTUD3V+GfcGVoI/mS5
0NdA7JTfhgF12xUxZ00YA3+wYmmQjvG3eVlmtF6JVJE7gGQaYbA6w3OcOQ4X
YXhmOkLBBaTSD0DZBTqagPpKqrtI3FjLIBoQTDXRPJc8gAPcj/EI/S4J+uSd
7jjsCK+03zpfr5xQuIBPMhlO/sCYOXhqzOrkJ46DBdOH4yB4ARzoTiCuCeWT
2WPzDtkGhY1BGczSDHoxz672jB8zEOcoe6KQ7//cqGCSBjkyDgbMzIYgk1KS
S8r3jbF/3g+1Gol4R/OedWTPOT9KQejit99AkbF28DRifZapDeMKwL68xHmH
pui7Kv/rnJ7R35d7F9dHl3u7+PfVYeP4WP9RkSuuDs+uj3fNX+bOnbOTk73T
Xb4ZvnUyX1XegdB8x9L73dl56+jstHH8btYN63IksC0HQ7uLK9rXgfc0d87/
v/93aRV26f+53N9ZXlra+vFDPmwubazCB/Q+8Nto/fgjmncVXFY3Jk44GKBr
BwPjKJoTFEMg+FFrhoX8279wZf697fy93Rktrf4hX+CEM1+qNct8SWs2+83M
zbyIBV8VvEavZub73Epnx9u4y3xW6259+fd/EFutLW3+448KBniv4aTsoM+c
CYZIF2mtPYgwT0B5ztATRsmLbsxbFYrtKEbbjLd9Jk5PNC9HKWFX5gC1EGIQ
Kl/BUt80qzGnSZ6H/FmyV+jro6gF42QuiZqn94KSFQ9fOMaHjWPFBrpRpJ4C
O77rw9FEfmrFDWJfn1meNYpPzIECa1ET7ffvP02m+fEDz6bT8uNhEEYgbae8
vkDjw8yq0nFIfOIEYKS+iDlArjo3ZDtTmUcphupg9nZyKSV+9mLKaLAFR1VS
U1GEi6nELhbr9NUrt+i000EgeHzVGLCa7fCYKVDFpweVM9DyIgnJksPfVWkV
dP5EPonizw9AD3jYGYy92YmjN1t2HsyZbbhdpwUBoWA4V38O0AWvHLVDEL+4
tZgPNBM7woey/cvPFJ/+VKRh30f6/gVzPRtryCh3Rs0pVpFhCEq9pH3L828a
2C4Rg2JDe+GLPwD9gH4y/mpUjEPR/98n5Gp2SbWxI4CupdaiSHYpJ9BRj8w6
pm3JNquio+psbkTao1hAefSVeS859XQqXERWVd8fjGyBnfdDKFNOuTqQ0NBE
YduhWBmCx0oiBU9J8wPLuww6nfgZ6BjPzvAIKAI0C/ImFBgplGmWXcBJjNIE
E1kobcte73YQaveNcbJn6N03D8puFg0F30TxX3vVkQ7Z3Fe+MHRl+RixdOby
T5+ljnlFOONw9nZ0ev7CI4Am0e+nzlCg8x8xSgWrl6Mq5V82Ttp99DWBTTW1
KQUfWc24YTiNpdBBoskPmfHz2BcDukwf0waM5ShW60suTNpZmLVYnbIgYKtz
VoZajJklE4JXGwQrwzMq5C/oUgFKLRvkDMUm6rW5YJc69SrgQfbfJPQpHMjG
sh0nAsmJ34cZx51xE08dk42B7mx/Ig/SeQcx8s2cKjoHOwA7iCbPse/1ZA+1
A43mT65jYznb2mwuIYTWBzNXCpcnKCODeoU1ENE4EuOjxCHygDo+WDUOsx9W
BjoUHfFIfr/pw8sn+VX1SnGWFEkfK4GFZQU+BbQH+3tYPxmIyDI1LCI7skOi
HjASMDMks4nZXiEHYst+NkRWV0/NGUDEr+RBdrbNOWUbs5lD+cY/fnyU8Adz
GWYy6vE1HUMlDpGQvwUfUaWgtBI+bxis2kWMs8m7XFk5KQpLzslZNzPWb3uf
zJxING0j9MQEHGRQGZe0BcZVpOlTjEnSILEQJuU0wtmVJ/5cnGOJiu5Ucfqi
S95r776d6FPVuVpBmt/MqpWepslFBSpg6qHcJt4Xa+jMGnLTlTdas8b085AX
WyV1vOltAD7TjWKTZFi8SugGBv6iJlVwQUXTpd7gzP6ijz8rYVEqAf+Yzmga
eCnPdr7CZh6GH6OiOJ07QIV0autFlyZtQv35P8O0YOgpxR6MNiLrnkxBr50O
yROHcV/iq8DjApRuPznGc/Y5ntc2mGaI9i06EAIcLcdA/xpDnD3EP2OQMK1i
/phfwLxyoT3Z2YTYt4LBOhtXq8kk9WnG1SIiiSnoH3nsI6cF59wHJ2o/ApNJ
PvLhkei4TJ6v01SRVYzZGrDUukp+hlyagBYUzcfWlAvC2y1RnrVrREcq7RgD
cXGVFpy6vZ7ySGPNAiwcp5LMuUne4yVVP5SASUraq4s7Xs3otRy0lngC/qL0
liZmkZ91nRMMTwWYAzB31Tw7EWfjgBRXzqvsAeEHfqgU2RnNhzQWKoGwUx91
KKp0eSpFVFukiymLnkU2WLnwnqRAIOkMImQ2JLhKY/lBUnyy6U452eiKQ5ZT
8gjxk7qSef6ayQvmQDQPi0+tzkwsZdpW0tyQSW0mh12W0Y5AS7jGYrUlnMxO
jCKL18pd5mUWGuR4Glxyw0m7FLozOS/Kz681mMxOpnmuUCCcxfp3xz1x5gu5
K0WLdW/2k2cEYzmbnuOwhlbUiNNrHaTAfMKU2IzkKskFns/uvx15irGwkKwa
WpIC+cou5Gku39/tod+H5vI2B4eFVVtQaKKwayIp827MucoXpVIRCowuHT+b
r2bS9iXihdIKZwHzHGUyOWbyj6qOH5D7QHQPTizPeqKyRs5ABcY5z9TiDawq
qhBbVGRXVb5vO78Np+3Im/5ATx15YQI1S3s1KyhHMn4zNly9zB2ZWiVydRkf
KXswMUSrC+EwRU0JVW0BWzYMZgurMpfMoyX/Usve0rxsdtRmEjaCxBo0ZZAW
Oj3+ihwukLot4wzgDMPiBESyANLU7fSpgIgtISrzMDJgDoh8GFEQMsGUO9d2
bTCBZPREZEVZrxQROvpmklzWGxElGpEynvqMUpIoDk1ztAOdOF8aOevFeugZ
XlPqFKwqrqKyFQ3jkmOpEzHLkilDYnnosBRhZay0nGlRzs/rleaUZWHCiVJ9
y8ONTCdxpxkFa44TPV2slBmSAId1BQE3TzmodoIjausUbpSCuCikvDpKH8zw
muLUQJyQcmzE7OvA4elsH+UJlywCSiXGFw4wzpNJni1Q1BPJu/Y9zlN0egHw
iVKtwot8jF2mlPyHYwYh3Yf5JKSgoOTmak5P5WZINWpK+Vy0f0M7YYuVQL2m
op4Qh1fhRi5aRrqirHAsUeVwq+23xrFrDwAJXoodtDnRKeszSEGt82MuOM5p
PKoUEExK1HkpoNOJx8B2piaDn8JBdjVX4Cf5dcrVPRDxaxpUoR/OS3etcq1M
UkI16xyh4LMxzqqib2B04cUNuNpQEh+IbYDuhOM6+tVaTVx2Eesik/SAVVET
