<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-05"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization>DataTrails</organization>
      <address>
        <postal>
          <city>Seattle</city>
          <region>WA</region>
          <code>98199</code>
          <country>United States</country>
        </postal>
        <email>steve.lasker@datatrails.ai</email>
      </address>
    </author>
    <date year="2024" month="February" day="10"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 137?>

<t>Traceability of physical and digital Artifacts in supply chains is a long-standing, but increasingly serious security concern.
The rise in popularity of verifiable data structures as a mechanism to make actors more accountable for breaching their compliance promises has found some successful applications to specific use cases (such as the supply chain for digital certificates), but lacks a generic and scalable architecture that can address a wider range of use cases.</t>
      <t>This document defines a generic, interoperable and scalable architecture to enable transparency across any supply chain with minimum adoption barriers.
It provides flexibility, enabling interoperability across different implementations of Transparency Services with various auditing and compliance requirements.
Issuers can register their Signed Statements on any Transparency Service, with the guarantee that all Consumers will be able to verify them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 146?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document describes the scalable, flexible, and decentralized SCITT architecture.
Its goal is to enhance auditability and accountability across supply chains.</t>
      <t>In supply chains, artifacts travel down the chain until they are eventually consumed by someone.
Consumers like to have information about the artifacts that they consume.
There are many parties who publish information about artifacts:
For example, the original manufacturer may provide information about the state of the artifact when it left the factory.
The shipping company may add information about the transport environment of the artifact.
Compliance auditors may provide information about their compliance assessment of the artifact.
Security companies may publish vulnerability information about an artifact.
Consumers may even publish the fact that they consume an artifact.</t>
      <t>SCITT provides a way for consumers to obtain this information in a way that is "transparent", that is, parties cannot lie about the information that they publish without it being detected.
SCITT achieves this by having producers publish information in a Transparency Service, where consumers (also called Verifiers) can check the information.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t><strong>Editor's Note:</strong>: <em>The label "394" is expected to be reserved by this document, in the COSE Header Parameters Registry.</em></t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="RFC9052"/>.</t>
      <dl>
        <dt>Append-only Log (Ledger):</dt>
        <dd>
          <t>the verifiable append-only data structure that stores Signed Statements in a Transparency Service, often referred to by the synonym, Ledger.
SCITT supports multiple Ledger and Receipt formats to accommodate different Transparency Service implementations, and the proof types associated with different types of Append-only Logs.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements issued by a Transparency Service.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where it is possible for a Transparency Service to provide different views of its Append-only log to Verifiers about the same Artifact <xref target="EQUIVOCATION"/>.</t>
        </dd>
        <dt>Feed:</dt>
        <dd>
          <t>A collection of Receipts, as recorded by the Transparency Service, based on filtering of properties from the envelope including, but not limited to the <tt>sub</tt> field of the <tt>CWT_Claims</tt>.
Verifiers may use the Feed to ensure completeness and Non-equivocation in supply chain evidence by identifying all Transparent Statements linked to the Artifact they are evaluating.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>organizations, stakeholders, and users involved in creating or attesting to supply chain artifacts, releasing authentic Statements to a definable set of peers.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an auditor, reviewer or an endorser.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where it is impossible for a Transparency Service to provide different views of its append-only log to Verifiers about the same Artifact.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information. However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Verifiers.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a Receipt is a cryptographic proof that a Signed Statement is recorded in the Append-only Log.
Receipts are based on Signed Inclusion Proofs as described in COSE Signed Merkle Tree Proofs <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.
Receipts can be built on different verifiable data structures, not just binary merkle trees.
Receipts consist of Transparency Service-specific inclusion proofs, a signature by the Transparency Service of the state of the Append-only Log, and additional metadata (contained in the signature's protected headers) to assist in auditing.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Append-only Log, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version,  or any content an Issuer wishes to publish about an Artifact.
The additional Statements about an Artifact are correlated by the Subject defined in the <xref target="CWT_CLAIMS"/> protected header.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>This term has the same definition as in RFC8392, which relies on the definition in RFC7519.
The <tt>sub</tt> (subject) claim identifies the principal that is the subject of the CWT.
The claims in a CWT are normally statements about the subject.
In SCITT, <tt>sub</tt> identifies the entity about which statements, and receipts are made.
The subject value <bcp14>MUST</bcp14> either be scoped to be locally unique in the context of the Issuer or be globally unique.
The processing of this claim is generally application specific.
The <tt>sub</tt> value is a case-sensitive string containing a StringOrURI value.
Issuer's use <tt>sub</tt> to identify the entity about which they are making Signed Statements.
Transparency Services use <tt>sub</tt> to identify the entity about which they are issuing a Receipt.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Append-only Log, and endorses its state.
A Transparency Service can be a complex distributed system, and SCITT requires the Transparency Service to provide many security guarantees about its Append-only Log.
The identity of a Transparency Service is captured by a public key that must be known by Verifiers in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement, and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>organizations, stakeholders, and users involved in validating supply chain Artifacts.
Verifiers consume Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
      </dl>
    </section>
    <section anchor="mybody">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt that countersigns the Signed Statement and witnesses its inclusion in the Append-only Log of a Transparency Service.
By extension, the document may say an Artifact (a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Verifiers to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their Append-only Log using a combination of trusted hardware, replication and consensus protocols, and cryptographic evidence.
A Receipt is an offline, universally-verifiable proof that an entry is recorded in the Append-only Log.
Receipts do not expire, but it is possible to append new entries (more recent Signed Statements) that subsume older entries (less recent Signed Statements).</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.
