<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-07"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization>DataTrails</organization>
      <address>
        <postal>
          <city>Seattle</city>
          <region>WA</region>
          <code>98199</code>
          <country>United States</country>
        </postal>
        <email>steve.lasker@datatrails.ai</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 145?>

<t>Traceability of physical and digital Artifacts in supply chains is a long-standing, but increasingly serious security concern.
The rise in popularity of verifiable data structures as a mechanism to make actors more accountable for breaching their compliance promises has found some successful applications to specific use cases (such as the supply chain for digital certificates), but lacks a generic and scalable architecture that can address a wider range of use cases.</t>
      <t>This document defines a generic, interoperable and scalable architecture to enable transparency across any supply chain with minimum adoption barriers.
It provides flexibility, enabling interoperability across different implementations of Transparency Services with various auditing and compliance requirements.
Issuers can register their Signed Statements on any Transparency Service, with the guarantee that all Auditors and Verifiers will be able to verify them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 154?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document describes the scalable, flexible, and decentralized SCITT architecture.
Its goal is to enhance auditability and accountability across supply chains.</t>
      <t>In supply chains, downstream Artifacts are built upon upstream Artifacts.
The complexity of traceability and quality control for these supply chains increases with the number of Artifacts and parties contributing to them.
There are many parties who publish information about Artifacts:
For example, the original manufacturer may provide information about the state of the Artifact when it left the factory.
The shipping company may add information about the transport environment of the Artifact.
Compliance Auditors may provide information about their compliance assessment of the Artifact.
Security companies may publish vulnerability information about an Artifact.
Some of these parties may publish information about their analysis or use of an Artifact.</t>
      <t>SCITT provides a way for Relying Parties to obtain this information in a way that is "transparent", that is, parties cannot lie about the information that they publish without it being detected.
SCITT achieves this by having producers publish information in a Transparency Service, where Relying Parties can check the information.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="RFC9052"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl>
        <dt>Append-only Log (Ledger):</dt>
        <dd>
          <t>the verifiable append-only data structure that stores Signed Statements in a Transparency Service, often referred to by the synonym Ledger.
SCITT supports multiple Ledger and Receipt formats to accommodate different Transparency Service implementations, and the proof types associated with different types of Append-only Logs.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements issued by a Transparency Service.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where it is possible for a Transparency Service to provide different views of its Append-only log to Relying Parties about the same Artifact <xref target="EQUIVOCATION"/>.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where it is impossible for a Transparency Service to provide different views of its Append-only Log to Relying Parties about the same Artifact.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information. However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Append-only Log.
Receipts are based on Signed Inclusion Proofs, such as those as described in COSE Signed Merkle Tree Proofs <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>;
they can be built on different verifiable data structures, not just binary merkle trees.
A Receipt consists of a Transparency Service-specific inclusion proof for the Signed Statement, a signature by the Transparency Service of the state of the Append-only Log after the inclusion, and additional metadata (contained in the signature's protected headers) to assist in auditing.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Append-only Log, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>a Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version,  or any content an Issuer wishes to publish about an Artifact.
The additional Statements about an Artifact are correlated by the Subject defined in the <xref target="CWT_CLAIMS"/> protected header.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, that represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Verifiers can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Append-only Log, and endorses its state.
A Transparency Service can be a complex system, requiring the Transparency Service to provide many security guarantees about its Append-only Log.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement, and may be registered again in a different Transparency Service.</t>
        </dd>
      </dl>
    </section>
    <section anchor="mybody">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt that countersigns the Signed Statement and witnesses its inclusion in the Append-only Log of a Transparency Service.
By extension, the document may say an Artifact (a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their Append-only Log using a combination of trusted hardware, replication and consensus protocols, and cryptographic evidence.
A Receipt is an offline, universally-verifiable proof that an entry is recorded in the Append-only Log.
Requesting a receipt can result in the production of a new receipt for the same signed statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.
However, the Registrations on a separate Transparency Service is generally disjoint, though it is possible to take a Transparent Statement (i.e. a Signed Statement with a Receipt in its unprotected header, from a from the first Transparency Service) and register it on another Transparency Service, where the second Receipt will be over the first Receipt in the unprotected header.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Append-only Log, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>
          <t>CAs (Issuers) sign X.509 TBSCertificates (Artifacts) to produce X.509 certificates (Signed Statements)</t>
        </li>
        <li>
          <t>CAs submit the certificates to one or more CT logs (Transparency Services)</t>
        </li>
        <li>
          <t>CT logs produce Signed Certificate Timestamps (Transparent Statements)</t>
        </li>
        <li>
          <t>Signed Certificate Timestamps are checked by Relying Parties</t>
        </li>
        <li>
          <t>The Append-only Log can be checked by Auditors</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture consists of a very loose federation of Transparency Services, and a set of common formats and protocols for issuing and registering Signed Statements, and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
Most of the details of the Receipt's contents are specified in the COSE Signed Merkle Tree Proof document <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="704" width="400" viewBox="0 0 400 704" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 16,208 L 16,240" fill="none" stroke="black"/>
            <path d="M 40,304 L 40,384" fill="none" stroke="black"/>
            <path d="M 64,64 L 64,88" fill="none" stroke="black"/>
            <path d="M 64,128 L 64,184" fill="none" stroke="black"/>
            <path d="M 64,320 L 64,336" fill="none" stroke="black"/>
            <path d="M 64,464 L 64,480" fill="none" stroke="black"/>
            <path d="M 80,256 L 80,272" fill="none" stroke="black"/>
            <path d="M 88,352 L 88,368" fill="none" stroke="black"/>
            <path d="M 96,160 L 96,184" fill="none" stroke="black"/>
            <path d="M 120,416 L 120,440" fill="none" stroke="black"/>
            <path d="M 120,496 L 120,648" fill="none" stroke="black"/>
            <path d="M 136,208 L 136,240" fill="none" stroke="black"/>
            <path d="M 152,320 L 152,336" fill="none" stroke="black"/>
            <path d="M 168,352 L 168,368" fill="none" stroke="black"/>
            <path d="M 176,464 L 176,480" fill="none" stroke="black"/>
            <path d="M 208,80 L 208,96" fill="none" stroke="black"/>
            <path d="M 216,272 L 216,336" fill="none" stroke="black"/>
            <path d="M 232,544 L 232,568" fill="none" stroke="black"/>
            <path d="M 240,336 L 240,400" fill="none" stroke="black"/>
            <path d="M 248,112 L 248,264" fill="none" stroke="black"/>
            <path d="M 248,544 L 248,568" fill="none" stroke="black"/>
            <path d="M 272,112 L 272,264" fill="none" stroke="black"/>
            <path d="M 320,80 L 320,96" fill="none" stroke="black"/>
            <path d="M 344,272 L 344,336" fill="none" stroke="black"/>
            <path d="M 344,400 L 344,520" fill="none" stroke="black"/>
            <path d="M 344,536 L 344,648" fill="none" stroke="black"/>
            <path d="M 360,320 L 360,400" fill="none" stroke="black"/>
            <path d="M 376,192 L 376,512" fill="none" stroke="black"/>
            <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
            <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 224,64 L 304,64" fill="none" stroke="black"/>
            <path d="M 32,96 L 96,96" fill="none" stroke="black"/>
            <path d="M 224,112 L 304,112" fill="none" stroke="black"/>
            <path d="M 32,128 L 96,128" fill="none" stroke="black"/>
            <path d="M 112,144 L 232,144" fill="none" stroke="black"/>
            <path d="M 288,176 L 360,176" fill="none" stroke="black"/>
            <path d="M 32,192 L 120,192" fill="none" stroke="black"/>
            <path d="M 32,256 L 120,256" fill="none" stroke="black"/>
            <path d="M 216,272 L 344,272" fill="none" stroke="black"/>
            <path d="M 56,288 L 64,288" fill="none" stroke="black"/>
            <path d="M 96,288 L 208,288" fill="none" stroke="black"/>
            <path d="M 80,304 L 136,304" fill="none" stroke="black"/>
            <path d="M 160,320 L 216,320" fill="none" stroke="black"/>
            <path d="M 344,320 L 360,320" fill="none" stroke="black"/>
            <path d="M 216,336 L 344,336" fill="none" stroke="black"/>
            <path d="M 80,352 L 136,352" fill="none" stroke="black"/>
            <path d="M 176,368 L 240,368" fill="none" stroke="black"/>
            <path d="M 104,384 L 152,384" fill="none" stroke="black"/>
            <path d="M 56,400 L 104,400" fill="none" stroke="black"/>
            <path d="M 240,400 L 360,400" fill="none" stroke="black"/>
            <path d="M 80,448 L 160,448" fill="none" stroke="black"/>
            <path d="M 80,496 L 160,496" fill="none" stroke="black"/>
            <path d="M 136,528 L 216,528" fill="none" stroke="black"/>
            <path d="M 264,528 L 360,528" fill="none" stroke="black"/>
            <path d="M 160,576 L 328,576" fill="none" stroke="black"/>
            <path d="M 136,624 L 304,624" fill="none" stroke="black"/>
            <path d="M 48,656 L 200,656" fill="none" stroke="black"/>
            <path d="M 256,656 L 392,656" fill="none" stroke="black"/>
            <path d="M 32,688 L 184,688" fill="none" stroke="black"/>
            <path d="M 240,688 L 376,688" fill="none" stroke="black"/>
            <path d="M 32,688 L 48,656" fill="none" stroke="black"/>
            <path d="M 136,624 L 160,576" fill="none" stroke="black"/>
            <path d="M 184,688 L 200,656" fill="none" stroke="black"/>
            <path d="M 240,688 L 256,656" fill="none" stroke="black"/>
            <path d="M 304,624 L 328,576" fill="none" stroke="black"/>
            <path d="M 376,688 L 392,656" fill="none" stroke="black"/>
            <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
            <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
            <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
            <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
            <path d="M 224,64 C 215.16936,64 208,71.16936 208,80" fill="none" stroke="black"/>
            <path d="M 304,64 C 312.83064,64 320,71.16936 320,80" fill="none" stroke="black"/>
            <path d="M 32,96 C 23.16936,96 16,103.16936 16,112" fill="none" stroke="black"/>
            <path d="M 96,96 C 104.83064,96 112,103.16936 112,112" fill="none" stroke="black"/>
            <path d="M 224,112 C 215.16936,112 208,104.83064 208,96" fill="none" stroke="black"/>
            <path d="M 304,112 C 312.83064,112 320,104.83064 320,96" fill="none" stroke="black"/>
            <path d="M 32,128 C 23.16936,128 16,120.83064 16,112" fill="none" stroke="black"/>
            <path d="M 96,128 C 104.83064,128 112,120.83064 112,112" fill="none" stroke="black"/>
            <path d="M 112,144 C 103.16936,144 96,151.16936 96,160" fill="none" stroke="black"/>
            <path d="M 232,144 C 240.83064,144 248,136.83064 248,128" fill="none" stroke="black"/>
            <path d="M 288,176 C 279.16936,176 272,168.83064 272,160" fill="none" stroke="black"/>
            <path d="M 360,176 C 368.83064,176 376,183.16936 376,192" fill="none" stroke="black"/>
            <path d="M 32,192 C 23.16936,192 16,199.16936 16,208" fill="none" stroke="black"/>
            <path d="M 120,192 C 128.83064,192 136,199.16936 136,208" fill="none" stroke="black"/>
            <path d="M 32,256 C 23.16936,256 16,248.83064 16,240" fill="none" stroke="black"/>
            <path d="M 120,256 C 128.83064,256 136,248.83064 136,240" fill="none" stroke="black"/>
            <path d="M 56,288 C 47.16936,288 40,295.16936 40,304" fill="none" stroke="black"/>
            <path d="M 64,288 C 72.83064,288 80,280.83064 80,272" fill="none" stroke="black"/>
            <path d="M 96,288 C 87.16936,288 80,280.83064 80,272" fill="none" stroke="black"/>
            <path d="M 80,304 C 71.16936,304 64,311.16936 64,320" fill="none" stroke="black"/>
            <path d="M 136,304 C 144.83064,304 152,311.16936 152,320" fill="none" stroke="black"/>
            <path d="M 152,336 C 160.83064,336 168,343.16936 168,352" fill="none" stroke="black"/>
            <path d="M 80,352 C 71.16936,352 64,344.83064 64,336" fill="none" stroke="black"/>
            <path d="M 136,352 C 144.83064,352 152,344.83064 152,336" fill="none" stroke="black"/>
            <path d="M 104,384 C 95.16936,384 88,376.83064 88,368" fill="none" stroke="black"/>
            <path d="M 152,384 C 160.83064,384 168,376.83064 168,368" fill="none" stroke="black"/>
            <path d="M 56,400 C 47.16936,400 40,392.83064 40,384" fill="none" stroke="black"/>
            <path d="M 104,400 C 112.83064,400 120,407.16936 120,416" fill="none" stroke="black"/>
            <path d="M 136,400 C 127.16936,400 120,407.16936 120,416" fill="none" stroke="black"/>
            <path d="M 136,400 C 144.83064,400 152,392.83064 152,384" fill="none" stroke="black"/>
            <path d="M 80,448 C 71.16936,448 64,455.16936 64,464" fill="none" stroke="black"/>
            <path d="M 160,448 C 168.83064,448 176,455.16936 176,464" fill="none" stroke="black"/>
            <path d="M 80,496 C 71.16936,496 64,488.83064 64,480" fill="none" stroke="black"/>
            <path d="M 160,496 C 168.83064,496 176,488.83064 176,480" fill="none" stroke="black"/>
            <path d="M 136,528 C 127.16936,528 120,520.83064 120,512" fill="none" stroke="black"/>
            <path d="M 216,528 C 224.83064,528 232,535.16936 232,544" fill="none" stroke="black"/>
            <path d="M 264,528 C 255.16936,528 248,535.16936 248,544" fill="none" stroke="black"/>
            <path d="M 360,528 C 368.83064,528 376,520.83064 376,512" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="352,648 340,642.4 340,653.6" fill="black" transform="rotate(90,344,648)"/>
            <path class="jump" d="M 344,536 C 350,536 350,520 344,520" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="280,264 268,258.4 268,269.6" fill="black" transform="rotate(90,272,264)"/>
            <polygon class="arrowhead" points="256,568 244,562.4 244,573.6" fill="black" transform="rotate(90,248,568)"/>
            <polygon class="arrowhead" points="256,264 244,258.4 244,269.6" fill="black" transform="rotate(90,248,264)"/>
            <polygon class="arrowhead" points="240,568 228,562.4 228,573.6" fill="black" transform="rotate(90,232,568)"/>
            <polygon class="arrowhead" points="216,288 204,282.4 204,293.6" fill="black" transform="rotate(0,208,288)"/>
            <polygon class="arrowhead" points="184,368 172,362.4 172,373.6" fill="black" transform="rotate(180,176,368)"/>
            <polygon class="arrowhead" points="168,320 156,314.4 156,325.6" fill="black" transform="rotate(180,160,320)"/>
            <polygon class="arrowhead" points="128,648 116,642.4 116,653.6" fill="black" transform="rotate(90,120,648)"/>
            <polygon class="arrowhead" points="128,440 116,434.4 116,445.6" fill="black" transform="rotate(90,120,440)"/>
            <polygon class="arrowhead" points="104,184 92,178.4 92,189.6" fill="black" transform="rotate(90,96,184)"/>
            <polygon class="arrowhead" points="72,184 60,178.4 60,189.6" fill="black" transform="rotate(90,64,184)"/>
            <polygon class="arrowhead" points="72,88 60,82.4 60,93.6" fill="black" transform="rotate(90,64,88)"/>
            <g class="text">
              <text x="60" y="52">Artifact</text>
              <text x="260" y="84">Identity</text>
              <text x="264" y="100">Documents</text>
              <text x="64" y="116">Statement</text>
              <text x="180" y="132">cose</text>
              <text x="220" y="132">sign</text>
              <text x="300" y="132">cose</text>
              <text x="348" y="132">verify</text>
              <text x="76" y="212">Signed</text>
              <text x="80" y="228">Statement</text>
              <text x="76" y="244">(COSE_Sign1)</text>
              <text x="276" y="292">Transparency</text>
              <text x="104" y="324">Receipt</text>
              <text x="264" y="324">Service</text>
              <text x="300" y="356">Transparency</text>
              <text x="128" y="372">Receipt</text>
              <text x="280" y="388">Service</text>
              <text x="120" y="468">Transparent</text>
              <text x="120" y="484">Statement</text>
              <text x="188" y="596">Verify</text>
              <text x="264" y="596">Transparent</text>
              <text x="232" y="612">Statement</text>
              <text x="80" y="676">Collect</text>
              <text x="148" y="676">Receipts</text>
              <text x="300" y="676">Replay</text>
              <text x="344" y="676">Log</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
 .----------.
