<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-privacypass-rate-limit-tokens-03" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Rate-Limited Tokens">Rate-Limited Token Issuance Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-privacypass-rate-limit-tokens-03"/>
    <author initials="S." surname="Hendrickson" fullname="Scott Hendrickson">
      <organization>Google LLC</organization>
      <address>
        <email>scott@shendrickson.com</email>
      </address>
    </author>
    <author initials="J." surname="Iyengar" fullname="Jana Iyengar">
      <organization>Fastly</organization>
      <address>
        <email>jri@fastly.com</email>
      </address>
    </author>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple Inc.</organization>
      <address>
        <postal>
          <street>One Apple Park Way</street>
          <city>Cupertino, California 95014</city>
          <country>United States of America</country>
        </postal>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="S." surname="Valdez" fullname="Steven Valdez">
      <organization>Google LLC</organization>
      <address>
        <email>svaldez@chromium.org</email>
      </address>
    </author>
    <author initials="C. A." surname="Wood" fullname="Christopher A. Wood">
      <organization>Cloudflare</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2022" month="July" day="06"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a variant of the Privacy Pass issuance protocol
that allows for tokens to be rate-limited on a per-origin basis. This
enables origins to use tokens for use cases that need to restrict access
from anonymous clients.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/tfpauly/privacy-proxy"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies a variant of the Privacy Pass issuance protocol
(as defined in <xref target="ARCH"/>) that allows
for tokens to be rate-limited on a per-origin basis. This enables origins
to use tokens for use cases that need to restrict access from anonymous clients.</t>
      <t>The base Privacy Pass issuance protocol <xref target="ISSUANCE"/>
defines stateless anonymous tokens, which can either be publicly verifiable
or not.</t>
      <t>This variant build upon the publicly verifiable issuance protocol that uses
RSA Blind Signatures <xref target="BLINDSIG"/>, and
allows tokens to be rate-limited on a per-origin basis. This means that
a client will only be able to receive a limited number of tokens associated
with a given origin server within a fixed period of time.</t>
      <t>This issuance protocol registers the Rate-Limited Blind RSA token type
(<xref target="iana-token-type"/>), to be used with the PrivateToken HTTP authentication
scheme defined in <xref target="AUTHSCHEME"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A client that wishes to keep its IP address private can hide its IP address
using a proxy service or a VPN. However, doing so severely limits the client's
ability to access services and content, since servers might not be able to
enforce their policies without a stable and unique client identifier.</t>
        <t>Privacy Pass tokens in general allow clients to provide anonymous attestation
of various properties. The tokens generated by the basic issuance
protocol (<xref target="ISSUANCE"/>) can be used to verify that a client meets a particular
bar for attestation, but cannot be used by a redeeming server to rate-limit
specific clients. This is because there is no mechanism in the issuance protocol
to link repeated client token requests in order to apply rate-limiting.</t>
        <t>There are several use cases for rate-limiting anonymous clients that
are common on the Internet. These routinely use client IP address tracking,
among other characteristics, to implement rate-limiting.</t>
        <t>One example of this use case is rate-limiting website accesses to a client to
help prevent abusive behavior. Operations that are sensitive to abuse, such as account
creation on a website or logging into an account, often employ rate-limiting
as a defense-in-depth strategy. Additional verification can be required by these
pages when a client exceeds a set rate-limit.</t>
        <t>Another example of this use case is a metered paywall, where an origin limits the
number of page requests from each unique user over a period of time before the
user is required to pay for access. The origin typically resets this state
periodically, say, once per month. For example, an origin may serve ten (major
content) requests in a month before a paywall is enacted. Origins may want to
differentiate quick refreshes from distinct accesses.</t>
        <t>For some applications, the basic issuance protocol from <xref target="ISSUANCE"/> could be used to
implement rate limits. In particular, the 'Joint Attester and Issuer' model from <xref target="ARCH"/>
could be used to restrict the number of tokens issued to individual clients over a
time window. However, in this deployment model, the Attester and Issuer would learn all
origins used by a specific client, thereby coupling sensitive attestation and redemption
contexts. In some cases this might be a significant portion of browsing history.</t>
      </section>
      <section anchor="protocol-overview">
        <name>Protocol Overview</name>
        <t>The issuance protocol defined in this document decouples sensitive information in the
attestation context, such as the client identity, from the information in the redemption
context, such as the origin. It does so by employing the 'Split Origin, Attester, Issuer'
model. In this model, the Issuer learns redemption information like origin identity (used
to determine per-origin rate limit policies), and the Attester learns attestation
information like client identity (used to keep track of the previous instances of token
issuance).</t>
        <t><xref target="fig-example-allow"/> shows how this interaction works for client requests that
are within the rate limit. The Client's token request to the Attester (constructed
according to <xref target="request-one"/>, and forwarded to the Issuer according to <xref target="request-two"/>)
contains encrypted information that the Issuer uses to identify the relevant rate
limit policy to apply. This rate limit policy is returned to the Attester (according
to <xref target="response-one"/>), which then checks whether or not the Client is within this
policy. If yes, the Attester forwards the issuer token response to the Client (according
to <xref target="response-two"/>) so that the resulting token can be redeemed by the Origin.</t>
        <figure anchor="fig-example-allow">
          <name>Successful rate-limited issuance</name>
          <artwork><![CDATA[
                                                     +-----------+
      Client                                         |   Origin  |
        |                    Challenge               |           |
        <-------------------------------------------------+      |
        |                                            |           |
        |          +-------------+                   |           |
        |          |   Attester  |                   |           |
        |          |             |                   |           |
        |          | Attest      |    +----------+   |           |
        +----------------->      |    |  Issuer  |   |           |
        |          |             |    |          |   |           |
        |   TokenRequest         |    |          |   |           |