However, the Registrations on a separate Transparency Service is generally disjoint, though it is possible to take a Transparent Statement (i.e. a Signed Statement with a Receipt in its unprotected header, from a from the first Transparency Service ) and register it on another Transparency Service, where the second receipt will be over the first Receipt in the unprotected header.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Append-only Log, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>
          <t>CAs (Issuers) sign X.509 TBSCertificates (Artifacts) to produce X.509 certificates (Signed Statements)</t>
        </li>
        <li>
          <t>CAs submit the certificates to one or more CT logs (Transparency Services)</t>
        </li>
        <li>
          <t>CT logs produce Signed Certificate Timestamps (Transparent Statements)</t>
        </li>
        <li>
          <t>Signed Certificate Timestamps are checked by Verifiers</t>
        </li>
        <li>
          <t>The Append-only Log can be checked by Auditors</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture consists of a very loose federation of Transparency Services, and a set of common formats and protocols for issuing and registering Signed Statements, and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
Most of the details of the Receipt's contents are specified in the COSE Signed Merkle Tree Proof document <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="440" viewBox="0 0 440 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
            <path d="M 56,128 L 56,144" fill="none" stroke="black"/>
            <path d="M 64,224 L 64,240" fill="none" stroke="black"/>
            <path d="M 80,304 L 80,384" fill="none" stroke="black"/>
            <path d="M 104,320 L 104,336" fill="none" stroke="black"/>
            <path d="M 104,464 L 104,480" fill="none" stroke="black"/>
            <path d="M 112,176 L 112,200" fill="none" stroke="black"/>
            <path d="M 112,256 L 112,272" fill="none" stroke="black"/>
            <path d="M 128,352 L 128,368" fill="none" stroke="black"/>
            <path d="M 160,224 L 160,240" fill="none" stroke="black"/>
            <path d="M 160,416 L 160,440" fill="none" stroke="black"/>
            <path d="M 160,496 L 160,648" fill="none" stroke="black"/>
            <path d="M 168,128 L 168,144" fill="none" stroke="black"/>
            <path d="M 192,320 L 192,336" fill="none" stroke="black"/>
            <path d="M 208,352 L 208,368" fill="none" stroke="black"/>
            <path d="M 216,464 L 216,480" fill="none" stroke="black"/>
            <path d="M 240,544 L 240,568" fill="none" stroke="black"/>
            <path d="M 256,272 L 256,336" fill="none" stroke="black"/>
            <path d="M 264,160 L 264,176" fill="none" stroke="black"/>
            <path d="M 272,544 L 272,568" fill="none" stroke="black"/>
            <path d="M 280,336 L 280,400" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,272" fill="none" stroke="black"/>
            <path d="M 344,128 L 344,144" fill="none" stroke="black"/>
            <path d="M 376,160 L 376,176" fill="none" stroke="black"/>
            <path d="M 384,272 L 384,336" fill="none" stroke="black"/>
            <path d="M 384,400 L 384,520" fill="none" stroke="black"/>
            <path d="M 384,536 L 384,648" fill="none" stroke="black"/>
            <path d="M 400,320 L 400,400" fill="none" stroke="black"/>
            <path d="M 416,192 L 416,512" fill="none" stroke="black"/>
            <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
            <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
            <path d="M 128,96 L 200,96" fill="none" stroke="black"/>
            <path d="M 224,112 L 328,112" fill="none" stroke="black"/>
            <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
            <path d="M 128,128 L 200,128" fill="none" stroke="black"/>
            <path d="M 280,144 L 360,144" fill="none" stroke="black"/>
            <path d="M 72,160 L 96,160" fill="none" stroke="black"/>
            <path d="M 128,160 L 152,160" fill="none" stroke="black"/>
            <path d="M 376,176 L 400,176" fill="none" stroke="black"/>
            <path d="M 280,192 L 360,192" fill="none" stroke="black"/>
            <path d="M 80,208 L 144,208" fill="none" stroke="black"/>
            <path d="M 168,240 L 328,240" fill="none" stroke="black"/>
            <path d="M 80,256 L 144,256" fill="none" stroke="black"/>
            <path d="M 256,272 L 384,272" fill="none" stroke="black"/>
            <path d="M 128,288 L 248,288" fill="none" stroke="black"/>
            <path d="M 120,304 L 176,304" fill="none" stroke="black"/>
            <path d="M 200,320 L 256,320" fill="none" stroke="black"/>
            <path d="M 384,320 L 400,320" fill="none" stroke="black"/>
            <path d="M 256,336 L 384,336" fill="none" stroke="black"/>
            <path d="M 120,352 L 176,352" fill="none" stroke="black"/>
            <path d="M 216,368 L 280,368" fill="none" stroke="black"/>
            <path d="M 144,384 L 192,384" fill="none" stroke="black"/>
            <path d="M 96,400 L 144,400" fill="none" stroke="black"/>
            <path d="M 280,400 L 400,400" fill="none" stroke="black"/>
            <path d="M 120,448 L 200,448" fill="none" stroke="black"/>
            <path d="M 120,496 L 200,496" fill="none" stroke="black"/>
            <path d="M 176,528 L 224,528" fill="none" stroke="black"/>
            <path d="M 288,528 L 400,528" fill="none" stroke="black"/>
            <path d="M 200,576 L 368,576" fill="none" stroke="black"/>
            <path d="M 176,624 L 344,624" fill="none" stroke="black"/>
            <path d="M 88,656 L 240,656" fill="none" stroke="black"/>
            <path d="M 296,656 L 432,656" fill="none" stroke="black"/>
            <path d="M 72,688 L 224,688" fill="none" stroke="black"/>
            <path d="M 280,688 L 416,688" fill="none" stroke="black"/>
            <path d="M 72,688 L 88,656" fill="none" stroke="black"/>
            <path d="M 176,624 L 200,576" fill="none" stroke="black"/>
            <path d="M 224,688 L 240,656" fill="none" stroke="black"/>
            <path d="M 280,688 L 296,656" fill="none" stroke="black"/>
            <path d="M 344,624 L 368,576" fill="none" stroke="black"/>
            <path d="M 416,688 L 432,656" fill="none" stroke="black"/>
            <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
            <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
            <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
            <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
            <path d="M 128,96 C 119.16936,96 112,103.16936 112,112" fill="none" stroke="black"/>
            <path d="M 200,96 C 208.83064,96 216,103.16936 216,112" fill="none" stroke="black"/>
            <path d="M 328,112 C 336.83064,112 344,119.16936 344,128" fill="none" stroke="black"/>
            <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
            <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
            <path d="M 128,128 C 119.16936,128 112,120.83064 112,112" fill="none" stroke="black"/>
            <path d="M 200,128 C 208.83064,128 216,120.83064 216,112" fill="none" stroke="black"/>
            <path d="M 280,144 C 271.16936,144 264,151.16936 264,160" fill="none" stroke="black"/>
            <path d="M 360,144 C 368.83064,144 376,151.16936 376,160" fill="none" stroke="black"/>
            <path d="M 72,160 C 63.16936,160 56,152.83064 56,144" fill="none" stroke="black"/>
            <path d="M 96,160 C 104.83064,160 112,167.16936 112,176" fill="none" stroke="black"/>
            <path d="M 128,160 C 119.16936,160 112,167.16936 112,176" fill="none" stroke="black"/>
            <path d="M 152,160 C 160.83064,160 168,152.83064 168,144" fill="none" stroke="black"/>
            <path d="M 400,176 C 408.83064,176 416,183.16936 416,192" fill="none" stroke="black"/>
            <path d="M 280,192 C 271.16936,192 264,184.83064 264,176" fill="none" stroke="black"/>
            <path d="M 360,192 C 368.83064,192 376,184.83064 376,176" fill="none" stroke="black"/>
            <path d="M 80,208 C 71.16936,208 64,215.16936 64,224" fill="none" stroke="black"/>
            <path d="M 144,208 C 152.83064,208 160,215.16936 160,224" fill="none" stroke="black"/>
            <path d="M 80,256 C 71.16936,256 64,248.83064 64,240" fill="none" stroke="black"/>
            <path d="M 144,256 C 152.83064,256 160,248.83064 160,240" fill="none" stroke="black"/>
            <path d="M 96,288 C 87.16936,288 80,295.16936 80,304" fill="none" stroke="black"/>
            <path d="M 96,288 C 104.83064,288 112,280.83064 112,272" fill="none" stroke="black"/>
            <path d="M 128,288 C 119.16936,288 112,280.83064 112,272" fill="none" stroke="black"/>
            <path d="M 120,304 C 111.16936,304 104,311.16936 104,320" fill="none" stroke="black"/>
            <path d="M 176,304 C 184.83064,304 192,311.16936 192,320" fill="none" stroke="black"/>
            <path d="M 192,336 C 200.83064,336 208,343.16936 208,352" fill="none" stroke="black"/>