|  Artifact  |
 '-----+----'             .-----------.
       v                 |  Identity   |
  .----+----.            |  Documents  |
 | Statement |            '---+--+----'
  '----+----'       cose sign |  | cose verify
       |    .----------------'|  |
       |   |                  |  |
       v   v                  |  |'----------.
  .----+---+---.              |  |            |
 |    Signed    |             |  |            |
 |   Statement  |             |  |            |
 | (COSE_Sign1) |             |  |            |
  '------+-----'              v  v            |
         |                +---+--+--------+   |
     .--' '-------------->+ Transparency  |   |
    |   .--------.        |               |   |
    |  | Receipt  +<------+  Service      +-+ |
    |  |          +.      +--+------------+ | |
    |   '-+------'  |        | Transparency | |
    |     | Receipt +<-------+              | |
    |      '------+'         | Service      | |
     '-------. .-'           +------------+-+ |
              |                           |   |
              v                           |   |
        .-----+-----.                     |   |
       | Transparent |                    |   |
       |  Statement  |                    |   |
        '-----+-----'                     |   |
              |                           |   |
              |'-----------.   .----------)--'
              |             | |           |
              |             v v           |
              |    .--------+-+---------. |
              |   / Verify Transparent /  |
              |  /      Statement     /   |
              | '--------------------'    |
              v                           v
     .--------+---------.      .----------+-----.
    / Collect Receipts /      /   Replay Log   /
   '------------------'      '----------------'
]]></artwork>
      </artset>
      <t>This section describes at a high level, the three main roles and associated processes in SCITT: Issuers and Signed Statements, Transparency Service and the Signed Statement Registration process, as well as Relying Parties of the Transparent Statements and the Receipt validation process.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature an Append-only Log.
The Append-only Log is the verifiable data structure that records Signed Statements and supports the production of Receipts.</t>
        <t>All Transparency Services <bcp14>MUST</bcp14> expose APIs for the Registration of Signed Statements and issuance of Receipts.</t>
        <t>Transparency Services <bcp14>MAY</bcp14> support additional APIs for auditing, for instance, to query the history of Signed Statements.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example</tt> may have a distinct Issuer identity for each sub domain, such as <tt>customer1.ts.example</tt> and <tt>customer2.ts.example</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is accepted to be registered to the Append-only Log.</t>
          <t>Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.</t>
          <t>Transparency Services <bcp14>MUST</bcp14> also maintain a list of trust anchors, which <bcp14>SHOULD</bcp14> be used by Relying Parties to authenticate Issuers, and which <bcp14>MAY</bcp14> be included in a Registration Policy statement.
For instance, a trust anchor could be an X.509 root certificate, the discovery URL of an OpenID Connect identity provider, or any other COSE compatible PKI trust anchor.</t>
          <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made transparent and available to all Relying Parties of the Transparency Service by registering them as Signed Statements on the Append-only Log, and distributing the associated Receipts.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="RFC9052"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>In essence, when using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certificate chain from the Issuer's certificate identified by <tt>x5t</tt> located in the protected header of the COSE_Sign1 Envelope, to one of the root certificates most recently registered as a trust anchor of the Transparency Service.
An <tt>x5chain</tt> with a leaf certificate that corresponds to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header in support of certain supply chain scenarios.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently added to the Append-only Log at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors (either in the Append-only Log and retrievable through audit APIs, or included in the Receipt) to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>
              <t>A built-in default Registration Policy and default trust anchors;</t>
            </li>
            <li>
              <t>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</t>
            </li>
            <li>
              <t>An out-of-band authenticated management interface</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-append-only-log">
          <name>Append-only Log</name>
          <t>The security properties of the Append-only Log are determined by the choice of the verifiable data structure used by the Transparency Service to implement the Log.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>once included in the verifiable data structure, a Signed Statement cannot be modified, deleted, or reordered; hence its Receipt provides an offline verifiable proof of Registration.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the Append-only Log.
Everyone with access to its content sees the same collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Append-only Log includes sufficient information to enable authorized actors with access to its content to check that each included Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that is supporting a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
      <section anchor="sec-signed-statements">
        <name>Signed Statements</name>
        <t>This specification prioritizes conformance to <xref target="RFC9052"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissability of conforming messages.
This specification is left intentionally open to allow implementations to make the restrictions that make the most sense for their operational use cases.</t>
        <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="COSWID"/></t>
          </li>
          <li>
            <t><xref target="CycloneDX"/></t>
          </li>
          <li>
            <t><xref target="in-toto"/></t>
          </li>
          <li>
            <t><xref target="SPDX-CBOR"/></t>
          </li>
          <li>
            <t><xref target="SPDX-JSON"/></t>
          </li>
          <li>
            <t><xref target="SLSA"/></t>
          </li>
          <li>
            <t><xref target="SWID"/></t>
          </li>
        </ul>
        <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.
The SCITT tag <tt>COSE_Sign1_Tagged</tt> is outside the scope of COSE, and used to indicate that a signed object is a Signed Statement.</t>
        <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
        <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the resolved key manifest) for different Artifacts, or sign all Signed Statements under the same key.</t>
        <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
        <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
        <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
        <t>At least one identifier for an identity document <bcp14>MUST</bcp14> be included in the protected header of the COSE Envelope, as one of <tt>x5t</tt> or <tt>kid</tt>.
Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
        <ul spacing="normal">
          <li>
            <t>When using x509, Support for <tt>x5t</tt> is mandatory to implement.</t>
          </li>
          <li>
            <t>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected heaer is optional.</t>
          </li>
        </ul>
        <t>When <tt>x5t</tt> is present, <tt>iss</tt> <bcp14>MUST</bcp14> be a string with a value between 1 and 8192 characters in length that fits the regular expression of a distinguished name.</t>
        <t>The mechanisms for how Transparency Services obtain identity documents is out-of-scope of this document.</t>
        <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when <tt>x5t</tt> is not present.
Key discovery protocols are out-of-scope of this document.</t>
        <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="CWT_CLAIMS_COSE"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
        <t>A Receipt is a Signed Statement, (cose-sign1), with addition Claims in its protected header related to verifying the inclusion proof in its unprotected header. See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
        <section anchor="sec-signed-statement-examples">
          <name>Signed Statement Examples</name>
          <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition (see <xref target="RFC8610"/>) for of the protected header and unprotected header of Signed Statements and Receipts.</t>
          <t>Everything that is optional in the following CDDL definition can potentially be discovered out of band and Registration Policies are not assured on the presence of these optional fields.
A Registration Policy that requires an optional field to be present <bcp14>MUST</bcp14> reject any Signed Statements or Receipts that are invalid according to the Registration Policy.</t>
          <figure anchor="fig-signed-statement-cddl">
            <name>CDDL definition for Signed Statements and Receipts</name>
            <sourcecode type="cddl"><![CDATA[
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &(CWT_Claims: 15) => CWT_Claims
  ? &(alg: 1) => int
  ? &(content_type: 3) => tstr / uint
  ? &(kid: 4) => bstr
  ? &(x5t: 34) => COSE_CertHash
  * int => any
}

CWT_Claims = {
  &(iss: 1) => tstr
  &(sub: 2) => tstr
  * int => any
}

Unprotected_Header = {
  ? &(x5chain: 33) => COSE_X509
  ? &(receipts: 394)  => [+ Receipt]
  * int => any
}
]]></sourcecode>
          </figure>
          <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in EDN, with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
          <figure anchor="fig-signed-statement-edn">
            <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
            <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012603...6d706c65',       / Protected                     /
      {},                           / Unprotected                   /
      nil,                          / Detached payload              /
      h'79ada558...3a28bae4'        / Signature                     /
    ]
)
]]></sourcecode>
          </figure>
          <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
          <figure anchor="fig-signed-statement-protected-header-edn">
            <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
            <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  3: application/example+json,      / Content type                  /
  4: h'50685f55...50523255',        / Key identifier                /
  15: {                             / CWT Claims                    /
    1: software.vendor.example,     / Issuer                        /
    2: vendor.product.example,      / Subject                       /
  }
}
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="sec-registration">
        <name>Registration</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Client authentication:</strong> A Client authenticates with the Transparency Service, to Register Signed Statements on behalf of one or more Issuers.
Authentication and authorization is implementation-specific, and out of scope of the SCITT Architecture.</t>
          </li>
          <li>
            <t><strong>Issuer Verification:</strong> The Transparency Service <bcp14>MUST</bcp14> syntactically validate the Issuer's identity Claims, which may be different than the Client identity.</t>
          </li>
          <li>
            <t><strong>Signature verification:</strong> The Transparency Service <bcp14>MUST</bcp14> verify the signature of the Signed Statement, as described in <xref target="RFC9360"/>, using the signature algorithm and verification key of the Issuer.</t>
          </li>
          <li>
            <t><strong>Signed Statement validation:</strong> The Transparency Service <bcp14>MUST</bcp14> check that the Signed Statement includes the required protected headers listed above.
The Transparency Service <bcp14>MAY</bcp14> verify the Statement payload format, content and other optional properties.</t>
          </li>
          <li>
            <t><strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope, and may use information contained in the attributes of named policies.</t>
          </li>
          <li>
            <t><strong>Register the Signed Statement</strong> to the Append-only Log.</t>
          </li>
          <li>
            <t><strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Statements.
A Receipt for a Signed Statement <bcp14>MAY</bcp14> be provided asynchronously.
Details about generating Receipts are described in <xref target="Receipt"/>.</t>
          </li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements recorded in the Append-only Log.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
      </section>
      <section anchor="Receipt">
        <name>Transparent Statements</name>
        <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the Unprotected Header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
        <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
        <t>Receipts are based on Signed Inclusion Proofs as described in COSE Signed Merkle Tree Proofs (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) that also provides the COSE header parameter semantics for label 394.</t>
        <t>The Registration time is defined as the timestamp at which the Transparency Service has added this Signed Statement to its Append-only Log.</t>
        <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.</t>
        <figure anchor="fig-transparent-statement-cddl">
          <name>CDDL definition for a Transparent Statement</name>
          <sourcecode type="cddl"><![CDATA[
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &(receipts: 394)  => [+ Receipt]
}
]]></sourcecode>
        </figure>
        <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
        <figure anchor="fig-transparent-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012603...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        394: [                      / Receipts (2)                  /
          h'd284586c...4191f9d2'    / Receipt 1                     /
          h'c624586c...8f4af97e'    / Receipt 2                     /
        ]
      },
      nil,                          / Detached payload              /
      h'79ada558...3a28bae4'        / Signature                     /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Referencing the COSE Verifiable Data Structure Registry, RFC9162_SHA256 is value <tt>1</tt>, which supports <tt>-1</tt> (inclusion proofs) and <tt>-2</tt> (consistency proofs).</t>
        <figure anchor="fig-receipt-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4012604...6d706c65',       / Protected                     /
      {                             / Unprotected                   /
        -222: {                     / Proofs                        /
          -1: [                     / Inclusion proofs (1)          /
            h'83080783...32568964', / Inclusion proof 1             /
          ]
        },
      },
      nil,                          / Detached payload              /
      h'10f6b12a...4191f9d2'        / Signature                     /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
        <figure anchor="fig-receipt-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -7,                            / Algorithm                     /
  4: h'50685f55...50523255',        / Key identifier                /
  -111: 1,                          / Verifiable Data Structure     /
  15: {                             / CWT Claims                    /
    1: transparency.vendor.example, / Issuer                        /
    2: vendor.product.example,      / Subject                       /
  }
}
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Append-only Log was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
        <figure anchor="fig-receipt-inclusion-proof-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
          <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1             /
  8,                                / Tree size                     /
  7,                                / Leaf index                    /
  [                                 / Inclusion hashes (3)          /
     h'c561d333...f9850597'         / Intermediate hash 1           /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2           /
     h'0bdaaed3...32568964'         / Intermediate hash 3           /
  ]
]
]]></sourcecode>
        </figure>
        <section anchor="validation">
          <name>Validation</name>
          <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in Section 4.4 of RFC9052, when checking the signature of Signed Statements and Receipts.</t>
          <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
          <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them, and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
          <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
          <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
          <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Transparency Services are often publicly accessible.
Issuers should treat Signed Statements (rendering them as Transparent Statements) as publicly accessible.
In particular, a Signed Statement Envelope and Statement payload should not carry any private information in plaintext.</t>
      <t>Transparency Services can have an authorization policy controlling who can access the Append-only Log.
While this can be used to limit who can read the Log, it may also limit the usefulness of the system.</t>
      <t>Some jurisdictions have a Right to be Forgotten.
