<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-13" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-13"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization/>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="18"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 159?>

<t>Traceability in supply chains is a growing security concern.
While verifiable data structures have addressed specific issues, such as equivocation over digital certificates, they lack a universal architecture for all supply chains.
This document proposes a scalable architecture for single-issuer signed statement transparency applicable to any supply chain.
It ensures flexibility, interoperability between different transparency services, and compliance with various auditing procedures and regulatory requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 166?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document defines an architecture, a base set of extensible message structures, and associated flows to make signed content transparent via verifiable data structures maintained by corresponding transparency services.
The goal of the transparency enabled by the Supply Chain Integrity, Transparency, and Trust (SCITT) architecture is to enhance auditability and accountability for single-issuer signed content (statements) that are about supply chain commodities (artifacts).
Registering signed statements with a transparency service is akin to a notarization procedure.
Transparency services perform notary operations, confirming a policy is met before recording the statement on the ledger.
The SCITT ledger represents a linear and irrevocable history of statements made.
Once the signed statement is registered, the transparency service issues a receipt, just as a notary stamps the document being notarized.
Similar approaches have been implemented for specific classes of artifacts, such as Certificate Transparency <xref target="RFC9162"/>.
The SCITT approach follows a more generic paradigm than previous approaches.
This "content-agnostic" approach allows SCITT transparency services to be either integrated in existing solutions or to be an initial part of new emerging systems.
Extensibility is a vital feature of the SCITT architecture, so that requirements from various applications can be accommodated while always ensuring interoperability with respect to registration procedures and corresponding auditability and accountability.
For simplicity, the scope of this document is limited to use cases originating from the software supply chain domain, but the specification defined is applicable to any other type of supply chain statements (also referred to as value-add graphs), for example, statements about hardware supply chains.</t>
      <t>This document also defines message structures for signed statements and defines a profile for COSE receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, i.e., signed verifiable data structure proofs).
These message structures are based on the Concise Binary Object Representation Standard <xref target="STD94"/> and corresponding signing is facilitated via the CBOR Object Signing and Encryption Standard <xref target="STD96"/>.
The message structures are defined using the Concise Data Definition Language <xref target="RFC8610"/>.
The signed statements and receipts are based on the COSE_Sign1 specification in <xref section="4.2" sectionFormat="of" target="STD96"/>.
As these messages provide the foundation of any transparency service implementation for global and cross-domain application interoperability, they are based on complementary COSE specifications, mainly <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.
Therefore, support of COSE_Sign1 and extensibility of COSE Header Parameters are prerequisites for implementing the interoperable message layer included in this document.</t>
      <t>In summary, this specification supports relying parties obtaining proof that signed statements were recorded and checked for their validity at the time they were registered.
How these statements are managed or stored is out-of-scope of this document.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-software-supply-chain-scope">
      <name>Software Supply Chain Scope</name>
      <t>To illustrate the applicability of the SCITT architecture and its messages, this section details the exemplary context of software supply chain (SSC) use cases.
The building blocks provided by the SCITT architecture and related documents (e.g., <xref target="I-D.draft-ietf-scitt-scrapi"/>) are not restricted to software supply chain use cases.
Software supply chains serve as a useful application guidance and first usage scenario.</t>
      <section anchor="sec-generic-ssc-problem-statement">
        <name>Generic SSC Problem Statement</name>
        <t>Supply chain security is a prerequisite to protecting consumers and minimizing economic, public health, and safety threats.
Supply chain security has historically focused on risk management practices to safeguard logistics, meet regulatory requirements, forecast demand, and optimize inventory.
While these elements are foundational to a healthy supply chain, an integrated cyber security-based perspective of the software supply chains remains broadly undefined.
Recently, the global community has experienced numerous supply chain attacks targeting weaknesses in software supply chains.
As illustrated in <xref target="lifecycle-threats"/>, a software supply chain attack may leverage one or more life-cycle stages and directly or indirectly target the component.</t>
        <figure anchor="lifecycle-threats">
          <name>Example SSC Life-Cycle Threats</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="520" viewBox="0 0 520 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,80 L 8,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 8,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 8,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,720" fill="none" stroke="black"/>
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 56,144 L 56,176" fill="none" stroke="black"/>
                <path d="M 56,240 L 56,272" fill="none" stroke="black"/>
                <path d="M 56,336 L 56,368" fill="none" stroke="black"/>
                <path d="M 56,432 L 56,464" fill="none" stroke="black"/>
                <path d="M 56,528 L 56,560" fill="none" stroke="black"/>
                <path d="M 56,624 L 56,656" fill="none" stroke="black"/>
                <path d="M 104,80 L 104,144" fill="none" stroke="black"/>
                <path d="M 104,176 L 104,240" fill="none" stroke="black"/>
                <path d="M 104,272 L 104,336" fill="none" stroke="black"/>
                <path d="M 104,368 L 104,432" fill="none" stroke="black"/>
                <path d="M 104,464 L 104,528" fill="none" stroke="black"/>
                <path d="M 104,560 L 104,624" fill="none" stroke="black"/>
                <path d="M 104,656 L 104,720" fill="none" stroke="black"/>
                <path d="M 8,80 L 104,80" fill="none" stroke="black"/>
                <path d="M 8,144 L 104,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 104,176" fill="none" stroke="black"/>
                <path d="M 8,240 L 104,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 104,272" fill="none" stroke="black"/>
                <path d="M 8,336 L 104,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 104,368" fill="none" stroke="black"/>
                <path d="M 8,432 L 104,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 104,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 104,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 104,560" fill="none" stroke="black"/>
                <path d="M 8,624 L 104,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 104,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 104,720" fill="none" stroke="black"/>
                <g class="text">
                  <text x="60" y="36">Dependencies</text>
                  <text x="208" y="36">Malicious</text>
                  <text x="288" y="36">3rd-party</text>
                  <text x="360" y="36">package</text>
                  <text x="404" y="36">or</text>
                  <text x="448" y="36">version</text>
                  <text x="52" y="116">Code</text>
                  <text x="212" y="116">Compromise</text>
                  <text x="284" y="116">source</text>
                  <text x="344" y="116">control</text>
                  <text x="208" y="196">Malicious</text>
                  <text x="284" y="196">plug-ins</text>
                  <text x="52" y="212">Commit</text>
                  <text x="208" y="212">Malicious</text>
                  <text x="276" y="212">commit</text>
                  <text x="196" y="292">Modify</text>
                  <text x="248" y="292">build</text>
                  <text x="296" y="292">tasks</text>
                  <text x="332" y="292">or</text>
                  <text x="360" y="292">the</text>
                  <text x="400" y="292">build</text>
                  <text x="472" y="292">environment</text>
                  <text x="56" y="308">Build</text>
                  <text x="196" y="308">Poison</text>
                  <text x="240" y="308">the</text>
                  <text x="280" y="308">build</text>
                  <text x="364" y="308">agent/compiler</text>
                  <text x="196" y="324">Tamper</text>
                  <text x="244" y="324">with</text>
                  <text x="288" y="324">build</text>
                  <text x="336" y="324">cache</text>
                  <text x="212" y="388">Compromise</text>
                  <text x="276" y="388">test</text>
                  <text x="320" y="388">tools</text>
                  <text x="60" y="404">Test</text>
                  <text x="224" y="404">Falsification</text>
                  <text x="292" y="404">of</text>
                  <text x="324" y="404">test</text>
                  <text x="376" y="404">results</text>
                  <text x="184" y="484">Use</text>
                  <text x="216" y="484">bad</text>
                  <text x="268" y="484">packages</text>
                  <text x="56" y="500">Package</text>
                  <text x="212" y="500">Compromise</text>
                  <text x="288" y="500">package</text>
                  <text x="364" y="500">repository</text>
                  <text x="196" y="580">Modify</text>
                  <text x="256" y="580">release</text>
                  <text x="312" y="580">tasks</text>
                  <text x="56" y="596">Release</text>
                  <text x="196" y="596">Modify</text>
                  <text x="248" y="596">build</text>
                  <text x="292" y="596">drop</text>
                  <text x="336" y="596">prior</text>
                  <text x="372" y="596">to</text>
                  <text x="416" y="596">release</text>
                  <text x="52" y="692">Deploy</text>
                  <text x="196" y="692">Tamper</text>
                  <text x="244" y="692">with</text>
                  <text x="308" y="692">versioning</text>
                  <text x="368" y="692">and</text>
                  <text x="412" y="692">update</text>
                  <text x="472" y="692">process</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
      Dependencies        Malicious 3rd-party package or version
           |
           |
     +-----+-----+
     |           |
     |   Code    |        Compromise source control
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Malicious plug-ins
     |  Commit   |        Malicious commit
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify build tasks or the build environment
     |   Build   |        Poison the build agent/compiler
     |           |        Tamper with build cache
     +-----+-----+
           |
     +-----+-----+
     |           |        Compromise test tools
     |    Test   |        Falsification of test results
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Use bad packages
     |  Package  |        Compromise package repository
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify release tasks
     |  Release  |        Modify build drop prior to release
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |
     |  Deploy   |        Tamper with versioning and update process
     |           |
     +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>DevSecOps often depends on third-party and open-source software.
These dependencies can be quite complex throughout the supply chain, so checking provenance and traceability throughout their lifecycle is difficult.
There is a need for manageable auditability and accountability of digital products.
Typically, the range of types of statements about digital products (and their dependencies) is vast, heterogeneous, and can differ between community policy requirements.
Taking the type and structure of all statements about digital and products into account might not be possible.
Examples of statements may include commit signatures, build environment and parameters, software bill of materials, static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.
In consequence, instead of trying to understand and describe the detailed syntax and semantics of every type of statement about digital products, the SCITT architecture focuses on ensuring statement authenticity, visibility/transparency, and intends to provide scalable accessibility.
Threats and practical issues can also arise from unintended side-effects of using security techniques outside their proper bounds.
For instance digital signatures may fail to verify past their expiry date even though the signed item itself remains completely valid.
Or a signature may verify even though the information it is securing is now found unreliable but fine-grained revocation is too hard.</t>
        <t>Lastly, where data exchange underpins serious business decision-making, it is important to hold the producers of those data to a higher standard of accountability.
The SCITT architecture provides mechanisms and structures for ensuring that the makers of authoritative statements can be held accountable and not hide or shred the evidence when it becomes inconvenient later.</t>
        <t>The following use cases illustrate the scope of SCITT and elaborate on the generic problem statement above.</t>
      </section>
      <section anchor="sec-eclectic-ssc-use-cases">
        <name>Eclectic SSC Use Cases</name>
        <t>The three following use cases are a specialization derived from the generic problem statement above.</t>
        <section anchor="sec-security-analysis-of-a-software-product">
          <name>Security Analysis of a Software Product</name>
          <t>A released software product is often accompanied by a set of complementary statements about its security properties.
This gives enough confidence to both producers and consumers that the released software meets the expected security standards and is suitable to use.</t>
          <t>Subsequently, multiple security researchers often run sophisticated security analysis tools on the same product.
The intention is to identify any security weaknesses or vulnerabilities in the package.</t>
          <t>Initially, a particular analysis can identify a simple weakness in a software component.
Over a period of time, a statement from a third-party illustrates that the weakness is exposed in a way that represents an exploitable vulnerability.
The producer of the software product provides a statement that confirms the linking of a software component vulnerability with the software product by issuing a product vulnerability disclosure report and also issues an advisory statement on how to mitigate the vulnerability.
At first, the producer provides an updated software product that still uses the vulnerable software component but shields the issue in a fashion that inhibits exploitation.
Later, a second update of the software product includes a security patch to the affected software component from the software producer.
Finally, a third update includes a new release (updated version) of the formerly insecure software component.
For this release, both the software product and the affected software component are deemed secure by the producer and consumers.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>know where to get these security statements from producers and third-parties related to the software product in a timely and unambiguous fashion</li>
            <li>attribute them to an authoritative issuer</li>
            <li>associate the statements in a meaningful manner via a set of well-known semantic relationships</li>
            <li>consistently, efficiently, and homogeneously check their authenticity</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>know the various sources of statements</li>
            <li>express the provenance and historicity of statements</li>
            <li>relate and link various heterogeneous statements in a simple fashion</li>
            <li>check that the statement comes from a source with authority to issue that statement</li>
            <li>confirm that sources provide a complete history of statements related to a given component</li>
          </ul>
        </section>
        <section anchor="sec-promotion-of-a-software-component-by-multiple-entities">
          <name>Promotion of a Software Component by Multiple Entities</name>
          <t>A software component (e.g., a library or software product) released by a trusted producer is common practice for both open-source and commercial offerings.
The released software component is accompanied by a statement of authenticity.
Over time, due to its enhanced applicability to various products, there has been an increasing number of multiple providers of the same software component version on the internet.</t>
          <t>Some providers include this particular software component as part of their release product/package bundle and provide the package with proof of authenticity using their issuer authority.
Some packages include the original statement of authenticity, and some do not.
Over time, some providers no longer offer the exact same software component source code but pre-compiled software component binaries.
Some sources do not provide the exact same software component, but include patches and fixes produced by third-parties, as these emerge faster than solutions from the original producer.
Due to complex distribution and promotion life-cycle scenarios, the original software component takes myriad forms.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>understand if a particular provider is a trusted originating producer or an alternative party</li>
            <li>know if and how the source, or resulting binary, of a promoted software component differs from the original software component</li>
            <li>check the provenance and history of a software component's source back to its origin</li>
            <li>assess whether to trust a component or product based on a downloaded package location and source supplier</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>reliably discern if a provider is the original, trusted producer or is a trustworthy alternative provider or is an illegitimate provider</li>
            <li>track the provenance path from an original producer to a particular provider</li>
            <li>check the trustworthiness of a provider</li>
            <li>check the integrity of modifications or transformations applied by a provider</li>
          </ul>
        </section>
        <section anchor="sec-software-integrator-assembling-a-software-product-for-an-autonomous-vehicle">
          <name>Software Integrator Assembling a Software Product for an Autonomous Vehicle</name>
          <t>Software Integration is a complex activity.
This typically involves getting various software components from multiple suppliers, producing an integrated package deployed as part of device assembly.
For example, car manufacturers source integrated software for their autonomous vehicles from third parties that integrate software components from various sources.