        |   + Anon Origin ID     |    |          |   |           |
        | [ + Encrypted Origin ] |    |          |   |           |
        +----------------->      |    |          |   |           |
        |          |             |    |          |   |           |
        |          |       TokenRequest          |   |           |
        |          |      [ + Encrypted origin ] |   |           |
        |          |     +------------------->   |   |           |
        |          |             |    |          |   |           |
        |          |             |    |          |   |           |
        |          |       TokenResponse         |   |           |
        |          |      [ + Rate limit ]       |   |           |
        |          |     <-------------------+   |   |           |
        |          |             |    |          |   |           |
        |          |  in limit?  |    |          |   |           |
        |          |     yes     |    |          |   |           |
        |          |             |    |          |   |           |
        |   TokenResponse        |    |          |   |           |
        <-----------------+      |    |          |   |           |
        |          |             |    |          |   |           |
        |          +-------------+    +----------+   |           |
        |                                            |           |
        |                    Redeem                  |           |
        +------------------------------------------------->      |
                                                     |           |
                                                     +-----------+
]]></artwork>
        </figure>
        <t><xref target="fig-example-deny"/> shows how this interaction works for client requests that
exceed the rate limit. The Client's request to the Issuer and the Issuer's
response to the Attester are the same. However, in this scenario, the Client
is not within the rate limit, so the Attester responds to the Client with an
error instead of the issuer's token response.</t>
        <figure anchor="fig-example-deny">
          <name>Failed rate-limited issuance</name>
          <artwork><![CDATA[
                                                     +-----------+
      Client                                         |   Origin  |
        |                    Challenge               |           |
        <-------------------------------------------------+      |
        |                                            |           |
        |          +-------------+                   |           |
        |          |   Attester  |                   |           |
        |          |             |                   |           |
        |          | Attest      |    +----------+   |           |
        +----------------->      |    |  Issuer  |   |           |
        |          |             |    |          |   |           |
        |   TokenRequest         |    |          |   |           |
        |   + Anon Origin ID     |    |          |   |           |
        | [ + Encrypted Origin ] |    |          |   |           |
        +----------------->      |    |          |   |           |
        |          |             |    |          |   |           |
        |          |       TokenRequest          |   |           |
        |          |      [ + Encrypted origin ] |   |           |
        |          |     +------------------->   |   |           |
        |          |             |    |          |   |           |
        |          |             |    |          |   |           |
        |          |       TokenResponse         |   |           |
        |          |       + Rate limit          |   |           |
        |          |     <-------------------+   |   |           |
        |          |             |    |          |   |           |
        |          |  in limit?  |    |          |   |           |
        |          |      no     |    |          |   |           |
        |          |             |    |          |   |           |
        |        Error           |    |          |   |           |
        <-----------------+      |    |          |   |           |
        |          |             |    |          |   |           |
        |          +-------------+    +----------+   |           |
        X                                            |           |
  issuance failed                                    +-----------+
]]></artwork>
        </figure>
        <t>Each Issuer has a window over which a rate limit policy is applied. The window
begins upon a Client's first token request and ends after the window time elapses,
after which the Client's rate limit state is reset. Issuers apply the rate limit
policy corresponding to a Client's encrypted Origin by using a per-Origin secret
key to produce the token response. Attesters enforce the rate limit by combining
the Issuer's response with a per-Client value, yielding an (Anonymous) Issuer
Origin ID that is stable for all client requests to the designated Origin.
The Anonymous Issuer Origin ID is used to track and enforce the Client rate limit.</t>
        <t>Issuers can rotate the secret they use when applying rate limits as desired. If
a rotation event happens during a Client's active policy window, the Attester would
compute a different Anonymous Issuer Origin ID and mistakenly conclude that the
Client is acccessing a new Origin. To mitigate this, Client's provide a stable
Anonymous Origin ID in their request to the Attester, which is constant for all
requests to that Origin. This allows the Attester to detect when Issuer rotation
events occur without affecting Client rate limits.</t>
        <figure anchor="fig-example-policy-windows">
          <name>Issuer policy window rotation</name>
          <artwork><![CDATA[
                          Per-Origin
                         secret rotate
Issuer:      -----+------------X----------+------------> Time
                  |         policy        |
Client            |         window        |
Token Requests:   *--------------*--------|
                  |              |        |
                  v              v        |
            Issuer Origin  Issuer Origin  |
                ID x           ID y       |
                  |                       |
            (policy start)          (policy end)
]]></artwork>
        </figure>
        <t>Unlike the basic issuance protocol <xref target="ISSUANCE"/>, the rate-limited issuance protocol
in this document has additional functional and state requirements for Client, Attester,
and Issuer. <xref target="attester-state"/> describes the state that the Attester must track
in order to enforce these limits, <xref target="client-state"/> describes the Client state necessary
for successive token requests with the Attester, and <xref target="issuer-state"/> describes the state
necessary for the Issuer to apply rate limits. The functional description of each
participant in this protocol is explained in <xref target="issuance"/></t>
      </section>
      <section anchor="properties">
        <name>Properties and Requirements</name>
        <t>For rate-limited token issuance, the Attester, Issuer, and Origin as defined in
<xref target="ARCH"/> each have partial knowledge of the Client's identity and actions,
and each entity only knows enough to serve its function (see <xref target="terms"/> for more
about the pieces of information):</t>
        <ul spacing="normal">
          <li>The Attester knows the Client's identity and learns the Client's public key