7C/SuOHx+VxCK9VQhw44/wyfHHWigWQwZd0+Pq5ESAkqGe+QznuogsoRYCI3
LkLNslBthxFJ83j6ppuooonEi4iOgfoDHLlQKVbXRYmuSeDdoBRaWVDJ+o2p
kHP2QIm6D/RD2XOUtGVuHaCzpfRWlEDhFJkD6286IzbDwDpZX6aiCVa17VAN
u0vQpSlcAgkBpOJAvFslWo6lWGF2J+YuKkmWqTKSAQUqQUSCgiW5LXaiNPKM
xyhgvYG42OzCp1RQXqIocsJ06Gc1BV36g7oPqYREhHxM5wJ2mUiSlItVrigq
5qsqFTFb1FMQy8la+8ptoRRK8zuTb3bG1oaRy2XEJYgm35s8KmMSXCi7Xyjf
C3Pk4BcsDZpaW5mtrhT1MJHsDmKwbyVpoGAfAruIkcHEeiTl+5YfklTWZllE
lZM2cKY2DVI5rJsEA+LooyAc4b4LQ0TGzwFJJniukyqkeqk10YuvPNq6NEu5
fDIHQDHrue/fEa3H+g29RCphVnGEqjKkqiIDMb+ULRHNNEptTZFZCIbiZSOJ
pQ5u8lO4sZXoi8Eh4ORSDa4eYZX8ytln7VbX/RZvHWeKoZoRJG0fpaFHIfgM
fNPZC17uTyqV/wX/Oa6bvPQEWCT7X72m/6sXXfCnY4S482fhI97jzR/oEe8L
L6D/XspfT/fWs2PBH8sASSQaJY+o1f6gcRo28icMWpurzoe/12b+K5yqNZH3
8kF/KlqZ8rn+WfrpQ3Yc+PFD+XN4EHVemMwo/kT8F+czENqJGwZdVNPeGE/h
sEq/+ulzXma/+mBN6Bfmld338qG+NRa4RHigXK59ycgafvUZhmqK6EQt+ptr
kiGbN971l/cnTyw/fUYdRvA+c88fH7Jc5M+fPeNPx5zDuvVd9pI/s0oxH8HM
BVpeyrLC4DVPVc+gi60v8+N4L+uqljWzHh9+YT3e09kp3xWa2H90bv7yMwrO
zF94Rt06XMUH5qfP+DOjcxVP6efPsM7Lf/gMm7GWbc3/4L78+T5D7HWbxGrz
tTdF2sww/pwd1F+ZxYszQye/eLtmp/YRqePtWo2l/3IHVW5fYGV3mqGQhV99
+wL/ZRGGI1/+yu1ZdpXhuv+Hh6pY4XCsPf5gL1XmF3PYVGqd3KsWcMHZiQbo
8zMqpKwD/gN2wMDljBL8pnggBTN/X/bLe1LjOLNSpafaaf+ZBCpKQRpQYX3X
93wDAFBS30v+D5XCKDW2Sg/H37SFz+WHoHupNFM7bF5UFGQ7Voqt0jo5nXXI
xM5icROO7vxSyNY1VmY1l3lNQW4VEUy0Q9JNix1nc5wWr2I8Y8nIx+RIMeok
2YzXGQtmJF0uVs+1fVYqzT47gOI5Ke+ulNKAscuVEwRN6KOrVGedzcTK65WT
iM1/dtljxm+Ss13fJ6oanA3AXDHJT6LxdlqwCcorQDSV2WthZaFrrx+AITbw
QRdn5wLYZj5nHjtxNFAAJqbCSFVBJDoRe9vY0rIsBb78ZKwQ5/DuavH6lt6f
cWfrZwBJIaYC/mviezNFWEU1UFr3sTI+5bFcyFBY76bBquzh4OW/KW/FkRBI
pdJk34AORpBTTTwspQ6CKjpQiK4ZAoqjh+Q9+VcWv8zkPv577jeFgDnvzJFF
zlFPSqyDnyjsh7aIxBD+FvsJFS/+jauoXOdvGKwYipXyNwy2KUeViasm5Eh5
VQ5VusUM4m8qBkL8wIQC8bWMaZnoFEUuYhRcEdwLcxEb5iMKZLNfkLwTYVSE
IlcGe5dFlPsZKg2lNoDtjOeY1jpXFFUtfdcMh5PyCeUPwak9CHLng5rg9++C
Corncj9TRRxk/F608klfgipqc/DIPigI0YRyJOpc3riAfvkFoI6Oj0ii9cck
Ch+qen2zTjWgRTWy7cxTtvEp2/SUB2vDZGZUnGDwzcooMtG4ODMesxnoA0Iu
w6LT7jTnBswE7W05RWG9KRHReOSxOwZfQ2Qk65Stw2c66MYICMzXKpcdETYN
1mQmaTQGUw5DRfovFDkifB2fPGic9EWPGIfkX6bbONzK73yJ0Jc6KCjINQnm
dji9NAAuCT0CEYYnB99bZ86OM+faIp25q6ioIFdgZijvtSuGZeHAV8loieWP
xQOvC2E0PapIkYKfKwzjIhgTJqjI2B6eAu9BBgRExh+pwEmH3akIrQ1sCnOg
ry+PqxUKkMX+gGBt8StMOzWfFLxJRV9CwH/OAyzcA3L5sV93qMTEfoYqratW
+Dp6CLFQqrHmRKOSFGxyJiMjRTqy5sBpkiZ0nU4tRadLk9D7rZBfJC1KV6cb
rjtf55A/VwXhj/wqLre2VwmJAFcqG4a2QcYwjIVERpfuqgQCSmG0Y5GRBPAy
g3uwiqqQv3wg/oKqBeLOEMOmXHjXjCNQUkwhzyi5U3ca3VQFEUnZi92eGqQp
spwpuTYpZFgIYGeJTXhj9W4gb5Mft5eWV36DlaytLj9UKzSgsiVClpG/9YFD
WjxwPJ+/sCrVSqjLl/TUHmgQyw8MnqQXTJJCOawm0TstCzkxRtUbPDBZfPan
nyZPD7hQIKXSqRTzZsaFZJK92t5gLnLMjP1x8mR2NKudEgDKA+4qLcMYr38g
hkxfmrnAyj8QQ0MWj3GpDjp3WR3OVHrRG/jA4YojPVedIaihlIqCYxMaAnZk
QxkZgFQS0iBBQDoq4kpgIonSlLW1wlVhFUEAmNlyZQEZ7Za4OU4ig2RACU6W
5FOV8aj6YdGrIjyl/unTJaWMxH9oV/Ds8lTbviAup5nVSMagLAgaGWsEHKn4
CTfCeyV7CVnqw0NFiNb53ZkDksZEUcKnwSDPKN1W9PKV6OV3530RJb+fd37/
oxJ4ajbOHJmfFqEV3QUsC99vn9BtHlLubPFlJ7QaarRpJNd+B5P8XeC923be
5W57V8Wf7BPD4Odw6b++kyEv98mxp+vhSxwwfv0Jxnjrt+FH9YugGg38uOx1
cJF9nuCy7+IyePeUTvGuvR25EJ8Xv+BX57WVzVXzLegYdOFV5ttX/O54x2+k
y8ntyvrj1upkvH++2DvdOzrc/fZ8uX7a/3rtjZfP2sd+vNL5vN/ccRuHd0vJ
y7B9frO+1T5fuTw0j6OxfPu2fPXUOTu4O1k/b98NJktbaac9+hatt/dO7g6P
JgfN8HQt9jYvbqdPjRFwxHPv9XX1enF81XnZ7dx57+hpP+D/f/y78oO3aY99
LHBAkd/6QsSTAFUqOGcIwBiyLiYZZzGx67SI0dokVK1gNFeBvmD8mCvQEfiK
5TSlRhMiTHeGadVAYjLjosNj/0oo90gBcAmyNTuCzsWKYFZYWcmaU1vgGF6A