Integration complexity creates a higher risk of security vulnerabilities to the delivered software.</t>
          <t>Consumers of integrated software want:</t>
          <ul spacing="normal">
            <li>all components presents in a software product listed</li>
            <li>the ability to identify and retrieve all components from a secure and tamper-proof location</li>
            <li>to receive an alert when a vulnerability scan detects a known security issue on a running software component</li>
            <li>verifiable proofs on build process and build environment with all supplier tiers to ensure end to end build quality and security</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated software at both component and product level before installation</li>
            <li>notify software integrators of vulnerabilities identified during security scans of running software</li>
            <li>provide valid annotations on build integrity to ensure conformance</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="STD96"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl anchor="mybody">
        <dt>Statement Sequence:</dt>
        <dd>
          <t>a sequence of Signed Statements captured by a Verifiable Data Structure.
see Verifiable Data Structure</t>
        </dd>
        <dt>Append-only Log:</dt>
        <dd>
          <t>a Statement Sequence comprising the entire registration history of the Transparency Service.
To make the Append-only property verifiable and transparent, the Transparency Service defines how Signed Statements are made available to Auditors.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements, or the transparent Statement Sequence, issued by a Transparency Service.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where a Transparency Service provides inconsistent proofs to Relying Parties, containing conflicting claims about the Signed Statement bound at a given position in the Verifiable Data Structure <xref target="EQUIVOCATION"/>.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where all proofs provided by the Transparency Service to Relying Parties are produced from a Single Verifiable Data Structure describing a unique sequence of Signed Statements and are therefore consistent.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Verifiable Data Structure.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for implementations
Receipts are signed proofs of verifiable data-structure properties.
The types of Receipts <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other proof types, such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Verifiable Data Structure, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>a Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version, or any content an Issuer wishes to publish about an Artifact.
Additional Statements about an Artifact are correlated by the Subject Claim as defined in the IANA CWT <xref target="IANA.cwt"/> registry and used as a protected header parameter as defined in <xref target="RFC9597"/>.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, which represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Verifiable Data Structure and endorses its state.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure which supports one or more proof types, such as "inclusion proofs" or "consistency proofs", for Signed Statements as they are Registered to a Transparency Service.
SCITT supports multiple Verifiable Data Structures and Receipt formats as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, accommodating different Transparency Service implementations.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-definition-of-transparency">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.
SCITT supports multiple Verifiable Data Structures, as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the Verifiable Data Structure of a Transparency Service.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their registered sequence of Signed Statements and Verifiable Data Structure using a combination of trusted hardware, consensus protocols, and cryptographic evidence.
A Receipt is a signature over one or more Verifiable Data Structure Proofs that a Signed Statement is registered in the Verifiable Data Structure.
It is universally verifiable without online access to the TS.
Requesting a Receipt can result in the production of a new Receipt for the same Signed Statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Verifiable Data Structure, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency (CT) <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>CAs (Issuers) sign the ASN.1 DER encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</li>
        <li>CAs submit the certificates to one or more CT logs (Transparency Services)</li>
        <li>CT logs produce Signed Certificate Timestamps (Transparent Statements)</li>
        <li>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</li>
        <li>The Verifiable Data Structure can be checked by Auditors</li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture enables a loose federation of Transparency Services, by providing a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
The remaining details of the Receipt's contents are specified in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a Transparency Service independent of any one use case:</t>
      <ul spacing="normal">
        <li>Issuers that use their credentials to create Signed Statements about Artifacts</li>
        <li>Transparency Services that evaluate Signed Statements against Registration Policies, producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</li>
            <li>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g. verification);</li>
            <li>or replay all the Transparent Statements to check for the consistency and correctness of the Transparency Service's Verifiable Data Structure (e.g. auditing)</li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple Transparency Services and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more Transparency Service.
Each Transparency Service produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple Transparency Services.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="536" viewBox="0 0 536 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,448 L 32,480" fill="none" stroke="black"/>
              <path d="M 40,352 L 40,368" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,200" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,328" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,408" fill="none" stroke="black"/>
              <path d="M 120,288 L 120,328" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 152,352 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,448 L 160,480" fill="none" stroke="black"/>
              <path d="M 208,272 L 208,288" fill="none" stroke="black"/>
              <path d="M 216,464 L 216,496" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,320" fill="none" stroke="black"/>
              <path d="M 224,384 L 224,408" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,144" fill="none" stroke="black"/>
              <path d="M 288,272 L 288,288" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,88" fill="none" stroke="black"/>
              <path d="M 304,304 L 304,320" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,272" fill="none" stroke="black"/>
              <path d="M 344,384 L 344,408" fill="none" stroke="black"/>
              <path d="M 344,464 L 344,496" fill="none" stroke="black"/>
              <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
              <path d="M 384,176 L 384,200" fill="none" stroke="black"/>
              <path d="M 384,448 L 384,480" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,88" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,64" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,200" fill="none" stroke="black"/>
              <path d="M 440,336 L 440,360" fill="none" stroke="black"/>
              <path d="M 440,376 L 440,408" fill="none" stroke="black"/>
              <path d="M 472,208 L 472,272" fill="none" stroke="black"/>
              <path d="M 488,256 L 488,336" fill="none" stroke="black"/>
              <path d="M 504,160 L 504,352" fill="none" stroke="black"/>
              <path d="M 512,448 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 288,32 L 408,32" fill="none" stroke="black"/>
              <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
              <path d="M 288,64 L 408,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 384,96 L 472,96" fill="none" stroke="black"/>
              <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
              <path d="M 240,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 368,128 L 456,128" fill="none" stroke="black"/>
              <path d="M 448,144 L 488,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 304,160 L 368,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 128,224 L 336,224" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 272,256" fill="none" stroke="black"/>
              <path d="M 472,256 L 488,256" fill="none" stroke="black"/>
              <path d="M 136,272 L 208,272" fill="none" stroke="black"/>
              <path d="M 296,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 472,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 272,304" fill="none" stroke="black"/>
              <path d="M 200,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 56,336 L 136,336" fill="none" stroke="black"/>
              <path d="M 240,336 L 288,336" fill="none" stroke="black"/>
              <path d="M 368,336 L 488,336" fill="none" stroke="black"/>
              <path d="M 152,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 360,368 L 488,368" fill="none" stroke="black"/>
              <path d="M 56,384 L 136,384" fill="none" stroke="black"/>
              <path d="M 24,416 L 176,416" fill="none" stroke="black"/>
              <path d="M 200,416 L 368,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 8,448 L 160,448" fill="none" stroke="black"/>
              <path d="M 368,448 L 512,448" fill="none" stroke="black"/>
              <path d="M 176,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 32,480 L 160,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 216,496 L 344,496" fill="none" stroke="black"/>
              <path d="M 8,448 L 24,416" fill="none" stroke="black"/>
              <path d="M 240,128 L 256,96" fill="none" stroke="black"/>
              <path d="M 160,448 L 176,416" fill="none" stroke="black"/>
              <path d="M 328,128 L 344,96" fill="none" stroke="black"/>
              <path d="M 176,464 L 200,416" fill="none" stroke="black"/>
              <path d="M 368,128 L 384,96" fill="none" stroke="black"/>
              <path d="M 456,128 L 472,96" fill="none" stroke="black"/>
              <path d="M 344,464 L 368,416" fill="none" stroke="black"/>
              <path d="M 368,448 L 384,416" fill="none" stroke="black"/>
              <path d="M 512,448 L 528,416" fill="none" stroke="black"/>
              <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
              <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
              <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
              <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
              <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
              <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
              <path d="M 448,144 C 439.16936,144 432,136.83064 432,128" fill="none" stroke="black"/>
              <path d="M 488,144 C 496.83064,144 504,151.16936 504,160" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 304,160 C 295.16936,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 368,160 C 376.83064,160 384,167.16936 384,176" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 344,240 C 335.16936,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 224,256 C 215.16936,256 208,263.16936 208,272" fill="none" stroke="black"/>
              <path d="M 272,256 C 280.83064,256 288,263.16936 288,272" fill="none" stroke="black"/>
              <path d="M 136,272 C 127.16936,272 120,279.16936 120,288" fill="none" stroke="black"/>
              <path d="M 312,272 C 320.83064,272 328,264.83064 328,256" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 168,288 C 176.83064,288 184,295.16936 184,304" fill="none" stroke="black"/>
              <path d="M 288,288 C 296.83064,288 304,295.16936 304,304" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 272,304 C 280.83064,304 288,296.83064 288,288" fill="none" stroke="black"/>
              <path d="M 200,320 C 191.16936,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 56,336 C 47.16936,336 40,343.16936 40,352" fill="none" stroke="black"/>
              <path d="M 136,336 C 144.83064,336 152,343.16936 152,352" fill="none" stroke="black"/>
              <path d="M 240,336 C 231.16936,336 224,328.83064 224,320" fill="none" stroke="black"/>
              <path d="M 288,336 C 296.83064,336 304,328.83064 304,320" fill="none" stroke="black"/>
              <path d="M 208,368 C 216.83064,368 224,375.16936 224,384" fill="none" stroke="black"/>
              <path d="M 360,368 C 351.16936,368 344,375.16936 344,384" fill="none" stroke="black"/>
              <path d="M 488,368 C 496.83064,368 504,360.83064 504,352" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,376.83064 40,368" fill="none" stroke="black"/>
              <path d="M 136,384 C 144.83064,384 152,376.83064 152,368" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="448,408 436,402.4 436,413.6 " fill="black" transform="rotate(90,440,408)"/>
              <path class="jump" d="M 440,376 C 446,376 446,360 440,360" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="440,200 428,194.4 428,205.6 " fill="black" transform="rotate(90,432,200)"/>
              <polygon class="arrowhead" points="400,88 388,82.4 388,93.6 " fill="black" transform="rotate(90,392,88)"/>
              <polygon class="arrowhead" points="392,200 380,194.4 380,205.6 " fill="black" transform="rotate(90,384,200)"/>
              <polygon class="arrowhead" points="352,408 340,402.4 340,413.6 " fill="black" transform="rotate(90,344,408)"/>
              <polygon class="arrowhead" points="344,224 332,218.4 332,229.6 " fill="black" transform="rotate(0,336,224)"/>
              <polygon class="arrowhead" points="320,320 308,314.4 308,325.6 " fill="black" transform="rotate(180,312,320)"/>
              <polygon class="arrowhead" points="312,88 300,82.4 300,93.6 " fill="black" transform="rotate(90,304,88)"/>
              <polygon class="arrowhead" points="304,272 292,266.4 292,277.6 " fill="black" transform="rotate(180,296,272)"/>
              <polygon class="arrowhead" points="232,408 220,402.4 220,413.6 " fill="black" transform="rotate(90,224,408)"/>
              <polygon class="arrowhead" points="128,328 116,322.4 116,333.6 " fill="black" transform="rotate(90,120,328)"/>
              <polygon class="arrowhead" points="104,408 92,402.4 92,413.6 " fill="black" transform="rotate(90,96,408)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6 " fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="80,328 68,322.4 68,333.6 " fill="black" transform="rotate(90,72,328)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6 " fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,88 52,82.4 52,93.6 " fill="black" transform="rotate(90,56,88)"/>
              <g class="text">
                <text x="60" y="52">Artifact</text>
                <text x="348" y="52">Issuer</text>
                <text x="56" y="116">Statement</text>
                <text x="292" y="116">sign</text>
                <text x="420" y="116">verify</text>
                <text x="68" y="228">Signed</text>
                <text x="404" y="228">Transparency</text>
                <text x="72" y="244">Statement</text>
                <text x="400" y="260">Service</text>
                <text x="248" y="276">Receipt</text>
                <text x="428" y="292">Transparency</text>
                <text x="264" y="324">Receipt</text>
                <text x="424" y="324">Service</text>
                <text x="96" y="356">Transparent</text>
                <text x="96" y="372">Statement</text>
                <text x="56" y="436">Collect</text>
                <text x="124" y="436">Receipts</text>
                <text x="228" y="436">Verify</text>
                <text x="304" y="436">Transparent</text>
                <text x="428" y="436">Replay</text>
                <text x="472" y="436">Log</text>
                <text x="272" y="452">Statement</text>
                <text x="72" y="468">Relying</text>
                <text x="128" y="468">Party</text>
                <text x="424" y="468">Relying</text>
                <text x="480" y="468">Party</text>
                <text x="256" y="484">Relying</text>
                <text x="312" y="484">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 .----------.                      +--------------+
|  Artifact  |                     |    Issuer    |
 '----+-----'                      +-+----------+-+
      v                              v          v
 .----+----.                   .-----+----.    .+---------.
| Statement |                 /   sign   /    /  verify  /
 '----+----'                 '-----+----+    '-------+--+
      |                            |                 |'------.
      |    .----------------------' '---------.      |        |
      |   |                                    |     |        |
      v   v                                    v     v        |
 .----+---+---.                           +----+----+-----+   |
|    Signed    +------------------------->+ Transparency  |   |
|   Statement  |                         .+               |   |
 '------+-----'           .-------.     | |   Service     +-+ |
        |      .---------+ Receipt +<--'  +--+------------+ | |
        |     |.-----.   |         +.        | Transparency | |
        |     |       |   '+------'  |       |              | |
        v     v        '---+ Receipt +<------+   Service    | |
     .--+-----+--.          '-------'        +--------+-----+ |
    | Transparent |                                   |       |
    |  Statement  +-------.                .----------)------'
     '-----+-----'         |              |           |
           v               v              v           v
  .--------+---------.  .--+--------------+--. .------+----------.
 / Collect Receipts /  / Verify Transparent / /   Replay Log    /
'--+---------------+  /      Statement     / '-+---------------+
   | Relying Party | '----+---------------+    | Relying Party |
   +---------------+      | Relying Party |    +---------------+
                          +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely Transparency Service, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature a Verifiable Data Structure.
The Verifiable Data Structure records registered Signed Statements and supports the production of Receipts.</t>
        <t>All Transparency Services <bcp14>MUST</bcp14> expose the minimally conformant APIs, defined in (<xref target="I-D.draft-ietf-scitt-scrapi"/> for the Registration of Signed Statements and issuance of Receipts.</t>
        <t>Transparency Services <bcp14>MAY</bcp14> support additional APIs for auditing, for instance querying the history of Signed Statements.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example</tt> may have a distinct Issuer identity for each sub domain, such as <tt>customer1.ts.example</tt> and <tt>customer2.ts.example</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is registered to the Verifiable Data Structure.
To enable audit-ability, Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.</t>
          <t>Beyond the mandatory Registration checks, the scope of additional checks, including no additional checks, is up to the implementation.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="STD96"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>) in order to check the signatures of Signed Statements, either separately, or inside Registration Policies.