            <path d="M 120,352 C 111.16936,352 104,344.83064 104,336" fill="none" stroke="black"/>
            <path d="M 176,352 C 184.83064,352 192,344.83064 192,336" fill="none" stroke="black"/>
            <path d="M 144,384 C 135.16936,384 128,376.83064 128,368" fill="none" stroke="black"/>
            <path d="M 192,384 C 200.83064,384 208,376.83064 208,368" fill="none" stroke="black"/>
            <path d="M 96,400 C 87.16936,400 80,392.83064 80,384" fill="none" stroke="black"/>
            <path d="M 144,400 C 152.83064,400 160,407.16936 160,416" fill="none" stroke="black"/>
            <path d="M 176,400 C 167.16936,400 160,407.16936 160,416" fill="none" stroke="black"/>
            <path d="M 176,400 C 184.83064,400 192,392.83064 192,384" fill="none" stroke="black"/>
            <path d="M 120,448 C 111.16936,448 104,455.16936 104,464" fill="none" stroke="black"/>
            <path d="M 200,448 C 208.83064,448 216,455.16936 216,464" fill="none" stroke="black"/>
            <path d="M 120,496 C 111.16936,496 104,488.83064 104,480" fill="none" stroke="black"/>
            <path d="M 200,496 C 208.83064,496 216,488.83064 216,480" fill="none" stroke="black"/>
            <path d="M 176,528 C 167.16936,528 160,520.83064 160,512" fill="none" stroke="black"/>
            <path d="M 224,528 C 232.83064,528 240,535.16936 240,544" fill="none" stroke="black"/>
            <path d="M 288,528 C 279.16936,528 272,535.16936 272,544" fill="none" stroke="black"/>
            <path d="M 400,528 C 408.83064,528 416,520.83064 416,512" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="392,648 380,642.4 380,653.6" fill="black" transform="rotate(90,384,648)"/>
            <path class="jump" d="M 384,536 C 390,536 390,520 384,520" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="280,568 268,562.4 268,573.6" fill="black" transform="rotate(90,272,568)"/>
            <polygon class="arrowhead" points="256,288 244,282.4 244,293.6" fill="black" transform="rotate(0,248,288)"/>
            <polygon class="arrowhead" points="248,568 236,562.4 236,573.6" fill="black" transform="rotate(90,240,568)"/>
            <polygon class="arrowhead" points="232,112 220,106.4 220,117.6" fill="black" transform="rotate(180,224,112)"/>
            <polygon class="arrowhead" points="224,368 212,362.4 212,373.6" fill="black" transform="rotate(180,216,368)"/>
            <polygon class="arrowhead" points="208,320 196,314.4 196,325.6" fill="black" transform="rotate(180,200,320)"/>
            <polygon class="arrowhead" points="176,240 164,234.4 164,245.6" fill="black" transform="rotate(180,168,240)"/>
            <polygon class="arrowhead" points="168,648 156,642.4 156,653.6" fill="black" transform="rotate(90,160,648)"/>
            <polygon class="arrowhead" points="168,440 156,434.4 156,445.6" fill="black" transform="rotate(90,160,440)"/>
            <polygon class="arrowhead" points="120,200 108,194.4 108,205.6" fill="black" transform="rotate(90,112,200)"/>
            <polygon class="arrowhead" points="64,88 52,82.4 52,93.6" fill="black" transform="rotate(90,56,88)"/>
            <g class="text">
              <text x="60" y="52">Artifact</text>
              <text x="280" y="100">Identifiers</text>
              <text x="56" y="116">Statement</text>
              <text x="164" y="116">Envelope</text>
              <text x="316" y="164">Identity</text>
              <text x="320" y="180">Documents</text>
              <text x="108" y="228">Signed</text>
              <text x="212" y="228">COSE</text>
              <text x="264" y="228">Signing</text>
              <text x="112" y="244">Statement</text>
              <text x="316" y="292">Transparency</text>
              <text x="144" y="324">Receipt</text>
              <text x="304" y="324">Service</text>
              <text x="340" y="356">Transparency</text>
              <text x="168" y="372">Receipt</text>
              <text x="320" y="388">Service</text>
              <text x="160" y="468">Transparent</text>
              <text x="160" y="484">Statement</text>
              <text x="228" y="596">Verify</text>
              <text x="304" y="596">Transparent</text>
              <text x="272" y="612">Statement</text>
              <text x="120" y="676">Collect</text>
              <text x="188" y="676">Receipts</text>
              <text x="340" y="676">Replay</text>
              <text x="384" y="676">Log</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
  .----------.
 |  Artifact  |
  '----+-----'
       v
  .----+----.  .----------.   Identifiers
 | Statement ||  Envelope  +<-------------.
  '----+----'  '-----+----'                |
       |             |            .--------+--.
        '----. .----'            |  Identity   |
              |                  |  Documents  +---.
              v                   '------+----'     |
         .----+----.                     |          |
        |  Signed   |    COSE Signing    |          |
        | Statement +<-------------------+          |
         '----+----'                     |          |
              |                 +--------+------+   |
           .-' '--------------->+ Transparency  |   |
          |   .--------.        |               |   |
          |  | Receipt  +<------+  Service      +-+ |
          |  |          +.      +--+------------+ | |
          |   '-+------'  |        | Transparency | |
          |     | Receipt +<-------+              | |
          |      '------+'         | Service      | |
           '-------. .-'           +------------+-+ |
                    |                           |   |
                    v                           |   |
              .-----+-----.                     |   |
             | Transparent |                    |   |
             |  Statement  |                    |   |
              '-----+-----'                     |   |
                    |                           |   |
                    |'-------.     .------------)--'
                    |         |   |             |
                    |         v   v             |
                    |    .----+---+-----------. |
                    |   / Verify Transparent /  |
                    |  /      Statement     /   |
                    | '--------------------'    |
                    v                           v
           .--------+---------.      .----------+-----.
          / Collect Receipts /      /   Replay Log   /
         '------------------'      '----------------'
]]></artwork>
      </artset>
      <t>This section describes at a high level, the three main roles and associated processes in SCITT: Issuers and Signed Statements, Transparency Service and the Signed Statement Registration process, as well as Verifiers of the Transparent Statements and the Receipt validation process.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>An important function of a Transparency Service is to maintain Registration Policies for the Append-only Log.
The Append-only Log is the verifiable data structure which registers Signed Statements and supports the production of Receipts.</t>
        <t>All Transparency Services <bcp14>MUST</bcp14> expose APIs for the registration of Signed Statements and issuance of Receipts.</t>
        <t>Transparency Services <bcp14>MAY</bcp14> support additional APIs for auditing, for instance, to query the history of Signed Statements.</t>
        <t>Typically a Transparency Services has a single Issuer identity which is present in the <tt>iss</tt> claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> claim, for example, <tt>ts.example</tt> may have a distinct Issuer identity for each sub domain, such as <tt>customer1.ts.example</tt> and <tt>customer2.ts.example</tt>.</t>
        <section anchor="ts-initialization">
          <name>Initialization</name>
          <t>The Append-only Log is empty when the Transparency Service is initialized.
The first entry that is added to the Append-only Log <bcp14>MUST</bcp14> be a Signed Statement including key material.
The second set of entries are Signed Statements for additional domain-specific Registration Policy.
The third set of entries are Signed Statements for Artifacts.
From here on a Transparency Service can check Signed Statements on registration via policy (that is at minimum, key material and typically a Registration Policy) and is therefore in a reliable state to register Signed Statements about Artifacts or a new Registration Policy.</t>
        </section>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to the checks that are performed before a Signed Statement is registered to an Append-only Log, and a corresponding Receipt becomes available.</t>
          <t>As a minimum, a Transparency Service <bcp14>MUST</bcp14> authenticate the Issuer of Signed Statements, which requires a trust anchor in the form of an already registered Signed Statement including key material (see <xref target="ts-initialization"/>).
As defined in <xref target="RFC6024"/>, "A trust anchor represents an authoritative entity via a public key and associated data.
The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative."