However, once a Signed Statement is inserted into the Append-only Log maintained by a Transparency Service, it cannot be removed from the Log.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>On its own, verifying a Transparent Statement does not guarantee that its Envelope or contents are trustworthy.
Just that they have been signed by the apparent Issuer and counter-signed by the Transparency Service.
If the Verifier trusts the Issuer, after validation of the Issuer identity, it can infer that an Issuer's Signed Statement was issued with this Envelope and contents, which may be interpreted as the Issuer saying the Artifact is fit for its intended purpose.
If the Verifier trusts the Transparency Service, it can independently infer that the Signed Statement passed the Transparency Service Registration Policy and that has been persisted in the Append-only Log.
Unless advertised in the Transparency Service Registration Policy, the Verifier cannot assume that the ordering of Signed Statements in the Append-only Log matches the ordering of their issuance.</t>
      <t>Similarly, the fact that an Issuer can be held accountable for its Transparent Statements does not on its own provide any mitigation or remediation mechanism in case one of these Transparent Statements turned out to be misleading or malicious.
Just that signed evidence will be available to support them.</t>
      <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      <t>Issuers <bcp14>MUST</bcp14> ensure that the Statement payloads in their Signed Statements are correct and unambiguous, for example by avoiding ill-defined or ambiguous formats that may cause Relying Parties to interpret the Signed Statement as valid for some other purpose.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> carefully protect their private signing keys and avoid these keys being used for any purpose not described in this architecture document.
In cases where key re-use is unavoidable, keys <bcp14>MUST NOT</bcp14> sign any other message that may be verified as an Envelope as part of a Signed Statement.</t>
      <t>Each of these functions <bcp14>MUST</bcp14> be carefully protected against both external attacks and internal misbehavior by some or all of the operators of the Transparency Service.</t>
      <t>For instance, the code for the Registration Policy evaluation and endorsement may be protected by running in a Trusted Execution Environment (TEE).</t>
      <t>The Transparency Service may be replicated with a consensus algorithm, such as Practical Byzantine Fault Tolerance <xref target="PBFT"/> and may be used to protect against malicious or vulnerable replicas.
Threshold signatures may be use to protect the service key, etc.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> rotate verification keys for signature checking in well-defined cryptoperiods (see <xref target="KEY-MANAGEMENT"/>).</t>
      <t>A Transparency Service <bcp14>MAY</bcp14> provide additional authenticity assurances about its secure implementation and operation, enabling remote attestation of the hardware platforms and/or software Trusted Computing Bases (TCB) that run the Transparency Service.
If present, these additional authenticity assurances <bcp14>MUST</bcp14> be registered in the Append-only Log and <bcp14>MUST</bcp14> always be exposed by the Transparency Services' APIs.
An example of Signed Statement's payloads that can improve authenticity assurances are trustworthiness assessments that are RATS Conceptual Messages, such as Evidence, Endorsements, or corresponding Attestation Results (see <xref target="RFC9334"/>).</t>
      <t>For example, if a Transparency Service is implemented using a set of redundant replicas, each running within its own hardware-protected trusted execution environments (TEEs), then each replica can provide fresh Evidence or fresh Attestation Results about its TEEs. The respective Evidence can show, for example, the binding of the hardware platform to the software that runs the Transparency Service, the long-term public key of the service, or the key used by the replica for signing Receipts. The respective Attestation Result, for example, can show that the remote attestation Evidence was appraised by a trusted Verifier and complies with well-known Reference Values and Endorsements.</t>
      <t>Auditors should be aware that the certification path information included in an unprotected <tt>x5chain</tt> header of a to-be-registered Signed Statement can be tampered with by a malicious Transparency Service (e.g., one that does not incorporate remote attestation), which may replace the intermediate certificates and ultimately connect to an unexpected root.
This modification can allow malicious TS to forge Claims that look genuine except for the wrong trust anchor.
Auditors <bcp14>MUST</bcp14> perform certification path validation in accordance with PKIX rules specified in <xref target="RFC5280"/>.
In particular, Auditors <bcp14>MUST</bcp14> verify that certification paths chain to one or more trust anchors (often represented as root certificates).</t>
      <section anchor="sec-security-guarantees">
        <name>Security Guarantees</name>
        <t>SCITT provides the following security guarantees:</t>
        <ol spacing="normal" type="1"><li>
            <t>Statements made by Issuers about supply chain Artifacts are identifiable, can be authenticated, and once authenticated, are non-repudiable</t>
          </li>
          <li>
            <t>Statement provenance and history can be independently and consistently audited</t>
          </li>
          <li>
            <t>Issuers can efficiently prove that their Statement is logged by a Transparency Service</t>
          </li>
        </ol>
        <t>The first guarantee is achieved by requiring Issuers to sign their Statements and associated metadata using a distributed public key infrastructure.
The second guarantee is achieved by storing the Signed Statement on an Append-only Log.
The third guarantee is achieved by implementing the Append-only Log using a verifiable data structure (such as a Merkle Tree <xref target="MERKLE"/>).</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>The document provides a generic threat model for SCITT, describing its residual security properties when some of its actors (identity providers, Issuers, Transparency Services, and Auditors) are corrupt or compromised.</t>
        <t>This model may need to be refined to account for specific supply chains and use cases.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
These guarantees are meant to hold for extensive periods of time, possibly decades.</t>
        <t>It can never be assumed that some Issuers and some Transparency Services will not be corrupt.</t>
        <t>SCITT entities explicitly trust one another on the basis of their long-term identity, which maps to shorter-lived cryptographic credentials.
A Verifier <bcp14>SHOULD</bcp14> validate a Transparent Statement originating from a given Issuer, registered at a given Transparency Service (both identified in the Verifier's local authorization policy) and would not depend on any other Issuer or Transparency Services.</t>
        <t>Authorized supply chain actors (Issuers) cannot be stopped from producing Signed Statements including false assertions in their Statement payload (either by mistake or by corruption), but these Issuers can made accountable by ensuring their Signed Statements are systematically registered at a trustworthy Transparency Service.</t>
        <t>Similarly, providing strong residual guarantees against faulty/corrupt Transparency Services is a SCITT design goal.
Preventing a Transparency Service from registering Signed Statements that do not meet its stated Registration Policy, or to issue Receipts that are not consistent with their Append-only Log is not possible.
In contrast Transparency Services can be held accountable and they can be called out by any Auditor that replays their Append-only Log against any contested Receipt.
Note that the SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.</t>
        <t>In both cases, the SCITT Architecture provides generic, universally-verifiable cryptographic proof to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT Architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
In particular, so long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
        <section anchor="sec-append-only-log-1">
          <name>Append-only Log</name>
          <t>If a Transparency Service is honest, then a Transparent Statement including a correct Receipt ensures that the associated Signed Statement passed its Registration Policy and was recorded appropriately.</t>
          <t>Conversely, a corrupt Transparency Service may:</t>
          <ol spacing="normal" type="1"><li>
              <t>refuse or delay the Registration of Signed Statements</t>
            </li>
            <li>
              <t>register Signed Statements that do not pass its Registration Policy (e.g., Signed Statement with Issuer identities and signatures that do not verify)</t>
            </li>
            <li>
              <t>issue verifiable Receipts for Signed Statements that do not match its Append-only Log</t>
            </li>
            <li>
              <t>refuse access to its Transparency Service (e.g., to Auditors, possibly after storage loss)</t>
            </li>
          </ol>
          <t>An Auditor granted (partial) access to a Transparency Service and to a collection of disputed Receipts will be able to replay it, detect any invalid Registration (2) or incorrect Receipt in this collection (3), and blame the Transparency Service for them.
This ensures any Verifier that trusts at least one such Auditor that (2, 3) will be blamed to the Transparency Service.</t>
          <t>Due to the operational challenge of maintaining a globally consistent Append-only Log, some Transparency Services may provide limited support for historical queries on the Signed Statements they have registered, and accept the risk of being blamed for inconsistent Registration or Issuer Equivocation.</t>
          <t>Relying Parties and Auditors may also witness (1, 4) but may not be able to collect verifiable evidence for it.</t>
        </section>
        <section anchor="sec-availability-of-receipts">
          <name>Availability of Receipts</name>
          <t>Networking and Storage are trusted only for availability.</t>
          <t>Auditing may involve access to data beyond what is persisted in the Transparency Services.
For example, the registered Transparency Service may include only the hash of a detailed SBOM, which may limit the scope of auditing.</t>
          <t>Resistance to denial-of-service is implementation specific.</t>
          <t>Actors may want to independently keep their own record of the Signed Statements they issue, endorse, verify, or audit.</t>
        </section>
        <section anchor="sec-confidentiality-and-privacy">
          <name>Confidentiality and Privacy</name>
          <t>According to Zero Trust Principles any location in a network is never trusted.
All contents exchanged between actors is protected using secure authenticated channels (e.g., TLS) but may not exclude network traffic analysis.</t>
          <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Some Transparency Services may publish every Signed Statement in their logs, to facilitate their dissemination and auditing.
Transparency Services <bcp14>MAY</bcp14> return Receipts to Client applications synchronously or asynchronously.</t>
          <t>A collection of Signed Statements must not leak information about the contents of other Signed Statements registered on the Transparency Service.</t>
          <t>Issuers must carefully review the inclusion of private/confidential materials in their Statements.
For example, Issuers must remove Personally Identifiable Information (PII) as clear text in the Statement.
Alternatively, Issuers may include opaque cryptographic Statements, such as hashes.</t>
          <t>The confidentiality of queries is implementation-specific, and generally not guaranteed.
For example, while offline Envelope validation of Signed Statements is private, a Transparency Service may monitor which of its Transparent Statements are being verified from lookups to ensure their freshness.</t>
        </section>
        <section anchor="sec-cryptographic-agility">
          <name>Cryptographic Agility</name>
          <t>The SCITT Architecture supports cryptographic agility.
The actors depend only on the subset of signing and Receipt schemes they trust.
This enables the gradual transition to stronger algorithms, including e.g. post-quantum signature algorithms.</t>
        </section>
        <section anchor="sec-transparency-service-client-applications">
          <name>Transparency Service Client Applications</name>
          <t>Authentication of Client applications is out of scope for this document.
Transparency Services <bcp14>MUST</bcp14> authenticate both Client applications and the Issuer of Signed Statements in order to ensure that implementation specific authentication and authorization policies are enforced.
The specification of authentication and authorization policies is out of scope for this document.</t>
        </section>
        <section anchor="sec-impersonation">
          <name>Impersonation</name>
          <t>The identity resolution mechanism is trusted to associate long-term identifiers with their public signature-verification keys.
Transparency Services and other parties may record identity-resolution evidence to facilitate its auditing.</t>
          <t>If one of the credentials of an Issuer gets compromised, the SCITT Architecture still guarantees the authenticity of all Signed Statements signed with this credential that have been registered on a Transparency Service before the compromise.
It is up to the Issuer to notify Transparency Services of credential revocation to stop Relying Parties from accepting Signed Statements signed with compromised credentials.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-media-type-registration">
        <name>Media Type Registration</name>
        <t>Pending WG discussion.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="COSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="18" month="June" year="2024"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-05"/>
        </reference>
        <reference anchor="CWT_CLAIMS_COSE">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
        </reference>
        <reference anchor="IANA.cwt" target="http://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.named-information" target="http://www.iana.org/assignments/named-information">
          <front>
            <title>Named Information</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-29"/>
        </reference>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
        </reference>
        <reference anchor="NIST.SP.800-63-3" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">
          <front>
            <title>Digital identity guidelines: revision 3</title>
            <author fullname="Paul A Grassi" surname="Grassi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael E Garcia" surname="Garcia">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="James L Fenton" surname="Fenton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="22" month="June" year="2017"/>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="800-63-3"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-63-3"/>
        </reference>
        <reference anchor="FIPS.201">
          <front>
            <title>Personal identity verification (PIV) of federal employees and contractors</title>
            <author fullname="Charles H Romine" initials="C." surname="Romine">
              <organization/>
            </author>
            <date month="January" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.201-3"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="ISO.17000.2020" target="https://www.iso.org/standard/73029.html">
          <front>
            <title>ISO/IEC 17000:2020</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="CWT_CLAIMS" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION">
          <front>
            <title>Attested append-only memory: making adversaries stick to their word</title>
            <author fullname="Byung-Gon Chun" initials="B." surname="Chun">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="Petros Maniatis" initials="P." surname="Maniatis">
              <organization>Intel Research Berkeley, Berkeley</organization>
            </author>
            <author fullname="Scott Shenker" initials="S." surname="Shenker">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="John Kubiatowicz" initials="J." surname="Kubiatowicz">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <date month="October" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGOPS Operating Systems Review" value="vol. 41, no. 6, pp. 189-204"/>
          <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MERKLE">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author fullname="Ralph C. Merkle" initials="R." surname="Merkle">
              <organization/>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="Advances in Cryptology — CRYPTO ’87" value="pp. 369-378"/>
          <seriesInfo name="DOI" value="10.1007/3-540-48184-2_32"/>
          <seriesInfo name="ISBN" value="[&quot;9783540187967&quot;, &quot;9783540481843&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="PBFT">
          <front>
            <title>Practical byzantine fault tolerance and proactive recovery</title>
            <author fullname="Miguel Castro" initials="M." surname="Castro">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Barbara Liskov" initials="B." surname="Liskov">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 20, no. 4, pp. 398-461"/>
          <seriesInfo name="DOI" value="10.1145/571637.571640"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="URLs" target="https://url.spec.whatwg.org/">
          <front>
            <title>URL Living Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="21" month="April" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of in a
   sequence of characters.  This simplifies parsing, comparison, and
   reference resolution in environments with severe limitations on
   processing power, code size, and memory size.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –15 of this draft continues -14 by picking up
   // more comments, such as moving to a CRI scheme number registration
   // system based on unsigned numbers.  This revision still contains
   // open issues and is intended to serve as a snapshot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-15"/>
        </reference>
        <reference anchor="KEY-MANAGEMENT">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 899?>

<section anchor="sec-common-terminology-disambiguation">
      <name>Common Terminology Disambiguation</name>
      <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups.</t>
      <t>This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and in particular, the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
      <t>The terms "verifier" and "Relying Party" are used interchangeably through the document. While these terms are related to "Verifier" and "Relying Party" as used in <xref target="RFC9334"/>, they do not imply the processing of RATS conceptual messages, such as Evidence or Attestation Results that are specific to remote attestation. A SCITT "verifier" and "Relying Party" and "Issuer" of Receipts or Statements might take on the role of a RATS "Attester". Correspondingly, all RATS conceptual messages, such as Evidence and Attestation Results, can be the content of SCITT Statements and a SCITT "verifier" can also take on the role of a RATS "Verifier" to, for example, conduct the procedure of Appraisal of Evidence as a part of a SCITT "verifier"'s verification capabilities.</t>
      <t>The terms "Claim" and "Statement" are used throughout this document, where Claim is consistent with the usage in <xref target="I-D.draft-ietf-rats-eat"/> and <xref target="RFC7523"/>, and Statement is reserved for any arbitrary bytes, possibly identified with a media type, about which the Claims are made.</t>
      <t>The term "Subject" provides an identifier of the Issuer's choosing to refer to a given Artifact, and ensures that all associated Statements can be attributed to the identifier chosen by the Issuer.</t>
      <t>In simpler language, a SCITT Statement could be some vendor-specific software bill of materials (SBOM), results from a model checker, static analyzer, or RATS Evidence about the authenticity of an SBOM creation process, where the Issuer identifies themselves using the <tt>iss</tt> Claim, and the specific software that was analyzed as the Subject using the <tt>sub</tt> Claim.</t>
      <t>In <xref target="RFC7523"/>, the Authorization Server (AS) verifies Private Key JWT client authentication requests, and issues access tokens to clients configured to use "urn:ietf:params:oauth:client-assertion-type:jwt-bearer". This means the AS initially acts as a "verifier", and then later as an "Issuer". This mirrors how Signed Statements are verified before Receipts are issued by a Transparency Service.</t>
      <t><xref target="FIPS.201"/> defines "assertion" as "A verifiable statement from an IdP to an RP that contains information about an end user".</t>
      <t><xref target="NIST.SP.800-63-3"/> defines "assertion" as "A statement from a verifier to an RP that contains information about a subscriber.