(Client Key), the Issuer being targeted (Issuer Name), the period of time
for which the Issuer's policy is valid (Issuer Policy Window), the number of
tokens the Issuer is willing to issue within the current policy window, and the
number of tokens issued to a given Client for the claimed Origin in the policy
window. The Attester does not know the identity of the Origin the Client is
trying to access (Origin Name), but knows a Client-anonymized identifier for
it (Anonymous Origin ID).</li>
          <li>The Issuer knows a per-Origin secret (Issuer Origin Secret) and policy about client
access, and learns the Origin's identity (Origin Name) during issuance. The Issuer
does not learn the Client's identity or information about the Client's access
pattern.</li>
          <li>The Origin knows the Issuer to which it will delegate an incoming Client
(Issuer Name), and can verify that any tokens presented by the Client were
signed by the Issuer. The Origin does not learn which Attester was used by a
Client for issuance.</li>
        </ul>
        <t>Since an Issuer applies policies on behalf of Origins, a Client is required to
reveal the Origin's identity to the delegated Issuer. It is a requirement of
this protocol that the Attester not learn the Origin's identity so that,
despite knowing the Client's identity, an Attester cannot track and concentrate
information about Client activity.</t>
        <t>An Issuer expects an Attester to verify its Clients' identities correctly, but an
Issuer cannot confirm an Attester's efficacy or the Attester-Client relationship
directly without learning the Client's identity. Similarly, an Origin does not
know the Attester's identity, but ultimately relies on the Attester to correctly
verify or authenticate a Client for the Origin's policies to be correctly
enforced. An Issuer therefore chooses to issue tokens to only known and
reputable Attesters; the Issuer can employ its own methods to determine the
reputation of a Attester.</t>
        <t>An Attester is expected to employ a stable Client identifier, such as an IP
address, a device identifier, or an account at the Attester, that can serve as a
reasonable proxy for a user with some creation and maintenance cost on the user.</t>
        <t>For the Issuance protocol, a Client is expected to create and maintain stable
and explicit secrets for time periods that are on the scale of Issuer policy
windows. Changing these secrets arbitrarily during a policy window can result in
token issuance failure for the rest of the policy window; see <xref target="client-state"/>
for more details. A Client can use a service offered by its Attester or a
third-party to store these secrets, but it is a requirement of this protocol
that the Attester not be able to learn these secrets.</t>
        <t>The privacy guarantees of this issuance protocol, specifically those around
separating the identity of the Client from the names of the Origins that it
accesses, are based on the expectation that there is not collusion between
the entities that know about Client identity and those that know about Origin
identity. Clients choose and share information with Attesters, and Origins
choose and share policy with Issuers; however, the Attester is generally
expected to not be colluding with Issuers or Origins. If this occurs, it
can become possible for an Attester to learn or infer which Origins a
Client is accessing, or for an Origin to learn or infer the Client
identity. For further discussion, see <xref target="collusion"/>.</t>
      </section>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>Unless otherwise specified, this document encodes protocol messages in TLS notation
from <xref target="TLS13"/>, Section 3.</t>
      <t>This draft includes pseudocode that uses the functions and conventions defined
in <xref target="HPKE"/>.</t>
      <t>Encoding an integer to a sequence of bytes in network byte order is described
using the function "encode(n, v)", where "n" is the number of bytes and "v" is
the integer value. The function "len()" returns the length of a sequence of bytes.</t>
      <t>The following terms are defined in <xref target="ARCH"/> and are used throughout this
document:</t>
      <ul spacing="normal">
        <li>Client: An entity that provides authorization tokens to services
across the Internet, in return for authorization.</li>
        <li>Issuer: An entity that produces Privacy Pass tokens to clients.</li>
        <li>Attester: An entity that can attest to properties about the client,
including previous patterns of access.</li>
        <li>Origin: The server from which the client can redeem tokens.</li>
        <li>Issuance Protocol: The protocol exchange that involves the client,
attester, and issuer, used to generate tokens.</li>
      </ul>
      <t>The following terms are defined in <xref target="AUTHSCHEME"/>, which defines the
interactions between clients and origins:</t>
      <ul spacing="normal">
        <li>Issuer Name: The name that identifies the Issuer, which is an entity
that can generate tokens for a Client using one or more issuance protocols.</li>
        <li>Token Key: Keying material that can be used with an issuance protocol
to create a signed token.</li>
        <li>Origin Name: The name that identifies the Origin, as included in a
TokenChallenge.</li>
      </ul>
      <t>Additionally, this document defines several terms that are unique to the
rate-limited issuance protocol:</t>
      <ul spacing="normal">
        <li>Issuer Policy Window: The period over which an Issuer will track access
policy, defined in terms of seconds and represented as a uint64. The state
that the Attester keeps for a Client is specific to a policy window.
The effective policy window for a specific Client starts when the Client
first sends a request associated with an Issuer.</li>
        <li>Issuer Encapsulation Key: The public key used to encrypt values such as
Origin Name in requests from Clients to the Issuer, so that Attesters cannot learn
the Origin Name value. Each Issuer Encapsulation Key is used across all requests on the
Issuer, for different Origins.</li>
        <li>Anonymous Origin ID: An identifier that is generated by the Client and marked
on requests to the Attester, which represents a specific Origin anonymously. The Client
generates a stable Anonymous Origin ID for each Origin Name, to allow the Attester
to count token access without learning the Origin Name.</li>
        <li>Client Key: A public key chosen by the Client and shared only with the Attester;
see <xref target="issuance-unlinkability"/> for more details about this restriction.</li>
        <li>Client Secret: The secret key used by the Client during token issuance, whose public key
(Client Key) is shared with the Attester.</li>
        <li>Issuer Origin Secret: A per-origin secret key used by the Issuer during token issuance,
whose public key is not shared with anyone.</li>
        <li>Anonymous Issuer Origin ID: An identifier that is generated by Issuer based on an
Issuer Origin Secret that is per-Client and per-Origin. See <xref target="response-two"/> for details
of derivation.</li>
      </ul>
    </section>
    <section anchor="setup">
      <name>Configuration</name>
      <t>Issuers MUST provide the following parameters for configuration:</t>
      <ol spacing="normal" type="1"><li>Issuer Policy Window: a uint64 of seconds as defined in <xref target="terms"/>.</li>
        <li>Issuer Request URI: a token request URL for generating access tokens.