1ZgwiAoxY0awEkTwDONjDYnMLtSTUI7bkwQ+gxaVT8hmL74wjt+cnWgoDhDn
7Gh3h88MmbQKCOYJg6H8BJVmBzzkK/0gc6aorXyDZ99oMpTSS7KYU8z4WxLu
xOfyPC7LZCcuFibw48R0VNqe1EE7D3XCNKTBPpBCBT+qp05NJnrMfg0DdpkX
4PyWB1yzKInq8v0DW3M04OzYQLKgfoUPDdHFl0XSRO0QRq7spNxTF6xBL+CD
qCeEdf+D8pjghGgEhjvBpD9dnZ0aWhaoWTv5XklmXD2g0eTrOA4e2CKRITi/
NDa8l+24vzCePIcuPzHVCo+dnigTMICVZF7U6/aomTPjvcyd8RJkusQtvufY
3OXV8tq64UvCJS+vGuY7oCb8DkwH812I30xut1pPV+1OuLZ/sxJcf6ptLi0n
z62XSetgZz/eHa6/7C5f13rLK71wPY6b3v79Rbu73O7thVdP0WDUX99xw7O7
1sXS4PNN//Pj4bG3frF6sntzEHjtm2Z/7+o1aC/fHX37dHN9VVuMLnrBt6fm
3qfX6eHR6v1g5fXL18RrfJ36veProHb3lH7tuSfnV5OvL6NXvzZqvo5rj97S
alB73O1OovNP197+5v2ng6utKN45vwwOd+6Od3tnSWdn60vQPtyKr9utl4PN
59V24/x16+x1fegOXlfPjl+uV0Zfbh79yfrxwUrQDJbv+qOdW3/9JTp5uf90
9+V5ZylcO3n6+vnMO+js7Ke7vfHK0dr61cFVN9nfqKVHG88HS/dnm5cn42/P
h4vHT59ugnj8ePftSxye3G/c9ton51+Gh9ebweq3xdVvE7PItOyNi0bT2h8W
maet5sFp69PeyW5n5fJ6D/53s3fWOlk93e1Mz/b2d0+/7U3PWndrp7unB2fX
F6tne9drZ9aWvq6l/53HdDRh0RcnR8Aev+3sNLpnvcbkqNnoHX1qnJ6HvcUv
l7eTxDtpLB7sXD0fXB21V3Yv9prNi+vGSXPyevDYuGv2Tm+ajZOTvdvTl3Z4
+dJZ3hzffblZdHcb47vlrfSkufplt7W3CIN9PWntLZ+2LqanSxF8dwREc/J6
Zr6bHO7uuSfN3kFj6XqvMZlcwv1j72DrW3u61ve+XEYnO2uP7eXFSa+3F+TH
1IAxNVaPmruTBv7+uRHBPC52m+2ls8tP6bT7dPPF/3QRbnz74k5HZwvNk7uj
2+Ss/bx5ft9a3237O93ncbK/eDNopgv348aV9/kquB0eRp+eO2v9093b69Ht
3vNJJ10Z7fYmp9fup6X0+mDv8vjg08t97/FkcHN5vHHV39k5PrvYuwgPjzqP
/eGX7n73w+vi7sKn9UZ6dbwWXK18aEaTrePdDx/C/Y31p8ODjfXTlS/B8frJ
6cJOb3Nwufjl9enp/ng5SI62Do46n3rJWWP9dXK85H9KusvpZXq22Z7G/aSx
cLi4cfh8//zlsLc63mr5A+/2dGM3Str+0cHxfXDw9Ol+4/lDb7r1NOj70fFt
92na2ozWFu8nR7eLZzsbncdwdHT/6cPky8v64uM4at88bbzuTTfOou7F+GJw
+3m8fvp46o87r8C6mslky7/zWtPjx/PW43mjd9JsNA4er3ebZyfNRdwvb7d3
cdtsto7d+NB7OnXXdr6dT4PPn67XltLNT7fh1m2r0UVaObw62TvYbdz23r72
hK69PNlrthq7jYvDhSIaxP2Gg7a8f/Y4/NActZ+f1rbii+bO4pf1aJQsTZqd
L4ebnUH4pXuwdLD17F9OjvcmV3537fD822qr1V/qLg863dXzzvPyy/7iYfvm
9NN+eHxz8+H88XKrsfOURh9elsLN1WDherXZ9L/dT+/GX5bvR3vtl43+zcL5
7WtvM+3cgDA6dx/XF6/dxsLourG5vtO9m3447jzdrZ5efh7ubtzHnZ1vj6+3
y/39g1M37A6X9/fi6euXxsrlyWl3/Si43Ujbn7buD1p73cbCbv8mvO/1F/zN
5c83Xzb27sOn5urJ485FPHncukhur06aaTO4Gy0uvFwGW53X3f3DwfUkvGtc
+/fe4W3r9sPlaPnTl42LSXfxbtp57U0fnw4a13v3ndXbkXcaXAwmd921gzV/
1D1LDw+CSfDp6sN4Iby6e3kGRri28aG3cvnhnbCHf7O2Wv2vi6HpoHdz3z69
XA0HyfXXRvt6897buO/fdId348lz7bK59PXu4vbwbmV9edTwvdpz7+rLzdLF
8PNkZ/x0sXy7m5wf3vZG5+O97srZV7cz/NTZCa5e+5101IzXbj8/PQZrQO93
X5b3n3dWXqfDg6e727XTYPCy/y387H6+Xl0bD5o3zWncaa/cpJvN5+dmo+/u
rt5NJ/f3n6ON4cnY6zx/Pfn6tbv4NW2udg+Tw0N/w+/fRu3b9FvjduPr6eX5
4tf9x+bq58nqefD8Kdzpn7902+PX1s7edefoLk76l5Pd9YP91d2v0bHnX66u
epPX1Um613s5P0ufLta+HB3E/Yudr0nvttNefuxv3H1xxzfXj+Nz/9t57ebp
88btcGt4f+lvrIGMW7m6fZ20VtxutNY8dle+3h3fut+eO6Pbyy/h1sXe7u0v
iSH35Ojz9Gs7vnhaCY+9xfPP3tYgnJEytddOa/q6uvG84nnTzsHGcbq3frHT
2Wu1k7dFyc5CC0SJf6tFyeH68vR2+mXj5vX1In+MdyYzoqT1tig5mqDYgKvW
Th6fFlmUnHyDz69nu/q7rCh5PflviJLPt82bQbJ0GPi3r63NZtp6Haykw/2b
D/fBxk68tnf4ZavfvPMewdR5aq6trD83P3lfbnbu4sbn9cvd+7uzyabn7jx9
WL1c6GxsjaZgOn7+dHywP11+OngZ3D1fnR0PH8PLfvfuNjruHn6+cy/77afl
z7ebX846o2jUehyuX+9fH35OX1+825XJwXO0t7Mfnfcfj5uDp+fH8d10bWka
b35b2FpofVg87G/6k463ka7vu/3UXTlptl82l/YWWpu3J4e9eLf34XM07Hze
+7C1Nd7YPzm6vASFdTzdP2ycR3dfeucfeunS2uFjf2X38HFn8Wpnc3N9+XJ3
0Om54/3G8Ydp8/71xT07TPve89rN1dnq1sbJwtrtRZy67eX7wf7GSziNH71P
7cPmuTf68Pi0l8bdrV56H5+NpoP7fb+71Lg4bStRcvEIO9/YJFGyN9lrLkwu
9k+AMhrdzcnhxd3uzeXiWbN5t7d/fuPtrV6dv4z7g7Pdm8WDs8753urF/cbr
6fikscqiiO8HFeJop7/bOG32np77T8HB1mQR9jHZbzTOdhrw83g57HeDT08L