Assertions may also contain verified attributes."</t>
      <t>This document uses the term Statement to refer to potentially unsecured data and associated Claims, and Signed Statement and Receipt to refer to assertions from an Issuer, or the Transparency Service.</t>
      <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."</t>
      <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="ISO.17000.2020"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.". In the RATS context, a "NIST attestation" is similar to a RATS "Endorsement". Occasionally, RATS Evidence and RATS Attestation Results or the procedures of creating these conceptual messages are referred to as "attestation" or (in cases of the use as a verb) "to attest". The stand-alone use of "attestation" and "to attest" is discouraged outside a well-defined context, such as specification text that highlights the application of terminology, explicitly. Correspondingly, it is often useful for the intended audience to qualify the term "attestation" to avoid confusion and ambiguity.</t>
    </section>
    <section anchor="sec-identifiers">
      <name>Identifiers</name>
      <t>This section provides informative examples of identifiers for Statements, Signed Statements, and Receipts.</t>
      <t>SCITT Identifiers are primarily meant to be understood by humans and secondarily meant to be understood by machines, as such we define text encodings for message identifiers first, and then provide binary translations according to standard transformations for URLs and URNs to binary formats.</t>
      <t>SCITT Identifiers for URLs and URNs that are not Data URLs <bcp14>MUST</bcp14> be represented in binary using <xref target="I-D.draft-ietf-core-href"/>.</t>
      <t>For each SCITT conceptual message, we define a Data URL format according to <xref target="RFC2397"/>, a URN format according to <xref target="RFC8141"/> and a URL format according to <xref target="URLs"/>.</t>
      <t>Note that Data URLs require base64 encoding, but the URN definitions require base64url encoding.</t>
      <t>Resolution and dereferencing of these identifiers is out of scope for this document, and can be implemented by any concrete api implementing the abstract interface defined as follows:</t>
      <artwork><![CDATA[
resource: content-type = dereference(identifier: identifier-type)
]]></artwork>
      <t>These identifiers <bcp14>MAY</bcp14> be present in a <tt>tstr</tt> field that does not otherwise restrict the string in ways that prevent a URN or URL from being present.</t>
      <t>This includes <tt>iss</tt>, and <tt>sub</tt> which are used to express the Issuer and Subject of a Signed Statement or Receipt.</t>
      <t>This also includes <tt>kid</tt> which is used to express a hint for which public key should be used to verify a signature.</t>
      <t>All SCITT identifiers share common parameters to promote interoperability:</t>
      <t>Let hash-name be an algorithm name registered in <xref target="IANA.named-information"/>.</t>
      <t>To promote interoperability, the hash-name <bcp14>MUST</bcp14> be "sha-256".</t>
      <t>Let base-encoding, be a base encoding defined in <xref target="RFC4648"/>.</t>
      <t>To promote interoperability, the base encoding <bcp14>MUST</bcp14> be "base64url".</t>
      <t>In the blocks and examples that follow, note '' line wrapping per RFC 8792.</t>
      <section anchor="sec-identifiers-for-binary-content">
        <name>Identifiers For Binary Content</name>
        <t>Identifiers for binary content, such as Statements, or even Artifacts themselves are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of bytes / octets.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "statement" for Statements about Artifacts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
      </section>
      <section anchor="sec-identifiers-for-scitt-messages">
        <name>Identifiers For SCITT Messages</name>
        <t>Identifiers for COSE Sign 1 based messages, such as identifiers for Signed Statements and Receipts are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-to-be-signed-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of the "to-be-signed bytes", according to <xref section="8.1" sectionFormat="of" target="RFC9052"/>.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "signed-statement" for Signed Statements, and "receipt" for Receipts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-to-be-signed-bytes-digest}
]]></artwork>
        <t>Note that this means the content of the signature is not included in the identifier, even though signature related Claims, such as activation or expiration information in protected headers are included.</t>
        <t>As a result, an attacker may construct a new Signed Statement that has the same identifier as a previous Signed Statement, but has a different signature.</t>
      </section>
      <section anchor="sec-identifiers-for-transparent-statements">
        <name>Identifiers For Transparent Statements</name>
        <t>Identifiers for Transparent Statements are defined as identifiers for binary content, but with "transparent-statement" as the <tt>message-type</tt>.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
        <t>Note that because this identifier is computed over the unprotected header of the Signed Statement, any changes to the unprotected header, such as changing the order of the unprotected header map key value pairs, adding additional Receipts, or adding additional proofs to a Receipt, will change the identifier of a Transparent Statement.</t>
        <t>Note that because this identifier is computed over the signatures of the Signed Statement and signatures in each Receipt, any canonicalization of the signatures after the fact will produce a distinct identifier.</t>
      </section>
      <section anchor="sec-statements">
        <name>Statements</name>
        <section anchor="sec-statement-urn">
          <name>Statement URN</name>
          <figure anchor="example-statement-urn">
            <name>Example Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-url">
          <name>Statement URL</name>
          <figure anchor="example-statement-url">
            <name>Example Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-data-url">
          <name>Statement Data URL</name>
          <figure anchor="example-statement-data-url">
            <name>Example Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/json;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-signed-statements-1">
        <name>Signed Statements</name>
        <section anchor="sec-signed-statement-urn">
          <name>Signed Statement URN</name>
          <figure anchor="example-signed-statement-urn">
            <name>Example Signed Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-url">
          <name>Signed Statement URL</name>
          <figure anchor="example-signed-statement-url">
            <name>Example Signed Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-data-url">
          <name>Signed Statement Data URL</name>
          <figure anchor="example-signed-statement-data-url">
            <name>Example Signed Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-receipts">
        <name>Receipts</name>
        <section anchor="sec-receipt-urn">
          <name>Receipt URN</name>
          <figure anchor="example-receipt-urn">
            <name>Example Receipt URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-url">
          <name>Receipt URL</name>
          <figure anchor="example-receipt-url">
            <name>Example Receipt URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-data-url">
          <name>Receipt Data URL</name>
          <figure anchor="example-receipt-data-url">
            <name>Example Receipt Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-transparent-statements">
        <name>Transparent Statements</name>
        <section anchor="sec-transparent-statement-urn">
          <name>Transparent Statement URN</name>
          <figure anchor="example-transparent-statement-urn">
            <name>Example Transparent Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-url">
          <name>Transparent Statement URL</name>
          <figure anchor="example-transparent-statement-url">
            <name>Example Transparent Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeRzg1...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-data-url">
          <name>Transparent Statement Data URL</name>
          <figure anchor="example-transparent-statement-data-url">
            <name>Example Transparent Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-signing-statements-remotely">
      <name>Signing Statements Remotely</name>