For example, an Issuer URL might be https://issuer.example.net/token-request. This parameter
uses resource media type "text/plain".</li>
        <li>Issuer Public Key values: an Issuer Public Key for an issuance protocol.</li>
        <li>Issuer Encapsulation Key: a <tt>EncapsulationKey</tt> structure as defined below to use when encapsulating
information, such as the origin name, to the Issuer in issuance requests. This parameter uses resource media type
"application/issuer-encap-key". The Npk parameter corresponding to the HpkeKdfId can be found in <xref target="HPKE"/>.</li>
      </ol>
      <artwork><![CDATA[
opaque HpkePublicKey[Npk]; // defined in RFC9180
uint16 HpkeKemId;          // defined in RFC9180
uint16 HpkeKdfId;          // defined in RFC9180
uint16 HpkeAeadId;         // defined in RFC9180

struct {
  uint8 key_id;
  HpkeKemId kem_id;
  HpkePublicKey public_key;
  HpkeKdfId kdf_id;
  HpkeAeadId aead_id;
} EncapsulationKey;
]]></artwork>
      <t>The Issuer parameters can be obtained from an Issuer via a directory object, which is a JSON
object whose field names and values are raw values and URLs for the parameters.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Field Name</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">issuer-policy-window</td>
            <td align="left">Issuer Policy Window as a JSON number</td>
          </tr>
          <tr>
            <td align="left">issuer-request-uri</td>
            <td align="left">Issuer Request URI resource URL as a JSON string</td>
          </tr>
          <tr>
            <td align="left">token-keys</td>
            <td align="left">List of Issuer Public Key values, each as JSON objects</td>
          </tr>
          <tr>
            <td align="left">encap-keys</td>
            <td align="left">List of Encapsulation Key values, each as a base64url encoded EncapsulationKey value</td>
          </tr>
        </tbody>
      </table>
      <t>Each "token-keys" JSON object contains the following fields and corresponding raw values.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Field Name</th>
            <th align="left">Value</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">token-type</td>
            <td align="left">Integer value of the Token Type, as defined in <xref target="iana-token-type"/>, as a JSON number</td>
          </tr>
          <tr>
            <td align="left">token-key</td>
            <td align="left">The base64url encoding of the public key for use with the issuance protocol, including padding, as a JSON string</td>
          </tr>
        </tbody>
      </table>
      <t>Issuers MAY advertise multiple token-keys for the same token-type to
support key rotation. In this case, Issuers indicate preference for which
token key to use based on the order of keys in the list, with preference
given to keys earlier in the list. Likewise, Issuers MAY advertise multiple
encap-keys to support key rotation, where the order of the keys in the
list indicates preference as with token-keys.</t>
      <t>As an example, the Issuer's JSON directory could look like:</t>
      <artwork><![CDATA[
 {
    "issuer-token-window": 86400,
    "issuer-request-uri": "https://issuer.example.net/token-request",
    "encap-keys": [
      <encoded EncapsulationKey>
    ],
    "token-keys": [
      {
        "token-type": 3,
        "token-key": "MI...AB",
      },
      {
        "token-type": 3,
        "token-key": "MI...AQ",
      }
    ]
 }
]]></artwork>
      <t>Issuer directory resources have the media type "application/json"
and are located at the well-known location /.well-known/token-issuer-directory.</t>
    </section>
    <section anchor="token-challenge-requirements">
      <name>Token Challenge Requirements</name>
      <t>Clients receive challenges for tokens, as described in <xref target="AUTHSCHEME"/>.</t>
      <t>For the rate-limited token issuance protocol described in this document,
the name of the origin is sent in an encrypted message from the Client
to the Issuer. If the TokenChallenge.origin_info field contains a single
origin name, that origin name is used. If the origin_info field contains
multiple origin names, the client selects the single origin name that
presented the challenge. If the origin_info field is empty, the
encrypted message is the empty string "".</t>
      <t>The HTTP authentication challenge also SHOULD contain the following
additional attribute:</t>
      <ul spacing="normal">
        <li>"issuer-encap-key", which contains a base64url encoding of a <tt>EncapsulationKey</tt> as defined
in <xref target="setup"/> to use when encrypting the Origin Name in issuance requests.</li>
      </ul>
    </section>
    <section anchor="issuance">
      <name>Issuance Protocol</name>
      <t>This section describes the Issuance protocol for a Client to request and receive
a token from an Issuer. Token issuance involves a Client, Attester, and Issuer,
with the following steps:</t>
      <ol spacing="normal" type="1"><li>The Client sends a token request containing a token request, encrypted origin
name, and one-time-use public key and signature to the Attester</li>
        <li>The Attester validates the request contents, specifically checking the request
signature, and proxies the request to the Issuer</li>
        <li>The Issuer validates the request against the signature, and processes its contents,
and produces a token response sent back to the Attester</li>
        <li>The Attester verifies the response and proxies the response to the Client</li>
      </ol>
      <t>The Issuance protocol is designed such that Client, Attester, and Issuer learn only
what is necessary for completing the protocol; see <xref target="info-disclosure"/> for more details.</t>
      <t>The Issuance protocol has a number of underlying cryptographic dependencies for
operation:</t>
      <ul spacing="normal">
        <li>RSA Blind Signatures <xref target="BLINDSIG"/>, for issuing and constructing Tokens. This support
is the same as used in the base publicly verifiable token issuance protocol <xref target="ISSUANCE"/></li>
        <li>
          <xref target="HPKE"/>, for encrypting the origin server name in transit between Client and Issuer across the Attester.</li>
        <li>Signatures with key blinding, as described in <xref target="KEYBLINDING"/>, for verifying
correctness of Client requests.</li>
      </ul>
      <t>Clients and Issuers are required to implement all of these dependencies, whereas Attesters are required
to implement signature with key blinding support.</t>
      <section anchor="state-requirements">
        <name>State Requirements</name>
        <t>The Issuance protocol requires each participating endpoint to maintain some
necessary state, as described in this section.</t>
        <section anchor="client-state">
          <name>Client State</name>
          <t>A Client is required to have the following information, derived from a given TokenChallenge:</t>
          <ul spacing="normal">
            <li>Origin Name, a hostname referring to the Origin <xref target="RFC6454"/>. This is the name
of the Origin that issued the token challenge. One or more names can be listed
in the TokenChallenge.origin_info field. Rate-limited token issuance relies on the
client selecting a single origin name from this list if multiple are present.</li>
            <li>Token Key, a blind signature public key corresponding to the Issuer
identified by the TokenChallenge.issuer_name.</li>
            <li>Issuer Encapsulation Key, a public key used to encrypt request information corresponding
to the Issuer identified by TokenChallenge.issuer_name.</li>
          </ul>
          <t>Clients maintain a stable Client Key that they use for all communication with
a specific Attester. Client Key is a public key, where the corresponding private key
Client Secret is known only to the client.</t>
          <t>If the client loses this (Client Key, Client Secret), they may generate a new tuple. The
Attester will enforce if a client is allowed to use this new Client Key. See <xref target="attester-state"/>
for details on this enforcement.</t>
          <t>Clients also need to be able to generate an Anonymous Origin ID value that corresponds
to the Origin Name, to send in requests to the Attester.</t>
          <t>Anonymous Origin ID MUST be a stable and unpredictable 32-byte value computed by the Client.