Typical representations of a trust anchor include certificates or raw public keys.</t>
          <t>The <tt>x5t</tt> and <tt>kid</tt> Claims in the protected header of Signed Statements can be used as hints for discovering trust anchors.
Before a Registration Policy is used to decide if a Signed Statement is registered, the policy <bcp14>MUST</bcp14> be registered.
Before a Signed Statement is registered, the trust anchor used to verify it <bcp14>MUST</bcp14> be registered (e.g., via a registered Registration Policy).
In order to register a trust anchor, the trust anchor <bcp14>MUST</bcp14> be converted to a Signed Statement with a matching content type Claim.
During initialization of a Transparency Service, the first Signed Statements registered will be for a trust anchor that is not validated by any Registration Policy.</t>
          <t>Transparency Services <bcp14>MUST</bcp14> specify their supported signature algorithms in their Registration Policies.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies to the operator of the Transparency Service.</t>
        </section>
        <section anchor="sec-append-only-log">
          <name>Append-only Log</name>
          <t>The security properties of the Append-only Log are determined by the choice of the verifiable data structure used to produce Receipts.</t>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/> are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that is supporting a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh receipt for a given software package, or to request a list of Signed Statements and Artifacts associated with a software package.</t>
        </section>
      </section>
      <section anchor="sec-signed-statements">
        <name>Signed Statements</name>
        <t>This specification prioritizes conformance to <xref target="RFC9052"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissability of conforming messages.
This specification is left intentionally open to allow implementations to make the restrictions that make the most sense for their operational use cases.</t>
        <t>At least one identifier for an identity document <bcp14>MUST</bcp14> be included in the protected header of the COSE envelope, either <tt>x5t</tt> or <tt>kid</tt>.</t>
        <ul spacing="normal">
          <li>
            <t>Support for <tt>x5t</tt> is mandatory to implement.</t>
          </li>
          <li>
            <t>Support for <tt>kid</tt> is optional.</t>
          </li>
        </ul>
        <t>When <tt>x5t</tt> is present, <tt>iss</tt> <bcp14>MUST</bcp14> be a string with a value between 1 and 8192 characters in length that fits the regular expression of a distinguished name.</t>
        <t>The mechanisms for how Transparency Services obtain identity documents is out-of-scope of this document.</t>
        <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when the <tt>x5t</tt> header parameter is not present.
Key discovery protocols are out-of-scope of this document.</t>
        <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="CWT_CLAIMS_COSE"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
        <t>A Receipt is a Signed Statement, (cose-sign1), with addition claims in its protected header related to verifying the inclusion proof in its unprotected header. See <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.</t>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition for of the protected header for Signed Statements and Receipts.</t>
        <t>Everything that is optional in the following CDDL can potentially be discovered out of band and Registration Policies are not assured on the presence of these optional fields.
A Registration Policy that requires an optional field to be present <bcp14>MUST</bcp14> reject any Signed Statements or Receipts that an invalid according to the policy.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl"><![CDATA[
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &(CWT_Claims: 15) => CWT_Claims
  ? &(alg: 1) => int
  ? &(content_type: 3) => tstr / uint
  ? &(kid: 4) => bstr
  ? &(x5t: 34) => COSE_CertHash
  * int => any
}

CWT_Claims = {
  &(iss: 1) => tstr
  &(sub: 2) => tstr
  * int => any
}

Unprotected_Header = {
  ? &(receipts: 394)  => [+ Receipt]
}

]]></sourcecode>
        </figure>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  3: application/example+json,      / Content type                  /
  4: h'50685f55...50523255',        / Key identifier                /
  15: {                             / CWT Claims                    /
    1: software.vendor.example,     / Issuer                        /
    2: vendor.product.example,      / Subject                       /
  }
}
]]></sourcecode>
        </figure>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012603...6d706c65',       / Protected                     /
      {},                           / Unprotected                   /
      nil,                          / Detached payload              /
      h'79ada558...3a28bae4'        / Signature                     /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates a payload that is detached.
This is to support very large supply chain artifacts, and to ensure that Transparent Statements can integrate with existing file systems.</t>
        <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software artifacts may include:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="COSWID"/></t>
          </li>
          <li>
            <t><xref target="CycloneDX"/></t>
          </li>
          <li>
            <t><xref target="in-toto"/></t>
          </li>
          <li>
            <t><xref target="SPDX-CBOR"/></t>
          </li>
          <li>
            <t><xref target="SPDX-JSON"/></t>
          </li>
          <li>
            <t><xref target="SLSA"/></t>
          </li>
          <li>
            <t><xref target="SWID"/></t>
          </li>
        </ul>
        <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement (the SCITT tag of <tt>COSE_Sign1_Tagged</tt> is outside the scope of COSE, and used to indicate that a signed object is a Signed Statement).</t>
        <t>Issuers may produce Signed Statements about different Artifacts under the same Identity.
Issuers and Verifiers must be able to recognize the Artifact to which the statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> claims, within the CWT_Claims protected header, are used to identify the Artifact the statement pertains to.</t>
        <t>See Subject under <xref target="terminology"/> Terminology.</t>
        <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the resolved key manifest) for different Artifacts, or sign all Signed Statements under the same key.</t>
        <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
        <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Verifiers can choose which Issuers they trust.</t>
        <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
        <section anchor="sec-registration">
          <name>Registration</name>
          <t>The same Signed Statement may be independently registered in multiple Transparency Services.
To register a Signed Statement, the Transparency Service performs the following steps:</t>
          <ol spacing="normal" type="1"><li>
              <t><strong>Client authentication:</strong> This is implementation-specific and <bcp14>MAY</bcp14> be unrelated to the Issuer identity.
Signed Statements may be registered by a different party than their Issuer.</t>
            </li>
            <li>
              <t><strong>Issuer Verification:</strong> The Transparency Service <bcp14>MUST</bcp14> perform resolution of the Issuer's identity.
  This step may require that the service retrieves the Issuer ID in real-time, or rely on a cache of recent resolutions.
  For auditing, during Registration, the Transparency Service <bcp14>MUST</bcp14> store evidence of the lookup, including if it was resolved from a cache.</t>
            </li>
            <li>
              <t><strong>Signature verification:</strong> The Transparency Service <bcp14>MUST</bcp14> verify the signature of the Signed Statement, as described in <xref target="RFC9360"/>, using the signature algorithm and verification key of the Issuer.</t>
            </li>
            <li>
              <t><strong>Signed Statement validation:</strong> The Transparency Service <bcp14>MUST</bcp14> check that the Signed Statement includes the required protected headers listed above.
The Transparency Service <bcp14>MAY</bcp14> verify the Statement payload format, content and other optional properties.</t>
            </li>
            <li>
              <t><strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope, and may use information contained in the attributes of named policies.</t>
            </li>
            <li>
              <t><strong>Register the Signed Statement</strong> to the append-only log.</t>
            </li>
            <li>
              <t><strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from registration.
Details about generating Receipts are described in <xref target="Receipt"/>.</t>
            </li>
          </ol>
          <t>The last two steps may be shared between a batch of Signed Statements recorded in the Append-only Log.</t>
          <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt, so that it can always back up the Receipt by releasing the corresponding entry (the now Transparent Statement) in the Append-only Log.