      <t>Statements about digital Artifacts, containing digital Artifacts, or structured data regarding any type of Artifacts, can be too large or too sensitive to be send to a remote Transparency Services over the Internet.
In these cases a Statement can also be hash, which becomes the payload included in COSE to-be-signed bytes.
A Signed Statement (cose-sign1) <bcp14>MUST</bcp14> be produced from the to-be-signed bytes according to <xref section="4.4" sectionFormat="of" target="RFC9052"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
            <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
            <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
            <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
            <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
            <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
            <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
            <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
            <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
            <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
            <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
            <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
            <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
            <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
            <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
            <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
            <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
            <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
            <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
            <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
            <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
            <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
            <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
            <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
            <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
            <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
            <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
            <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
            <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
            <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
            <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
            <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
            <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
            <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
            <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
            <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
            <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
            <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
            <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
            <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
            <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
            <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
            <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
            <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
            <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
            <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
            <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
            <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
            <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
            <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
            <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
            <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
            <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
            <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
            <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
            <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
            <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
            <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
            <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
            <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
            <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
            <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
            <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
            <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
            <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
            <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
            <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
            <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
            <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
            <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
            <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
            <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
            <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
            <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
            <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
            <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
            <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
            <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="336,584 324,578.4 324,589.6" fill="black" transform="rotate(90,328,584)"/>
            <polygon class="arrowhead" points="280,584 268,578.4 268,589.6" fill="black" transform="rotate(90,272,584)"/>
            <polygon class="arrowhead" points="280,520 268,514.4 268,525.6" fill="black" transform="rotate(90,272,520)"/>
            <polygon class="arrowhead" points="248,176 236,170.4 236,181.6" fill="black" transform="rotate(0,240,176)"/>
            <polygon class="arrowhead" points="176,176 164,170.4 164,181.6" fill="black" transform="rotate(0,168,176)"/>
            <polygon class="arrowhead" points="152,624 140,618.4 140,629.6" fill="black" transform="rotate(180,144,624)"/>
            <polygon class="arrowhead" points="64,680 52,674.4 52,685.6" fill="black" transform="rotate(90,56,680)"/>
            <polygon class="arrowhead" points="64,584 52,578.4 52,589.6" fill="black" transform="rotate(90,56,584)"/>
            <polygon class="arrowhead" points="64,456 52,450.4 52,461.6" fill="black" transform="rotate(270,56,456)"/>
            <polygon class="arrowhead" points="64,104 52,98.4 52,109.6" fill="black" transform="rotate(90,56,104)"/>
            <polygon class="arrowhead" points="48,200 36,194.4 36,205.6" fill="black" transform="rotate(90,40,200)"/>
            <g class="text">
              <text x="76" y="52">Artifact</text>
              <text x="60" y="132">Hash</text>
              <text x="196" y="180">OR</text>
              <text x="296" y="180">Payload</text>
              <text x="72" y="228">Statement</text>
              <text x="104" y="292">...</text>
              <text x="164" y="292">Producer</text>
              <text x="232" y="292">Network</text>
              <text x="280" y="292">...</text>
              <text x="192" y="324">...</text>
              <text x="104" y="356">...</text>
              <text x="164" y="356">Issuer</text>
              <text x="224" y="356">Network</text>
              <text x="272" y="356">...</text>
              <text x="52" y="420">Identity</text>
              <text x="168" y="420">(iss,</text>
              <text x="212" y="420">x5t)</text>
              <text x="52" y="436">Document</text>
              <text x="48" y="500">Private</text>
              <text x="96" y="500">Key</text>
              <text x="268" y="548">Header</text>
              <text x="76" y="628">Sign</text>
              <text x="220" y="628">To</text>
              <text x="244" y="628">Be</text>
              <text x="284" y="628">Signed</text>
              <text x="336" y="628">Bytes</text>
              <text x="36" y="708">COSE</text>
              <text x="76" y="708">Sign</text>
              <text x="104" y="708">1</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
      </artset>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Transmute</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@transmute.industries</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9V96Xob15XgfzxFDfV9TdICQIKLRDJxOpREx4y1tUjH8cQe