Transparency Services <bcp14>MUST</bcp14> authenticate Signed Statements as part of a Registration Policy.
For instance, a trust anchor could be an X.509 root certificate (directly or its thumbprint), a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.</t>
            <t>When using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates currently registered as a trust anchor by the Transparency Service.
The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made Transparent and available to all Relying Parties of the Transparency Service by Registering them as Signed Statements on the Verifiable Data Structure.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently committed to the Verifiable Data Structure at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>Pre-configured Registration Policy and trust anchors;</li>
            <li>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</li>
            <li>An out-of-band authenticated management interface</li>
          </ul>
        </section>
        <section anchor="sec-verifiable-data-structure">
          <name>Verifiable Data Structure</name>
          <t>The security properties are determined by the choice of the Verifiable Data Structure (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) used by the Transparency Service implementation.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>a property required for a verifiable data structure to be applicable to SCITT, ensuring that the Statement Sequence cannot be modified, deleted, or reordered.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the registered sequence of Signed Statements accepted by the Transparency Service and committed to the Verifiable Data Structure.
Everyone with access to its content sees the same ordered collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Verifiable Data Structure includes sufficient information to enable authorized actors with access to its content to check that each data structure representing each Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non-inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that supports a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
    </section>
    <section anchor="signed-statements">
      <name>Signed Statements</name>
      <t>This specification prioritizes conformance to <xref target="STD96"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissibility of conforming messages.
This specification is left intentionally open to allow implementations to make Registration restrictions that make the most sense for their operational use cases.</t>
      <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
      <ul spacing="normal">
        <li>
          <xref target="CoSWID"/></li>
        <li>
          <xref target="CycloneDX"/></li>
        <li>
          <xref target="in-toto"/></li>
        <li>
          <xref target="SPDX-CBOR"/></li>
        <li>
          <xref target="SPDX-JSON"/></li>
        <li>
          <xref target="SLSA"/></li>
        <li>
          <xref target="SWID"/></li>
      </ul>
      <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.</t>
      <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
      <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header) for different Artifacts or sign all Signed Statements under the same key.</t>
      <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
      <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
      <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
      <t>Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
      <ul spacing="normal">
        <li>When using x.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</li>
        <li>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</li>
      </ul>
      <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, <tt>iss</tt> <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in length.</t>
      <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out-of-scope of this document.</t>
      <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="RFC9597"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
      <t>A Receipt is a Signed Statement, (COSE_Sign1), with additional Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <section anchor="sec-signed-statement-examples">
        <name>Signed Statement Examples</name>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition <xref target="RFC8610"/> for the protected header and unprotected header of Signed Statements and Receipts.</t>
        <t>The SCITT architecture specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl">
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &amp;(CWT_Claims: 15) =&gt; CWT_Claims
  ? &amp;(alg: 1) =&gt; int
  ? &amp;(content_type: 3) =&gt; tstr / uint
  ? &amp;(kid: 4) =&gt; bstr
  ? &amp;(x5t: 34) =&gt; COSE_CertHash
  * int =&gt; any
}

CWT_Claims = {
  &amp;(iss: 1) =&gt; tstr
  &amp;(sub: 2) =&gt; tstr
  * int =&gt; any
}

Unprotected_Header = {
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  ? &amp;(receipts: 394)  =&gt; [+ Receipt]
  * int =&gt; any
}
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
          <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1      /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag">
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}
</sourcecode>
        </figure>
      </section>
      <section anchor="sec-registration-of-signed-statements">
        <name>Registration of Signed Statements</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1">
          <li>
            <strong>Client authentication:</strong> A Client authenticates with the Transparency Service before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation-specific and out of scope of the SCITT architecture.</li>
          <li>
            <strong>TS Signed Statement Verification and Validation:</strong> The Transparency Service <bcp14>MUST</bcp14> perform signature verification per <xref section="4.4" sectionFormat="of" target="STD96"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The Transparency Service <bcp14>MUST</bcp14> also check the Signed Statement includes the required protected headers.
The Transparency Service <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain specific registration policies that apply to specific content types.</li>
          <li>
            <strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope and may use information contained in the attributes of named policies.</li>
          <li>
            <strong>Register the Signed Statement</strong></li>
          <li>
            <strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the Verifiable Data Structure.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>A Transparency Service <bcp14>MAY</bcp14> accept a Signed Statement with content in its unprotected header, and <bcp14>MAY</bcp14> use values from that unprotected header during verification and registration policy evaluation.</t>
        <t>However, the unprotected header of a Signed Statement <bcp14>MUST</bcp14> be set to an empty map before the Signed Statement can be included in a Statement Sequence.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
        <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      </section>
    </section>
    <section anchor="Receipt">
      <name>Transparent Statements</name>
      <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
      <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
      <t>Receipts are based on Signed Inclusion Proofs as described in COSE Receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> that also provides the COSE header parameter semantics for label 394.</t>
      <t>The Registration time is recorded as the timestamp when the Transparency Service added the Signed Statement to its Verifiable Data Structure.</t>
      <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.
See <xref target="fig-signed-statement-cddl"/> for the CDDL rule that defines 'COSE_Sign1' as specified in <xref section="4.2" sectionFormat="of" target="STD96"/></t>
      <figure anchor="fig-transparent-statement-cddl">
        <name>CDDL definition for a Transparent Statement</name>
        <sourcecode type="cddl">
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ Receipt]
}
</sourcecode>
      </figure>
      <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
      <figure anchor="fig-transparent-statement-edn">
        <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        394:   [                    / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Per the COSE Verifiable Data Structure Registry documented in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, the COSE key type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
      <figure anchor="fig-receipt-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-protected-header-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
        <sourcecode type="cbor-diag">
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Verifiable Data Structure was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-inclusion-proof-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
        <sourcecode type="cbor-diag">
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]
</sourcecode>
      </figure>
      <section anchor="validation">
        <name>Validation</name>
        <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in <xref section="4.4" sectionFormat="of" target="STD96"/>, when checking the signature of Signed Statements and Receipts.</t>
        <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
        <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
        <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
        <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
        <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Interactions with Transparency Services are expected to use appropriately strong encryption and authorization technologies.</t>
      <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Issuers and Clients are responsible for verifying that the Transparency Service's privacy and security posture is suitable for the contents of the Signed Statements they submit prior to Registration.
Issuers must carefully review the inclusion of private, confidential, or personally identifiable information (PII) in their Statements against the Transparency Service's privacy posture.</t>
      <t>In some deployments a special role such as an Auditor might require and be given access to both the Transparency Service and related Adjacent Services.</t>
      <t>Transparency Services can leverage Verifiable Data Structures which only retain cryptographic metadata (e.g. a hash), rather than the complete Signed Statement, as part of a defense in depth approach to maintaining confidentiality.
By analyzing the relationship between data stored in the Transparency Service and data stored in Adjacent Services, it is possible to perform metadata analysis, which could reveal the order in which artifacts were built, signed, and uploaded.</t>
    </section>
    <section anchor="SecConSec">
      <name>Security Considerations</name>
      <t>SCITT provides the following security guarantees:</t>
      <ol spacing="normal" type="1">
        <li>Statements made by Issuers about supply chain Artifacts are identifiable and can be authenticated</li>
        <li>Statement provenance and history can be independently and consistently audited</li>
        <li>Issuers can efficiently prove that their Statement is logged by a Transparency Service</li>
      </ol>
      <t>The first guarantee is achieved by requiring Issuers to sign their Statements.
The second guarantee is achieved by proving a Signed Statement is present in a Verifiable Data Structure.
The third guarantee is achieved by the combination of both of these steps.</t>
      <section anchor="sec-ordering-of-signed-statements">
        <name>Ordering of Signed Statements</name>
        <t>Statements are signed prior to submitting to a SCITT Transparency service.
Unless advertised in the Transparency Service Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the Verifiable Data Structure matches the ordering of their issuance.</t>
      </section>
      <section anchor="sec-accuracy-of-statements">
        <name>Accuracy of Statements</name>
        <t>Issuers can make false Statements either intentionally or unintentionally, registering a Statement only proves it was produced by an Issuer.
A registered Statement may be superseded by a subsequently submitted Signed Statement from the same Issuer, with the same subject in the cwt_claims protected header.
Other Issuers may make new Statements to reflect new or corrected information.
Relying Parties may choose to include or exclude Statements from Issuers to determine the accuracy of a collection of Statements.</t>
      </section>
      <section anchor="sec-key-management">
        <name>Key Management</name>
        <t>Issuers and Transparency Services <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>carefully protect their private signing keys</li>
          <li>avoid using keys for more than one purpose</li>
          <li>rotate their keys in well-defined cryptoperiods, see <xref target="KEY-MANAGEMENT"/></li>
        </ul>
        <section anchor="sec-verifiable-data-structure-1">
          <name>Verifiable Data Structure</name>
          <t>The security considerations for specific Verifiable Data Structures are out of scope for this document.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for the generic security considerations that apply to Verifiable Data Structure and Receipts.</t>
        </section>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, Transparency Services, and Auditors) are either corrupt or compromised.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
Issuers and Transparency Services can both be compromised.</t>
        <t>The SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.
Running multiple, independent Transparency Services provides different organizations to represent consistent or divergent opinions.
It is the role of the relying party to decide which Transparency Services and Issuers they choose to trust for their scenario.</t>
        <t>In both cases, the SCITT architecture provides generic, universally-verifiable cryptographic proofs to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
So long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
        <section anchor="sec-cryptographic-agility">
          <name>Cryptographic Agility</name>
          <t>The SCITT Architecture supports cryptographic agility.
There are no mandatory to implement signing algorithms for Signed Statements or Receipts.</t>
        </section>
        <section anchor="sec-key-compromise">
          <name>Key Compromise</name>
          <t>Revocation strategies for compromised keys are out of scope for this document.
It is important for Issuers and Transparency Services to clearly communicate when keys are compromised, so that Signed Statements can be rejected by Transparency Services or Receipts can be ignored by Relying Parties.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register:</t>
      <ul spacing="normal">
        <li>the media type application/scitt-statement+cose in the "Media Types" registry, see below.</li>
        <li>the media type application/scitt-receipt+cose in the "Media Types" registry, see below.</li>
      </ul>
      <section anchor="sec-cose-receipts-header-parameter">
        <name>COSE Receipts Header Parameter</name>
        <t>394 is requested in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> and has received an early assignment.</t>
      </section>
      <section anchor="sec-media-type-applicationscitt-statementcose-registration">
        <name>Media Type application/scitt-statement+cose Registration</name>
        <t>IANA is requested to add the following Media-Type to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="new-media-types-scitt-statement">
          <name>SCITT Signed Statement Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-statement+cose</td>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">
                <xref target="signed-statements"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>statement+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="SecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to provide an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.scitt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-media-type-applicationscitt-receiptcose-registration">
        <name>Media Type application/scitt-receipt+cose Registration</name>
        <table anchor="new-media-types-receipt">
          <name>SCITT Receipt Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-receipt+cose</td>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">
                <xref target="Receipt"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>receipt+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="SecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to establish or verify transparency over Statements. Typically emitted by a Transparency Service, for the benefit of Relying Parties wanting to ensure Non-equivocation over all or part of a Statement Sequence.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.receipt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/> in the 0-255 Range:</t>
        <table anchor="new-content-formats">
          <name>SCITT Content-Formats Registration</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">-</td>
              <td align="left">103</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">-</td>
              <td align="left">104</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="sec-common-terminology-disambiguation">
      <name>Common Terminology Disambiguation</name>
      <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups.</t>
      <t>This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
      <t>The terms "verifier" and "Relying Party" are used interchangeably through the document.
While these terms are related to "Verifier" and "Relying Party" as used in <xref target="RFC9334"/>, they do not imply the processing of RATS conceptual messages, such as Evidence or Attestation Results that are specific to remote attestation.
A SCITT "verifier" and "Relying Party" and "Issuer" of Receipts or Statements might take on the role of a RATS "Attester".
Correspondingly, all RATS conceptual messages, such as Evidence and Attestation Results, can be the content of SCITT Statements and a SCITT "verifier" can also take on the role of a RATS "Verifier" to, for example, conduct the procedure of Appraisal of Evidence as a part of a SCITT "verifier"'s verification capabilities.</t>
      <t>The terms "Claim" and "Statement" are used throughout this document, where Claim is consistent with the usage in <xref target="RFC9711"/> and <xref target="RFC7523"/>, and Statement is reserved for any arbitrary bytes, possibly identified with a media type, about which the Claims are made.</t>
      <t>The term "Subject" provides an identifier of the Issuer's choosing to refer to a given Artifact and ensures that all associated Statements can be attributed to the identifier chosen by the Issuer.</t>
      <t>In simpler language, a SCITT Statement could be some vendor-specific software bill of materials (SBOM), results from a model checker, static analyzer, or RATS Evidence about the authenticity of an SBOM creation process, where the Issuer identifies themselves using the <tt>iss</tt> Claim, and the specific software that was analyzed as the Subject using the <tt>sub</tt> Claim.</t>
      <t>In <xref target="RFC7523"/>, the Authorization Server (AS) verifies Private Key JWT client authentication requests, and issues access tokens to clients configured to use "urn:ietf:params:oauth:client-assertion-type:jwt-bearer".
This means the AS initially acts as a "verifier" of the authentication credentials in form of a JWT, and then later as an "Issuer" of access and refresh tokens.
This mirrors how Signed Statements are verified before Receipts are issued by a Transparency Service.
Note that the use of <xref target="RFC7523"/> is only one possible approach for client authentication in OAuth.</t>
      <t><xref target="FIPS.201"/> defines "assertion" as "A verifiable statement from an IdP to an RP that contains information about an end user".</t>
      <t><xref target="NIST.SP.800-63-3"/> defines "assertion" as "A statement from a verifier to an RP that contains information about a subscriber.
Assertions may also contain verified attributes."</t>
      <t>This document uses the term Statement to refer to potentially unsecured data and associated Claims, and Signed Statement and Receipt to refer to assertions from an Issuer, or the Transparency Service.</t>
      <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."</t>
      <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="NIST_EO14028"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.".
In the RATS context, a "NIST attestation" is similar to a RATS "Endorsement".
Occasionally, RATS Evidence and RATS Attestation Results or the procedures of creating these conceptual messages are referred to as "attestation" or (in cases of the use as a verb) "to attest".
The stand-alone use of "attestation" and "to attest" is discouraged outside a well-defined context, such as specification text that highlights the application of terminology, explicitly.