Conversely, the Transparency Service <bcp14>MAY</bcp14> re-issue Receipts for the Append-only Log content, for instance after a transient fault during Signed Statement registration.</t>
        </section>
      </section>
      <section anchor="Receipt">
        <name>Transparent Statements</name>
        <t>The client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the Unprotected Header of the Signed Statement.</t>
        <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
        <t>Receipts are based on Signed Inclusion Proofs as described in COSE Signed Merkle Tree Proofs (<xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>).</t>
        <t>The registration time is defined as the timestamp at which the Transparency Service has added this Signed Statement to its Append-only Log.</t>
        <t><strong>Editor's Note:</strong> The WG is discussing if existing CWT claims might better support these design principles.</t>
        <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.</t>
        <figure anchor="fig-transparent-statement-cddl">
          <name>CDDL definition for a Transparent Statement</name>
          <sourcecode type="cddl"><![CDATA[
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &(receipts: 394)  => [+ Receipt]
}
]]></sourcecode>
        </figure>
        <figure anchor="fig-transparent-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012603...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        394: [                      / Receipts (1)                  /
          h'd284586c...4191f9d2'    / Receipt 1                     /
        ]
      },
      nil,                          / Detached payload              /
      h'79ada558...3a28bae4'        / Signature                     /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-transparent-statement-edn"/> illustrates a payload that is detached.</t>
        <t>The unprotected header can contain multiple receipts.</t>
        <figure anchor="fig-receipt-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'50685f55...50523255',        / Key identifier                /
  -111: 1,                          / Verifiable Data Structure     /
  15: {                             / CWT Claims                    /
    1: transparency.vendor.example, / Issuer                        /
    2: vendor.product.example,      / Subject                       /
  }
}
]]></sourcecode>
        </figure>
        <t>Notice the verifiable data structure used is RFC9162_SHA256 in this case.
We know from the COSE Verifiable Data Structure Registry that RFC9162_SHA256 is value 1, and that it supports -1 (inclusion proofs) and -2 (consistency proofs).</t>
        <figure anchor="fig-receipt-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012604...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        -222: {                     / Proofs                        /
          -1: [                     / Inclusion proofs (1)          /
            h'83080783...32568964', / Inclusion proof 1             /
          ]
        },
      },
      nil,                          / Detached payload              /
      h'10f6b12a...4191f9d2'        / Signature                     /
    ]
)
]]></sourcecode>
        </figure>
        <t>Notice the unprotected header contains verifiable data structure proofs, see the protected header for details regarding the specific verifiable data structure used.</t>
        <figure anchor="fig-receipt-inclusion-proof-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
          <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1             /
  8,                                / Tree size                     /
  7,                                / Leaf index                    /
  [                                 / Inclusion hashes (3)          /
     h'c561d333...f9850597'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
     h'0bdaaed3...32568964'         / Intermediate hash 3           /
  ]
]
]]></sourcecode>
        </figure>
        <t>This is a decoded inclusion proof for RFC9162_SHA256, other verifiable data structures might encode inclusion proofs differently.</t>
        <section anchor="validation">
          <name>Validation</name>
          <t>Verifiers <bcp14>MUST</bcp14> apply the verification process as described in Section 4.4 of RFC9052.</t>
          <t>In order to verify the inclusion proof that is included in the Receipt, the verification process for the inclusion proof <bcp14>MUST</bcp14> be performed as described in the document that registers corresponding Verifiable Data Structure Parameters (see <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>).</t>
          <t>APIs exposing verification logic for Transparent Statements may wish to provide more details that a single boolean result, for example, indicating if the signature on the Receipt or Signed Statement is valid, if claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
          <t>The algorithm-specific details of checking inclusion proofs are covered in <xref target="I-D.draft-steele-cose-merkle-tree-proofs"/>.
The pseudo-code for validation of a transparent statement is as follows:</t>
          <sourcecode type="python"><![CDATA[
let verify_transparent_statement(t) =
  let receipt = t.unprotected.scitt-receipt
  let version = receipt.protected.scitt-version or fail "Missing SCITT Receipt version"
  assert(version == 1)

  let leaf = COSE.serialize(t with .unprotected = {
    334 => receipt.unprotected.statement-registration-info
  })

  let vds = receipt.protected.verifiable-data-structure of fail "Missing verifiable data structure"
  let root = verify_inclusion_proof(vds, receipt.unprotected.scitt-inclusion-proof, leaf)
    or fail "Failed to verify inclusion proof"

  // Statement registration info has been authenticated by the inclusion proof
  receipt.protected.statement-registration-info = receipt.unprotected.statement-registration-info
  return COSE.verify(receipt, detached_payload=root)
]]></sourcecode>
          <t>Before checking a Transparent Statement, the Verifier must be configured with one or more identities of trusted Transparency Services.</t>
          <t>Verifiers <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally, but this requires a fresh resolution of the Issuer's verification keys, which <bcp14>MAY</bcp14> fail if the key has been revoked.</t>
          <t>Some Verifiers <bcp14>MAY</bcp14> decide to locally re-apply some or all of the Registration Policies, if they have limited trust in the Transparency Services.
In addition, Verifiers <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
          <t>Verifiers <bcp14>MAY</bcp14> offer options to store or share the Receipt of the Transparent Statement for auditing the Transparency Services in case a dispute arises.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-federation">
      <name>Federation</name>
      <t><strong>Editor's Note:</strong> This topic is still under discussion, see <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture/issues/79">issue 79</eref></t>
      <t>Multiple, independently-operated Transparency Services can help secure distributed supply chains, without the need for a single, centralized service trusted by all parties.
For example, multiple Transparency Service instances may be governed and operated by different organizations that are either unaware of the other or do not trust one another.</t>
      <t>This may involve registering the same Signed Statements at different Transparency Services, each with their own purpose and Registration Policy.</t>
      <t>This may also involve attaching multiple Receipts to the same Signed Statements.</t>
      <t>For example, a software producer of a supply chain artifact might rely on multiple independent software producers operating transparency services for their upstream artifacts.
Downstream producers benefit from upstream producers providing higher transparency regarding their artifacts.</t>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Transparency Services are often publicly accessible.
Issuers should treat Signed Statements (rendering them as Transparent Statements) as publicly accessible.
In particular, a Signed Statement Envelope and Statement payload should not carry any private information in plaintext.</t>
      <t>Transparency Services can have an authorization policy controlling who can access the Append-only Log.
While this can be used to limit who can read the Log, it may also limit the usefulness of the system.</t>
      <t>Some jurisdictions have a Right to be Forgotten.
However, once a Signed Statement is inserted into the Append-only Log maintained by a Transparency Service, it cannot be removed from the Log.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>On its own, verifying a Transparent Statement does not guarantee that its Envelope or contents are trustworthy.
Just that they have been signed by the apparent Issuer and counter-signed by the Transparency Service.
If the Verifier trusts the Issuer, it can infer that an Issuer's Signed Statement was issued with this Envelope and contents, which may be interpreted as the Issuer saying the Artifact is fit for its intended purpose.
If the Verifier trusts the Transparency Service, it can independently infer that the Signed Statement passed the Transparency Service Registration Policy and that has been persisted in the Append-only Log.
Unless advertised in the Transparency Service Registration Policy, the Verifier cannot assume that the ordering of Signed Statements in the Append-only Log matches the ordering of their issuance.</t>
      <t>Similarly, the fact that an Issuer can be held accountable for its Transparent Statements does not on its own provide any mitigation or remediation mechanism in case one of these Transparent Statements turned out to be misleading or malicious.
Just that signed evidence will be available to support them.</t>
      <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> claims.</t>
      <t>Issuers <bcp14>MUST</bcp14> ensure that the Statement payloads in their Signed Statements are correct and unambiguous, for example by avoiding ill-defined or ambiguous formats that may cause Verifiers to interpret the Signed Statement as valid for some other purpose.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> carefully protect their private signing keys and avoid these keys being used for any purpose not described in this architecture document.