Clients MUST NOT change this value across token requests for the same Origin Name. Doing
so will result in token issuance failure (specifically, when an Attester rejects a request
upon detecting two Anonymous Origin ID values that map to the same Origin).</t>
          <t>One possible mechanism for implementing this identifier is for the Client to store a mapping
between the Origin Name and a randomly generated Anonymous Origin ID for future requests. Alternatively,
the Client can compute a PRF keyed by a per-client secret (Client Secret) over the Origin Name,
e.g., Anonymous Origin ID = HKDF(secret=Client Secret, salt="", info=Origin Name).</t>
        </section>
        <section anchor="attester-state">
          <name>Attester State</name>
          <t>An Attester is required to maintain state for every authenticated Client. The mechanism
of identifying a Client is specific to each Attester, and is not defined in this document.
As examples, the Attester could use device-specific certificates or account authentication
to identify a Client.</t>
          <t>Attesters need to enforce that Clients don't change their Client Key frequently, to ensure Clients can't
regularly evade the per-client policy as seen by the issuer. Attesters MUST NOT allow Clients to
change their Client Key more than once within a policy window, or in the subsequent policy window
after a previous Client Key change. Alternative schemes where the Attester stores the encrypted
(Client Key, Client Secret) tuple on behalf of the client are possible but not described here.</t>
          <t>Attesters are expected to know both the Issuer Policy Window and current Issuer Encapsulation Key
for any Issuer Name to which they allow access. This information can be retrieved using the
URIs defined in <xref target="setup"/>. The current Issuer Encapsulation Key value is used to check the value
of the issuer_encap_key_id in Client-generated requests (<xref target="request-one"/>) to reject requests where
clients are using unique key IDs. Such unique keys could indicate a key-targeting attack that
intends de-anonymize a client to the Issuer. In order to handle encapsulation key rotation, the Attester
needs to know the current key value and the previou key value, and remember the last time the
value changed to ensure that it does not happen too frequently (such as no more than once per
policy window, or no more than once per day).</t>
          <t>For each Client-Issuer pair, an Attester maintains a policy window
start and end time for each Issuer from which a Client requests a token.</t>
          <t>For each tuple of (Client Key, Anonymous Origin ID, policy window), the Attester maintains the
following state:</t>
          <ul spacing="normal">
            <li>A counter of successful tokens issued</li>
            <li>Whether or not a previous request was rejected by the Issuer</li>
            <li>The previous rate limit provided by the Issuer</li>
            <li>The last received Anonymous Issuer Origin ID value for this Anonymous Origin ID, if any</li>
          </ul>
          <t>The Issuer-provided rate limit for a single Origin is intended to not change more frequently
than once per policy window. If the Attester detects a change of rate limit multiple times
for the state kept for a single policy window, it SHOULD reject tokens issued in the remainder
of the policy window.</t>
        </section>
        <section anchor="issuer-state">
          <name>Issuer State</name>
          <t>Issuers maintain a stable Issuer Origin Secret that they use in calculating values returned
to the Attester for each origin. If this value changes, it will open up a possibility
for Clients to request extra tokens for an Origin without being limited, within a
policy window. See <xref target="token-key-management"/> for details about generating and rotating
the Issuer Origin Secret.</t>
          <t>Issuers are expected to have the private key that corresponds to Issuer Encapsulation Key,
which allows them to decrypt the Origin Name values in requests.</t>
          <t>For each Origin, Issuers need to know what rate limit to enforce during a policy window.
Issuers SHOULD NOT use unique values for specific Origins, which would allow Attesters
to recognize an Origin being accessed by multiple Clients. Each Origin limit is allowed
to change, but SHOULD NOT change more often than once per policy window, to ensure that
the limit is useful.</t>
        </section>
      </section>
      <section anchor="issuance-http-headers">
        <name>Issuance HTTP Headers</name>
        <t>The Issuance protocol defines four new HTTP headers that are used in requests
and responses between Clients, Attesters, and Issuers (see <xref target="iana-headers"/>).</t>
        <t>The "Sec-Token-Origin" is an Item Structured Header <xref target="RFC8941"/>. Its
value MUST be a Byte Sequence. This header is sent both on Client-to-Attester
requests (<xref target="request-one"/>) and on Issuer-to-Attester responses (<xref target="response-one"/>).