Correspondingly, it is often useful for the intended audience to qualify the term "attestation" to avoid confusion and ambiguity.</t>
    </section>
    <section anchor="sec-signing-statements-remotely">
      <name>Signing Statements Remotely</name>
      <t>Statements about digital Artifacts, containing digital Artifacts, or structured data regarding any type of Artifacts, can be too large or too sensitive to be send to a remote Transparency Services over the Internet.
In these cases a Statement can also be hash, which becomes the payload included in COSE to-be-signed bytes.
A Signed Statement (COSE_Sign1) <bcp14>MUST</bcp14> be produced from the to-be-signed bytes according to <xref section="4.4" sectionFormat="of" target="STD96"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
            <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
            <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
            <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
            <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
            <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
            <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
            <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
            <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
            <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
            <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
            <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
            <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
            <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
            <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
            <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
            <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
            <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
            <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
            <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
            <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
            <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
            <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
            <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
            <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
            <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
            <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
            <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
            <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
            <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
            <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
            <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
            <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
            <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
            <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
            <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
            <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
            <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
            <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
            <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
            <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
            <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
            <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
            <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
            <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
            <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
            <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
            <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
            <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
            <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
            <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
            <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
            <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
            <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
            <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
            <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
            <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
            <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
            <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
            <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
            <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
            <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
            <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
            <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
            <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
            <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
            <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
            <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
            <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
            <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
            <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
            <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
            <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
            <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
            <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
            <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
            <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
            <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
            <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="336,584 324,578.4 324,589.6 " fill="black" transform="rotate(90,328,584)"/>
            <polygon class="arrowhead" points="280,584 268,578.4 268,589.6 " fill="black" transform="rotate(90,272,584)"/>
            <polygon class="arrowhead" points="280,520 268,514.4 268,525.6 " fill="black" transform="rotate(90,272,520)"/>
            <polygon class="arrowhead" points="248,176 236,170.4 236,181.6 " fill="black" transform="rotate(0,240,176)"/>
            <polygon class="arrowhead" points="176,176 164,170.4 164,181.6 " fill="black" transform="rotate(0,168,176)"/>
            <polygon class="arrowhead" points="152,624 140,618.4 140,629.6 " fill="black" transform="rotate(180,144,624)"/>
            <polygon class="arrowhead" points="64,680 52,674.4 52,685.6 " fill="black" transform="rotate(90,56,680)"/>
            <polygon class="arrowhead" points="64,584 52,578.4 52,589.6 " fill="black" transform="rotate(90,56,584)"/>
            <polygon class="arrowhead" points="64,456 52,450.4 52,461.6 " fill="black" transform="rotate(270,56,456)"/>
            <polygon class="arrowhead" points="64,104 52,98.4 52,109.6 " fill="black" transform="rotate(90,56,104)"/>
            <polygon class="arrowhead" points="48,200 36,194.4 36,205.6 " fill="black" transform="rotate(90,40,200)"/>
            <g class="text">
              <text x="76" y="52">Artifact</text>
              <text x="60" y="132">Hash</text>
              <text x="196" y="180">OR</text>
              <text x="296" y="180">Payload</text>
              <text x="72" y="228">Statement</text>
              <text x="104" y="292">...</text>
              <text x="164" y="292">Producer</text>
              <text x="232" y="292">Network</text>
              <text x="280" y="292">...</text>
              <text x="192" y="324">...</text>
              <text x="104" y="356">...</text>
              <text x="164" y="356">Issuer</text>
              <text x="224" y="356">Network</text>
              <text x="272" y="356">...</text>
              <text x="52" y="420">Identity</text>
              <text x="168" y="420">(iss,</text>
              <text x="212" y="420">x5t)</text>
              <text x="52" y="436">Document</text>
              <text x="48" y="500">Private</text>
              <text x="96" y="500">Key</text>
              <text x="268" y="548">Header</text>
              <text x="76" y="628">Sign</text>