In cases where key re-use is unavoidable, keys <bcp14>MUST NOT</bcp14> sign any other message that may be verified as an Envelope as part of a Signed Statement.</t>
      <t>Each of these functions <bcp14>MUST</bcp14> be carefully protected against both external attacks and internal misbehavior by some or all of the operators of the Transparency Service.</t>
      <t>For instance, the code for the Registration Policy evaluation and endorsement may be protected by running in a Trusted Execution Environment (TEE).</t>
      <t>The Transparency Service may be replicated with a consensus algorithm, such as Practical Byzantine Fault Tolerance <xref target="PBFT"/> and may be used to protect against malicious or vulnerable replicas.
Threshold signatures may be use to protect the service key, etc.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> rotate verification keys for signature checking in well-defined cryptoperiods (see <xref target="KEY-MANAGEMENT"/>).</t>
      <t>A Transparency Service <bcp14>MAY</bcp14> provide additional authenticity assurances about its secure implementation and operation, enabling remote attestation of the hardware platforms and/or software Trusted Computing Bases (TCB) that run the Transparency Service.
If present, these additional authenticity assurances <bcp14>MUST</bcp14> be registered in the Append-only Log and <bcp14>MUST</bcp14> always be exposed by the Transparency Services' APIs.
An example of Signed Statement's payloads that can improve authenticity assurances are trustworthiness assessments that are RATS Conceptual Messages, such as Evidence, Endorsements, or corresponding Attestation Results (see <xref target="RFC9334"/>).</t>
      <t>For example, if a Transparency Service is implemented using a set of redundant replicas, each running within its own hardware-protected trusted execution environments (TEEs), then each replica can provide fresh Evidence or fresh Attestation Results about its TEEs. The respective Evidence can show, for example, the binding of the hardware platform to the software that runs the Transparency Service, the long-term public key of the service, or the key used by the replica for signing Receipts. The respective Attestation Result, for example, can show that the remote attestation Evidence was appraised by a trusted Verifier and complies with well-known Reference Values and Endorsements.</t>
      <section anchor="sec-security-guarantees">
        <name>Security Guarantees</name>
        <t>SCITT provides the following security guarantees:</t>
        <ol spacing="normal" type="1"><li>
            <t>Statements made by Issuers about supply chain Artifacts are identifiable, authentic, and non-repudiable</t>
          </li>
          <li>
            <t>Statement provenance and history can be independently and consistently audited</t>
          </li>
          <li>
            <t>Issuers can efficiently prove that their Statement is logged by a Transparency Service</t>
          </li>
        </ol>
        <t>The first guarantee is achieved by requiring Issuers to sign their Statements and associated metadata using a distributed public key infrastructure.
The second guarantee is achieved by storing the Signed Statement on an Append-only Log.
The third guarantee is achieved by implementing the Append-only Log using a verifiable data structure (such as a Merkle Tree <xref target="MERKLE"/>).</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>The document provides a generic threat model for SCITT, describing its residual security properties when some of its actors (identity providers, Issuers, Transparency Services, and Auditors) are corrupt or compromised.</t>
        <t>This model may need to be refined to account for specific supply chains and use cases.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
These guarantees are meant to hold for extensive periods of time, possibly decades.</t>
        <t>It can never be assumed that some Issuers and some Transparency Services will not be corrupt.</t>
        <t>SCITT entities explicitly trust one another on the basis of their long-term identity, which maps to shorter-lived cryptographic credentials.
A Verifier <bcp14>SHOULD</bcp14> validate a Transparent Statement originating from a given Issuer, registered at a given Transparency Service (both identified in the Verifier's local authorization policy) and would not depend on any other Issuer or Transparency Services.</t>
        <t>Authorized supply chain actors (Issuers) cannot be stopped from producing Signed Statements including false assertions in their Statement payload (either by mistake or by corruption), but these Issuers can made accountable by ensuring their Signed Statements are systematically registered at a trustworthy Transparency Service.</t>
        <t>Similarly, providing strong residual guarantees against faulty/corrupt Transparency Services is a SCITT design goal.
Preventing a Transparency Service from registering Signed Statements that do not meet its stated Registration Policy, or to issue Receipts that are not consistent with their Append-only Log is not possible.
In contrast Transparency Services can be held accountable and they can be called out by any Auditor that replays their Append-only Log against any contested Receipt.
Note that the SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.</t>
        <t>In both cases, the SCITT Architecture provides generic, universally-verifiable cryptographic proof to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT Architecture.</t>
        <t>Verifiers and Auditors need not be trusted by other actors.
In particular, so long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
        <section anchor="sec-append-only-log-1">
          <name>Append-only Log</name>
          <t>If a Transparency Service is honest, then a Transparent Statement including a correct Receipt ensures that the associated Signed Statement passed its Registration Policy and was recorded appropriately.</t>
          <t>Conversely, a corrupt Transparency Service may:</t>
          <ol spacing="normal" type="1"><li>
              <t>refuse or delay the Registration of Signed Statements</t>
            </li>
            <li>
              <t>register Signed Statements that do not pass its Registration Policy (e.g., Signed Statement with Issuer identities and signatures that do not verify)</t>
            </li>
            <li>
              <t>issue verifiable Receipts for Signed Statements that do not match its Append-only Log</t>
            </li>
            <li>
              <t>refuse access to its Transparency Service (e.g., to Auditors, possibly after storage loss)</t>
            </li>
          </ol>
          <t>An Auditor granted (partial) access to a Transparency Service and to a collection of disputed Receipts will be able to replay it, detect any invalid Registration (2) or incorrect Receipt in this collection (3), and blame the Transparency Service for them.
This ensures any Verifier that trusts at least one such Auditor that (2, 3) will be blamed to the Transparency Service.</t>
          <t>Due to the operational challenge of maintaining a globally consistent Append-only Log, some Transparency Services may provide limited support for historical queries on the Signed Statements they have registered, and accept the risk of being blamed for inconsistent Registration or Issuer Equivocation.</t>
          <t>Verifiers and Auditors may also witness (1, 4) but may not be able to collect verifiable evidence for it.</t>
        </section>
        <section anchor="sec-availability-of-receipts">
          <name>Availability of Receipts</name>
          <t>Networking and Storage are trusted only for availability.</t>
          <t>Auditing may involve access to data beyond what is persisted in the Transparency Services.
For example, the registered Transparency Service may include only the hash of a detailed SBOM, which may limit the scope of auditing.</t>
          <t>Resistance to denial-of-service is implementation specific.</t>
          <t>Actors may want to independently keep their own record of the Signed Statements they issue, endorse, verify, or audit.</t>
        </section>
        <section anchor="sec-confidentiality-and-privacy">
          <name>Confidentiality and Privacy</name>
          <t>According to Zero Trust Principles any location in a network is never trusted.
All contents exchanged between actors is protected using secure authenticated channels (e.g., TLS) but may not exclude network traffic analysis.</t>
          <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Some Transparency Services may publish every Signed Statement in their logs, to facilitate their dissemination and auditing.
Others may just return Receipts to clients that present Singed Statements for Registration, and disclose the Append-only Log only to Auditors trusted with the confidentiality of its contents.</t>
          <t>A collection of Signed Statements must not leak information about the contents of other Signed Statements registered on the Transparency Service.</t>
          <t>Issuers must carefully review the inclusion of private/confidential materials in their Statements.