V6PVreO95HKpPQjGNyfnW+G00776tvjNGy23osZ0cfe+2215i/ufnxYm0/10
2G4vXu+3dpfds97C7f2n493OhxXv7vH2Ymnt6up497K/fnyzunYG2uHuU9xZ
fj5+DC69qL98efQhuNh3n3bD5bPe+WnveXz8YWVv72jUbu42FsY30dndTvvp
+dOpe3qy4PdOF5Lll/v1o+eNMxBv8e2XBf9kee11snl+Enw4uV79vJx8Gj11
di8n0eet2+mm719dXR4d3IWjz2ery72FlYujrQ/NS3dtvPthK+kfrIcbr71v
jfMD0Bauv7iPO61+NJycbb4chaP1m+e7zaeVI/947y5qR58e1z6fdD/1zm6v
n4Zu1F+/b346DHei3svVl6MVODuvO6/Dw0b784fPXuvJXbjrLZ+4YCp4jd9/
z4mOCv71g/1OiHbJ+RsTRqm2IOF0xzAKw6DFTq4QdgswkBaZ/1nXADkPEbGQ
fQguw6yCQaafhH088Glg6YbegJGV08hz0bfLLsbdzBPPOT7wGewvFT7B6DI3
e/h52OKoK/Y23ZRE6paqHcYg30EmVgILQbdVK5TXP0Fgw9wN2aCNAipwscCf
Jkr3k48C7vpd7g6s4YxDwSOjqkr++oPz8Bv9P11Nrn59vVyN5e2ELwCT+ZfV
A5B8QJ1JWmOHai0Ia4LW8e85ZYFjxR3WQT7B2qj+ggtgTi/80nMW5sXdagdB
/gOXq3LAs8vV9jW+7XRV9xU4XSUsgi0syYOMzptiR6w4Sm1/rD2drE826++c
9XXO+jn/iz7O/5Z/U5yaeLRO3WGmnrfCCKAq9E3+q1LoJJPpYLCTkIalfRAi
P8H6ZxuvRCCAJNpEWFRYTSOIz5KzEAzFd0q1J52oF2L/ozaljD1R3I/jZnbB
92xxesIFiKZrh6D4IEgAR9UkfGxDP8zUmxNKVRnolJ3QgckBZjkyAfY5nRtA
2SNy7Pn5OrZm56DMS+fImcVlfAaMNRcH1XNrD89kX+tsWPpEim0xUyehYkDV
JIVmjA5TGCYH8Sg/jYuZhojYSo3qLGS1EsAkyqaamnr8c1VdrupI9CI/dNLp
AwMOqVM+b3ZXMW671UKiYsVFA+Iy0WSsmuFJix9qnEkJOoYKC9s8zWBw6OIf
rLVhVEX0xJbAFWUgAqpSg4tyT0BNuAoPcS9vdbKBSUzpEiotYmd6UtVkUafI
tCwQSkEaVXltDjWYGUoiHqbWmAYVGqEdm7BYwVKNeVI0FguB7Yr6dMkuVAk0
M7XVB0GUfRNa2WOE0KL2bD5GEaWVhIVabrf/eIB1/4qDNOkVZonlECthbekJ
hWepqqoaORsxg801dEfU2wbOmGfA6lRbIvNFtjWsRvRLgyGCqQxH85zkKDDI
lEYk+BkKlpRCRBq6cQzsATaAu8FRHo8P9JwGnUQ15ixpiXCGh1eAQ6UYE/EX
xsDrhgKAowAuKNrgxu0Alh9jGBh8oSQMJEZMwuCMMGuSFPMeMajAR1XTiEuk
GvoMRynzocLhcYgYcy3LMoBV+MXzuYMYMQ4qB8TgzQDe9QjnVYM4M+4B0bg5
6NS+j7FnFLaX1fbjjZ6JFqp7AdyUQqtR/TsKmxxyC1RUziz4G919Dph0AdK1
YC8wLy8CbkPCNQgVjdKEQE4sesVlM4Db8HQqh1TV69lmoAXS3oL0U7ms1qAz
CNFc8QgUniAwO+b57ZV2IaFFUQ2K32y9p97GKUoEH4JMEqatSpxn6q0lLyRT
N252XYVlqz9lNvmMV716Gtqdc/B0UbqCTC1jc7IifEWSgVCXnDvspqXLb40J
Q7XFmPWNOSkIGBEjjgcBYDwpcBf5UpVeYooedidFxiRZiTIyVaVZkDJsDzWb
pMnl3B7ntYxm10pTp4azsOGcNKBF2zbMsKXrOAy1rdja2/uYJXUNvMOKv+gn
xT1mFMc9R2wXAkJrTr8hkwQ1c98dD1KnBawmprzIuVFzvwUEi+3esS43B/+g
IAnUsg8xMZQaCyBW7ngQijms2tl8pOTxBOEmDDpKYj3VfigdbJsF+GkHe9f4
00iSYhQ5GfIoThvnN0hbIhvgJXvKVf7obG7o89jnwmaWk9KJuJARZEv0FWSH
aC8MdIztQTGUinrkX8CAEMp3X6LAswBlkqLSA8YNU5fYHFEXc+i5f6QyDSGK
kSKKHOCtvFxFgf2QyrMVNgTnslIRN4kFJ48CYXVC5n4ciaRBGnVnZmC5+msl
+HlBCzm+UuVlRY4sBkYttBoGo42ZFhjQ8MZKZY+yEQoZsMmI0CBi+RWvVvL9
VfjChVEcvOAw0XIZuYHkPSvLh3ri9N1BV8OPKo4CuoTBUxFtXm/vG8hlZM5b
3YY0WI/KV9APMephkm21NwDzCrWv3JhMb27kj7peilHBpBA/24O7XtoBxVS/
K6sw22baQm1mvTCIy1ZeJ8CpNKM4Sk2+N5qWOmvewFFoRkh34vtNcyElwjXs
ZJCKbmhaqmRBA2QogZ2Akyv2QUAqEjsupQo53/w4ogwOwtEU+ADByqoa2ATF
Z1XezZhbbZdA9Gn+oGD1zNkk5ARGiiN4iMG0rO8vApuplnGq7ZxpemTleitU
GWc0cFPUuEm4LhA2oiAmtnaaohqOyzvqiYPBZslq2EbQlwHGSGWb6h5FlUtD
aWuSrQxQJhwClZHNyhuTT7YnCIehtIXX3ZSoBTcoa3xhKXvGOV82WlfU08Uf
pWNCGGUdz5DGnkyvCnahlvjstcjBx1l4kpfCMucS6kVeg61Kalg9SLVbGVNc
tRgtBUa0Nl4hB4mjQAlpaYqnNA5kaAJ/Sx1IZOdrRj1RYth/BfIS/e8liKNQ
qvFAXcE0dVLp5CV5YnUV8o4NownXYpkMCWN4DjymakPXw3GdIUMNO6yoUFFg
ec0eCzrsylDDnEQbKTLPA1Vt2BPzDS261KRs7m4sD6Zwa14FJE54f2pfuIbD
HqpmuLrvuN1TZKZLdHbQiBvnJqpHMAGWzSyySM5Cw6K0ezPLA/JdZ/t7oyFs
w0QaaFnEjNK6ESGPorKovIQcJyEPixBGhfp2IzwmJkhXucOG+oD4nOqY152G
QusS1P0qq/QCXFfJ1g4FuqUo1+jo0b9l46VRRZqIKBdBKADdpLvUnRMq6FMt
XVSnFpWRxw3bYG8KsWAd4MDkusj26fMilLAG4lwg1RhYqFLSCYK2BMsoMqwh
Ke2iXkGZo6FOU6tYoGgdgFZuRVnvc5MY591sszsgnHdSViUdIfGxqpEJVzZV
ZM5ID1INWQIsr3Vq1v40zwrC0TitED0ACdBJQxhv6huk1owHNfBBhxOU32xj