              <text x="220" y="628">To</text>
              <text x="244" y="628">Be</text>
              <text x="284" y="628">Signed</text>
              <text x="336" y="628">Bytes</text>
              <text x="36" y="708">COSE</text>
              <text x="76" y="708">Sign</text>
              <text x="104" y="708">1</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
      </artset>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <seriesInfo name="DOI" value="10.17487/RFC6838"/>
            <seriesInfo name="RFC" value="6838"/>
            <seriesInfo name="BCP" value="13"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <seriesInfo name="DOI" value="10.17487/RFC9360"/>
            <seriesInfo name="RFC" value="9360"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9597"/>
            <seriesInfo name="RFC" value="9597"/>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-14"/>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="11" month="May" year="2025"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-scitt-scrapi">
          <front>
            <title>SCITT Reference APIs</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-scrapi-04"/>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jon Geater" initials="J." surname="Geater">
              <organization>DataTrails Inc.</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document describes a REST API that supports the normative
   requirements of the SCITT Architecture.  Optional key discovery and
   query interfaces are provided to support interoperability with X.509
   Certificates, alternative methods commonly used to support public key
   discovery and Artifact Repositories.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9711"/>
            <seriesInfo name="RFC" value="9711"/>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
            <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST.SP.800-63-3" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">
          <front>
            <title>Digital identity guidelines: revision 3</title>
            <seriesInfo name="DOI" value="10.6028/NIST.SP.800-63-3"/>
            <seriesInfo name="NIST Special Publications (General)" value="800-63-3"/>
            <author fullname="Paul A Grassi" surname="Grassi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael E Garcia" surname="Garcia">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="James L Fenton" surname="Fenton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="22" month="June" year="2017"/>
          </front>
        </reference>
        <reference anchor="FIPS.201">
          <front>
            <title>Personal identity verification (PIV) of federal employees and contractors</title>
            <seriesInfo name="DOI" value="10.6028/nist.fips.201-3"/>
            <author>
              <organization/>
            </author>
            <date month="January" year="2022"/>
          </front>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="NIST_EO14028" target="https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf">
          <front>
            <title>Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="February" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <seriesInfo name="DOI" value="10.17487/RFC7523"/>
            <seriesInfo name="RFC" value="7523"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="BCP" value="225"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CoSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <seriesInfo name="DOI" value="10.17487/RFC9393"/>
            <seriesInfo name="RFC" value="9393"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION">
          <front>
            <title>Attested append-only memory: making adversaries stick to their word</title>
            <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
            <seriesInfo name="ACM SIGOPS Operating Systems Review" value="vol. 41, no. 6, pp. 189-204"/>
            <author fullname="Byung-Gon Chun" initials="B." surname="Chun">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="Petros Maniatis" initials="P." surname="Maniatis">
              <organization>Intel Research Berkeley, Berkeley</organization>
            </author>
            <author fullname="Scott Shenker" initials="S." surname="Shenker">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="John Kubiatowicz" initials="J." surname="Kubiatowicz">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <date month="October" year="2007"/>
          </front>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="KEY-MANAGEMENT">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Tradeverifyd</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@or13.io</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
      <contact initials="A." surname="Chamayou" fullname="Amaury Chamayou">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>amaury.chamayou@microsoft.com</email>
        </address>
      </contact>
      <t>Amaury contributed elemental parts to finalize normative language on registration behavior and the single-issuer design, as well as overall document consistency</t>
      <contact initials="D." surname="Brooks" fullname="Dick Brooks">
        <organization>Business Cyber Guardian (TM)</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>dick@businesscyberguardian.com</email>
        </address>
      </contact>
      <t>Dick contributed to the software supply chain use cases.</t>
      <contact initials="B." surname="Knight" fullname="Brian Knight">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>brianknight@microsoft.com</email>
        </address>
      </contact>
      <t>Brian contributed to the software supply chain use cases.</t>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <t>Robert contributed to the software supply chain use cases.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIABDsUmgAA+19aXfb2JXgd/4KjHxOSyqTkCVZXtRJumRJTimxLY2kSiUn
yZRBAiQRgwAbACWzbPdvmd8yv2zu+hYslKu60nNmzugkZYkE3nLffXdfRqPR
4O44OBwM6rTOkuPgJA9Oysk8rZNJvSqTYFqUwW25qur7oqzn6yDKY/g7yqtl
VCZ5HZyls7SOsuBmtVxm6+B0HqV5NYjG4zKBcW9OL25vvQEHcTHJowXMFJfR
tB6lST0dVZO0rkeR89hoH5YEM0QwRjJZlWm9HtzPZMDBh/vj4CKvkzJP6tEZ
jjOYRPVxUNXxYFLkVZJXq+o4WCfVoFqNF2lVpUVer5cw68X57evB4EMZLeLi
Pv+xWNbwVXU8CIJoVRc/pvGPyzKZph9hsGQyGgzuknyV4NezslgtdQFBsIjS
DJ7BhX+LewiLcoZPpfV8NT4OaFv3M97Z3satwj5X9bwojwejgCHzXZJ/CF6l
5Yd5kf0Eg8LQx8HrMlrl82KalMHNBa5AYdz6IuG1zWGUcCyjfFuldTg1T4Zx
Ag9WdZkkALbreQKHVpdRVSXB8yP4ZlLEsI7tZ08PXh5t498A/+PgLCoXVR3F
NT2xyusSPvx9Ui6ifG0Wf5LXRZonwVmSpbM8qkdvortoFfM2ojz9KUKIHwdv
00lZVMW0Dq6TKkGAOCs62A9uanowuC6i2K7o9NV+cPD6lV3TabQYl2k8S+zG
o7yOs28XOn44KRbugr//o1nraRKX6SR4XawQk/4LlzjlGb9qkX8pZkk1B3hW
8yXcvqS1zJPrt8669vefBK9X2Rhn6FjZy3d/2LiyNc0G+CGzfQtn3rk4wBi4
DWHwJqo+JCV8zau9qZO7xH4oo1b4aZ7Rp9/Oixo/pVHxutZlOoa7RxeARr0M
cZgkS8yol2Wa2M/87QM1imH0Mp2uYztjAW98W5T7h2FaeGvP4d7FdHRAHfAL
mZ/G+h18EvBs5gt4ui6CdLEsi7s0nwX1PAlmSZ6UUSZrCIppcHp5cx6MV2kW
4zPjrJh8qIhYAr1bLZBSImFKARD5ZB3qTk9CpJiLaF2szF5PFtGqXLuf92Cl
g/H0SjiRVzagFe/+j7DGWL5pb18W4AIA4I57ADoPZL+uECDTNEcAJEFeAAGo
Uzj1LMpnq2iWBACSMpmlSFIIPuNkHt2lwEkQIAi/ChaQJSMgzCsgW4BsQCqG
QVQF90mW4b/FHcI364SeAu8sDF6VRfGhMqA7Sycf7Gc+2F6tYNKkqoLT9Rjm
/P0qKuM0yoOd27e7FpIxjPDtWB6d4JMzebAHlBsRidbTQCTaPhzNPXC3oGKu
OUGuGayA+k6iKqkMerwKgz/m6Wxemx2+KnHN5sMHMWOMz3+gxx/Eio1b4Yn/
E3u5DhHb3wL6pLnZznUBEK7tp439XNxenwenRbksGJHsvoB/0zuwKaB7wnx/
1oZk6l+yo4FBeRQMrl+fPntx+EJ+fXH48kB/fbb/BGjs2dkb+Pvm9uzl02Oa
eQQfvrq8pt9/e0xPvnz6Up55Zp8BiuI88/LJ0QGP+/Lw2ROZ4uXRy+fw5A+3
P56+Obl4e/OjvHQxOgsdoWNSVMlokZQf4M4hmxgBLSumeCjnp+cXV7c37VdY
TqkmZbRMUeq5Prm6wKdO3p2Ek/v6eDBI86kFgyzn+f4+ruzdxc1teHMV7r94
8mS0/9L9CD95djg6xM9eX1zdhAdP9uHiXl6E+0/CZ08OXuzRk/rV6FDe/fH8
cv8pfM3gqaNyhsxuXtfL6nhv7/7+PsyBPISz4m6vWgOdWOxN0yyp9pSAVHsH
Tw4O9p7A/57u6QmP+IRHdMKjSgTN0WyVxlE+SUYrYIDl6PxyRFPjA4hBo6dJ
uIynvBCWmm8UZVwx2EiuQGx4QEBMGDA4/whfEMW8LPHvnfPL3YCmwFeIYj5N
aPgYEBhEDVj56An87ymD+SmgCwheWVFVUbnmz54fHRwq3j0/OFL82H92APhx
q4hz+BTO/ATOGz44LW5+uDhj3Dp8eUgfrSdZkSdnf+6G8oS/jj/ifdurlskk
naYTupl7SLDv0uR+zwWLGQ8HP//v31/86fL05Pbi8p058f39p0d7+4cHhwcv
D8P9g5dPD148wYfhOOqiLrrXIV8CZ/dmk4/x9Zs3Nyfd71ZZFYF0c+e9iY/T
a1dnfx7h3ex5dwlbx3eBFvjbr/zhYJjgxv3eDP6HG9j8P2NwPMruQ6vKib0b
V2XxD0Cxak8xdnQRw+0wY41woD28ACC+50Q87czwVXvmP57/ZfQWqMLvz9+e
v7vtuMpy6Y+eL+uDcn8wwOlA+MRFn795fRxsAQLW87TaGgxGoxGoNSg2TOrB
AAS7SRKN0wyvEFwnlxxXQQriFSpl9yhv6dVFcj4BtTAc/DCH6x+QWJhGY/gV
rlKEQvKKlK4qAIkkCaI4ht8roP0K8YBkkmoIs03mKIkk/75K74qJCHp3KK6I