Its ABNF is:</t>
        <artwork><![CDATA[
    Sec-Token-Origin = sf-binary
]]></artwork>
        <t>The "Sec-Token-Client" is an Item Structured Header <xref target="RFC8941"/>. Its
value MUST be a Byte Sequence. This header is sent on Client-to-Attester
requests (<xref target="request-one"/>), and contains the bytes of Client Key.
Its ABNF is:</t>
        <artwork><![CDATA[
    Sec-Token-Client = sf-binary
]]></artwork>
        <t>The "Sec-Token-Request-Blind" is an Item Structured Header <xref target="RFC8941"/>. Its
value MUST be a Byte Sequence. This header is sent on Client-to-Attester
requests (<xref target="request-one"/>), and contains a per-request nonce value.
Its ABNF is:</t>
        <artwork><![CDATA[
    Sec-Token-Request-Blind = sf-binary
]]></artwork>
        <t>The "Sec-Token-Request-Key" is an Item Structured Header <xref target="RFC8941"/>. Its
value MUST be a Byte Sequence. This header is sent on Client-to-Attester
requests (<xref target="request-one"/>), and contains a per-request public key.
Its ABNF is:</t>
        <artwork><![CDATA[
    Sec-Token-Request-Key = sf-binary
]]></artwork>
        <t>The "Sec-Token-Limit" is an Item Structured Header <xref target="RFC8941"/>. Its
value MUST be an Integer. This header is sent on Issuer-to-Attester
responses (<xref target="response-one"/>), and contains the number of times a
Client can retrieve a token for the requested Origin within a policy window,
as set by the Issuer. Its ABNF is:</t>
        <artwork><![CDATA[
    Sec-Token-Limit = sf-integer
]]></artwork>
      </section>
      <section anchor="request-one">
        <name>Client-to-Attester Request</name>
        <t>The Client and Attester MUST use a secure and Attester-authenticated HTTPS
connection. They MAY use mutual authentication or mechanisms such as TLS
certificate pinning, to mitigate the risk of channel compromise; see
<xref target="sec-considerations"/> for additional about this channel.</t>
        <t>Requests to the Attester need to indicate the Issuer Name to which issuance
requests will be forwarded. Attesters SHOULD provide Clients with a URI template
that contains one variable that contains the Issuer Name, "issuer", using
Level 3 URI template encoding as defined in Section 1.2 of <xref target="RFC6570"/>.</t>
        <t>An example of an Attester URI templates is shown below:</t>
        <artwork><![CDATA[
https://attester.net/token-request{?issuer}
]]></artwork>
        <t>Attesters and Clients MAY agree on other mechanisms to specify the Issuer Name
in requests.</t>
        <t>The Client first creates an issuance request message for a random value <tt>nonce</tt>
using the input TokenChallenge <tt>challenge</tt> and the Issuer key identifier <tt>key_id</tt>
as follows:</t>
        <artwork><![CDATA[
nonce = random(32)
context = SHA256(challenge)
token_input = concat(0x0003, nonce, context, key_id)
blinded_msg, blind_inv = rsabssa_blind(pkI, token_input)
]]></artwork>
        <t>The Client then uses Client Key to generate its one-time-use request public
key <tt>request_key</tt> and blind <tt>request_blind</tt> as described in <xref target="client-anon-issuer-origin-id"/>.</t>
        <t>The Client then constructs a InnerTokenRequest value, denoted <tt>origin_token_request</tt>,
combining <tt>blinded_msg</tt>,  <tt>request_key</tt>, and the origin name as follows:</t>
        <artwork><![CDATA[
struct {
  uint8_t blinded_msg[Nk];
  uint8_t request_key[Npk];
  uint8_t padded_origin_name<0..2^16-1>;
} InnerTokenRequest;
]]></artwork>
        <t>This structure is initialized and then encrypted using Issuer Encryption Key, producing
<tt>encrypted_token_request</tt>, as described in <xref target="encrypt-origin"/>.</t>
        <t>Finally, the Client uses Client Secret to produce <tt>request_signature</tt>
as described in <xref target="index-proof"/>.</t>
        <t>The Client then constructs a TokenRequest structure. This TokenRequest
structure is based on the publicly verifiable token issuance path in
<xref target="ISSUANCE"/>, adding fields for the encrypted origin name and request signature.</t>
        <artwork><![CDATA[
struct {
   uint16_t token_type = 0x0003;
   uint8_t token_key_id;
   uint8_t issuer_encap_key_id[32];
   uint8_t encrypted_token_request<1..2^16-1>;
   uint8_t request_signature[Nsig];
} TokenRequest;
]]></artwork>
        <t>The structure fields are defined as follows:</t>
        <ul spacing="normal">
          <li>"token_type" is a 2-octet integer, which matches the type in the challenge.</li>
          <li>"token_key_id" is the least significant byte of the Token Key key ID, which is
generated as SHA256(public_key), where public_key is a DER-encoded SubjectPublicKeyInfo
object carrying Token Key.</li>
          <li>"issuer_encap_key_id" is a collision-resistant hash that identifies the Issuer
Encryption Key, generated as SHA256(EncapsulationKey).</li>
          <li>"encrypted_token_request" is an encrypted structure that contains an InnerTokenRequest
value, calculated as described in <xref target="encrypt-origin"/>.</li>
          <li>"request_signature" is computed as described in <xref target="index-proof"/>.</li>
        </ul>
        <t>The Client then generates an HTTP POST request to send through the Attester to
the Issuer, with the TokenRequest as the body. The media type for this request
is "message/token-request". The Client includes the "Sec-Token-Origin" header,
whose value is Anonymous Origin ID; the "Sec-Token-Client" header, whose value is
Client Key; the "Sec-Token-Request-Blind" header, whose value is request_blind; and
the "Sec-Token-Request-Key" header, whose value is <tt>request_key</tt>. The Client
sends this request to the Attester's proxy URI. An example request is shown below,
where the Issuer Name is "issuer.net" and the Attester URI template is
"https://attester.net/token-request{?issuer}"</t>
        <artwork><![CDATA[
:method = POST
:scheme = https
:authority = attester.net
:path = /token-request?issuer=issuer.net
accept = message/token-response
cache-control = no-cache, no-store
content-type = message/token-request
content-length = <Length of TokenRequest>
sec-token-origin = Anonymous Origin ID
sec-token-client = Client Key
sec-token-request-blind = request_blind
sec-token-request-key = request_key

<Bytes containing the TokenRequest>
]]></artwork>
        <t>If the Attester detects a token_type in the TokenRequest that it does not recognize
or support, it MUST reject the request with an HTTP 400 error.</t>
        <t>The Attester also checks to validate that the issuer_encap_key_id in the client's TokenRequest
matches a known Issuer Encapsulation Key public key for the Issuer. For example, the Attester can
fetch this key using the API defined in <xref target="setup"/>. This check is done to help ensure that
the Client has not been given a unique key that could allow the Issuer to fingerprint or target
the Client. If the key does not match, the Attester rejects the request with an HTTP
400 error. Note that this can lead to failures in the event of Issuer Issuer Encapsulation Key
rotation; see <xref target="privacy-considerations"/> for considerations.</t>
        <t>The Attester finally validates the Client's stable mapping request as described in
<xref target="attester-anon-issuer-origin-id"/>. If this fails, the Attester MUST return an HTTP 400
error to the Client.</t>
        <t>If the Attester accepts the request, it will look up the state stored for this Client.