For example, Issuers must remove Personally Identifiable Information (PII) as clear text in the statement.
Alternatively, Issuers may include opaque cryptographic statements, such as hashes.</t>
          <t>The confidentiality of queries is implementation-specific, and generally not guaranteed.
For example, while offline Envelope validation of Signed Statements is private, a Transparency Service may monitor which of its Transparent Statements are being verified from lookups to ensure their freshness.</t>
        </section>
        <section anchor="sec-cryptographic-agility">
          <name>Cryptographic Agility</name>
          <t>The SCITT Architecture supports cryptographic agility.
The actors depend only on the subset of signing and Receipt schemes they trust.
This enables the gradual transition to stronger algorithms, including e.g. post-quantum signature algorithms.</t>
        </section>
        <section anchor="sec-transparency-service-clients">
          <name>Transparency Service Clients</name>
          <t>Trust in clients that submit Signed Statements for Registration is implementation-specific.
An attacker may attempt to register any Signed Statement it has obtained, at any Transparency Service that accepts them, possibly multiple times and out of order.
This may be mitigated by a Transparency Service that enforces restrictive access control and Registration Policies.</t>
        </section>
        <section anchor="sec-impersonation">
          <name>Impersonation</name>
          <t>The identity resolution mechanism is trusted to associate long-term identifiers with their public signature-verification keys.
Transparency Services and other parties may record identity-resolution evidence to facilitate its auditing.</t>
          <t>If one of the credentials of an Issuer gets compromised, the SCITT Architecture still guarantees the authenticity of all Signed Statements signed with this credential that have been registered on a Transparency Service before the compromise.
It is up to the Issuer to notify Transparency Services of credential revocation to stop Verifiers from accepting Signed Statements signed with compromised credentials.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD; <xref target="mybody"/>.</t>
      <section anchor="sec-media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.media-types"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an scitt configuration represented as JSON:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: scitt-configuration+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; application/scitt-configuration+json values are represented as a JSON Object; UTF-8 encoding <bcp14>SHOULD</bcp14> be employed for the JSON object.</t>
          </li>
          <li>
            <t>Security considerations: See the Security Considerations section of TBD.</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: TBD</t>
          </li>
          <li>
            <t>Applications that use this media type: TBD</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>Magic number(s): n/a</t>
              </li>
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: TBD</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: TBD</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration?  No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="COSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="CWT_CLAIMS_COSE">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
        </reference>
        <reference anchor="IANA.cwt" target="http://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="http://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.named-information" target="http://www.iana.org/assignments/named-information">
          <front>
            <title>Named Information</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-steele-cose-merkle-tree-proofs">
          <front>
            <title>Concise Encoding of Signed Merkle Tree Proofs</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This specification describes verifiable data structures and
   associated proof types for use with COSE.  The extensibility of the
   approach is demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-steele-cose-merkle-tree-proofs-01"/>
        </reference>
        <reference anchor="RFC2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC6024">
          <front>
            <title>Trust Anchor Management Requirements</title>
            <author fullname="R. Reddy" initials="R." surname="Reddy"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>A trust anchor represents an authoritative entity via a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative. A relying party uses trust anchors to determine if a digitally signed object is valid by verifying a digital signature using the trust anchor's public key, and by enforcing the constraints expressed in the associated data for the trust anchor. This document describes some of the problems associated with the lack of a standard trust anchor management mechanism and defines requirements for data formats and push-based protocols designed to address these problems. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6024"/>
          <seriesInfo name="DOI" value="10.17487/RFC6024"/>
        </reference>
        <reference anchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="CWT_CLAIMS" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION">
          <front>
            <title>Attested append-only memory: making adversaries stick to their word</title>
            <author fullname="Byung-Gon Chun" initials="B." surname="Chun">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="Petros Maniatis" initials="P." surname="Maniatis">
              <organization>Intel Research Berkeley, Berkeley</organization>
            </author>
            <author fullname="Scott Shenker" initials="S." surname="Shenker">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="John Kubiatowicz" initials="J." surname="Kubiatowicz">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <date month="October" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGOPS Operating Systems Review" value="vol. 41, no. 6, pp. 189-204"/>
          <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MERKLE">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author fullname="Ralph C. Merkle" initials="R." surname="Merkle">
              <organization/>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="Advances in Cryptology — CRYPTO ’87" value="pp. 369-378"/>
          <seriesInfo name="DOI" value="10.1007/3-540-48184-2_32"/>
          <seriesInfo name="ISBN" value="[&quot;9783540187967&quot;, &quot;9783540481843&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="PBFT">
          <front>
            <title>Practical byzantine fault tolerance and proactive recovery</title>
            <author fullname="Miguel Castro" initials="M." surname="Castro">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Barbara Liskov" initials="B." surname="Liskov">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 20, no. 4, pp. 398-461"/>
          <seriesInfo name="DOI" value="10.1145/571637.571640"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="URLs" target="https://url.spec.whatwg.org/">
          <front>
            <title>URL Living Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="9" month="January" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison, and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –14 of this draft picks up comments from the
   // shepherd review and adds sections on CoAP integration and on cri
   // application-oriented literals for the Extended Diagnostic
   // Notation.  This revision still contains open issues and is
   // intended to serve as a snapshot while the processing of the
   // shepherd review is being completed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-14"/>
        </reference>
        <reference anchor="KEY-MANAGEMENT">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 919?>

<section anchor="sec-identifiers">
      <name>Identifiers</name>
      <t>This section provides informative examples of identifiers for statements, signed statements, and receipts.</t>
      <t>SCITT Identifiers are primarily meant to be understood by humans and secondarily meant to be understood by machines, as such we define text encodings for message identifiers first, and then provide binary translations according to standard transformations for URLs and URNs to binary formats.</t>
      <t>SCITT Identifiers for URLs and URNs that are not Data URLs <bcp14>MUST</bcp14> be represented in binary using <xref target="I-D.draft-ietf-core-href"/>.</t>
      <t>For each SCITT conceptual message, we define a Data URL format according to <xref target="RFC2397"/>, a URN format according to <xref target="RFC8141"/> and a URL format according to <xref target="URLs"/>.</t>
      <t>Note that Data URLs require base64 encoding, but the URN definitions require base64url encoding.</t>
      <t>Resolution and dereferencing of these identifiers is out of scope for this document, and can be implemented by any concrete api implementing the abstract interface defined as follows:</t>
      <artwork><![CDATA[
resource: content-type = dereference(identifier: identifier-type)
]]></artwork>
      <t>These identifiers <bcp14>MAY</bcp14> be present in a <tt>tstr</tt> field that does not otherwise restrict the string in ways that prevent a URN or URL from being present.</t>
      <t>This includes <tt>iss</tt>, and <tt>sub</tt> which are used to express the Issuer and subject of a signed statement or receipt.</t>
      <t>This also includes <tt>kid</tt> which is used to express a hint for which public key should be used to verify a signature.</t>
      <t>All SCITT identifiers share common parameters to promote interoperability:</t>
      <t>Let hash-name be an algorithm name registered in <xref target="IANA.named-information"/>.</t>
      <t>To promote interoperability, the hash-name <bcp14>MUST</bcp14> be "sha-256".</t>
      <t>Let base-encoding, be a base encoding defined in <xref target="RFC4648"/>.</t>
      <t>To promote interoperability, the base encoding <bcp14>MUST</bcp14> be "base64url".</t>
      <t>In the blocks and examples that follow, note '' line wrapping per RFC 8792.</t>
      <section anchor="sec-for-binary-content">
        <name>For Binary Content</name>
        <t>Identifiers for binary content, such as Statements, or even Artifacts themselves are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of bytes / octets.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "statement" for Statements and Artifacts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
      </section>
      <section anchor="sec-for-scitt-messages">
        <name>For SCITT Messages</name>
        <t>Identifiers for COSE Sign 1 based messages, such as identifiers for Signed Statements and Receipts are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-to-be-signed-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of the "to-be-signed bytes", according to <xref section="8.1" sectionFormat="of" target="RFC9052"/>.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "signed-statement" for Signed Statements, and "receipt" for Receipts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-to-be-signed-bytes-digest}
]]></artwork>
        <t>Note that this means the content of the signature is not included in the identifier, even though signature related claims, such as activation or expiration information in protected headers are included.</t>
        <t>As a result, an attacker may construct a new signed statement that has the same identifier as a previous signed statement, but has a different signature.</t>
      </section>
      <section anchor="sec-for-transparent-statements">
        <name>For Transparent Statements</name>
        <t>Identifiers for Transparent Statements are defined as identifiers for binary content, but with "transparent-statement" as the <tt>message-type</tt>.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