Vj4wlaJ+fTJsIcb4LTswUSiNFWoAiXIaCRL2MxiOhxgFlB7qAqDvAc+IpgyR
aPUVtB1hamSzWKts6WuUXZvQpRMekCCQO50K8ZRVNI7y4vIq9g5718hca5CT
Ob+az0tK4b2KqFtsv1gcMlccQeCUDip+1jXGZ1MRNDTVQcmYgIa35p5me3zY
vIDjUFGO84RpwPhckT/y4mj7UE0vSLJzqr8TDRWvafA1CimKTDRBKkX3duxO
MnIhZmd/RTvBGGJrhIm9MQ6+7hylBjSZEEmjKLUfy8o6q2VuxfqBNDyb4koh
jnXxSzXnjebgQWXCjrlZslZrSs4EPlE2OZKXhMhJk7NEs7i2USOAFTxbAtKW
4aiAne3Ob+R5wuMe+/mCYFg0j/lQqcdRGEjOF6FPdUZHNJpXpw8aCXa3msF+
rwry+4IqYM7+iD4mbjFGcLyJgjoOVchHNVFkk8cY2wmLMruLsAWFRn3/tGCf
C+p+HQ82eSHRf92LEQUP54l+Whi3S1aLYE2KKhyOh22mkhIn37zRbNsZEHn3
baQAzAKYAf4j4W2Q+01vDVMdqzUUDVLPV5B+yXN9X/BSkux4xLl4lhQY1RJR
22sI1U4wyuy3yLQWL+kjoBoPcelIYrx/fRcMRuUQn1d91Q0cHg+EdTGk/Hbs
u08l/aczLghndtl0Y0UNxGjhM1KUFzVjM+aAzH+sxRyoWuNSlPNUChszXaqI
e2gleTgmW8QatKpL28fm9QRG0MiQrYVzuu1EYWHTrZxcpobjPuPolkBDUsGn
LDQiFUceBXyr0s2eMzqwitqb8YDIGCz4Ue09soFxZwWl4VKFDYOl5RQhCoDK
xt4ncZRlLE2eGsbdGZLRyCs1Jg0ZWwKGqpV+hW5tlWdKqY/eH8UeuQQJZviU
H9C2yQzI4ZFmYnKJLwoFBbvtflTCLgTwFbgDqWYzOKX88NCyQMhpIuW/hJ5D
7fX+AvqBMfmGPp6yIBlqTX5q3ITFIR3FwKhpIyK42jSR9xXSUR3HRIX6CdIq
QRVmIsiP6m6rPQXGJ/grgK+8cswXTHM+CR6rrciTdKVSKz/XKt5jImcY+EWH
EqqTCTYwL7TUMrweTHSJO6B6Tb1tkmhgrBBDJflFlh1QbkD7VSL7uFEjnLhp
4A88Q2Hs262ryVGVrRTmaYJjppR1oqmh2MdKBtPDSjHGxheBj9pUZjEsRAbl
HDUHjwZTokIpPA7MZzEH1DRmM/XMOINiH2XCkVaVmJK89T70dxrbbjDV6oAa
LtMh+hgHQc4yUIEiIUSpSFWEfGBWCS9qgrKJWzYaESmXemLRBk5svcSsdpXp
nqrNVKydCh890sAEwCPqsKcZV2ocS7dDFWjJ7KMgsmvxhJEvbhiQxameAaVi
erFdFkPdxWVG2eHGqTHjfiihT+E4eT+a4eJ8L8YvFkUXb2HwEFQPyW2qmzYb
UZmCqdkluYXNmim1YfwKm+iWRBMwF9DaKrOe6liYEJTpxZ7xBOEK5exXZeeW
Nm8RMtcVgPDYIZHpwczZ0j2w2JUCJBGMyaoc+qhoWqAkBBJN2m1W9yi1j6vS
AzAaWhypgBWR7akW0Tr9JU1DMrMwjcCD8AWzxjKuZZWjkBfulEzAJa6E5q9Q
ZA59HdHNBFpVEIyCzG/ASFmD9xXiO4xXg+9rH7Xa7SD2atz4UDmspaWRBgov
3F/rPeJGoUOVCxAqMiV8EQLqhy0IBM3qRndDKZnP998MENYP9jnn2xFYExKI
8ESfbvLTYAvZpTqNqSTekwUhmhPHb3EGYLWyzM/Sti9mG6lHmE4QbFilkqkI
t63UJdLFyUq5mJJgpquBl6QLcTNiE3uQ2GQJJDr3rDTrpNrQJDY8/FEWgqJq
jCeVYCGhvBYJOneaFSWc8eFm8MrY2s+ctJmuhDrNi6g5l7OmiF+a/MnxtmwA
YYCCt+dOVZNW3c+p1oH/V82R1QoYd6bAiGBuHHJPQ0DU1INCYm4qR1rVNMtC
UdoyHN2un4q7B41DxETLxFEIgkSBbYgzXud9IBF2kItpLYvF/ktkwl123wyM
KIpFZNEp2JIiK7hNSybXUYChXCeLh1YtyU9V66fVST0RyW4X9LLYfxTdWxvB
5IzglUOLqucK5o+lxVA5uCJtu9GqBO862OFGnTkMORVvjAe755FpmzwFIxor
gpaJkqltfhuBIyN5yzhZcTdKrRPqbh/YwYY8L3pYmN+lu64goBRY636oosd2
TzHJVMHdMPvMskl+on7g8XhU3KdKNbFDLRt4LCIx+P4oYwqSLTxAZmT7ct8Q
jYyzaPk2CAy+FGGwWqCS31hrPQPnyFA95PrOgdcp55R0tEGGqwOEnPdU1JbG
Ajq02M0gaMeuMSrLAqUscEzyMnWNy091nzy6rLkqHNOf5d3lu8s2zy6dM24V
oxDF8eq9kGwPHPEcOakICvNqj1oLtihIEUlPWHoE/gz//vjBPXFh1T2/FnW7
cArTCbawSVxgQVPq/2T7LNBMGaITR5Z6m908M1PtkzNuHAZgnJuOi+SWwkgs
Y3pZkCNkBHBTGW0u5ExtdCEr5M4aIXc6qg+d1rZeU+2JsHFof9JdHEcw8GuZ
5pNKxLrOA17zFW9felCORxv3QuxjjWKWl0XWKbYBQxXnkHY+LPuop1VBszuS
CQVZqOUxG8PbKNeH0fyMmczysUPJgRqmydIqi4YQzPqiijO3s0cI961QKtDA
bNFggE5mXr5NBqhxgAKd+INt5wG2ZNtpJNPh0EepV+S9zQS1TQyqqJsug/Ag
O+mh7MlAl9RW1h7om72d3asG60ZXhw0sAEJbynf+RbTUME5jpV7/e+63o8Zp
o47lVPMfta5sJtFq7iJmpY9Zyy66wR5WtmhiKOjmyppNCKgmIqBiEqOKkOOk
Yp6KLsXKTEQhYMoXMKzhA46KCkDeHNMyjsmsIgg2Uk7zDeczL8cnq8IFxvtT
b1jBp1HFT013C8u3JHxjGnY5WDLyXhndBd5WJGwx8vP23Gg0OsXfOglWxrvK
xxe9qthdhRPG9he4deqFq/hw/lIWpz1FrS7mTtkNS+Ut6pRLwLFuLNBC5pQU
HFI6Jyb+8taMaVCNOHan7A9TsNDKLwJ3RhMJP0v3IlsfkNot7h+oSzGKnNVj
ZG5cwFVsSzDW9s7u7jHJJfgX5BK2oU51XzwtWE31Iy4krwXOmrrJdDxvwD3q
v+obfncM//7aoua8lcrMV3DZb+v1pc0588u8fRn8jsX0Zr23Hewj6dQ7bSDK
c/X110PaBqzZszdn27k2n6xrFJXzw/Abw7/4u8q/qV/21yMk4N8J5+EfKjHB