It will look up the count of previously generate tokens for this Client using the same
Anonymous Origin ID. See <xref target="attester-state"/> for more details.</t>
        <t>If the Attester has stored state that a previous request for this Anonymous Origin ID was
rejected by the Issuer in the current policy window, it SHOULD reject the request without
forwarding it to the Issuer.</t>
        <t>If the Attester detects this Client has changed their Client Key more frequently than allowed
as described in <xref target="attester-state"/>, it SHOULD reject the request without forwarding it to
the Issuer.</t>
      </section>
      <section anchor="request-two">
        <name>Attester-to-Issuer Request</name>
        <t>Assuming all checks in <xref target="request-one"/> succeed, the Attester generates an HTTP POST request
to send to the Issuer with the Client's TokenRequest as the body. The Attester MUST NOT
add information that will uniquely identify a Client, or associate the request with a small
set of possible Clients. Extensions to this protocol MAY allow Attesters to add information
that can be used to separate large populations, such as providing information about the country
or region to which a Client belongs. An example request is shown below.</t>
        <artwork><![CDATA[
:method = POST
:scheme = https
:authority = issuer.net
:path = /token-request
accept = message/token-response
cache-control = no-cache, no-store
content-type = message/token-request
content-length = <Length of TokenRequest>

<Bytes containing the TokenRequest>
]]></artwork>
        <t>The Attester and the Issuer MUST use a secure and Issuer-authenticated HTTPS
connection. Also, Issuers MUST authenticate Attesters, either via mutual
TLS or another form of application-layer authentication. They MAY additionally use
mechanisms such as TLS certificate pinning, to mitigate the risk of channel
compromise; see <xref target="sec-considerations"/> for additional about this channel.</t>
        <t>Upon receipt of the forwarded request, the Issuer validates the following conditions:</t>
        <ul spacing="normal">
          <li>The TokenRequest contains a supported token_type</li>
          <li>The TokenRequest.token_key_id and TokenRequest.issuer_encap_key_id correspond to known
Token Keys and Issuer Encapsulation Keys held by the Issuer.</li>
          <li>The TokenRequest.encrypted_token_request can be decrypted using the
Issuer's private key (the private key associated with Issuer Encapsulation Key), and contains
a valid InnerTokenRequest whose unpadded origin name matches an Origin Name that is served by
the Issuer. The Origin name associated with the InnerTokenRequest value might be the empty string "",
as described in <xref target="encrypt-origin"/>, in which case the Issuer applies a cross-origin
policy if supported. If a cross-origin policy is not supported, this condition is not met.</li>
        </ul>
        <t>If any of these conditions is not met, the Issuer MUST return an HTTP 400 error to the Attester,
which will forward the error to the client.</t>
        <t>The Issuer determines the correct Issuer Key by using the decrypted Origin Name value and
TokenRequest.token_key_id. If there is no Token Key whose truncated key ID matches
TokenRequest.token_key_id, the Issuer MUST return an HTTP 401 error to Attester, which will
forward the error to the client. The Attester learns that the client's view of the Origin key
was invalid in the process.</t>
      </section>
      <section anchor="response-one">
        <name>Issuer-to-Attester Response</name>
        <t>If the Issuer is willing to give a token to the Client, the Issuer decrypts
TokenRequest.encrypted_token_request to discover a InnerTokenRequest value. If this fails,
the Issuer rejects the request with a 400 error. Otherwise, the Issuer validates and
processes the token request with Issuer Origin Secret corresponding to the designated
Origin as described in <xref target="issuer-anon-issuer-origin-id"/>. If this fails, the Issuer
rejects the request with a 400 error. Otherwise, the output is
index_key.</t>
        <t>The Issuer completes the issuance flow by computing a blinded response as follows:</t>
        <artwork><![CDATA[
blind_sig = rsabssa_blind_sign(skP, InnerTokenRequest.blinded_msg)
]]></artwork>
        <t><tt>skP</tt> is the private key corresponding to Token Key, known only to the Issuer.