ygsTCeDweeAca5CAgOFHwSqHy11W8EzU1KVRqPE2Eg5uYfNW0AHSvARyjbur
JlFGa2+N4stPKD3hFpDd0Ri1UdAnoLHDZLBIHAcYHKhq3vzh4KIOUF9GmEyz
5GPKAB8CxEHBLpYgh8kRjJP6Pkly2P8UVMjWPBUSgAmCAqU8EDFgWiJ696AT
B3dRmRYr2NUqTms8MtjnJIlpWnwe5MVVFoEWsIZfAeQl7QSZLSLFIo1jEP0H
j1DtL4t4NWH080EXg+Ke03gexGBBwRg4N6ywRlE9+QhiZJUiQBZw+CiwWrzg
1YMmXEzSCIWCaVbck8C7iD4kCmqUGnwA1MFdGm3CN5BbQIBO8e0x4mkJHy6L
nNSFTjgiYoCmUQAWwaJRMPEeS3KchgbD7zzGg7aRWUmneOu8MxTrzaqqgx0y
ZOz6qJXSRpN8TudGR6WHT1CZkISlH/UiokJnx2BktQuLjOoAWWQEqmnty1aA
LIsC8QLgtINy3RQIQLUbDq5JiwCg4h1vYHnFiBV1Qo/IwwcYGlEeVBSgiqqs
GcQLB7ddcA8A5VGy4bfWAV0BosND3Nk0LRe4nChYFnCv1jjTAhBrnMBLCSAv
HG2seqK9kjAxfgAnNktKPlo2jvEn8N4SEIK2FQVIeiPWllLAEyQ/iFKA7HRB
AB0cKCxA/Q0Hl3hirFo1iAGsrxQwJvGwjUgWYkj4YHbYQpIu62HwD0SUqFIA
rnHQxbKiIcylGye4WYFwEoeDm3SRZrj6JUA6msyV1o6RdoAazaok3izEHyW7
kwytTxXuzSCAJcKnltR6GB18+jQ6vf3yxQWozgvjZ3R3o2CBJ0M6O8wEr0ZA
wheIkYgNyR0TJrNcochbgsajaJYXVZ1OtuzQEY/ME3beXkS8cRIkgKJwuild
SKIngJNAZCuigVWRkU4C2y7lBVhSCtpLKqo2wiNP7kHtAU2UXiHhFtZ4LlRM
2CNu847Y0jSJ6DIL0RCgePSwKvg6upQ2mJbFwpJpZhq8uEmU09ImfE9pG/fE
X6PsPlpXzD9wdS2eQVcUKR1MjTv0zAINFuDTxAeoTzh4TeQHucyEKB0h/wQm
5527jAF+zwArRcczmhwaiQCoEZ0Fbb9f/YsLJODDADRFfsqVg4TzxHQMLXZb
EAqg+Zlurjuqc413oqxC+ABrLXmdgPd3UbZKRiClgKQTLefV7pBuTfIxwns0
dN9nsjqPyri1eOSiPqekuZRdtpmgkPYmvSVzlvJYPD1UsehZsn4J3ajwUqpi
+eULCBJhEg51uF4OGbBOuktXuepizcQ9kJHHSk1PQdpL4dlXcIhAni7HKNsG
10pK+Wxualg3gIVoBcj2X750YBuujhAY9h5NEMMIy5Gn00Twng5/I4/iIOf5
pFwv29MAOJQo9exDMQZNTTNvM2cIljP8OqWB36hVDQc+O3ujA3efjzmENrBg
UT/i4vcbyAt4+OmTUTzDA8RSs4UTIvf2PKqA7KAxM5sp3MjY2EAR2btZi1J9
fhQxZpYVY5SP8SRKUGRHfMFcwtOiJiJkezsjOZPHRqMp4qGvPA1J8srWPlYS
CEti2UO6KwXTWgdIuLTEI7Jq5v0uiVBtvwJGApwfBH1aEiAd0dMK6AzfILNt
PWJnQ47wmUVrYhGTbBUzg/CoF1zeC1R+FgvY4ZC/8w9Q1o98PluTbI0sFOnb
GCVOkbaJKgLR75CjEiO4wBd0JPNk8kFYNCw8LZESpTGRYqZ/dbpI+DjkbZUw
wsF3xb3gjIub8NAiymG/MTI7FGSYXgLVGhVob+qi3LD3R4/gQjts6l1RRyr8
J8EHXACsG9j12+9vbreG/G/w7pJ+v0ajw/X5Gf5+893Jmzfml4E8cfPd5fdv
zuxv9s3Ty7eg0Z7xy/Bp4H002Hp78pctlqi3Lq/QqHHyZqt1eLRv5ux0+IAk
SFeiahAn1aRMx3zgr06v/tf/3H8KOPrfQBs+2N9/CVSK/3ix//wp/HE/T3Ke
rUBk5j8R/gO4MSgs4t0B3XISLVEKqMiaXs2L+zxARAdAfvNXhMzfj4PfjCfL
/ae/kw9ww96HCjPvQ4JZ+5PWywzEjo86pjHQ9D5vQNpf78lfvL8V7s6Hv/k3
FJ6D0f6Lf/vdABXGHtMcohugUBGkWbYiiYQpmrJvc+O7ZSiWzWvDPCu9mEJG
4wRuXsaicvIxAUIQiUsFSAqJAZ1Sxs7Nzemua2pGHG96lYQAW9Wve3VADIiH
GQtosJOEM+DEQAjZnvvlyy7hJwjvKKPVIB2LiPSgCfym64GKCH7CKgM8PF1l
Hj1XuyotD/Qo0C5WzBsnoM2C4MnX/fciqAMsgquyAFK5YFM+7mIwuPEEKDX8
pCySWBKM2wBIIUQQdug/AjCUzCVBgwN58Cf8AsheXizSyTBYrsawVLguUVbP
+a5V0TSpEcolCNW47c6557Bh1s1gp1mGmvFkJfypTKsPQvjEvAOajSoIODz5
l4KsQPqZTpBdJUndZw4h8S+BM0BjB4waC0kAEWSBvrg0v4PH4C01gDEdFvcd
U2HLs4H/knrMO/btQkPWRIzaQr4ws+UR81/gZCTZoylbrkon5iBnWtC/Y9Cf
YvgYLeskAKGOD6dfZyLBi1yAmsYqV+AmH2GmFEQKmDPHU0QVxUPNqK4jvBts
/cRzvU+iD+jEA0jjWXUui8QbSwBiFoWydJqgqTsZybmjEBv13AmeGE54DZo8
Oi3J/ZkgjyOtEwcb0WjIDWei6sRwoBPYMz6W5uYvXj3BAeUaGIdY4H/8x38E
UVTdzcgaG4BwuEwAfiAuwnDy8zZCPQjhcljGIxQA1iAGTD7QekoUuyt2oJmf
zx1/PB7hj/yXP/rcfgo/Oi1ABHS/Pi3QQ75ACbYqVuVEPOhF1jtMx2Q/azHt
rS+z1WyE8Uf6ACwK1L7uhyf03T9/dUWcTtdMxOGAqw+s7CtdB935Li2LnGib
efMVfeWMclWklcjx/Bqca17vIZbANS83zH8LqiLcXFLE+dUJWjl+3U06hw/C
L2r6RVY5z9/ih87zr0FCsfIrkg58AHjQKqurf/qRfF+hAhHr/bATXsmF6dyY
3qYyWRbAYAryvP1zFyq4A5w8Qfs1YY95/Fo+7UG1GBQN4DYpW5ZkiH/ais1H
QJuyYh30IKCQIVWfV0s0JrEdqHro3EcyOVDDwafj4FGLTLOf6rdb52wdIfnh
DZLfUyK/t/zU1pfB4Cy5A333conmxho9GkRQK9aUU0M/mbUm+UgImnIANVHE
Lh0WIxnw6joRrfQjCg7FajYv1GjkMdiqYD1L9DPg3EY4ql3Xlz8I6GJm5yj1
oDcmncC9EZWWJaE8Ee2NRQ/2Ij1gz4drqK6tJftYUABdL1moYfYM2v2Mef16
ydbalgmqOUawI1E/aelBbBdXegeizBAEENSL0UALhFn8R5E6mozfycoEYnn3
HUW30QfVs8nWRvKbsS6heQJdb32rxafNikHuKRQ6ICvO5jXJyHC8cPXJc4T2
V8KyJgxQEBBVXjgMKdyROJdaNJ8nNpaEoRUz4FTI87OI0AFCKh3OAxIqSRDr
PFrg7458bQRSpKYICyGoIDWufvqp/anSFTJr39EMMV1fWhgbBOCzu1WWW4tu
hSdjhuDV15M5SrBwCBcUI1TBwaC0hk7Eqk6A1CLGlGSbQAMsRkFUNaEgmRRZ
E2a/AilOaJ9YA2Z+5FNEUReFY/LeAQ1ZW2uqcXN0I9+wT0NiEZ2uvLFeO4Ot
4DWckqxOd6magPbqljsNZWSkHaxukGXM+m0nSNdStVgLBRJcIz0Alip+FwQr
mWVBEYIzIXM0YDuNjuCAgUcJ3AfET9g42w2dE5/M8/TfcSAAQyX2ObhxS7I3
BWMU+is2muOZEKVRYFkEJfSdwgHgdjimEo63UsIDcngKwCeijQGd8DFSJtfv
BABeoGKcZFMj9DM1rBMgfWRGCgeXJQrUOi3NKrM1hzVRRmgPJEs+75lttXlx
z/oMgAqwme3KaKJH3WIEqgvZWNmDxkPgQRVkJgfB+g1sDSnbPRFOskcnH4E6
I40jJF2KUksCo4YFAo5OUmRjowWRnKEsLF2gFS7KydExLzIOdWRMRMWTNKSi
kolY8wLagmqV2o6RSjXcHLfd+Cu4hgYIXHBaLSqf4rEJ0uA2mf5wPejG5sVw
2DlaulF/c2iYsLJ5kjk8ImOKinRwjuiFRrw5eSrQxIFrIV//PKFzGgPxWJDq
BeQAjjTFW4X2iDJkwx0753Bl1h3TMMUYk6BsH+2xcK8KekCEYePUEzuBRw/u
EjYonAOrxMtGEgEKf6c4Ha8DZYfu1ZCvmi2tNtIXcAKAFVtv0dcs4JGNBDsB
pXtdpQx/a5u6YnI1GJwoUY4tIxBaRsZSElfIEbeEQ2cbUKSBDb4tvMXq0Fxl
CAbTBbQSi7tzBvtCTx7dPPJz84mi8bIA0c3iMXtP1JxiEKu9cLRkqAkMzQT4
nc6vKM/D4bVepbV6zeAQQjT0jJmR0B1dAMNJUawzQ5QSlM/ojIApV6jpL+dk
Som8+SIFPKkmij4VsF2FL181IriWVAQph0etOXBGR3OMC6hcOwwyZXsD3XxW
GMh+Tx5d3EbExnkQ2MjBL4vCG2dnYrdmYmYh264Fq2MauMR4pAjtMGnBTDZd
ULyLRUPC1MiTa+09c47PTkb2lqJic0gU3Edr9RbbEAV0YoOkIEfmSQgMR0WX
ll1IsdkQMHexNI8EWTDmZGlOYh3dlzYIGsIJKRmd043XxGglckM+9F+O02qS
FRgJRTpeybIZ8WSNjQB4xCANFO71Qlyao8ujAFGxTmdKvhpAOanZ5Dn0uIID
hlzUoY6bz36bGgVCElrc4bOkCyzIA6t5ChScn6YN8HlOI/iC8B8GTfM5iCd1
ZY4TUT8ExgiUmvAIzaNGUes7SxF4K35BCAxJhRJSHZHg4m7NLrXteFfggLiC
SQZ8bQiBdSHOhBgdoYLsjkJQ9MxdXTHKEEmZoWhOC+yCGQtHZMWX8YZM+Tq3
rJkMm3bGfl5AEqFDiVrszel7pDRE8q9/McK3aep9lFP+xfFgMAo+oPzDwgsA
WkyHVeJR2doN7/CJuKUJSLXUX9CMgreHjKcA9CVj7XEFCsg4na1QNBKcgiVF
tYTT4yALDoFoSBocLIbPapSdHysl9G6RRGgoQCcCiP+A6+SNN8wOM0VGCIDc
6Ae8BXT6ztNlBROYpBHiIAkqyqn8gTuYFwtVOkkrB11cBF1X/gdGRPKHT7CI
eWHAE9NH5zzockoYDRsOGjoiPAi3DeNOFRlc1V8dCaKRe6/xEdFjSBfNNJ7+
3AKkcBN7RrpTofyWkrHMJhxDjB4cZCcHuCaWSLREaJK6ZUZKtuUL2biqRJFR
Anqi2Bzsi0gWye1FYhkKZKRFYUINrOx0aoneOnirUsI5RhmnKOWddF1NcYVh
qN24pCi/soXxu/b6kZRVY+BkEtvbm7IRmSKZ2KtDMjcRDdduJPGwcKtRlITl
TymiUdx77Ttul4m2nJawZxnP1ENUEQdYBIhXRBOItHM8Z9zwbaKGJ/jjacuw
APS5ULge+YAmoLWStpmvFmOmTEYYk/NV7UYkqi4+zRRZBa9UsndRzCsW7jhq
PCFC7MhKXfS1MjFyfG2VD8h+9tRkOwZlTvQXN3pFvyYU5wiJBkhteE5aCt2y
dyGUpYsV2Vl5opFlWf9piYMRR4gLVKu846t8oORFkBX5jICPJjGWqQHneuFt
fDAxK8RAb0biLejEtDGGUKXs2l0k5v7y0jyobZyXA+QUEiQDiMtrmn5MFNPU
d+2wH4pXEG8lxjoSvappq1HuBEoaacFA2EoLZ4zzanyNMdJQsr707IWCuF45
8T2LqcgeXBtGNajOoHCvyzQi4+riF7Bsx/aVTn1tQI+bLbhKbdwYRStUl8RW
M7xEzFRJslcWhCMTf7sXVo6HOcS32HBHwQQUMzfkRTNkujGDrbBdkG8/7DCX
Hsa27pPkt5VbBmN0qArt4rlYVkCGCcIOR1MWDCBhLLzSorTivsaHRQHm+WdF
hEY0vfCZmoP4CrJxH23zKcglX8/uxeLEmgOchJyoc4wuuIZtBlK4Z60FFtxD
1aHkwRxVt2QGjG0hfhP6GpaCDoMW1OH6zYWb5+37wqy2A/+8Q7RLY9tX4W7R
ezLVpANiEOiKMgHEKFej4dSY8iRMVlmaGY+NJYobFxJ+AK+fwPEvxhmrb02z
CSfW5MHJqsZYDuRof0rm6QQzRlqDiWofGTKBnPtO9FY8MnV4YDBFkaFRBARr
ujJWqmsir9wOa6MQZAKiwuBmj5cbUKG4yBZ3igkz3CxOKGwy4k1LrLMJ+p1E
5NZZYYw8KBWluTjO6GaJNoIvstC5Y+iYO42alaoBohbKSP17bYi4aPq3ABbY
UkYW2rzpGomxkyJiUPhTJaVpPhEFBDPQ7jCi0PG7DU6N3QlG6NovElu6nBQM
Z9dsTBe+LUXpRYZqQowXCXU6KyE55h+0IwM/wfIGjbFVYGYdjzQr8nlymq2h
Njh6wQG6dwnTb8xAJpNp1OVliZOazP1RoHqOCXZCCZyoW7nKc04l6KDFTrA1
R1fjO+yCEp8rrbbtlGKhX1PVUhJLyNhXSK4Y/BPzX/r6v68i41jUhf4MWmoV
BZxJwlDd9KopusiAEIniIhkYU45t8WIJLCEi+40rzomQ2oU4MCYJ7o54aV2C
FNuTaY4POVCyTA8VBCTEEDNSasgWYWnLOigJlxiaJ34no67DqdM7zVN1AEQe
FFhbLnGwzpnajdtzQq0MqS7wA4yGvE0we6nIitk6+PSotn99EXN4goY3k86Q
+1GNlMcjFnHVz9Xa6cQ2/sxcNPS/pJhUA8ulsDnP4e1FA/+Ad2Ulpkmcbihz
e9l0tAe6CxwMy3lJtwYmQJFiE1JO4bTIDUqTIMgDpEaibwEidIG1NadwcIwS
XkZrlDQ0LLguRuNkJI6x8Rqo4JYX+0/RZibS3gwZbE2yKF1skXfffVTKC9DD
JiAyuBFnK1yjY6JC/CcdBE9947p2lsgzhO/+ydIHyjq4UedROKiSpP9rkHqX
6MgfEfDeFDOZu70ouk5A8dUzj6hvwsWFWTiCIT7i5XfdcAYBnR4lYOIT7uTi
x1i7tK5BOoa9w5psFpSU28DimHUkSndRmqlz4gTDKAo210mmmmx/OV9X5NIF
opQX+cj8TU5RZqygP3AZmQgVOjwvLxl3IKPziHnAydJiF0dRq7IIP6lzpeBO
dRSNdHCLdNk9DTX4rO762hzbkFmMoEn3iWClMF6syKYioIiAr34zGORa0hKu
UEdBJp6hFU636EYwsENV43aTuPvU4K6zwIMBIElVMwlM5lE2VSQyjwDfFDsr
8TTUKUSB/0ls3YPzHGg7YBEtaJHUEfpnhyK4mCjrC9b+2c2PAjTiewNl2KCj
4xFJJAc48ZxYzlJWKONxCIH1cbOrjrBckGvIqb4Il05oXLt36QojY0SIIk6h
1tX2Uk9an7FcTCkuZg/3JeYXAMMpyc3u3PEhqpAm01XhpuzADCDSnDPxRU5z
UISxCyvEYKtgCAIwcQ12fFKs4EOlUaMIdpndA3/I26+jEeMrhkBscPL9laTi
2sXO3n0brIRDDm8xOqvQBSBwrwBZOwQ3JDR9CqfGYepI+SsHC1pnNOZzqI2Z
lKIRJY8L3+il2sBB3BocxEYYBnoVjWji5COL5uJW5hmKgjJEVlwSSRHcNrEZ
N03nsxc0rahdERWRm4BBIBIExJe2UFsb4sSJTQpmZQ9wT4LJakeDWZuU4ciQ
Jwx0wtIkxm4CbwH9RosRoCJLqO56c6RYnEXHrOM9EMP3WGUnOMXj4WuySNQY
WktynSKbieYK3u8fSXUeOtb3RIPUO9zEUUJ87/LB+bwDNpI8gJFZpojWzAzp
RNU2NgaO0y1WbeaGMvs3YJOEbbFKvqLgoweED7qfZcJGZpKk7V3xrJ+RhxSa
W0auvo5RCb8ii1Ws4nXunXgADuOQXEpYw6gylSV9VgofZJnIv927alFsDaDR
LDpkonBIDajD6QqayaFSKmlBib4cUKIZe21G0xZON5xUOLhJEj/90U9PZD1C
V8PoIFKrqo3TZuLuyEvcdUJJEhsaagakPDPNsqR1V5L/jYMjWrw9+YtNwyQL
n+wfx7J1ANzD4bcJipYBEijlek3EXkUlQNmC0wFJsoJ1IcuQJJO1MriuR4B3
tLkvqjZxLKGOGw9m6KiYvDqBWGNTMq6zN7Tl5zGT/QRRefLApTfVKWw9jTYs