j7+2sTBwjGmldclomvtf6OGcr/KFyjn+NYzkQvlBqTtf0+TtJ4TR15j8yXBZ
OB4M8Ou/OeiHc37/A53oWEH80UEOPysxJBLKlVrVotzqLqZmT4saXePaVz6a
oKjb6ZChIVYT8gbMdk+KxIVBbC04IvVKfrtkYZdwRoH0CTD/fbSDWKbVj+Os
4PW0ErnrbX4H163ide2C65gjVPBPOKBV5xhPq7TmUkcV37O1VPSmjwrhmLkx
XbhcfCGydvqdhqzpSf9exjJxb2cpV5br7UH/A95GE//XB8UysNicuwVQkIL5
TaVSouj+pf7rEtGx+baCvs+V9MAVSY6NWqkWxD4FAXhbszoFCcxx6Y+sX1rJ
xj5xw4fFh6ytYSXi2ECgzq1PqYT0SBoTJ8HayMNcii/uEO3H7qoWnqpftQo+
f8zk9lczKQwYrzfR7dZVVd/F1abSJQ52nOIWKj5j0jgtE2WH6sClZqEGhPbV
HIhtypCxQLfLs+sE1ZmUZ3xi3dZWJXs61QjPibgZDMBecYhNovNCLJeYmaK5
6Uf2AREacKJxnk0eVWAFFF1Jo7WnbKx1Uq/U5tvKq8h8KUDM699voaOz10QK
bRk1PlNcx6lplD0dYHxEerTZJDxj8BYnK1gZBbg+RO24a0xuiv5yFZMySU83
7GV7AQ6MeKge5EYgfwqc5foSJimfv7q8TEhEwGnlZXOD4Mm3LAxe9vm/MIgM
MZYOJbbGckXEZu9htt+CpTrKKK08pEyeJpecqwxBqxEsKalULDqbWqQYAx8B
GNAV9j3M9LDAk5BoOlACjDWiB/RBPuj1Q+SF5ZL1IqccbrFxUSoJPSd7V1Xb
AqsyU/jGEsE8fOjG2HRQOUGl5A7utH2lM/OlyKtSoc3SidvNxCdNjnqgYs5Z
dpLRHFuFr8lqiSruS8W3uBcmmQ4GTa4KLifG7Sgq7UaCs8pxtKqp6Op3QVrS
kkMULSfPIlNR8xyuj9iWt/GZRPlG4g2VPlCpjCwrtMUzRxyEcwq3f6WEvEyB
eP7ZJcrPytZisfqDgp75g5rtDc+Sblot1oEs7aRQDMyp9LF5URXWRDHR+8gK
ysfSI6lyI+fU6QB1Ha/nspYy7UGWj66k2Cli8Fq+gip/xlQ1eZ61C7qMlp5u
HrUsag4ZW//OLsKOChSYy/9RphBqjdCeFC0PqW1kjHxZW9yyrv9Sx8+UwWff
RCr5brbVTuaQ4ApWuTKO8lZMef5VZWYXcmYH//IVD9QbpkPeRiC9780WMzPp
kzoX1m6CpBIfr5pnJ1RXNKD4etJxKYcRI4yS/Q8fhV6IFdAuqm7JyhGHDGsi
eAXUv4DSHgqSwxu62tHqUyOsi8KPyTjQNWfYaonq1Nnt6efiSwqw3OF4o656
oHKJKe9mVV2lq6x14FMXSWjoFZhFxjlSVUwY5Tvi5Nauzne/wN/o8lV/X92C
6QFfReqPaWcQhT79FoS1NEojvOr4qlGpnKnYUMZ7qufnWZlJ4gw1fp0FCYPX
eGGqVm8g0aK6GG8QhmZ5W5QaU2acKA6gIB/2lc2nvVOg/qPAw7zoqqoLsp6P
1zOWg5bcXAlh1XXOUKuGAsnAfWQzL2xfLCu8mSxeu6uUpBfPtMQp9ld3Y7Ln
MbYnoTmNcT0DsmOFrSMFkqXrqKzAolYACrrekJ5h+RAeFDwVXPg1TR4yIBhM
JdL/Jg/jIn29/Mz+kz7BpZJZ3pozoezuxqGdkI7JRoYIZ1ZsLtW6beoykPqM
44fwtED1SALRWbh/gzggeHl1MnamEbKrgF0kYEDxhPwY5uti7b7Rj47VJ7I9
CsmN1Dm7/bpFd4Ft2xUHplp2DVNJNmmSLdfJW8hw70jyHHaKcrgUolKS2zmj
b+IyCi7IOCR8NeMzzOUI1GdKQ3Qtfb4M3STYc8AX9iWU6KjqII/5FJkXdK0x
lxipbLFl8+dEiuZCz4pHvdF3KHMYlBlZmPzxVopippRflhvXU/Qow7DUTsob
MpU3ZE5T6AlThtRAkHwQ9F91xnGoaoZDRa4EzyXRPUytyeORX6mbuZWFyN0c
UEjWLK3aRf8FwRuKJdmmulXCaE3LarOyao3JjkK1rNWhHVYprnlYMRGedJxn
AxKyg7MqebbVQeZt+QxJy2cx+wZRIKQGkqvOK2t1p0HaQYE03OZ67IwkK8eC
UlI3N3tdz3GZ1xPzmD85pMUMbQtCS1+K4rIb3yL9aKk0o0/6SOnYdq5O0Qq8
khhQo2L2zBnz1iJMdXSYaiA4ZKP1XI1KsENgSEUxeDr9KtWYk8JoYoW515ou
kMXEdq6R4nwo52y1RabiewWqjwaZGmlossp6nfpmgKifU2xwnu4L/Umh0Wpn
+FUqG3W6SM4/6bqWZ0RM+IGLKdCTiBm+YthJ3yWOK5kBrtMmr0sJUEhxVXtp
hb8AFXEFqsjVn1RlSDog8CisbJF0WJ3OpSAduCxDaT5tF6hxnM1oQQAa/YzZ
1CSumSAdIowmxf6H+dl57kQhqlT+YJoVrcytawysOFP6bHLv+cjn0FrcLktv
ypolAUyBExV9f7NxqORCmpSWjFGe5hQRK8VGF39YXvWcZqYUSpWhgURk5WdY
eTRWDGUGOMpKwvyRhQCayamj3DVkLXY1umCqvCiNKNcGVnqS6ttKK3nwzbot
tUq6V3XoysrB4gnlh/9L2ZVHXb6JlBR8is7RTKyX5EZh99aTfr3ak17iE8ud
FiKAI0nkTkCGu3EQJbnXuAOMqE0l65Ri7mrhRcgi36AMgdl06MwaciNFbEZG
jhh0t0t5DW4SsmKGeEEmzjXluliHoXRBFx9xJzVbeBtrRswTrtpzczAB2IeH
jfJMW9H3iaVbmMANJvprcYxu2jmT8qkUKzen8qk6ySmcwGCgXqNVOBE3kso0
IFIJTCdJ2hrsjunNV+Un4FMyIi7spdiEOTceUsob2IlFCTiz+Y3IfEx+o5o3
sCMW2AUwYSVobAqahlzcCsaABx6Up0AKkqCwkWpuYJLkq7EH88m+eLxcaZ2Y
URItdDrjcqdjjimkhEupH4A7RqZmwmnbNNc3gC1zScK6RXNeXcu0Y0avFS2u
LsgqoVt21XGRCtkZmLaLYtbwNBiPilXJ2WFoB7TmyctVutj6Vspy8oIEpkvF
YXCAFa8WVp9GI0T7SSTpk3FkMdA2TtgpQIlNLLM2tgx6dA844biNqUMLhBQ9
6dWSTpCmNno0fVGz0/AW6EHJwsbWfKVyImZrNWvc1hRoT8nckFFQBIHLVzI5
97YDLanqKldWkrSOyNl+VcfOqtJMVVi49FWX3LwcMOybBreW2dpo5UIGPwtJ
hG8w1msU94CBfJN4LakvXkSMhI8W8gA3JI6qQK841ELlIPnComJXAuXjmleW