        <t>Note that because this identifier is computed over the unprotected header of the Signed Statement, any changes to the unprotected header, such as changing the order of the unprotected header map key value pairs, adding additional receipts, or adding additional proofs to a receipt, will change the identifier of a transparent statement.</t>
        <t>Note that because this identifier is computed over the signatures of the signed statement and signatures in each receipt, any canonicalization of the signatures after the fact will produce a distinct identifier.</t>
      </section>
      <section anchor="sec-statements">
        <name>Statements</name>
        <section anchor="sec-statement-urn">
          <name>Statement URN</name>
          <figure anchor="example-statement-urn">
            <name>Example Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-url">
          <name>Statement URL</name>
          <figure anchor="example-statement-url">
            <name>Example Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-data-url">
          <name>Statement Data URL</name>
          <figure anchor="example-statement-data-url">
            <name>Example Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/json;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-signed-statements-1">
        <name>Signed Statements</name>
        <section anchor="sec-signed-statement-urn">
          <name>Signed Statement URN</name>
          <figure anchor="example-signed-statement-urn">
            <name>Example Signed Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-url">
          <name>Signed Statement URL</name>
          <figure anchor="example-signed-statement-url">
            <name>Example Signed Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-data-url">
          <name>Signed Statement Data URL</name>
          <figure anchor="example-signed-statement-data-url">
            <name>Example Signed Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-receipts">
        <name>Receipts</name>
        <section anchor="sec-receipt-urn">
          <name>Receipt URN</name>
          <figure anchor="example-receipt-urn">
            <name>Example Receipt URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-url">
          <name>Receipt URL</name>
          <figure anchor="example-receipt-url">
            <name>Example Receipt URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-data-url">
          <name>Receipt Data URL</name>
          <figure anchor="example-receipt-data-url">
            <name>Example Receipt Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-transparent-statements">
        <name>Transparent Statements</name>
        <section anchor="sec-transparent-statement-urn">
          <name>Transparent Statement URN</name>
          <figure anchor="example-transparent-statement-urn">
            <name>Example Transparent Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-url">
          <name>Transparent Statement URL</name>
          <figure anchor="example-transparent-statement-url">
            <name>Example Transparent Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-data-url">
          <name>Transparent Statement Data URL</name>
          <figure anchor="example-transparent-statement-data-url">
            <name>Example Transparent Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-signing-statements-remotely">
      <name>Signing Statements Remotely</name>
      <t>Statements, such as digital artifacts or structured data regarding artifacts, can be too large or too sensitive to be send to a remote Transparency Services over the Internet.
In these cases a statement can also be hash, which becomes the payload included in COSE to-be-signed bytes.
A Signed Statement (cose-sign1) <bcp14>MUST</bcp14> be produced from the to-be-signed bytes according to <xref section="4.4" sectionFormat="of" target="RFC9052"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
            <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
            <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
            <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
            <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
            <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
            <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
            <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
            <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
            <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
            <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
            <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
            <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
            <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
            <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
            <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
            <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
            <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
            <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
            <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
            <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
            <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
            <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
            <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
            <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
            <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
            <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
            <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
            <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
            <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
            <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
            <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
            <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
            <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
            <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
            <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
            <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
            <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
            <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
            <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
            <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
            <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
            <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
            <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
            <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
            <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
            <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
            <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
            <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
            <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
            <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
            <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
            <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
            <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
            <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
            <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
            <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
            <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
            <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
            <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
            <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
            <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
            <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
            <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
            <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
            <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
            <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
            <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
            <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
            <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
            <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
            <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
            <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
            <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
            <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
            <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
            <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
            <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="336,584 324,578.4 324,589.6" fill="black" transform="rotate(90,328,584)"/>
            <polygon class="arrowhead" points="280,584 268,578.4 268,589.6" fill="black" transform="rotate(90,272,584)"/>
            <polygon class="arrowhead" points="280,520 268,514.4 268,525.6" fill="black" transform="rotate(90,272,520)"/>
            <polygon class="arrowhead" points="248,176 236,170.4 236,181.6" fill="black" transform="rotate(0,240,176)"/>
            <polygon class="arrowhead" points="176,176 164,170.4 164,181.6" fill="black" transform="rotate(0,168,176)"/>
            <polygon class="arrowhead" points="152,624 140,618.4 140,629.6" fill="black" transform="rotate(180,144,624)"/>
            <polygon class="arrowhead" points="64,680 52,674.4 52,685.6" fill="black" transform="rotate(90,56,680)"/>
            <polygon class="arrowhead" points="64,584 52,578.4 52,589.6" fill="black" transform="rotate(90,56,584)"/>
            <polygon class="arrowhead" points="64,456 52,450.4 52,461.6" fill="black" transform="rotate(270,56,456)"/>
            <polygon class="arrowhead" points="64,104 52,98.4 52,109.6" fill="black" transform="rotate(90,56,104)"/>
            <polygon class="arrowhead" points="48,200 36,194.4 36,205.6" fill="black" transform="rotate(90,40,200)"/>
            <g class="text">
              <text x="76" y="52">Artifact</text>
              <text x="60" y="132">Hash</text>
              <text x="196" y="180">OR</text>
              <text x="296" y="180">Payload</text>
              <text x="72" y="228">Statement</text>
              <text x="104" y="292">...</text>
              <text x="164" y="292">Producer</text>
              <text x="232" y="292">Network</text>
              <text x="280" y="292">...</text>
              <text x="192" y="324">...</text>
              <text x="104" y="356">...</text>
              <text x="164" y="356">Issuer</text>
              <text x="224" y="356">Network</text>
              <text x="272" y="356">...</text>
              <text x="52" y="420">Identity</text>
              <text x="168" y="420">(iss,</text>
              <text x="212" y="420">x5t)</text>
              <text x="52" y="436">Document</text>
              <text x="48" y="500">Private</text>
              <text x="96" y="500">Key</text>
              <text x="268" y="548">Header</text>
              <text x="76" y="628">Sign</text>
              <text x="220" y="628">To</text>
              <text x="244" y="628">Be</text>
              <text x="284" y="628">Signed</text>
              <text x="336" y="628">Bytes</text>
              <text x="36" y="708">COSE</text>
              <text x="76" y="708">Sign</text>
              <text x="104" y="708">1</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
      </artset>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Transmute</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@transmute.industries</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