swAUgLKAKqSqQAqR2M8yzzJPNme9S9UtUHY7PRl+3bGAKtzl3HPPvvR6vc7t
WXTY6VRpNU/OovMsOi9Gs7RKRtWqSKJJXkTXxaqs7vKimq2jOBvD5zgrl3GR
ZFX0Ip2mVTyPrlbL5XwdPZ/FaVZ24uGwSGDcq+eX19fegJ1xPsriBcw0LuJJ
1UuTatIrR2lV9WLntd7+004HZohhjGS0KtJq3bmbyoCd93dn0WVWJUWWVL0X
OE5nFFdnUVmNO6M8K5OsXJVn0TopO+VquEjLMs2zar2EWS8vrr/qdN4X8WKc
32U/5csKHpVnnSiKV1X+Uzr+aVkkk/QDDJaMep3ObZKtEnw8LfLVUhcQRYs4
ncM7uPA/4h76eTHFt9JqthqeRbStuynvbG/jVmGfq2qWF2edXsSQ+TrJ3kfP
0uL9LJ//AwaFoc+ir4p4lc3ySVJEV5e4AoVx40HCa5vBKP2hjPLHMq36E/Nm
f5zAi2VVJAmA7d0sgUOrirgsk+jpMTwZ5WNYx/aTo4PT4238DPA/i17ExaKs
4nFFb6yyqoAv/5QUizhbm8WfZ1WeZkn0Ipmn0yyuei/j23g15m3EWfqPGCF+
Fr1KR0Ve5pMqepeUCQLEWdHBILqq6MXoXR6P7YqePxtEB189s2t6Hi+GRTqe
JnbjcVaN539c6Pj9Ub5wF/ztN2atz5NxkY6ir/IVYtJ/4xInPONnLfL7fJqU
M4BnOVvC7Usayzx/98pZ12CwH321mg9xhsDKTl//eePK1jQb4IfM9kc48+Di
AGPgNvSjl3H5PingMa/2qkpuE/sloe6LuIqBZqTz0s5T4nv9Ob33xzG8UNEL
/Ti16z09GZye2tVeJXEFNAo+F8mUdv7dubesDK7UmE4FLj4SgqpIh3CrC7y/
suI3fVxiQsPomt8UaeJ+64OXqN1iVfEzWX4OP/ljpU/6aTYGEgnflfRSy5L4
kayKxv4DfRfxCswj+EWVR+liWeS3aTaNqlkSTZMsKeK5rCrKJ9HzN1cX0XCV
zsf4znCej96XRJ6Bwq4WSJuRFKYA6Gy07nc6WQ4XtUpviZq9++r58cHJ/ln0
9pvLv/LnJyeHJ/Lo5MkAHj1/8eIlfz7dPz44ownl8+GTfX318PQA/wkPv7t8
ccZPTw/hm8vei75D+EZ5mfQWSfF+nvQQVXuwu3xS4rCvLq7fXXRwkO+uf3r+
8vzy1dVPONkZjWF/PbqreqN5nC7KXpr1Zkk8TgqE6uX56/M+PDzTf+OxjuGd
CW8ZIC1bPH4K+/r23eV1sljOYzpS+ProydHJWfQsLpMnR98W807H/BKB1dxK
EVdlL0GGE/gSXn99eXXdv3rbH5zs7/cGp2fOV/jNk8PeIX731eXbq/7B/gAu
yJvL/mC//2T/4GSP3tRHPQLk1Zv+4On+/j58c0Bwj6IqLqZ422dVtSzP9vbu
7u76aZkjF9oDEp2N42K89/Rw/+C0P6sWc/4Nc3gYbu/y4nlEQ57hkB0Gw9Pj
g0M91acHx/LPg8PTp3yFv333spTHg6MBwvG1fD4dPEH8uFbsODw6iwgeQjPt
uW5YfZzFtHzgQsA4EIHLPThU/P/+h/omnj978y76LhlG1/n7JIt2YIbd6Dnh
BiHSejTPs+TFX8Pzjfjx+APDa5mM0kk6IkzZy2+T4jZN7va86XQ8HPziP769
/Mub5+fXl29em7MbDI6O9waHB4cHp4f9wcHpEdwufBkQtcqrPLwOedhPc282
+Rp//uri3TcvL+ws+/tP9w57x0f7vaOTwclR7+CnwwN87+2zr679tRw/HTw5
fNrH/xzRSq5eXp2Hl1HOyxgo/q23CHydfvb2xV97CO6W3y4BivjbVZn4kCz9
4WCY6Mp9bgb/8xXA8Z8xOBKk8PmXxaifAWnsT/PbvbdF/jOIYuXeFTDiOxA6
e5djwD4zVg8H2puu0jGINJnQcZ0ZHjVnxpsSnnlVzPu4kf7dLK7upoR/7njw
y+hlSlT/Sq5xgACNcljkDORUwEygZoTy31x833sFxO9PF68uXl8HaIpQn+On
y+qgGHQ6vV4PZEgU+0ZVpwNcbpTEw3QOrBa5y3K2LmFHc+YoIuSfFwAVeL0E
FI1KlvhHJPFHKfCeCO4IiLy4bthAF5hTBS+OQIov4TO8WyZFmq9KFK1JpEcO
NQIpvt+5BhZXpCB+wsDLfLmax4UsBK4jwDYezpMIxQSUc1YkN8OEOOcigRXA
WS6QZy7i90kEC8yLMloAkODfxIvp56jKgMgcg+jNTDUtYAHACID0jJII+BFo
CjDsDMYFAQ32XeaLBPY5GiVlOVkBLGDHioA4naJkBPgZjWL88Q68PsOVIdN2
QUTTKyBh04JfSbnLgJrHxL+Z0cOQCPcSDoCW7uoLMHIMvD3Oong8BjDgj+4A
Nwsgudk0QZiZ5QDbv57B0RiRYAy6TZY483QB4qBI5UuQLmim9mnzKMno68ro
fyNQCFGCRcFj7W/3DjShaJFm6WK1gJWyohUN4wJEnQIWdllFJN+ApBlN5smH
lHGvy5PgCTkLY7SUqcbpBFQY3A2ISPME9yVHAlu/dtd2haQcDo8Xcxsz9oE2
klY4Ae7VQYAi+fsqLWg8XF9ZrmChBGiUN0GOKgRproA/qVRHb0ewMwRAaPIu
T04y3CqGF0DO5COM53CjcC2IrbiWvxCq46R3KTwbwgEQuHO+BGscZNHnm7tI
x2MQVzuPUBEu8jHcCSI+9eMuRyBSJoKOcq5dATj+i653MoKXSbrEbZHO7h49
HlYZTXNA3LRkPJgRxAiS5nRgJHPdvAPzKAWs/7JGPLoR6uKowMQLh8YAHEm+
raLVEgC8WtbfYLJBJwjbYXJRuXQMl/T3VTwXUgNwmtM1BGCUSZ2AMaFSZEF4
ZavFEA4dRnUWBUPCCVcg6juyPNKTXI4H1oSEB/4f9WLz8t0sj5YrwGzQ5RzJ
FI44h9tvJjjrfAULTD7EuKkuLQN0jWmaAfBhvBW+BEdSwIe1XqDAeHTciJ8E
E/igE8A6QF5Kgd4kE35tQvRyzcAsZ+lyidtBqOLycRqgMy1TMCXIiwpQ4jYt
chLb6lP2O8/tJTMI/+D6feqMtomyDA9/ZdkJLhqhTaMLtG9X88wSkeZcceaO
hSSfZwAU0cNzh2tbLMivc+CZQAwKIsAwiDdyhy+WIXpAtWFURMd3yXyNMH8r
swEq5cMKiWiFt9mdEL7j3xEFgYdblhhXW139umtxNM6yHE47TZxjc0ekX8CX
doOI//gmIMkwwXWNEyQEybgvW0AOCtp7ycsbroFjksSyJDqE9CsEK1p6C4Wk
K1MHA1Le0SwZva+vGWD56BG8bsl19DqvYiWASfQednOXF2MAz6tvr64BLvTf
6PUb+vc7lODfXbzAf199ff7ypflHR964+vrNty9f2H/ZX4K2CvLVC/4xfBt5
X3W2Xp1/v8VUdevNW9QQzl9uRXqShi7HzE+HCTO5ZZGg0h+XHSXYeOGiZ8/f
/p//PTiKPn78H6iIDQan9/fy4WTw9Ag+4GXm2fIMSBl/xMPsgKiSxAUBHVjJ
KF6i3AF4AZJJOQNqGyHIAZBf/A0h8+NZ9PvhaDk4+oN8gRv2vlSYeV8SzJrf
NH7MQAx8FZjGQNP7vgZpf73n33ufFe7Ol7//d5Tco97g5N//0EGmeZ0UIJvk
83y6jj4+quyne8Yg/KYUaWlszg/kVkJlwPeEhT+kygmQHBJXCE+RKSQfiEq5
NnGyV08LknDcS9AVi/qqrPAepCg8AnIAARnDcEW+ms741jro0+98h0Sc3sFZ
YbquzF2AQAjMkkxCvAccTY4f2TuQeeTfJUp0wO/GsYpdhEAxDgFbS5jK0gBE
gUbz1bgJiL4LrC02yOC9WMbreR6P9SJUeW+Y9EqWmoZrkHm3aFkOeD9+7KHF
5/7eGTLaImPPFq7Ae1XMTvTyOeB5Nu7R6l/m02jnZTKeJsXuWadzRjBx9IfY
edfXJZgKlsCYgO40xbsNpAtUxgQFRJBIC7bbDdfMfddZnq0XEa9HSSfKHMAu
gaOs5lUKLF6eE6DegRyWLquICR3xARSoFot8jJzcyr2hpdSFYYY9roQMbRG6
P1BlKnPAWqQ2JObYMfk5yjo+RFFgUyZGQI2tbgi8CzbZM59BYFwYzrRg42WM
SiH8yJW2cEiWA3jELEJ9uxKuRjS/tAg9qjLSckhaNxZN4q9A2lxnlHtkKL4j
trWcHCzhOTDFrNIVOLodqpHCz5jxhQEOuJKvClEckpLVgGEyi+cTlVHMK0Bx
5ZAJ7ClKkuT1EYMuLOciu03moO7QghZJFSOKdiOUSiveCY7IagmihnBb2F8d
YVmU0/GIIpGIS2x0LKCWFcp4uLKwiKdn7yhmQWi8Ix2p4J+/zQGWIsrcAuEh
/MXRmks9b3zHtgQyb5s93BV4eYFFFqSYx/Zt0J5ToXcwvsJNqbEZgMVzd2LQ
QnAOvCcerBDB6CLEDgIwbYt2fEqo4NsGikjOLiAlu6wIAXnOmj9HUewzhkBs
AOHmNh+J9ZquHcvzLCulBKUlaFepmjbCeC6YQmK2vexo4KQ9IiK6Fx5YIP6i
Loo5SkW8cJSJjx9dYygRZN6O3qpULGlonUhAzCnxI6nenpcFNMCE6SkwtaKL
hEXQlE1FbA7Tu82r8awNjk54nilSo9Q+ZLzj+4dQolvn6XQ0Ha41GycICaKG
s7RgRQ/NGmzRQWmeqVYXNoMglCGRfI1Bp0EyD1jFlN5dr6XtJTPqGyBPN2gW
Z5s1Y/wiUXUTXyH8F7yBdQDY0QBxMzg+Y3M62bpviJwIIjXQjXDYu0dwPq+B
YCefg1zAT35z9Hr5i9Cr33lzi7QuXZChwj1WY5HJkrsAw24odu0snAkyDuNq
GNHX+R2oOIXKVT7bgS/mc5EFUc5rmd/Tu1GbAWQk5iaMCbhXDRJwPoIociyj
Yr2s8ilQPxANlZOT8ShINuu0pQb7vo4uxpUYJUjYgwx1ib8uiX6Tb64bWWNm
XqIOHnn6CaGW/PYVefYAwkkiv2aZjnx79/e/65CKKUBgqw7M46BMq5m3GyHV
/BkEZKT0cbGO2IsYoRcR77uRm3ziHTrsnrHYpmavDFQxCzWg2sW7oYRZmXAQ
j+Te+laXGu7HE7Ei2vlZTovHaJPMycqjLGxHGLc9TrMQ4Bb1217ukrxYIgQI
28XKSShlWbORi+H3aNbGlVKMTMV0uYlWOGqL8Isy01pZb+gVWGdTLkCdZzy2
NrM6lBgiLN7wmuSAa1uR0ZwdJb0R6j70MMHbPLKCU/DMhskkJ0WIqUkYAl17
UWr2DDISAj3NlzFIgEp2cfXmEL0zRHJYp8cuBVjLrW9YQgCxQfMrW4TdrtiH
rVuDfesi1SHOV3pK9lxFSQO5DgggLFtgsSrZ/Odqkj6rRMc5SaCEYi6VZbS8
BUERTXZ51nCCoBWsBt26pGC8EAhYkBlgDvrKLrxJ3I1qabmE5cTdEH2GjQIi
5GOyuvCZyCD5kJyBv2M+LUC68biyVRt90ZpVDkfE7NR3yS4wCuPAPT1giwRN
fZbMl9ZGZGI/3LMnwrog8gg0MZ5OVbdDiQKAR5pdtIOGHyZ+jhqNMR/397sk
hRv4Mn8VYQ3vg7hFo2folXgziV4hAsAuymjn6tmbV7vMkeZEepm2TUEXTtkz
gqS41BGsMmGFJrbpwrWpqqSsWoCBbqox+ctErB/jyC/TCezs4s3LXZTIxmkh
PJlIVkbyGdwMprIsqbEfgPZl5Im7tJyxqqJmy9BZwKwOkd4oa5DJBS/Q3NXc
rlaEWb5RKYFzsNER9/cNss4ze0ye2Bw8QmRlwgNLbyHQAKdX598jZsADlCXQ
AtSRpTSF9K5Znaduil3ZIEUpfol2AZ6ldyIXFiwEKLZxOfDbccXjXXGcjJkG
DNdqE0PNhGwMNdHLjiOyBcVp4i4vfRVJ7dzqm1H7S1Bqq4mhl5n4A8ipCnsF
VAcGXkXqJNwhgX43WqTTGWx0ilIQHAq6AYiMAId1xX14xGo9iZIzloBKtCJk
LEhskih9Dcz3GyIM5ii3xlOdtTLmPnaUAfKrNaWuCqi/zpkWDkCwY83GnFaD
i2NZoutnJC1Btj7FGDRwNGQAWgBJZbKKq0w+wJLHZbukIHSkJPZK4hfSsyC/
FxyJ1WkYlWvg+4uu+H43iTKuprNgSi5eJ+PW1VMKaD18jV3jS4s2gvc7XiJz
EeMV0aQRuTQYOELp32doxYdX6sJCiqr1mDm0sb3o/fJOoapz4YDwJ8a8eDXF
z5a1GJlbzFO3aeyLeq0KF4NCf4/GZDS7GnoYMJtosKOx0ggzDhmTgruD410w
PjFEQlI+Cm1sL1BpEGWDKRoXaCubra8A149n0aPFepiP0YfwKHqBhDRVOuX+
psP0xDHos5Y59n7hBVmQaofXQEzMGPUZYaSaieBBJUljIOoWXM8A0e9cfCDy
NfWn4JtQGpXvuQ1R8XeM1BPDxVHGK/ko1ECfiimzxab3S4Q8YgG+QHdtzZVl
gjygDKpNpE5VVTyakZOV1Tv4P1fc2IEjXeRlpQQ9du13LAF7xlK8fb7BlC4G
Wh7LmlhNMjca+GU9/YbEa1gV7dHx39J+aeWsiJilexer1aTd1SuEQiWTGL1l
bFfH0AwUh6YisDYOSezTyCCEnFo1OWxRaKdk/c6zNdNulr8Iw9X/iTetjNee
1LQTR5O0WJCcyIr+LoWbOPBJ0aKEtFujNPIMxRAO9WrhS5MiXzj2dnydjIG4
IvSueU67Er6ajzmMDGeaow/1jiSH9bKFM8Makw9LJlhsKJumoAK5nn8PPuMc
Vo8mDRCmbilIB0RO2EhJUjAyJg5EG6t0IYF0VTTL54xuCzeuDS2eawtG4aBE
ydiokoCOh2RW5E+MWxsVGLQiMTsaDgWIlZMmuFRj1HUbL3SCGODyY/hIXSth
sU3WoZfZCF1mZ8anEIiB4FMgFSmhIKUUMamsw5NNlez6YqbJq+M7ZEx3Vdf1
/3V9yxrINWvHBNUVrose0ds45WA4UC6ArzIloVB/0prI1qvkENfiugIpQDF8
OS4/N3RN4mQqOjpS7utXkOkVyTR4bywDAUkBmWhcjPFSoZBjXVzqTaNUKZog
B8lavIa+1THBo85GiWtqY3KeTyboVwehP0tR0UIw9hxLnmuvJBGvWDOIEJIb
rZTkUONtFSppUCBeCSgUWYO3xL0xGUIjbmF9qFZaFtW+dAUF2cl2KecucAFK
36X3Wdyd5iDizUBAJLkBWcESY1jhRtVN8xT3w/eHcxRI8cLYVBDFMeiU7NgO
TU5LdeGhSgZ3GIkZS1cUcKrWsVZB1vFXKPauidK55mo8TnZWCKFjHYC0dR/p
PKrpyEBwoWj5yoY9y7jLmTgMEngzwqQuNTjyraSyoBM+LX/OU5Z/iBbX3FoI
AYrobRHrdtJ+0g+JrTUhVUxvTdGyy+wh5v8Q70yLMizi7QosxfGQVhz1yUe+
Ka6J0DBBy6RZkMZ3kghnp3XWGxaFyV64XHE8syqfFEw0WxGzRnnllsI4UceE
J5MVAtpiAIavOuod2/wU34m1OK7lBrNDYWYB9LBAClqYlYQpFwuK/pJIaUrC
hKzLTjYM0XMxGFEdI8jnxEqWabZElFFz31p9cnzmGNLyGfdHokzq2VOOaUaj
YBNP8JbwDT8QPM2a0c9E8wSMRBmKZI5sjSJZG+H0XYt/LNpTFDaPh/Z5NZ/h
15f5tdhaOEBkfIucZ+wEh2po8yTPdRQTfZia0G8/l6xN2EcfzvX9vfJzEVz9
oDUY0Y8Ir+cPN0LhYca/9o/3T704eAwTZcMWbuD5NYc2YWQRiha4elBSe9Hz
8zLaEdTfJcyVsa6fXTnbgJcMeHddnG5OHO008HxXJmLPCFNO9xcYoemInrDY
OepZO8GLQIPJG7Wb5cEd2ANwqMXSG6eqrWrzD8nyaD2MNaEKfn4dEOGbnkkN
0kU91ssGfyPJUXx9mpHiNRccvI0hBeg7nCRwsHFIHTZwEk+YRp9R4FNmgqHE
J8RiCqEV2tsV110PTuM0u76cGwYux6Uby4kbeBWXbPH5nLArfFn5V7cW9UkQ
VyN8aVS1uAorFjsiQ4vBh8L9xG1s8J8hRnCmOACOkyl0XI4u1sgDHs9fQHhP
qvdqCFk85eBpR9qpOUzrvuN+51VemljtMSjD6bzUj1b2Ems8Y67nnzDeljYH
s4Wr62iGY/zP//zPOC5vp52o3zN//c6nyCpJ0adOtE3fP8b/2Y7cP+dX8DP5
8jaq/8F4lwonGpB/SAP2ay++kKWW9OInR1L55L65zb/nNXX4s79CzINlovcJ
B6aPLPl17Gz+Fuhv+xMv0bzizWu+/uRut7llemXbh47Z9OP6vvl173OHP8uR
NpbR8r6F1ue8v4NY8xNOMdh9+H1BA4ZyDREQArf19+1Q/t9j5+xoQPt+Hwd2
wIZ/f3jsXz0+lI4ObQ6w3zah9/4nIzpGj39v5tfrLOt77L5v190363/sLhDe
dtazrQ+3nR9/8rfgvu8uSVdEIPF24L5vDmLbecHbgb5vQNkHMLkn5q/f7NeH
Wdufhaf9C9yAlvf7DhL1H37/k8eEgsuqvd9+CYLrcYhbHamD79vv2v6C77tI