ZAFTNqfy5oEZjax6NI4JRrIkLlQ3A5IYJY+KU4OoO7ZaMFNvGb0xUBmFOtoc
i1ZzU67DDBdA92tb518GmS73FM4uRaJ80SUi2fsE8ErFUoK4eOYZwqi4TIEB
CZzC1+EimVJRBbhSzWI4GGWQoHeQN4Pe4hUq3IR2DrKbclmlAOOtl0t5q0UI
+OjiNOSK7iSqR2rw7OQsKS1BwcLwekuduCVF7XolrPtJjBZvaJfFkILHLIJo
KYaSdRrnR6TkKmQqzjhVWKTiegypyeJhq3XuHOy1kOOen5Fy9TyWEsejNxIX
pMRbUpZx88gR9j5RD6jqToOmFTK9bPX1FV+2Bv+gVBhz6Z4RKe3Im1qgSdLZ
Dl4E6sPQ6L2SlUxgJxubixuY9iI2JKwdhfLR3b7tNJzryyPH4NiL22uqTpA8
Od8B3hSxSfEbqQp+HEcccbZSWEwpr0p61u5b6sfIZg0bvOzRok6TFJGXSBF+
e315SmYurDU52Ladd7Bu2yg8tglsLtkmGbJNg9h+R3VmvB44y/4YtK4a6q2k
aHE2ZT5aQrcyRx0B5XFdU+kmU0jAykpXjhHeXs8nrYm4o4UyziOy6u2s9woq
eIdR4GECe/S9WmEb+JUIVMdRHnYkatKiPbWTXWX/pP8nkZjucdGgBGYDjjRu
g4YmqIkzRqJKmhqHkp2SqXMxBhsDWCmqdh5WFxedpouygFbmwSZrTdXGeYz0
zQmapoeiakr71n63Xe9KjUZnVXM7BF5yfEAro5NZaOs6I8wGRiQ5jxpO5Cuw
eJr4OxWgPEFUEtk7ij4S61BMTqSWylYWymAJFPs648BA/EvwiaUTo1RLWi1Z
yijW/VeEtbJykN4N3QHDR72zRqJRlyUEYYWoitkV7RlxLFfhSec5FuI/uHRK
UR7w1cTop4oOrTNPDIapF/d523nQ43xw5lrmoFivRrhffLuHURAOHGiKp963
zhqQEi7f2uIKU7JNSuaUUM2l8XwEAwrSKc8aUKakRku5Po9DqX8MyaGKzU1N
kkca+mmk4jlBtuG8S4NSY3jDn2onEcHpuMTR1KjVu87OYdY3opx9ZN/LK0tY
eWN17Na0pLG1KAqgjG2pnIcLJ26QGtkJr8rxKbK0yJ3YTjLIHPZQZvi5Pg9E
6lMzjAyEnh/PMBENOUEvp1NeIbH69yau4/Xl8R8LPpcJ8wk7tPLU32ByWCvx
UKk0kXdICM9KxhbJbhqR0x5hBFIHajT/oTddMVktLy45uQIBtH3GhD7QHQ/q
wFxqjuTFPBxLHd12wWQW/r5H7sGj3T8eMjeVT4nrE/BanJXz8N15Ry7GI+r9
pp/37g/nx0NmzMsFYxYcy18YMFscyHoW/n6m/v7Pxj13pjJM5LbtDLnDa4HL
RaBO/pGbpx6DzDUzjndV5x0fe/xNJvYuuwgocnKLgLweJZfaO8cbcxeZkEEa
ycrn9TFsy3kolCo83FZzd5tddL6+IREZrvszkUH829LGf8sWXtqYJ8UTt9lC
ACJ+E8q518nGdPjHoM0NsmtBq0DeAWyIAPyRDcwRnIEcWrZcz6tqIm/2hhgU
IkuQ4fmqax4uwxHfetTmmIwpFUXNkAGAibNm3o3pdnq8mr3goXqxx8EbX8Re
UHn/FfquSKr5X+QQM4RmThsl7tUM7f/8zPz1U6POzfZ/5+AUzGfi2iwvP6e/
wPT+g7X4j2amqQW/LmKZf/x80nwoMoP+vzpmfh8NGHkJfPXdaL1/xz/oBqPI
/p3/xKngZPjVGX2rlHPhlf9qne2e/fv/J/ZlselVGMt1yC5+e3mKJqSXE3Sw
/WgcemoyLU7UR14xoo73ducKYVLIRvzXUWBg2gjvkTDX2JTHWIK+g/dDuCqv
j7KsjQmGaDCeRhJ8ywxXDaxkdyXdvOC9MFJqNcYySWqKA0vjMjFH8uyGUzHa
zDPmq1bXGA5NkCXmBxRhcWnVyRvzIDxAWWQmLUdp+trtEzCQkIrpklkziejx
SnNXWH8cbifbeUwGsIVIxmAWeS7+K0pijovPchhm3xfUo8JAzxOvtjjqA+2Z
CJ7f03jsP2g/znP23qJrncCkwApxFGb92dh82VxHHS7OsBvtu1QUZedrz9ak
1f8TOWXrfm8yYNalDSszivTM0eXVRwro4oHMq0/wGuK/5sBmN75oDf6jzV+Q
GqX/VIb/+tq0o9heGy4eVUP/P14dtot5dUywSgIDeeLI0pNl7mg7TS4sJKDK
b845duYAy3QnE5XHEr4B+Sy9FwTkTVT2XDFuPEEw5jJ02VgvAM1IHSvSPBdj
EEdFIYYlSQbz5Fon2OEZRMyZN7zX8Tg292ezpWSExEqpRJqBL7lFSS6+Nxog
Zqn/KkgkCsM3v1xnui9A1YoPlOEgaU6u8VhU/klidaqMDRqYG9s1LtNarfbI
cV83tWKrJM/El6V6yYzk5VZIvgOEBqtfy1xZiFxZV2xRB/1pEHaCoMIyxXXz
xWuqs3XfF5TGoCopxXzGY5RJCDMYiCa0nmsMmGmT5ySu9miYFp4JyFfTMgFv
DgnlngNTb86smMj1PO20WmvWhUJghB0z3vAel6P8uAyIQnuKSelBYnXBNKlD
s+f0jZh60etyWR3W2YChj4dWmqgNYlmE15RNSqIyO8klte/kyJiqJce0g2AY
wElWuU+0e1kyUpkeffSIuR2iX92rhxpiFEO16WMWma4dOpIGRx5UpqAn+U3o
YOdWsvjRVIvquHhohZlK3ifCnuLHpEIPg2QAvJZmHpueYJnjK6dQJw0rXCuT
DmKhUqYMWJhLu7cz4QoTDtTuBLPOOJUIxSUYlLkeusN20BvDQLPwGSgAsOUW
pc9ZYJioR6o7NEaRrsFnJTJTWWC6hBaeGTeRnhk6lMl5Qfro6vnjcN9sATTT
GU9WQTH7TO9dxhPCnmK8y/Rl2yfUDJ0uipJCYttIWZmstBkMISvF+CiUvCaK
vQrqVo086eiTovcynjK9VgPwcAdfjbAuXkyzvBriVUyQ0OKlJhw9G8mRJpt9
ktInoIkMWPPQeoPJ5HN6fugjUE7KVw/xaq53Rs2nasfPBDEt8BBoW0HfKYTn
wJfOXCpoSyiTHYJ3nNOdrBTif6LLS0owi6qZjkbzmpARsIyEp4ar0wkQNHIy
WHzf06E26Z8aKd7ChKciOJkMEVXbwZtZ1jG5MYtWa88AmR65p4EMh24cGPzb
xGQcFjBZU0FBsIiEU9jNVjA5c9kqCwGCVRcVF1bauKoM/QUTtKHisLpOteil
loXMFqht4wtVgAQRJwRgBKJqYvke2JAerZN0gQhRVST2RsJFBB3Rg32oyzu0