htZs6oXdMX6hRFssI7zmQrEok0r5vjA0xkcUs5qkzJMCBeWbhEhM6VWv9MpR
gtYn46AQCFpLSfbyBI5AtLKhFmMQWLBrx1cdfS5D8WqEIMhIXBKzXbl2Vg0m
8iX5JnSbTNYJqctHwG5hDvrILrxN2YwuaUmkZWLDHhUGEKGI2cDI+dH8VEHp
7NW/MosTIL33GJq9474oy7qBI9INmruk3G+Om8M9tSVcZ1ek3M2TbGlTZI0t
xz37GrONF2j0RzEhmmEqsZSAWSQxZupjUPBOZNKjHb0ZK/R9+bJLUq+BLzMX
kXNcu/IrjLS5nAZvNfQ62Ll5dflWithkJKeyHWkGunRKkPbdGlZ4t/LGQnwU
UY2R2D3AGFI+2ETF9vOcwrowjQHLxL3ZRWGG88UohqfgCJjEZHiJeLQ2RXgs
L71PqzlrBpTpWM27juIkZrKCJZ038Vg2NZbqtjdViLhGAstJUcOSlFD5QBKk
Pn3SSoLAjMQaIGElFaNqhxJgBauoahpR/BKIpiKMyzCJecRkXBQ6BqDoofzC
ksZ0e5AvowVpINtri8tDsxxPW1TLlhM5xx6hflmaBWk6RQtrgj4P5RzKjiup
7jrWipyWIUY1Si2dUEqlJ8e0wn2pwDVu84KgpZkOJk4ERU2cQn0cnSIQuYUt
Nl3k4tOlkNohuWSB/9cCH9gDyda7kmQRzTAYV0q0EFkC3u1K3ujdJbWc5LI5
VyF7QOjsXpuI+Q32A5AwWZw8t2tJ5QAWY3RpyuZBRJUs3Mkx6lA8CGzz6bPL
uBXH6FKbwkiCc+Fg0IWqXXYirTRW2RIWEgXYL8zTk0ymKg4UxqVJSKxjueiR
q9OmZVFyqbE8A69JyDY7MuCRJuhTVDFjZrfGcKHI7W2+brLUDplOTG3Raia1
poRPyIDGtoMRZZ6k1as6MCj0fTQFSwULJmwdNgetFmJMHFpMoMMS07k7kz8R
idG/tU8SwFhttgU44Bahjk07saX6uvc06MUIAW2jRg/TFFNvxE107pTXt5rC
/hY+v9UW47e4sFHH9a2Y7yPpubZ77JXaQ3E5mTUaetW7VU/lD1hQqdosxi1p
ZEthIQ5vhnJTzwope3GxHhcxel0eubV+AILuEAMmoI4LZCiuUfcNr+QOKYaS
M4Sh++QYorKVWliT/FUF+5kaZnzf+IE5blKozK/qwyXIHi7OFqmvLJcYSN6K
WfwvOavhpoOhcJxOq+bPEbuJifoi9q012FZJxk5ZKygZHYgMHFgQYK4Vsjik
zBUAd2DRi6KqlSVGrgXTVoMyRBdJqG8yJuqGtteqoejYmiS8nrClgxhmT3t0
fQC4X1q5iZDnpXvUsdcbMFQ6SIUTiU8YVdZYAeJkUeSS32PpQifTftCU2cuK
wsGrtZZtKvJhtw0VaWYVrT2BdscrrBZhsP5C8jAxUIqyVV2ApVPMc+KIWeIu
LjHsYfJkWrMuCHycTJ24TJPxpo7UCj7KYvZ64UwZVvm5J2FMkh874FbZVBsK
ihEbsZXIfCkiLpJKAvww8Q6DvWDaHJPx4e2JSX6PVWCT+L6a8tsqjvF2UsTQ
nru2MBVxhBgU24+wAiUl+7CegDVQJuUKaIw666U67FjL5i0jx7K02fQeuZ5E
V3FkriXr0NttaI3ZmXGzNGUTLf7KWiz67SUBsGrCk7MATYXL8VpWx5fKWjvJ
tqSUd+hb/ij2yFrbtC4NeqmNG5Jzc5m01By2eSKWbJPdSXkMXjXBvhtz4TOo
JhfSBzk7VOQcE3FrWPLDtt/+68x0j2KyxhTsqJyNA+a0quEwMN19aB0F6DSa
L+4ZTzUfEcHiyGxuzinxRPfO9q/uStw4/bZYBwwPW2NZvzI1or3TJlKCCgsg
Btax4gxitSTe3iA5JZ+nZy8MbE52YN0LUiWZaSUavR0RxypEXeKoPLhd+bE1
wIqGplJilM0wCnq+GNracJyHNmzp6xQByPdZHFyoXEuibYIFVamcXOSelfoj
kKfnazwoluF9gHQRhInvHcpMbjFSXlf05JgudA0J4ZUMBTTw+JfAo+LOYcMF
p+WrnACns1xxTpxquOzwWJG9Hln6HbnEUZGFb6YrPH67BrhRrvbIhkqFuCbU
qP+5dclM7V2kKaVZSfddZuHMX5JEsPFCNpmtKzIxOb5OGBnBjokCGZHZZZov
i1SpID6twQJSEjaKv+IsJSqmWQHNkf80NTrxxF51JXhlbFEjalQ/5zstAK04
QDpDkr9aYrKv5Mc7VmETBC1VeDDYjcdza7rhxxfFrZh2aIdRfMdJGDZyU6ug
TItCRwk1Yo6r27e7DPWJ2junt7taDFkZnoh6ft3BoFEvu1VavmnJxmn/HB49
eenVuw8pEhOtabiL01uOx8JwKM3Xpqi+05Mq2JGbsEuIzI6ym3fhfnB2fm1s
0/W4cvdmNU433iJvLyTYad2CXZmX3T58s52V44gu2Ye1Y+mKYKfzmtBg8kTj
3nlnAeRLimPvdFMNHGjji8Z6f4s2MCwxKpxNGa2ptNbWntkaa72NDQEGpr7d
KE23/ZUa5IT6qdcP8FL6fAz6ChNwXXqqYl5gsYNpEkv99F65YtgUlGw++4LL
xS5s2Qzh+uzB1IxebiBgXFs9rmcVLrtPiOusGiOUU+0arw32uPsq9Z7iuMV2
OvSVd441VOdEZRSmqO6WmXZEcBXb2Uoz0bIsMHeKNhZwTRQMLeB4nVLHRSjZ
YAYx33gL6N6Tap8mzXXGcckOS1diIeu+MBrdlThmbykOayFRLloRU3RZK2KI
o0Lczr7nxtftP32aprMRtfhY1iM32fPLl0ZSO8xcZInBmQnn6kt6OUUk9oby
uIElUtQY6YUWhiC6psydBhRjNVzSCcgECDj0GFlTdZ9N2rAVvJ+dPJqGT7AI
eM84aOmr6u4QMDf1wOjgxNeqFTFezKx139QTq7E3oTWIid7EormaUjvVatc6
33nHsBlYS7mCPWIzmJE6KOxiOy8FlSY3lSH8SNJeme1faQITv9+nnhdOSQbf
R9I4MZLFqoSyQyiV1BOUd3k6kiaWWcQ31r9r3ry1FAIzV6oppLrhnhuiZLer
DTSel6k0cJeIndqwsCbsV14tozb3SJVokdZHbEAJq14UUNTCGvGzOVL1BnOK
Kxqeo+TdZxJggc5oFA0jQDSbwXyRlPw0a+s8n6FjuDLBBc1N3EdNvWAzoESw
jcoSsxg8ly82nOE0BidECaveSQnQ0BbDC4POH7deHpXM+xxYm4xXYK9Rc1AM
jFx5b9tW/Nvum8eZ6bGpG3jX/bT+OF/fyW4e920mHPlfh3bCEHZl4d/e1B78
nwRO/hX/I2pgsOdurr23bTvpY/s3faJb7IZh0Pfl521ds/OEc47uz7aZz4DE
DPjZeX/jEvyltN6/Cx48Jfug8+hn57we9+Mf/Ty2QBwpKD8PaClye4IWpjo/
v3vsXxzeM71vT30DEMLHHaBQrO7Caz2OUJ6mmYSe8FIfOyVzP/sv4faUXz7+
DQ38eDTydvcYx2y8/zk0U9qdPA7tQx4IOt53/tp+rPjjfexBwL7fONjt1g70
yBwQmPdDc6YeCijeGqia/SsG8PufPTr7NXhsNiTvuyigk7Rw0blfu7KwgbPO
Jga0gOX87hZEbd6bu/4/gbzZVTiUy4HgyPk61Iedr4Bi7AWnTcFoD8nZn5ia
ubDcI1J3zULHm2KGi9gbbLcmw5Pd4zU6kMSHATitZwcEDi98D/522IM3bsez
OEDnk13jdj3rwr/x035W68P2CTRaJvba/QxtK/xsZaxKW5IT50ibkv9V+TUr
F9zDjF8fUmvbrFtZ7AjRG3oyuKbFdcqJ5DkstUYm17brmqU7VETCcLU91Mbs
r83mAqkM6go83Rq3cey2LdJOaMeJFxXTWjAXI2NAY9l+spibtEYQyq8uqqFr
EtxxGhwYkfq6oSd0LxgNCpH4MDqDT7zVOTHLjjcY18OqhMjaHNpg/DKASaWJ
KnY9Vm1zrq2+26eszl3RWsQ3o7yzyJua5Gf1DUg+A0VUuWHaDCus3mOsr1RP
Z1RjoGttNivmIu1AKOmaHAdTEexsZFzVMWmjidV72Kr88Z4EdG7N2QwWs/ui
tyMKRBmbxlwajfB+ArpKsUjK/dAdF0/XfHXgfiUlGjt16K44bK6VNRUrkT13
Sc/jWAu0ymD9R9r6W0x5pmP2RjvVfD5pjCh9B1F9YMP/g76mhwLMJenVVn8e
mbTXDRdO48e6QQLgepWsC7ELLbq3xrBo9GRrwWooOQzcQLDze7RY6DZ9Q5v2
NPNbIWVJhDq5/+iQzcxqKVRzXGRpUdcZcxYp1RjJJ/OiNI4KbghZlJtUcUaq
R5uPfjA4Yy9AgwN0X3U8myEnfhEdXME9oiLJXEfYrWCmN6Yn4owakHa7nA1h
MpHiwi0mpq1l0exw1ryehERAHzhTTfP/OtZgT9/PPevJkAoHF9Pu1ClTDtAo
3Q4BGor5hZmI3DVfV++1g+pWxDLezwq8exMZD6KPPzuYVN2M3bIPiMlT+3pj
dx43KtKerlOvuYtvmESHKkFzLdZdHnKjEaoL3XOrN2zMlFDosULawiVRx+hr
v+r0UOvd6K4nFOYydvw7ZVHUvpPH65dC8sRqMV7C3al3qaQqeRpLqTZ4uUzy
izOU53KUmg1eapUZEyLPHmlEZSqNBWumeGdncXDgUnIAsZRX1wHvB/DHuApN
YKtTDs/uk6Ik3ZI9JkHVhYW6ryTPuQEqeHZVluz1dkNCqybUN2C9KeDaimdV
wiAd8kxkK21Ti34J8lky1NgA8uiPR/V7zURnL6OlBQ+8SI+/J1rAw3SkwjXX
TlkY5l0NBgZeMfUmaJSRYMLFk1AjTjVVNqdrB/92JnB1MxUlMRSX5Ar+JEO4
hQc6cgg3sSB2BFqnGMdqVR0XuHgwZKU/+ooJBLmLW2I2X38mumggpbDHUto9
SXeE+ivEGK/nYINfK6M9cZtbNJ7h5btsu4/FwvlKhdm+zZjyCe4Z9o+I7Aa7
YsLKNzMPSTIgWE2FPnXEtSf2Wg+1WLeXq1dtqFjB5YfUjd3a4cSRR6mpYyOn
pQejHzqbQKpfaxgD4vUrIFv41HKJmPnpUV2NUu+pL5g/py2tNwqZ1PQy4OI0
3N1ig1LaqQ3Kybau5kYh2Sh+WBsIOyQ4RLlZU37s7dYW7CdX4hUnc07TGWVP
fNXK/hXeO5mguUGV1Uj66bUdEyT3SHaftImmZILOxFWNPhNVpCmbCshx9lwb
d469IkvkUnHa3RFfnkZUfAhQYUNFGbK0tKvTS8EcrlRkcRHAkE4MwDd4vTwf
8q7xofd7vhtKBukY/U2LPVxgf76eulOn3rapOTalcy7zTLNgTQ0beVJjd/un
lV7hXqtpyQFtd3zoqspD9aOI7VChPgzLjROUR2IpE0liJ0m8nSUIam01BHrb
FItyCSv8+nhQQt8HDkML534dmwgH5xgH0REqKIF/NZvwJECAoh9lmw8n+UtL
Iqd0cmqTCrnaB0+ar61Bheg1WTM0+plDBLNoLazK5HT3o7BRbqqVFrD2SH7t
qPhc2AYFvgkR/A1wcDQKDDJAc0oDybwSIPRAi7qYQsHiofakztDzMXPdCY1E
ofq2vfhdST5gh3WtM83IVilwPOdDqQcq32C6h8k6wDg7TbDrX4VMIE1bxOJb
acbprTQSb6YGiWVEgjpNbeJOcsBJTyaEkQJ/p2IxmWo1eq8ZMkg68T+iCd9m
Zkh9coWY6WyBSao4RTogaz64Xcz4p+hcDshHayQmP1I/ISwMR7qhV36yR9Jh
w6EafN0Si1Lo0uEKnEE0lFMm5z8lUJnyIxQkiHZU7USBwGgPFA6ubNRY7tZt
lMpQyBfhIOde6LMmRTRXyLWx3HdVje/SeU26ZkfPCdP441HHq58ecQL+yFY/
/9Jpy6LmfYD3P3FhBC3j51lgTM6PYR3aD1ZviynNAaCaphoT1ejIbrJNma9W
mnyiUWcwpeHBcBsXaeU2RZfFsXDD7ZDDrg3BB1kyrW2PFbI7YaV0UW+wdHEj
mk5zLzwxRJsV8xOcZCK14UjHwBQBt/Qpi/4MEqeJsTTMiyhxOl/bwiVuDJ7S
GCwAQM3kM24Ci6Uah1IZgtuFYMQVC2zWxlNJzQANGEPz9r20iMI4K24112H6
d+oioeDH0h3mncRS+NP0y5FIv533h++PjaCHW9nlkG4uw5A0RAF5kO92T3Pb
oT5VucV+PFS3EVFO4zuSaz99Oi1ufrg4+/KF/1hPgPwkZ3+Wv9N8VBd1IX/d
XJ39eXT66vLa/fsPN1ikiv9+c3Oiv/KYg0uqKy2BVcYSweq3xBImtVtKiES1
FcX9aRFStnI27oIfcUy98eAmkhnNQrOtXJhiWkx4e4P0TaM6zRm1IKTa4FY2
uRDDVWgG7spZ1+hQFQPROTfL9cBtKlYh7iAPDSqU9MlmCWJYVhRUfS/qrjzG
ZiF245A3hXPzKZ9j6Fa2sgWvugwxpSUppriuv1IfT3l9SAjCwQ4WMtIaEwyt
T5/cIqZfAqfAabhrj4Q0e+TiBuyaVfEhWcMtd4qyAiTef0jj933GpF0iLF3n
h5GJGHGEWNk+98bpwryU2qLoiUhDVOxnFVjwOXN7MHiaciK+piBCJdSS5BZO
zhF3lpgv3jZS5uw0BhpDbuDnlrRzDaW9++iqxAC8CAUvRlsbcYslBVAZ3rgg
M0Wrmo46S50KLVPM9STu1RyPClLgMRkBFG3p1pIoAcVqNuQCyWz/NDZOQSan
DAQurmV8TLUxhtgWO+zCX21+9Ir4OCWYRoFjzf7YSuoYGoGbPKzNfZhd91Ww
A/5+jRUGr8/P6HorXcWw3xtn5I3Xi2lLc66OPcJsl1dYyPDkTWM2ttl3Lbzl
Cm8TKCZwapUldcBo09zQ7vvrC1+I7yvSa+klmY+3UfzJZ3iQ6iGTzrb7tOkX
+y8P8N5hkr44zvl5sb8y2Fq1cHQw3RnVE8+908t/JhTCwR8T7mpQUGaBzboQ
LQUNP8av21RS+rwHHe5szl5Q4dxzI5Dt3VR+qTo23i70dCMq/AFO11cTyBtU
7PqtiYWO0mPvgx2OlciicZIF+7tGx3vv1TtqPHew61U5otoEXi5qu/zajnWu
7A5Febeqr/BUKa/WgrDTQcl35TZqcOgAXV6LVqFADjJqnZs2P9acjKZGM5rE
cdaIHI8QDRfc2OL07OyN6wlFfQY+cuJ1OslCN6Xrtta44TvdmUp+HozEFjnG
ZjrGqpkePTK6Urc9HOVgJgheiYjWqBinFiCYpEjDjxa6vw0ePQv3X7jYoFUU
Or8bOD653wZ/HQQO9ILgOMDCH0E4GQNor/SLH79jegcPu1A9Dr63fznPqF4R
2AH3gjzN8DsbJaDfDf4+GDRngpV9gof/ZceKh8fB/tFu8NvfORIjPPFv8EyU
zY7xosF3oCDJh2K5+hF1m+PgkL6teSUr+xQQyePgKX1JS+FPgQzCK/wxQQuT
8L6Lqjl8/w3OgV+ADjgAzcKRX3XNQMR1PTUP+i+gGI6P8ZLbz5oDtUEpA/KK
iBzDqg7tqv4MLFm+LwV/4YGXsG585K8mRPfv7dncsMfO66hxj82711N3x7lC
GAjZc8+TOG9e89yGunUTfaA/5x8lV/csjWZ5ge1ag3fS0CDYOT97Z8if1Wil
phMGP07maF08k9+slqriSxZhAylP8KT6VuRi666JYjue0LyJVr5Rg5gUvdF7
C3dpFMPaB3AV+4NT5WePBTGcGFg9f0QhrX+VwNb5dvT0yf7BsyeHYRg+i58/
eTZ5drQ9NK9fOdfZeT0IPn0ZBv0/e+5l9l/Eq7vpxSZszYvz7ecvozg6OnoB
Sz2MDl6Mo+Tptn3xxiEGzox/H+xuxlBAJIOgry6vN2OIV2m+eZ4bsNUAY8Tc
owN9kRXECScl94nVXRi96X5wyQfJ8al6hnAam0cBmj6spR7onfSabygR+oQx
QTo6ebB1R2WHQom71XjHrRYKf9qIvBtxcP84GD3fhILw4okWinBfPDx2c/P3
ZG2P/1FhAJy8eOrs37z49BhQ8OjJsxdH06MjQMGjJ0cHhwdH9rbAiyi8OuFk
stSj42DzTvdsocHKQ17YpWlBJEA1Oje/aBOnvBcPjoPuQzB7VAHSe/HLQ+S8
C49/pdsDSoo9aWZaeKGaAbJdYtcAo01Nse4u+bbX0Sf+Zk2JNi7UOlmiy3Q/
DL75hrtGuK5mdEZ+801wErS/0qJM/cEx7YLInYExtq2Em5Ao9oFwcOKtJlBf
uGkvwZUpegRIMtW7Lh+lLy1ZNWQQ3N60Ccef3AotVGWHg8wEOJsDdwTujgjn