jdt26M4uk7D24T95nzcv5dY7iuC7ZurHDh73g+/uscds7R3CXnDcPf6XA/yI
v2y+W7vg5rr8MrS6NSRDd1OjBA6IBd06vKbn7Bg1/F7Xjv8BpXEes7QHX+AP
AqsVPGk82UaOKpmFmgFhEwspFm2WgvKOjsc5mwWqGbJp9LlERT5PWHpzPIQS
fMTeKpbtrTqbNf0zZTcsqKh80jAAeBZzmY30y7sExKe4bNgbRTJpc27KPErS
xK/mDM45SaFFhv2eZURpNpOEA8vQEB7yGNZl9bSsJzWEEhnYwBbKZFDFknIQ
mjY0x0147rl6GwtPPixR9jh/e2lFQQ/oYS82OkfgnGPxcwfdkt5c599bpds6
e8y0KtR3WSMQO2wXJfi/r1gqTjwTddOi0bleL8UC3OKTnZGOSznsxv9jRGQW
qsmYxwEzIrtKiC/5+52dCrAw28SYIl6hWbxXYdhUZXYrWhmnXJtcILYLcXah
DdsoA5MyREwi6Q1sVT7ckE2ZcpjieiiD3Rf9Gu1+oAODqI132caD3oxAKckX
STHou+Pi8ZpHB+4juh6PwkkCoag+vJJkSWcbhzl4yQ1h1yfSlCH8k7b+Cqsl
0DF7oz3XZJKY43JAORKHgti+woG0aEJaSiyD7xIOxyy2IzBeFg1oCO9/82/j
eZnbAWJjuCXzPsBgNMsLo9tJVp2jLQb8KugIw0Mm44HxxJDvjwaRgCE3ljgO
rHzt2tO/8m5f7K0OHY/zMcVdqK0G9LfKtaiIezAtRznpslgGg/Nn3wCYL18A
c8syZG4GPcUDVXQ1rovtsKQxUhpwRRbkt99cemsJhpCmwqA8kDL0Q15awjvj
FkKANgO5m/zEjTpde/YKduiFqHUe9I9I0j5uwiSfzxKXvbpklbi2W6AE+HSM
ybu+4aLL8ZBqT1HdOrac4fOgJteDyjZUebEJDkwTHm2+uZ3OC7Zous+6bZQa
z6zLIomUnuhiIl4FOr+QeJtQLASvJZYED6nFRWgink3YqPDwEXJdiWum8Eqs
m4UmCSdywSCwoteQEpo0PSmwCr6HkjTj5NO0ZH30O5eTcDqIXGgn99DhIF3C
Yo7zN8TS9wK14rNuRSyIbElD8S4TJ0gmPkq+/AHh7oGhjU3cxDPF1pPlkBGt
tKLGdJNa5b5jNk2buvlwXN1Ec4yAs3anUASSHjhbFkwsUtfYgiXjr0bZSo4z
KajExnztBReVdUK58bKcZ7hY2uGNOrjgKk+8zUmghwZvm/vI2wTwrZIQfW8J
vJIqPyiO5DxPXCv8E5WwL6yrUopLpf0UKVmgKScKL6GF38V1cAHrb+W5USxF
KNJFUidRSlvO3QoltXd4wS6laqMqALDV0uQwhpYvErBPC9tHJIf4mla+mftL
6CZBZyKcLhCkl1jEQkLOvlQ3V6GUmFqXbZlSHDuSAdAS4sP2dQx5uOWfiijK
4f8oihMTruOTMCFyvmDkMDs+GgAcOQLaXeJkhQ/bkCVlrXPz0UeXGI1mnVwU
TQx3E9/iCicfH1VYR9B96x7TEzJZ5SLMlmS9RYK+uUxLXzjXusnGg/qRIE6D
g4Y1XUEHowph/ZYYBUFLeVjnnuTzeX5HPk1vt6ZMVkletHPOwYL9I7xjDKpo
W50+91b5OxyDZGRV5WLxYTd98cRTJJGCHZAchBnMDNLiIyKn1zm/gB9nB7Fk
VfXySW/I3h0r1JIzNJ6KMI++ykmMejgRBB+5mQaYUN4l1ZtyBbjGZSAM5YIR
FkkBJk4KWLt2rlL5piBjI5fRW2IJSMsNo3qowV4lRQKzM7e41Zkpm/AGtkWh
vzlFL9VucOuM3ZDWJJVmUGIGOZLDzsYJsuhxlz3g5FxLxr/D0sQ4XVUag4oN
KDNRRVEjkKh50YPJrBzkn2KQHV69961hRheoawSibiSGpuKofC2ehYFED+Z9
YvCUU7YmriSkxYahyWTZ2poEiH6TPq4BexznMY/XwrpMjlvDHqQyXbmaTJA0
EsY71X1M0TYtN4CCBxfI27BrDB6xWyAzgEGOxsGjeWSYgJAn1Ro8KYeFQdXg
OflX/ZFUXm9DfT/OpgiYf5yKFtYmITlv5Dk20SOEefZJRoGs4qnEoAhNUtiU
fkoTsGRszZ5Ss+T6/p4O3XVB2sobEnbDZCEtwreR2IMNN0HihzEfIwx0Z87h
lX5hKjb+OR6RjVLYQ5sQIVakMSBTvsajp2ocGGUhCjPuFtMbKXqNA0TRWIb5
IyALzqgoDtkovLJkbcngki0gR8bxeyZ6ZRmP3uO4DnHW9As+aTK0UJA9BrQY
KZ6MfWxv5Ajb5kD9zlsb84npYyzwkeRBoYQU4oVltJ0aKyZSt75CQhrvt2p0
Cdz4WkEVIhW18dg23PhtUDlfgiwNKAL3lG4j3eSMGYOjUpooc0Ek1o64xiLf
D2FjBJhJqiZ4X+e3OTrMv0qNf1b7EUxqeB3cPyyk78jSsjyWLuDJlEOGG1uC
L6jYHAVS8QpRdgJCJsaT/K4RRaHhv3yL0NIxkgcc3iyPSFnAGFYTaAS3jCV6
hoRfCdMrzGcK3rghF0pMMK8Rrv4intNBlnCPUEUmiReEWTSfd6MlC0k29aGU
VEh1ZaCd9S5melphPXYAQR6yQTs1K1DIYkkKI57HiQRVrlJTxBQDO3ZuDm/O
jFCFW9nl8DrOLpViK/VcX77FzpV0VbmuvmWy/NXO0Ujf5J0JRyB58uNHLgB+
f88ftF6yfJaKxvLJlBR2P2MVYP388upc/8ljdt5QDUCyUDhFXSTznYNHksot
EkEyEZ4+lbagQrpsr6ldAbeQDhUBgqtT4H2e21zdANPrOwFQVTyNbqxp4Kdr
ysG9QbwHYk60lqA4ktQlrTozNpfMyW0l25WXiswic3MBXoXS1ohNSUmz2Uv2
DFfZOHGCpDWYxZY+5bQh366p0UiqRKKraZopxtkshFyMyR4elijWkw1hSHFh
VGVJVLkwhNmhQX4FzqGk0OquW/bEVkNp2G26Ti213CQy1lbqXxReHxKgfmfn
KrFpuwytjx/dWnH3kVNHrr9rj4QsBqVbEkVDbN8nayAzNRvU+xTRJVNql89v
4QHmHAGhSidA/nalenDjEIlVUTwQXo7m6dfOGMakWHO9JYg6REx/UTqsLwo0
B4O3KWD2c9JXSyHaJChxtLy4d8Q48qqWM2KnMeDoRphIQ/xonnKpAy/4r20f
4YKTFK7IyKtTkoBO+u/GBZkpGrUK1Hno5L9PMNmJeGd9PEofxmNylXzH8DuR
ckVqSTZxcGqHretxm8yZjiEzLtWcwNZCmIYwE9iTEb0x7ttaIUPWRrEl+UN4
ScQ4dcNwKUs1S7fPSCqKq6BfqsVuGdof1k2OvrO26A/H+6ddKtGIygXClJdM
pjK1/LjqeB+jb93X3VvbWAKRLAOo8FLR5FYaqQ0WSMszyxCHcleIoJ4uKSe4
A7EBs1F3mFR3qIMNaOaTwekB3ibMDBX38DzJpiSfoiUxFe8/6GlYah2la6wk
bjJp2Cs8XWFlhDF1SRHzrjUjEQxmILqFFQ8pYNtA0lLYIhpuDEesqzhE+Qm8
jQJYCgX1tt95IJO0upKG+SZZOy5FGzssWtaDKwjX0womTdpUE1qfoChb3k3a
fxnYTrMqx5XYFw5IVPAboqgvyRtTjPqNeYUq02s30Q5HIszjYTKPBrtGRb1R
/hZ672AXFqTdVbjcppcBFsij3qFOLSVFX0rpc6P8C5eWbJwGeLVehql3btJw
a7WaWtN5+hFy7Fo48KOA7hVdMPsCHezjx0k6leKkPePR7o3G4znw93Q+X5G9
iXIdTQsd6o3jJmzvlDIxfH9/z+w6b/HDkeQXJFphg5LjzSWLVSX9C1jXNkqf
Sf5V2199jSQn5qSDkQY2tB53FDbZ7sDG1CxknU0lpwcvGai9VKIgV/KXlFq7
oqJKGWZZgNnzsZTpanH7iBLLxj/vdxJ+oZedkLxICF9DnhDKtHHMauLGTDM2
OHsO2haDPMePR3j8krj9k8WaL6NHT/qDEzfCWCuqBZ91HIfhl9HfOpGDDFF0
FmHuftQfDWHVb/XBT1+z6Aovu0iCvaSWgXdUBYzsgHtRls7xmXVN67POj51O
fSZY2Ud4+d92rCB9Fg2Od6Mv/+DI1vDGv8M78Xx6huQDnoEuK1+K1fAn7rB3
SE8rXsnKvgX0/Cw6ooe0FP4WKDf8hL8maGFmy9dxiW2DvsA58AH2lwMl0JH0
dc3AGXU9FQ/6b6DDD8+QdNnv6gM1QSkD8oqIacOqDu2q/grSgjyXDFOY9/AU
1o2v/O2xYt2PzdkweBJrQ7SSGe798uVW/b6SXXAjRdi6b6VfyTirk6/M5imH
ORlQkIsXr5VqW+uCUBpM4hjN0KT7Qv5lLQZqpJ1jv5tG6o14McOFEFIqjI0y
IM2baHUKNUNKYQq9mHBZeuM0nnbgrm2Io9XYV5NCApJR4DnFzv5N4nNn2/HR
/uDgyf5hv99/Mn66/2T05Hi7a8Z661zetrGi6ON9N/hcR3GQb8MoeIU3jVI/
gvAos+2np/E4Pj4+gR0dxgcnwzg52rajXDkUom0tP3Z2N+MwoJpBYWzLdfFB
EiZfwDFlOZzmyNTnV70xjIEb8NnATPq+BRCcE424qFubShDC+U03iMtIiXmm
pWpGWtoqtXGEdizrR1kvpQpXXQHSN4zR2LFvRFu3VKykL8G5GkW51bgDHzdg
mj3lh/F2cBb1nm5CWxjlXJPhW0c5PHMTY/dk1Y9/Lqn+Go/y3IFMeJSjM0Db
4/0nJ8eT42NA2+P944PDg2N7EWEUFO0djTi0o+OzaDN09mxBrrJtRwQZNX/2
5VSM6YNHETm7bRYa5eAsCh+pgYuK4e2j3D/ES0JX5De6mNulg0TMMfGu1iJ6
O1ix0CTIh7SDVr+3uPvLmggLAy3RXT3oR198wfXaXU8/eny/+CI6j5qP3D4+
4eR8ckXKWoOhl7aUu5vrK1YaEGi9dUQahGBKunuFSbiRnPpFpGWH6+lT+tRo
mNznzQuW/cWpVYFb3xxy5Yc+eoXYTWic0dCNadWt3OL0BwC9n60qDOvUmItp
fZaT3P6iJdrOVo642kKsu40KxOwSO3yyj15XW7fJick0RIvCB2uVPvyaTs5O
PPpukz0e3o7jNW9hN+KvZ+uLOO8atXzJ4ZhIePuGOjxoEnMg2HD4iLuo61S9
HIvjN+gsJACck08oVGn3s7ePEW7Sy9bxUVLlqmCYUZHU0ycaIME0p+eUWtBW
zxUNIWRAYK8ucdlV0d4wgys1qyEEsblIXHOoVIRblX6h1kZVZmerGGKAvWfZ
NWhBaghNCCkAqm1JBfJj8h06MXVffNH1Y/VjuOmjWZFn2N+OHOd+oMzmU3Pc
OVrh0Bq0yNo8n3sRbq7nsuZRb2C8rFAGHntLxcIULyQ1nC3lXJqi4rAvp1R5
/dbzM9MuZo5m8uouZ4ahxKucxYR2YhqNo2FcAcyChpYHaxK1lZRshGmGE0rc
UGotOj3nxphuIJTsh70I9WFkW37dH2dgLGqnzoSWCgu2qra+2fX6HlhbE1l7
dTRzFrIEqa9nInPbbfBNGk4VI1lWDmbb1TPpvES8j4/06BlQwox2TBYWGqey
BGOa4iKdu0Vsd9XYxPAKmS8l1BUmuCV7nyly6XhY22oRDdemqrm9qAofV+f7
eiN8+h2VZdwSM3iJiv+KsNI+KIe4mAOGWeJiPJfK8GR9DXeMkU9O/EvARU0O
jYcvRGvmnT2CYcJl/0wEc18HdwzSfspS83Rbjs6vxPWLWiT80p4IO65xWjCS
MrxMAKRxXDV8BWWyiFHeZNcLW+gPT4+EZHh8leKinbZZ0o+20kox6HS3/vn2
pEeOvkffSKgtQLDOrSjwTsLUr7eqt9Ync620zhsPmGrb7X4PWvV81at9c5ts
eS3oZ40e4WEDlrwWPBa73bhmGpJ4xDsbernBg8Ld16TYpcGx6Ebh0+bLHLMz
M+bO7HFRaI9KcqqzyOSRJrOWHQovTag4oFOTPxbDuH5lKoT//2MIfGBFn2cI
jBD+Z9Hf2kaxcDzY3TQK7mp8cHJ0fPJkBLs6GpwOJqfjg21vlCBs6qOMnhzo
KCeTo3hy+jSpjXLwwCg/yr/uu//y1s7WO/krLSsPkAC5ZnLpnewONWwaaRuF
/AfJhl9r23SrqDlUmaG0h0DzKIELbwZsz01YSjWoqyQJe0MpsEl0ABY+jBb/
YHA2hXZhHA8HDXt5mX+xP3qBP7oyPxJOue5GaDwYPDn46err84PjJ0i/2Jl+
M7gx1bK0WMJNb3Aj/d8cyLEj/aZ3cEPtekzRQnn630mrjv4VaFXv4OCgzfC6
p0JQ2ywOlekN2kjeniODCfbuDBzK546C0Dk53D/Zf3qClPwQDvnk9MkRQKcx
Sg3S7ig/mn8bevWbE67B/uTJcHAQ1ykzj/JrCJdDSX4lqRKy0SROv5EvpkUY
zz6XrLWThR24rIPBDZZyh7XAbWZyuePf9+bt/Ndyp/w2jhCExFk02Iil7bTS
7Oi3c6e4tUIbLpX/d+6UTcj9X7tALc4T/04ZxtIjcvTAlWp0r7PSgCdBSD5G
M4DKOjTFUl1iCHdLziOmZd+c3HhJt66RA59z8yu+mPYiamRdYwE2R0RNJA8k
TT54d1sE5BqOPkz1TzbeWx6FNHqCWBt2bb79PMpLjIFF49uHtlEe3pO7I9DY
seXFzmGTG4LQfvxkMD48RDY4OT0BUnL6dNsbBePasV1YRar/zIOMGeXp8WTw
9OlkDKMcJE8P45N4uHmUg9Ao+8NxHCdjjyVvHOWwNsqPnR+Ddzdwif7LV7dm
8WG356PoL7YC2MdH1kN032lEldeKH3g+KG3CWLciaRDoUf+Isl4570tqaZCT
penq+pz4wXMvn0OKkHBid2Nt5B8rvCBtUw7WGv28lkZuwLo1E7r9GxsLOP9e
85xM2Ke2opeYea+HiSnNpA4LWM6iK61kKsf/5MAlC7vi3FBBlvU1p39DSqox
mmFEM01JGRaUYoTbM6mKuEUPnNS/jLSdFtO2NHrgBlN5YYvmkufVgGOY5wBk
bYXQTMaAJUh2luQUpZMwQBSugSgz0YRSbBwyUZ7uhOcSrvgNEchaKr/BYhCT
tshdd2qdph+4New2wpyOdLqSwltF0nO8ncaF3Vg+lnOZU9VzJ/e428hlwjn4
YsbFMAU2W6y9yn4m6NV0bQ2LrCYBWtO3vVo1sLsrzCo0w6lTEblmtsT0kPk8
1FnUKTFjYWaTixvOXq++IYbHEhi0I1rnERCw9DYG5VTrrLMfoC11mMLkYeeZ
0wyFksVTsr5rtoqkjFbo1QkVsS6Q4np1rlqKm1MOd3CmjDvSjDBVIVh6wCQE
Uu3IhhNclkgEIi4KbhuwRGBUSR3wyzmWWks+tPWr45hFLp6X1QI+JB8UrSJF
Pqe2NneznH6gafYhz+J3s5SqqqQmXVsz1uYpVp/XMai3AY5ANcBS9geS84Df
I6tsiR0fMsd9w+GTmOuO2fY/r4q0HGsyrdQAfEfZ1xxqDeRkmldw6k6jDyoO
0dZwugT+QEyrpUiPlq7b5Oeh3dj6EUWyyDEDzmSAs2PhEbJFzp+vY/Abtmfn
d5nbC7fNTm46MJnOfcJcYAjbY67wi5MTl7zLi2oGdOXPzDFjqb1DcCQKYDvR
Ep9cytzCDLnpDnXh6vlvtjQJ4iPU/o68htIhfl2hTQ7V8r10yp4Vwoju2r3M
ZO6FSKiV6TWOKi39e6bQqUUM1XpDOGspYxP9aNuyl5iMxMU7K6fJ3XJVYL7/
RhBswqSak9zZdVAWWIJEk4zbnWGtlXtwREP+l9hcrXTqiDWu+rcZeVbj8S1K
VaV983Nn7frQkDuD2RgL2+KUuxggrMMNy8JlnhYYHJGUjQEqys/Uqq3Uwdm0
gKFoPdN1zE8FHWJ+9nzstioz59wiApmLmZv7bCNSgGYDlUunguaYL8RKAn40
eWm4uxHVs8icbJSW+TCuRlJfmPot0hKEK7JAo58qRo6dr0r3wsu91aZYppWP
V1rLKcaz8BJuaQhs3SnVwTjjdWy7xv99Fc+1/KrX/1hKe76z4ZXY7qoZXuFE
wWEQyc3gmDvPhjOpnTTyRiBLUMhQ9EmDuQna+Fga066yeDEE8Q1A6JWjJU5w
m3O9DoBfT/3UuGn9hen8YTrajWIUmwIVTQ3NCd/uWMRMWgIVnZE+d0pkvIz3
DeW3bEMlvyObyhJekjeXCYVNCg7Sl8MEn6+0kgkJIrwKwntPCSSS63VXsQmK
l4zlpbSYek8F4HoUqoZuXZqXO9nRtLT612+uJVXclEuVuh0WxE7TQJYiHZpf
khgWDhDG3LSYY6t4t5NVJkKGqQ5ZB14i/VWxoEBOmR9wihiRSNFF77V9vXwJ
VxNjXG5TABugDx8jh6YJy9NKfhuLr8JC/Vq1HIw/tp2KQrReYgs1ztdtJSpQ
s3vC6q6rjPBAeuByH76LDyC90BAA0rTIM/r5zvXFxe6m2ommKS1H7iSmA6/t
3ue0qdP6JW8LifuNnq3/gVEjQA2/ojJu16A+FpQE9PHj22dfaQEjmUYlT8Vv
PSBDChHmtyhhFtIUkZZFLkKsr5MDwTeaZumM6g5KxEm2R/32kmr0+ZewyIlW