MH8Ue1N2W6+nzqwEKx95LUromWwYBWdFoJ9GIpm+RwZ4UukfI8666mO8M64N
gheqZM7gNoMySyYyQjgKXKprpCqHQ8cJG8O6wUyZfhjFQY86kWLSBO5dtnti
1dagKTrFvxbvLsNZmrbiIqjV2EBH4/SzbF+gkdRv425MtErAqg9VeWiWZGD9
ylDuGvLkXLqVPvqy8/MWJn6SRqOR7+noujfuFNZBOaarQRfWnugKOQ1GTY3M
m7EA5sQR0kYlICGMVm5+KhTFLhQB004MbSIJD11UHywtpD1lCWwwmouF7AyK
Z3YP7T5rJRC/lqrEXJILreKIgaeZ6xZgPDJizsKbaI5Si0bnCI4sip1ehIX6
55wDkbdn8ikQdlJOSSWG5KcNfZ9NHUp4LMwPU10wcpnvGnOZvWAzIPeIG206
NjjHUU8l1yrPFAtihAzHsoXydEHUNqOctilpClN1AW6jqHtttiFFFjnSCBoh
kBTypsGUV+CaoSTuJ6lvYdqa2DLpRrQdjaxKIUqtLuNSmbQqTTGTpVg0xW0r
lUvOIPsIuYDr1xL+7P22c+lm9x5+Iwcop0KoBEGVDXck8NEkUKtls9baiOgi
1bLuElm2LAElLsN8ofOBZbgESarO9Bt4pHW061F0gDGgAuCcsKNUVFk+yiFP
lQbtBQkrxMjjTSdguXbSV3TNdOgFHWqiW9RmzdoLLdvmLLRspfxoVWle0G8n
2FOHXeqgBr5HUlEQr+9pVmSWEQ9UcyMhGNgtINJssZ87JM1T7SLQ91hKOvBI
Wh4yrTsJ/imn5usi2eItziQ+24od62oiF6xkWx49L+qMVyiJSKCTSqwoXHrP
sDKq+gYYBWDGFjC9VcMusguDCcU8AIf0roue4neWrRqVdpy0EIIynJFwiniG
TBdkjPLpUl7eRpatcdCgtBdOH2g2ScU5XaZkGMnpavvP5M/matqt+vMyH4cF
eDLjzkCnjy7zyhRjY5aPVf30NuQwsiksKEajLqF1An3enc4GqwvTXrGsNy5L
SsmKKJxS6YSkgUJxbly2MDkQH6TV4tt+DXsKGYmdt97iZJl6r59IVCqusxFn
UIBiVausVLYrTr4VBXxtGInW3bl8AksN8NgP4GtMyWqEWsr1SM0AZYoOHkZW
zGtcS+BJmErlEQe6ichobIm+xHg+xOnBAhRGXDXMdarjYpmdmVuep9KYME/I
GsLLvHtuZb6aQ6YuPa7sb2kx308kg2xqOQ3pfLDnEJty+a7YGgQ5klEH5par
K/N6jvRuXc1eou7tjhW7NZE97F/VR8UDu4NhOwpha3yOe4OonY+35TSiauUN
48rONVeVOjaSHDd8J3AajJRREZsd/qrkGRv5pY2mW9WdW0ZSQhwkTzgNdrPI
qnRlK9UUKtmzrU0OW6qViw9dZADnk8Ch5paqq/Ok3FuhS0V0Ktm9qGEVuxs1
S85BT2e47Ew089RH3f5J4VZfybHSjn1f2r2Sk8l6MplPkj9v12+Yo0YtAdv+
FMPBEylfnnEYl5hmmRoVFvfaKCmtB1CJizRevIlayHHhEIW8cebNsxPbf0/E
xPmWSg0wyASwvzhablyCmlQI3KQWdWtWtWNpq5dKg+W7htez3fMKkV6UTgEx
yGBdzchiYsRVBWeowjnStMVT+48RoG4gNr9SmEYcTKNB4ZvIIoycez+OpL3m
OejLnYD6bqvCLxVpckHRIRrhnrwvKiaB7issTdDBIP9V9eTT5dW8BByYliAf
J2pJxZPdWNWjln4hAnAK/28dX9F5oLo0clKIrqvOB7yRdlwNEI5ilxE63MFU
tU4pcISJh3amFuaNRkyBaZViBc2zS126f6YNSTfKvrHO1Y1vcD2MLgIZcyhz
NpivfAmDqJeQxLTKIPgXEGiJPyS3jepQpSmcEMb4ReT5l3QMu7ZJpe2puoOE
+QjtszXF/MSqyuLoDCLJ2c7pinJOjYz/pQXOtmyrNHLSuwBuBeeFxAJC8CkT
RTUwfXZ3I1bfi9AAbICkN6TjKchZ+BnDXwaISAFVaL+/1TKI+JZCS5UIwII9
9Zl+WrbvKM8tg+wbpbvJOXwlgB0KdZ1kyJENP3d+dEQR7Q4sFRxy7EAgbDox
7vnGgBp0Yi0AKsY2+phmwCMXWyVkTd7EKLy64ysyaF+f0guR3DN4D61iUlCS
vhyqh4mQTHOaeia07eUWjqu9o26XelMXwK6UNdtQe1Yts3xwbYZRSDoXix4h
5JJ4HQpfVjx0CIVcWYMoehqzz1eH1pAWunAq+6hCKBGQWfgGerRHkg/A9m3s
D0RF0sVOuc1SERKKOIgBmnRA60RDf+96v7Zz0tjOtPYE87RqQYvkW1CDUDGt
cCW2qIraqoKB4naeOKjKaSkx6iHizzC1PCralYk7mb5ymnXp0QJnJCZBIMW1
WIv07PA7hEdCPFVRpytwizXCUUQ0StJFuO2nbgiCj6c7JDYsbnQw1bBoJ9M4
vAgNROwAeEp9nim9wMtkojCZXXJ70reELGGWtdoTbvpjGB+Y7thrVZurdSId
gziwNizYoYSPgDeSD5crVxQ8AXt4CXJBNYqoWuY7YVKC2ZbWnsdw4sbDwn7E
QrOFB0dytGFdlC8xI40ku3D2TOaF0RsswkRFLBKU/iX+cCQdohTkWFgkgjkh
gjPHyZRgMijHjGY7g1Z2aBm2urSY8F1tFxXlKVi1yRTCpxyBt/Kf+GW6cVbs
czOtwGjpytdUXA0d6EDikXicmEC1/8kCD7MSE4wcR+ta+Wdm4lgCNmw85MIx
NI3U8lBZMJq5YkWJlopj8VYHGtGq1XBr1nC16ZRVmDLdBbmWweRX2LE0aYMo
9l7PJ6VEh3VLvcWMTGAFQujgWsFTem5hgxm7FJA9B3o0KilHZVplNZUS2lB9
CPu+NfK6tBRHcKEMnl1K/hyspireAESyMeOx2rMxKMTIyrPguCGdgOKQjD1T
u7VbJpRZphOQJ0bRJ8vLXwIWyoYJbXek3bdL8BW115hy77AfzkzeXau5+9H5
/n04xYpRQu6BY4RFwlfjds0UCutkBWeusHwUaRAfH+hCRz5WmiOlUnucZB77
UPiwh4poc++O9lr7JaO5NMSD6MoRSE7nXKcdm449ybuK9qR9/049gfhdP35U
rYJZfB3y0QGnMHLN4Mra2sqPH1xHi2ny+kE4lG3HodEiZLFzJVxayjicf8Hd
SP3/rvB9wDtRqwIR6GANwPbCwmQyqQdg/9VBfVgA7gObTmS1YB56BFb4K4Ou
w32nEUs1oweHUs5D+bq1Wo0Atyr/G0LOfBDNFQEA

-->

</rfc>