FXxZkoFNtaqn4VPWq6zngQaRtDovMrGXVFpviY0tNQSCYuQaFWcaxc94SaBk
vzx89kRVug2RSdi920ZOdlBuca6yy058KE3Cv6n8FBplNnbasMEXTjCnFO2W
6HXrf/HSmZemmQeFrXKQVeE4axwCWQmKnNBTXdXDH0QGCybTxNnxK1Htt87o
lDJ5yJ5QYeLjKQXf99WoliT3WHxzxN04krF7xUQMjSKecFsh4wbQwpho8nV9
5V6R8sZO0UccYfT90sTEEkQ1hq7zcL/5Rh8ibw7HFpHU/M03mnMsZruoWueT
eVnk1DAbvZzt5PuNQchq4bet0jyvZpZtjH1ieRkrMLAhlIvL1F51gMi2dTDm
LP7ONKjKMNapvi+YNms+dTWPCEfEnhUFY+r+3qmc/6xaWV5t1CZM3Ji5B3Ml
DMHPpJsx2kBsvf2+eeDsOFSlawYiZnoLe80qtpw0oiNZnEznRSwf0TZqSF+4
uyZpb1OHtd4cDmrwOll0W0s6tqEIhmVXOIQ6WSzrNRzuUsHWSdhMgSFrj+7q
ASaY01ltTBHIr9flo8jmTHq3zIU+OfSKeFhLEC6jXZ1AawLUovJInFG/Wb0t
2FDZCxbdewpfOJ4eOnUshCyBo+xqiYWkwUfaSlHbmhpPxc13l9+/OTNRvVLW
rb0cW0aUgP5+/4iLaHc77yhOoSfl8NMjJQB8iCJp7ZjUMgwjyxMMMIrKNHOL
n4vnW8+yy+IpSE0NMZ1iDZ4DtQeixI9iEzCub/7sswsHKjy6pcLwshpJ9pfI
hf2DcmyJQT4sQ1HGmVPZo6dRmPzlBJ50eKB/4F6iD5HC3nRCewTjhEubmkDi
UAd3bNiNm9863Z6j86v7edzHNCDpqSrE1X8dDkWWFTOE3+RGGoVWhmVW1ivW
8iZUCWaTphOOyWIT/uHLp0K8PMGHYp0JpJgUlcTiOqXPqZgX+2D6wxpjKnnW
RVIlSG8TR2RLg1OK9peb3Xvr5agnYJNtXy31NGi50k4B2lJx2xqltze4ap6G
B45S4VjFnYU9YBrvt7M+aEX19ex+mG6ynfZguTVDdQ/bYTntuS5iCI0bJjkJ
Nby3YZWbPDuIxFo32CB38F7h84CjNQrIrBCVZaTNKCMjTXsU0KxlhyJGYf3l
2u1AE4kjQj8y/St+LctqwwTzi02sjXGCB41HLVtra4QAYX6Mi+oewcLuYLdv
BNxJfPDi6dGLZxPYydP9l/vTl/HBtjdCCxbNESbPDnSEF9On0fTl86QxwsGG
Ef4uv30Z/lJrcmvQn21WbozQtC/33rlfaCZ74IrLNZJL7aSCqCnZaGoo9j9I
FvxmE6b3Uqtzmu1+3RW+zKN0XGgzYH+CgTZXQzbQ6Y6lGChRKFmGMSLng4HV
FAAWDq5Ep6Yr3B//fq3dgTTEIOnqyGAGopYjSOjQRrT/7ODHm+9ODo6eIRVj
Z//7/ffh4A15YW0EWgu0O+9H++93g2ZzXfvtwfv/MpL19P8kyRodHBz0Wc73
VCrr+s4hOKP9426ah6bzFuT3d9sjIDReHD558eT5CyTgh3CiL14+ewrQaI3g
QNUd4e/md0O2flX6tf9k+my8fxA1iTKP8HPpl0NQfiHFEurRplG/khOsR7TP
v5a69VMHvHr7ePlWWLMTritTzR3/Qrdv3y/0Y3kn8YscWt4Iv8hB5Y2Auz8O
9jdiZD+5/MW+Lm8NBAm3UHTL8dXh9GqM8Au8X94ITTfYJgT+z12SHqeXf28M
ixgRmXng2jSDrhzG7wkLkijRjtGy3mKJx64wpvvBhEfMs37/4r2XlusaSPB7
7t/I19BeO43kay3FpnGoeWUzZ3/4pnbzgiaGbqbrLzbeUh6BSmkT3Lrwa/M9
5xHeYJguGhM/do3w8D7cXcwj6r+4c+jzN5DGj57tx4eHyNimL18AwXj5fNsb
AUPcscNlTQWf5gYSZoTnR9P958+nMYxwkDw/jF5E480jHDRHeDKOoyiJPea6
cYRDZ4S/D/7eeVM7rsx/+qI2LELinLZOz+DTozvzx5dBK7K8UbDA93dK0+Cm
kanPBzpkQw85zoz467pAHwxNPAn8+ne0Os71bq2OnKGlXxJDy3Nbq6DXrc9N
Trd2RLfPcGsBJ3/RNCMTSMp1y03kvLG1apc9zkQX71RNZSaov1bdVbNGq020
TF9OpXLTNpMz+zfkiZqcFlQPaEpKs6AEH9ydySFs+VOoLSapMT2mb2l2Q642
p+weUWSnZvC4KADG2n6lnZEBS5DcKKnxm067AaJg7QjHE+UlxeZJU+XaTrwv
oYrfhIWsqfIOFs2Z9oUCu1PrNGHHtWEnplOpgHKNRo7z3xRtaS0/K6jEVNgo
Ot01B9/MqBynwFRB6bN32brDo6m6Y7uFUJOVrFnXXvEd2N0N5vQt3YhdygtD
3rfEHJEsCzoaYKt3eejCzCb8thz+1CflPoHBpF8KgUE7aw4eAQFL7yJQKrWV
hvRhHxCxjSS9kax/PcW20XGu7b6ka2ojX60uMedXeth2R6j4qb79bmjqf8b9
mEwQB6GDlLx3XBZtsicBAkksHQlcx7eb3cZ+k0pqdGFSDTehNZaOtVfaoKcK
+lIASzUoTU0J4C8rLlrg5k66gXRV/waIxEhLEUrM5Xz2rn1QRl5Xdx+/6x0t
suaeVgaInLQOo0hyrNe10MXJnauLi13BTL9rkDYF+Ar4CEj4XlJKPieLy0As
9wHKYi8Fk2yPNE1a+XD+toSIcN/hRAI4bNGBcbEpDos9gEzJWpntvSVzvEa9
Gxp7Mnsg9oVdxbFMq9cnzHRulOr4JNpgj+2o5hpWkYSiaLWutq/Vq34WJ1NK
PYaJAJJotsfrSA2uClMfjtvOexeHuhZS64GfVI7wStZqYIWwP7fzbC9UG8+2
gDuUCha20XNh4sGcjpbcDsH0FKK0cGwWGHHmLUc0YeMRbjdtkiGpghCWPquH
0nGeSeVqibSRPH+PYC1yOX0SCDIcfAOfwX+/aEskz4fXUWZltooAFHWSSMSg
x8q555+hNBQB43U5slmcFLHXbBYqoQ5enRtvEloelkkV6GthVxMj4cY3eFZF
+gAvFI/opjImWvAjY1HENuN2rzzl1Rez2SbPLtN1ziI3gGLhbY4tMehVvsgI
VJNtWZimTR6RCbVcD9YB7R2PToyCIroEGidm7MFaxKCYlhsmkivqtg4kqsPU
vEo4WIlzmS5LaVrVHcLaiEtjzLUUnzlALfXhIgnV9CBuiud+n5NbP4rvUGKv
HriynfWYWNBw5XOp3AMC/2ph0YGvYd+uHm6nusBwraRqDcXnrlWRGYAnE7hw
yD28Qgl+9jvl4E6jrPKymCUnsVH+ocRWiO5HQy8q140oIkJOFwGblJMtQwMJ
Gg17T7xYuGa0Edx8WGkS642xFb4zZfJdARa2Ngnn59NcQyekFT/V1qYC88l9
/eOkOxk+HFwSPNzaEAQ4CupxRA8UtKdUAR6/oZKZVG2HMMppEtIqDRCtNYka
4wokv5H0E/7VrYyGW3OuvS33Qfqlc+ZRs1iSQxUQP9C4+daUaBl44l1/QTWq
GWGFJr/LqIhKXs4+PB7dFWkswU6Uxj9VLzQxblR6l6sSC8jAw2VRS4QuDEhP
I9MC6Xyk6bssGrD6hLnQFAHxx/O/jN6evDv5/fnb83e3X778vDpmE5+tUe8i
taVt6kf+FbWAWqmaRpilyE6YoG8VfjTxhqqLvqkCi83PMc4teFvESaYlawQR
nC68On/NTy/waVvoaOjWEuHKNbC4FSpGHdXfyL5Ckilqq1Q3jApbaVPBnhp9
LGpo3cNd1pSY+uDdWS2b/Y1DK2WkC45kM7WMjHmng7ZaiYCqahPXMVRCLC47
fsoCOxXNQ53MYMc1ve+GX3GHSM7A2blVl7OvW5NR4DXyM62fVXxnq5PbDgnF
xVLKnXQXij0zVTDkXJDkqNnGlsjoOSOKEPFpPVHinppLTtNovsXFvUbBAu1b
5Xl/CGg3zAzO2pUW5SzKRTM29TJZTnEqvVH9D+DqM/pjCSI99YLmxr4kvBeZ
LdErVHlJ/JtIK5nXWGDu0ezz2K94Yck4H5OtbVTBKQHCFqzEEQpIZ/m6O+3Z
7Fru6dBtRTxybG2+qiTeWWIksHm6stjqNbOssNLqqN3IcskkGUhzLI0RtVck
V6QUFBLmM+Ho0DgFrjpOZ9QBbxGhyQbj57W+3bzAWGVQWYNzp0Qhs+QOJb5w
jprMpGTzuGRWzUXRdHkI2yzVkmK2qhta+aifYbSgQmmKjNxv1+T8OJGfhuQP
f1bGT4uduyQNJIGETazjxJhlTNN0hg7wiCKgmm9RZe+n1ChnGkuGD0BWp0yd
WxbH5hzWaMCclpFTgpLQkqXRrSlGUW45BWgacXEOaetON2YLbspbIv8Ul6Fk
2iCV7049hDzhlpS9BM7Sb+816WQZOsW/8sLJz3dLibSbXVc963eM17JYFINO
DSHG0zTYyf5CtLfRaA65FrB/BftnWgMrhS1iPTF85GEugUUfswQbRFNdTbj4
ZJImLmumdtaDhRpZXujOmqbSff9gUXTc3fLGg41Rh2d5IZHIDSwnswBWzWhb
RfHDtNIQarVAM4aA+PhNQFeJnFQcAeRmmFbAoJ1IhMeTojI1d7be0ju3mEa1
pUkWa5YAx0lW3IdfNbh4vX7u0ChY+VHMEsN6pbHJgwHGanpbbwZAsc2BmhBS
NH1MWRx00KAqArglQBxbUpgVPQwgv4p25wlEcdywyNAEI5pAfBPdUIAd/Deq
j0JQHVEWG+UZfQ7eIVOxP5+DW6TyiKrtH2whJdUjm9/ASJ3b+vzwzj/D6tp1
Gr/gnfz06V9uzt+8hj8+k8cTlLKRs4VRYzz1eDKJaiff2ONwoU3xB8fUlmBS
fxnQ95iedjzwMqdBbF2Na/dLfx9IdzSp0bTuxcfyvWgwuDR1ItvfnWvLFF97
wO/RzlJiz3H04ZKZEIjuYhfW0q1x4DvkQhWLng9F8XdQjUbhtu3Xc5AcBoOr
1ThLKwzE8gpL8vhmuBM36cLp0Iu10c39xXe+lzp0JqEubxv+sGwssvaYP2qV
E7OWQ7UV+YaIwesymrHJywb8dOwPQW6rjLl6PX59hlIoF9cGEQiuOZ52ZfkC
7wjLr7zbOxnAL28j9G7mq8U4KXeqXe+712mGfiOQZNEVYb4NCW/55QmWpaxA
lcFHCb0wqsUf6Iq8FFxZA8SKDClBKTZ/ijCdMFearkox+3hbAlo/+zZN6mkI
MjfjAIUCrLB+KD5wevn27eU7RGCn2GeR2wcYJ07ImbV3SklUKs9kyBGOg4vz
29cP0zyPbvsU79enRN5kQScl8h/57CZhfg35KdU975IdU2LrV6Y27lr/P635
ClqDCUI0cGA8ml6cHRdcdGxqge0Bl4hdstfKPzQ2oDHodtO05o4MvhqB5WfF
fi0JtM0K79LDLMvIGWmcW52Znf/3kDdB1f83CdxpcXKlBVNGr7kisHvBH5Kf
GyJcYyQGtPEjbHXMBnJdtRqPrITrFITdOuX22WRlvT6/ucXO8+f5XVoWOesS
O6fF9fmulXhhtOumlDgBjWFkiQfGXvLwT0YHR0fBNYLnGEm2LuxW68a06bSW
ljllsvM5uDjzqDfS668QEUfNcfefHBLBthT6YQJP4+CrTxuvKnGX4IQRY1fl
E/bGKbSoOqLGYgFY5RTGDc6sUSXl9jiObmnDZ+KEA15I3ZgU1ADOsa9oysUw
uDz5/vY7thef3N4EP/yePb0Yvu1U5yWVkwsss1fuvijJrjori9WyCpvr4PfR
+5dgaZgtFqm22IqyJbHDWx3BeqYE5zCYc0I8p7bhverq2UAEsyyklRzMtsRg
AfVv8Fp5DalY2P6A+hrFq9D+1To0W6UxeYDNMp4fHMFZcq0FauOJyODmoRLd
jTLSE2gKrSmgKzR5qWLKFWBIaFO5xdDwnIRbtsoybYcTzIHtoKfU9uq0xoQf
5kQGnY1y/I0JMNv60+bpKp1Na7McPpWkHBOXh0aVteYSYWyIWNQJY6R5LnoB
tIK87e5wjsI5lZMrgxNggJWczTXZ4pwGmm6YcpksipqS+vV5dArynXkIePiZ
IJvXH7Xw4mw4+KVGh51E8KnVN+JNbfFiYZRwcOq2FkMXJzXz+vqtk+2vvfeh
GlScICYynrOu6YedRu3t49uUIL1pG/bs66LRuhX9/yup2U3HGkvgK8hFQO+r
iCyLdhcVFfQzAkVjOduVH6I5iZYspdnINMF+CoGUk7LpeE5xcUZzLjbt0BQK
2C0TqZDWQwqETiguP9/fN50+4O/nRweH2uejkWCPnn+JcMNwPxvEOF5TdWWJ
tHFyP2JN7rXCohbJttXaJd4zKrlJnAMJhwpa/5vXStOrIYD99NCPINKfbWIr
MVu2FLiplqi3i4IYbeWBlhXQ1NEx8aiuPIgNVHIN1DCaMcackakV0+1zYEYz
6i7SwF3bH1J6xmBGia2hZToRAKIQsgEXpCL9IFRgywYM5hI6wW0VxR/JHT3L
IdlLqBYXBl9Jc0jCe4u1pmi56+wjFM6pLYSU/7AB5IpmjhPQgINo/6JKMgxi
sIU6vPbIyk/auzS99GS9pvaAqYpvR7QlPhjYHvriEydeHCjqEOitPLnZ1cDZ
ikNUgY6iNfsPP9wGk64ibCpSituVzPeVjQD8kORieebYTj+GGPWlrVWZH6Oo
fEzyXXVc4ATH/MIIEA+9waCkkB7wj/t6NE4AGEhXb1nTinKGwslNIH3kkNdO
uDlp5FI8LaPhbwAOUILxiMdTDByRKNizOY48QH5YSgykyyFkqxzLyA1neNu6
wLQs0fsC0khP/SsTqSz1dryiGJyv06/2hYN3Re0EA0kTbue8kT5R8AzFRGjA
nwlOJC9E58kCMC4RTajuxOuLq5vw4AmSQ63ysGUOh6SArRM3WN+aQE1H0/hK
KgxdXwVSPN8kN9vgVmNbS1iMxJOG+d9d3NyGN1fhiydPRs8OR4cb19GcXEFc
/owFkDuaJEsMKdIZ2MvNleWkAoINNDf1xMKtjfKsX/PDkOJlUTMewlmtcoqI
SCSUk1i4pcHaeIP4UFddHackjqX0dg9+k9nhZtetA/x9hP7+Sw/2VjBh6N9a
KY8jnU2TpiBOZ2mNwR4m/YFraIjXH64ysh1x+NP2KYxdo1jnURkjIXQupfR9
ZO8sq7alX5HPKTWohLU9G54X7tEK8Vs3SnVvOFL0lCJFjeHp9/rg+WWw//TJ
wYste8RujRDO/MOxfzy/pAc5cwj5O2GpMtm8AcpUQCn+0Cl3rtHAY1MqJ6KI
gopSKrh/6CqbAjdciDBoK694XQscNW/B+jnmRsBNu5CkEJFO6+QjhjkHWwSd
5gKBg6dZJGIEy4vnyKErFsnCweVkElUmsq/BWVVj7BLrbSF4Fiu5v5sW2mJl
pUN4FtUFEF4YTNTEUBh4BxVajJJQfiD5H0QlxrvBFr5H72xpmiSsdYQd1Ax5
baA9iqL2LapUjf0TVhiiTk7/imv2+SFnCl4V+P2GWfgdH+kclI0MFQ5GLze6
AHdglewhZoRglESN+TYttYNDvgGvqQ0IBtsZk2GqBioMRk6k0RiVIpP8HpY4
vV3jhikID3k6ZzYQmSLjAnnZpQWa3wgGzhi1s2ztx9tKYyQmECYge6hUlqIu
2t9iTJ1GJQiptAUptK0X6STOiKI1FYXUCqfo3oIah6VUKok7bFYJd7CPVJ/s
8XCriYGsy3lS6yXSXmOe9dQoXWNOpVRaoCW3COtNzVBbYYvsBXUBws/IuJqQ
0aBe22QAboEkp0OIxMqa4LP2aCjLFKU2wO5LfOSM3iiq7maYQBqO4Ocx/meE
lT4/B1aVCD7jA9uP5evRaHvApjL4PBxtB8Hd4DMNoN+H8Dd8grX52aoGr+Ij
2yPzs01TYO7p3wbwedgwwuEXQfA3+iu0b4UD87X+wJy/exxcXssvwZUp70Cr
Du5aA/+Nxg6c5TzmHYWPzTxmlr/ttdxA+JU9JXjncaeFUqDm7rjv5/Og/7tf
5ckwhB1dMeqUwbukRrMdf4pP9gwK3w9ao6gy1Bjkn7UHe/jh5ic/m15renTY
8WEYfDyqd5tPnqk4F5gTd38em9nfm0vxvntaf0f/Y8MC/R097t+UefKzp7n5
WN8Yc9sdswPR7vx1tofCH7Ow8IEn8WpzeAvTgA1jmoVt2zHvOp90v7ob8Hrc
01FIhXpl9R+iCf4t3Wv86/wAteGPqXgP/jz+jZ76bRG8Mulhr4iSwpq7h1bi
5H852HYX552EQ/vkSwVHEyXQ/eGWF9LztS9inv7/Bny2jrz2CwEA

-->

</rfc>