1m0V7MS0Wq6xkmBXnMShMVzVlbXWUhM3v7n4vvfq/PX5ny5eXbwGmOxuCPgD
rdEwJVuTysSeU98cTI/kBrm2JbT0PqsVIOHCPYkWtjUNMVEIrijSDkN2XNFO
GzqirlJx1DwMske0TQq1KM49zxdLrhD8jKjFzvXzZxoHt2qXPEjsMunnfKE/
Y6t60/2QxJCsQX3pubr1XUxk0RR42iAQl9tUC4rK5TjWukCygmFWJgQlxbaq
t0n7MXkifso90rFDQSmigiaTvju/vkL9A41QwKujV1L6yN69CxENunDRDZ3g
Sh22VgKeyblztu/InGPwsQf4UPaQ+DMuelaedFP3cLcXqnYGlY5acCCrbBxT
P2y+tl2u7ab0SqqqqOiliGZ9IqapaGKIWWKJWUnUrNwllMlkaJ5JQyjp1nAl
LgUTwoW/CcHDXh8cuk/x5whCNJDCcZpBcHwgP3e1sveIStil2cqyzeujFi1z
e/R+bFIz8AnWUuuhrdpt0q5qt74oXAUfudUfFS5KtNyI58Yum4CpbVN3bwW3
APkwsELdDisdxam2FDPnajQL1vBg9FQzaYiIctd5DbhI0Ay+ktpiLrIj9dTq
sramWGyhS1y3WeLDN8Y4wZyZF35iC2u4lRmqvDdMehsqsapaghGQ9ALti/Zv
+VvwXu0k/Wm/SzoFLd8oKtiqEsQ3Sl9tgnzX1Y3xxGOpLZu6Lg6vWjSJzfMq
BSCgNXokde+xUBrCwHSaxjrT4t3jcpsCRjI2UUk1Z0tX+HuA7DRRYy7tAisw
YcT9CqWD5ANSNCMF3RU5dYh3S+ebIyXSLSlboWN0zBFpJmn3MStL8PTtN5d/
heuFNelqtS96+IiSLn2Tnz+xMQHHVWDyUjtw+i0a/crMO2zYxLLExORY2m3U
7t6Vyn1qdvqT2otK7afphe0Gyq4aC5NksXn2fm6KbcQeonRecW1bqwsvjvr5
Wa4XXPbq3kpeGZnrat9T3Yashz1bxzSCtxraB/YfkZ462jHF9Pt0jSnaOprr
meIXeDzJGEd0ayIlWpGURf5be/XdJrRUHjDHimnt9kEWj7kqnrXZkS9olia3
InRTmhFC35Rtylnfqeptb2vdiBZJFZOjR/ml6a1AlihD2oE6FbFxBvW1dDA2
9m1dFcJRFfKmCyprbfwDjLjYMKzh8sai1tIUfEOQjMorsReo/vHjq4t337y8
YLkDMzFmZNp/BTrSnA/CFJxy2sBT4g568/ntBb5tK5t23ZKCXLeyTMcoPoVK
L5OXkxW8Cb0tBWt3Gt0/QIAxDUxaMl7wrJV+7BoLxYodX8jhinyRUhihoaaw
ciTYWZLY/i+sO0hj0FXGhNLEMLi3ttTSfqbwpJIKIOqUk2JiCo2OEpBiPUm1
yxpyrbFBtOPnwnIwonkpzMnc8JtdwjVYqSVTXB8zkaKVpM+xpAF3vURZRBUn
lHPSRdLVbqdYB3MEJI1MSsxqM3QfcHoa2ifFXEoH6+p69EVY4SPjmngF5NgM
PAkVEF2AJyKnQzLDVB7pvjbmFmfnMC7T0lozreRmDeTKqZdMOIBPoJl+nt4a
nVE6gWAGE/0qnlMCnJGZxETnNKkI+x+AIkzTjJOgpP84pyyqUd9tElGZp+Hz
JMRw6gmKxqWL2i7FDRhyVTHC3BnvGFN5JktqIlI/frjHOUt6prK0x7301ppm
tdbDA1QR6JXgqs1JC9mqtfnJBKBNmIREQtpu11mJOvy0ocEQTcYltZBnq5Hg
EItmQ64KWNYr+Y0Tz2Y9XLNVVChtq+GTHW2xZlvXz9DxH7UZphzD+tKUMwaC
nZM5QAime1XFOEP1+dd7StfCV4nrddHNgUuKbHGaY9G5twUWT2wk5DkoRoe0
scGyCsWERIskEXtHFXMzooAXgwssk4PJRmEYHZs8tbWK6VWoZbyp+ZY7zmLy
v2IYysaS2A3fhPjVjdCDxyjOgVqneckjxPrsZcu69GjwZ+QoK52+TP3O67xy
jeyNpH+rYEjytFC21AkEwfrfhZSnDSPUC5O8L1eR1RAOcrGZ/S2MU9R3e+xY
hXgopoQmCpQSccnKNJZhvlMyw3EYRKiIJXbbdm3kCZEmuqDxAOkrSrxRPUeU
8emxlIPnOrq3dE2wvNk8dhhNXg/gcAH1hlOTZoAC0rObi+ar30DAJ+WwxbkB
QiL7KpDUW2VLi+vP8ihZYNX16MJpUMC4HLhAuXMgytloYWTZJmqmyyMGlmoh
bltrHu0CeE7jeEE2fT0IlPnV2Fgkbg5o9OsKUjSCdVwZi8UmofNqVhgqN2Ho
NBQ8jGFAKheXFlWl4x3LhRpU4dTSr/tajHDoi+nmTuOStiaYTLnleCpreXku
2QuW3+LQr5R3yPSLXJF8TfotTUYuN1nsZoB7ZSVGs9YcVdsFzLjYNIyKnXZO
MO+GpFx1dXPOedirjfYhkw/vlcSG/T3PM7yRCXKpONrEc5DcsNaLjh9uMQCy
dRzo6xOiKPzD1pxnl+Xgnlp3JLabZoQD3kQ/TEJx2fFguNOw4WEXF8Yn71Ak
r7/nAwySqhAEkmcdUPltOTbZpJxGTo4szmEhWkJtDl/vkhtaWdiUZAiQlOgW
xvNdZ8a2XGxuUxfXmqAAGVyu3KaD1iNuSoRT8+G06lryuTZFGb0jwxxGbiVV
Q3F1hzpz7xzuMtliQt+q8YhFayHWMr0suAYbVUI3h0NLvChW0pE9vr9z0MUS
h7pJmtwERbYIdi9WSo695gQgJs+xLC8RWyV4fMWn83zI/QqtGNRoA7lBcXKD
SSk6LDF9f7lwLxl4yEGIfXKp4VE4TtZtT2NlWoY8h+Iy+0nL91Q/lBzcApWJ
nKXZgn/pjXLhcsiH2IsJeoP7S16anUEXy0qiNE9ae+7VpxeEca+qCd3gaBSl
2Ry/4XSKY3TudF4nKLe/19aYV3KpjMcIhUQ8E3LoO6OoEZyqbVBE7i1Wdndu
Gllkhsk6p96rHN7cCCJqUbu+qrs5HIWj1ZGsBYJpvewMKWdS8pmijfHkn715
5dqtbXChEQy06zKdFa5WW5QAXIGYUGXlgEfKlzkQPFYs1TYZvqnxfZIsHXGS
mVJb6QzBVCLNXfXRazwg94nFdct5P8fIYlHjVY6SAFlcmFMp9n8mRc4eVXwh
G2FFFBtga6zcIPgQnpBOQpYPwY4+9dI2wYTJBw36MYVpGAypWxOZ7XfiMvab
m+HPs2ReKge4fnnloz/MQKesC4ILh6ZYWHI8X8NxbQo3wAbjgtSmftqoBqpW
+Ftr+oSi690SRFcPECs0swIuJlSsO1SmUS0305KY3iQe4S2TemYpdkcAwWZB
dhVTjk3RtCWcgAqgUHElq4PmUahWile0iFCpVsaoc/5gczBqnYHnA+zlvefq
sh0KDJZgIReSmEOlisxFzzf58E1ABU1sw2+kK1XlxefnE41i2nOPG4UV6oIS
srfUqZA3HwfxRm/hC+n4c+n4L6JLZ/s7by8vKfx7BJCBa5N8MGXAnACj8zlF
AqFDFGVPt8eOIWvLGLhZTTt0i9GqyZtTpeQeBNBbeeJDJfy4XBVuzgsnHtcA
c0cR3trXzkRU+VG7AeNXqWfS2nELd7/IMxJPmGSLybwl4hGZFrNoE+ZF5h10
Ba7Y8mlCAPGsyTGPbFappgfa8ykxuo7TDMfT562h2/tZPBX+iD8T4mdMj2yd
IHZjrA2q6znZTMCMQKZL/N4c167qjkPAjGQ0I6O36UDHJjXURjVwquw6ChZS
VZSkq97fV3Ccq0WonqACJHgqQkHOHQrSqdeLxOr+AULD3RE2doDbEBvltXYn
g0toDjUZ2BStYJAwBQF7GIESSksHsfihaphLt4R8grd/ZPJFvXZhJF987mCf
AS7uBosefyREUqd05tS1oo47q3oYseWDqPSoQt3wHFDzbNdCKf5CgzK9RqBa
2wna2oxLbbZE9jqSeXS1PWe1RpD12SF5zKyEdjlx64g4vguCtDGETBPq/2j8
Ya1GurJC1ccxQ5PFwQ2rwnGD3YgkdtomFNjVRBJKr4kUPpNroX5SSY8Zp66c
SzaX0WqpOpfGXpP6jaEDLS1LJu56gEuqdEckI182Io/Zd0M6UNgs7u7XAa3v
QOoAdp6/Pm/ktADWvsIIkegaqzH5dXbfJhzS9N2fqIXDqpR+lr1eLxrGo/c4
6PN8AZwhcjpURS+syVKugXNTbB7DOGEGRSrIKCdJ2LFeVlJipRu9Of/2+mum
yhgVB6sR1ycghTPtiFfCp4HNlUSbmhY58Jx+fR38e/SBJxjbuMXHt8Ucd0sy
+7fCtWBPDk8PsBbsjHOXaJgVhTgHmrCSY7DIpdW5hJC7oZalriEV8/WfsTAL
LsP2cEt9SyZxnVXK4S5mVU8Pju/vHWmByLFb7I2a2MZzXBrPKDhjFmyKv4nQ
IrARLl5sMXC85Not2/2MdsdqRzwk1Y9beFeON78faSKa3XfMdSo173PrL5un
K3U2Lcx7eISHUTnpssg/WPWU3GdxfxMCjWxY5aI1rBKl71CkoPEeuZUFmjFZ
/ehcqNpDwMPvBPdcgwAlzDpSPSfPkY9ROrjlJoscN7XFi4VR+nAnnfhPsqAC
nfwFWydLSHPvJhrIUSGIrdM+64Evze1z0FiZb9yGPfsqr4cfwoZWEthNxzqW
hPRzjjKMyW5vd1FSdwmTS1BbznbpB3eP4iVbVNKkhv0UzCYnZYtpOU3/GM1Z
uXJITFfSJrjafgtlELJBcWlj0KCrXppUEw7MTeLKNP4FRH96fHCofX9rRS7R
DuIke9hE4+G6SlyLrePClwB/ig/UFgKkIdqSjRLGR8EaQL8csDgU0m2q7RSJ
8TIEt0tueSe2Duq/y2ZeDjpwOtaZRh561yjT2HoaLJppbFploqiEEzurGGFD
5UzDYbUCNzqGSpIxscJlBpxqyt3GfUzGLEqOKZUe0mjs6dlwHI3kHaacHmK1
2B00b+12xV2mPFyifigeBwMw6H6JweQflAJb8C2wOGxU9obok5EJTerc2iIP
inSORGLAQZxgUSZzrDtrM7g4Z4vO2uZ9N3dJp0FBvbxek3hpelfaEW3uFwPb
w18KJPMEbRSOMNDo/GpXNcaSzWRAVbH40J+/uwa1PVCYX0vLSggWWeVKa/t8
n3CXX/5tWUv0RxfI1qrIzvDKnVEJ1PIsxwnO+Ac9EwjSo65DP99VvWECwEAq
y3FcSSwB3OdXEZXhZM5L0ZRIgCzBMbDNImR1hWQ+KfHXAdOiQE0Vw6zDESBG
pRa51KskK8m0rTGOVDn1q8u3V/2D/QEQF05XASJndkoMduvcNWWbuliCxyDN
j99KsPC7txIia6v+1S1OGKTJAluxRfO/vry67l+97Z/s7/eeHPYON66jPrnu
v/gFCyAln2Q4jC+2wT3Gyq+lQ21Wmqm23t/aKDn6tWoNYXM7oK0yNrCO2RJf
CwvVhghE1UOVop0iz5Zu2j2YI5Goro0hCA7wBwj9wakHe8vzGfrXVoBi053p
fg4KwRT0wLljtODis2JLgXuBNFwUFNr+nMNUWXLT9AjnUmDWndAPudQ25Vy6
nloDiVKp5mx4XrhHKx9vXSkJu+LAsecUOObEW8uLF2+iwdH+wcmWPWK3uC5X
v7q8etMfPN3f34cbdEAdIaSEY2VLXeG19oCZCjDFlT/hftGaTGvKP8dUpaak
FC1uobmaT4C5LETSsoHsErDD8HVUKtCAuJLXuA8U5VIKoYjohyZPZHNbBJ/6
AkuOC2O2zMKYk2wBo70ZjeIy1f6sNUal2llIZhaUNDKbKsGxxhWXSUgyFb0A
UL5Q+0gNrDDwTqo5qiJwSM0TohPD3WgLf0e/2eKEFyqi04uxcTi9Cz+rIT7K
efZXVOAaGxiu0B83Ns2241q+n4JXpWnf3ETWZjY+gCQ/R2leTBpOnAzuwCq0
XSfkNCDTp9yXkTIMuB6Hyaow9Q3QPqOmG0r5lpo2LMF5u8YNUxoxskg21hOh
IkWe3YyPjG09KUohiqW4IowQaKjvbaKSOx2Na8eaeLpNM2hCqKFTUYoFM2d6
aeahsc4mlBjTQLlUUp4TG5ytFrEYIzmI/qEfLDAAPqOY7pIP807IQMKnSKWi
4RB4H5rb7O0PUwgcyqYu8mGaoUxOZuK5WkldH2CpPeTpFcPGeKZv373kfXz7
7jUJNTKcJLAHoRT4nRv9SGUY6blNqrTeNTRH8BQs2WFR+W/fXZbUD4M8Dxi7
x5M2r2/XgVtsZpLV+tuGgfE5LoT0G1xp24u4CVGKNg3IY8E6bQyk3axGOyLd
fXJkDtTE6tL8lvLXf7Aq5uY37JtWUykF7CWFUyjYWHhc/HjQnMy4o2kxTqql
hIgitLH2CVCPtJmkEWPjSyp7gvaYCWaDORX6OX0IE4Wwth3aeVfFKDlThZ4E
3ehLZxuJ7SNfnDn7oDe5GqzE97t7NA1ZTL+dOLrBRpk32nPVy3Aji/RdWlKE
IYhemr/NPagxuZqjYGPqvHxLshEdEyM4M2d2OZnOzE5VSqRMpOZ0ndoUzLet
Gp9rg2pXeSKxTBSccD9LW+FNpySR0s5LLaZN65D6XDFwBEn04HecVCCb1Ki/
kqy02MpC6BRGMzhdQ/cEqC+NWkVNf4dSUuTJYEUIQrFCHEsCSPEyIRPtrIcd
hki9zpz2VvSln3gtrZupIVHPkb25a077XF0TGcJTKQXagnX3Do6foKqAi8E7
13OuaEIddsrEXEGD3GxEeUZ39Nti/nkL8IcyizA3fYsVWHp1nmu9CMPZWEqj
K9VFRE6i7R+2I3LA3hXA2wkhAY1A/Y1Onp4ecLKTS6KRkD5jMitdC2HCGgkX
MixX1MoYLsdEeuyaUjxlXzCBQ+g8IvBSypncmB33pBdCj2xHPRD04UbeGOFC
GZ7YAWskEZUc+oET18EmGIoBspiEQVw4frQX5aMqIf6la2FcJqxomRVv/ohE
3RXFsZhsJJscCZwK+PUC069Ry2iwkctreXh/74JBJiLidtNlhLQ2P19yEfXS
QJyrxXbqFoUSRLjq7IfOR3fse/zCYP/92UcPz+np5hPhusIhbGLwacWAJja5
dd9Z9Wjaghvi2saan78OvziTWhpM/rORDR9uuTMy+m01UEOLop70B05RVCIm
/6r4WWvRuRU+MfFsSRXbLQmeMiL2PxdzW89a0NhNVfHMao6fwTcBpCY13uTv
+7bfLtPDakY+KPtD9TSp4cUkqGIVBBMzCuw5LTTszq/d2GijSIY3WQeyY2Tq
hRRQQPZJhYawDlK8tljRUlpLPdS8eyqu5Ziz2aeBoVWYBNIsy4UCLLVUcvI8
XEkhQC3CITxNqrEh1MeRLut0o865cIF0WbeChfe31Kbs4/n/C8JqMXKYcEkw
rjFuDyMtLc3LjRv4F/SoI1Ge3KVle4s7i6D0qgr5HDajNo/mpIt4SSIktxpZ
xikG7kvrOKfIjhIADlxtPJbWF2wS0tKwFJTO6667W9qbz/R/NUSdNIm29tq1
bIpUqsI4xWwpNyfPMBRdnQ51iuJW4KVqg7RP25BvTB3jR5WzYCnc4NyaR+5n
ZAObMNeg/ZnIvGcGM8+O0yffJu/+MR30+/2/Z39aFIPcFCMX6dPpV4HBpbCz
afbl1jyZwDWSeuQXUr/IW5IWF3e/fMnrnFXVsjzb2/O6J8h0e6Bs7jn3+4fO
3j9/W/PP3tbL5rZU4+e9ofH9zO0cjh3Df8dL61796S/lENb04f3lf3z55YYl
4Si/YF26BOlj3Uw/4iXXEfoBxPmhU+f5vxbU9e7eDyJSYKUG8M1nvyVa/TM3
/cBxBjbWuukHkG4E8unnIl19nZ+He20LMq3UNePkkf30EMKJ0PgrAa6NEx5C
LmcxCl771W+JSr/VdjafhLP2+nZ+OyTRxXwWbtSnF5RoEwEftT17mD4Fpbtf
Ce9wi6aHkKl14XoWbS/8tjTrvwMQmw+9dZ+bAfHboWh42Z+FsJuXRhsggkeB
sVYpeUfxePN1p9Mw1qjf2hhtuur8J1Ni8ykW4NEsb/Hg2waCKFhqG1N3RImT
y/NoHmM9NCpEkUdYSTUl1xh7nspEs10lgrAlZFhFYepZkyVcmVf8puT7jGvl
58gCPWTzqjqotbcxuWKlhImrPZNZqGkhwdozDZ6yg8dPrw12jdFUuxtba0dz
tDZri9+ChqwtgEZxXN5OsZ9Pvwd/j/F/en34/Cmytd2jT/jC9mN53OttUwOg
T/h9v7cdRbedTzSAPu/DZ/jmazQR0R/8FF/Z7pm/bZoC2wD90IHv+14zpE/c
Pyj6gT717a/6HfNY/2DOPzyO3ryTf0RvTX8+WnV02xj4Bxo7cpbzmHfUf2zm
MbP8sBf5f58IOPac4DePo+AfQ83dcdvfp077s9/kTaAcEbY9QuQpIsmD5W/x
zZZB4XmnMYp6bWqD/LP2YA+/v/nNT2J2qdZ6dDspxup9OK5262++0DijyJy4
+/fYzH5jLsVNeFp/R/9rwwL9HT1u35R585MXn+djfW3MbXfMAKLd+utsDoV/
ZmH9B97Eq80mEKYBG8Y0C9u2Y94G33Qf3XZ4Pe7pKKT6emX1P0QT/Fu6V/uv
8wfUhr8m6zz+Pf69nvp1Hj0z0v0zoqWw5vDQSpz8h51td3HeSTi0Tx4qOOoo
AQfv9Y3V87U/RPb/fwG3PCoi8QEBAA==

-->

</rfc>