The Issuer then encrypts <tt>blind_sig</tt> to the Client as described in <xref target="encap-issuer-to-client"/>,
yielding <tt>encrypted_token_response</tt>.</t>
        <t>The Issuer generates an HTTP response with status code 200 whose body consists of
blind_sig, with the content type set as "message/token-response", the
index_key set in the "Sec-Token-Origin" header, and the limit of tokens
allowed for a Client for the Origin within a policy window set in the
"Sec-Token-Limit" header. This limit SHOULD NOT be unique to a specific
Origin, such that the Attester could use the value to infer which Origin
the Client is accessing (see <xref target="privacy-considerations"/>).</t>
        <artwork><![CDATA[
:status = 200
content-type = message/token-response
content-length = <Length of blind_sig>
sec-token-origin = index_key
sec-token-limit = Token limit

<Bytes containing the encrypted_token_response>
]]></artwork>
      </section>
      <section anchor="response-two">
        <name>Attester-to-Client Response</name>
        <t>Upon receipt of a successful response from the Issuer, the Attester extracts the
"Sec-Token-Origin" header, and uses the value to determine Anonymous Issuer Origin ID
as described in <xref target="attester-output-anon-issuer-origin-id"/>.</t>
        <t>If the "Sec-Token-Origin" is missing, or if the same Anonymous Issuer Origin ID was previously
received in a response for a different Anonymous Origin ID within the same policy window,
the Attester MUST drop the token and respond to the client with an HTTP 400 status.
If there is not an error, the Anonymous Issuer Origin ID is stored alongside the state
for the Anonymous Origin ID.</t>
        <t>The Attester also extracts the "Sec-Token-Limit" header, and compares the limit against the
previous count of accesses for this Client for the Anonymous Origin ID. If the count is greater
than or equal to the limit, the Attester drops the token and responds to the client with an
HTTP 429 (Too Many Requests) error.</t>
        <t>For all other cases, the Attester forwards all HTTP responses unmodified to the Client
as the response to the original request for this issuance.</t>
        <t>When the Attester detects successful token issuance, it MUST increment the counter
in its state for the number of tokens issued to the Client for the Anonymous Origin ID.</t>
        <t>Upon receipt, the Client decrypts the <tt>blind_sig</tt> from <tt>encrypted_token_response</tt> as
described in <xref target="encap-issuer-to-client"/>. If successful, the Client then processes
the response as follows:</t>
        <artwork><![CDATA[
authenticator = rsabssa_finalize(pkI, token_input, blind_sig, blind_inv)
]]></artwork>
        <t>If this succeeds, the Client then constructs a token as described in
<xref target="AUTHSCHEME"/> as follows:</t>
        <artwork><![CDATA[
struct {
    uint16_t token_type = 0x0003
    uint8_t nonce[32];
    uint8_t context[32];
    uint8_t token_key_id[Nid];
    uint8_t authenticator[Nk]
} Token;
]]></artwork>
      </section>
    </section>
    <section anchor="encrypt-origin">
      <name>Encrypting Origin Token Requests and Responses</name>
      <t>Clients encapsulate token request information to the Issuer using the Issuer Encapsulation Key.
Issuers decrypt the token request using their corresponding private key. This process yields
the decrypted token request as well as a shared encryption context between Client and Issuer.
Issuers encapsulate their token response to the Client using an ephemeral key derived from this
shared encryption context. This process ensures that the Attester learns neither the token
request or response information.</t>
      <t>Client to Issuer encapsulation is described in <xref target="encap-client-to-issuer"/>, and Issuer to
Client encapsulation is described in <xref target="encap-issuer-to-client"/>.</t>
      <section anchor="encap-client-to-issuer">
        <name>Client to Issuer Encapsulation</name>
        <t>Given a <tt>EncapsulationKey</tt> (Issuer Encapsulation Key), Clients produce encrypted_token_request
using the following values:</t>
        <ul spacing="normal">
          <li>the one octet key identifier from the Name Key, keyID, with the corresponding KEM identified by kemID,
the public key from the configuration, pkI, and;</li>
          <li>a selected combination of KDF, identified by kdfID, and AEAD, identified by aeadID.</li>
        </ul>
        <t>Beyond the key configuration inputs, Clients also require the following inputs defined
in <xref target="request-one"/>: <tt>token_key_id</tt>, <tt>blinded_msg</tt>, <tt>request_key</tt>, <tt>origin_name</tt>, and
<tt>issuer_encap_key_id</tt>.</t>
        <t>Together, these are used to encapsulate an InnerTokenRequest and produce an encrypted token
request (<tt>encrypted_token_request</tt>).</t>
        <t><tt>origin_name</tt> contains the name of the origin that initiated the challenge, as
taken from the TokenChallenge.origin_info field. If the TokenChallenge.origin_info field
is empty, <tt>origin_name</tt> is set to the empty string "".</t>
        <t>The process for generating <tt>encrypted_token_request</tt> from <tt>blinded_msg</tt>, <tt>request_key</tt>, and
<tt>origin_name</tt> values is as follows:</t>
        <ol spacing="normal" type="1"><li>Compute an <xref target="HPKE"/> context using pkI, yielding context and encapsulation key enc.</li>
          <li>Construct associated data, aad, by concatenating the values of keyID, kemID, kdfID,
aeadID, and all other values of the TokenRequest structure.</li>
          <li>Pad origin_name with N zero bytes, where N = 31 - ((L - 1) % 32) and L is the length
of origin_name. If L is 0, N = 32. Denote this padding process as the function <tt>pad</tt>.</li>
          <li>Encrypt (seal) the padded origin_name with aad as associated data using context, yielding ciphertext ct.</li>
          <li>Concatenate the values of aad, enc, and ct, yielding encrypted_token_request.</li>
        </ol>
        <t>Note that enc is of fixed-length, so there is no ambiguity in parsing this structure.</t>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork><![CDATA[
enc, context = SetupBaseS(pkI, "InnerTokenRequest")
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID),
             encode(2, token_type),
             encode(1, token_key_id),
             encode(32, issuer_encap_key_id))
padded_origin_name = pad(origin_name)
input = concat(encode(Nk, blinded_msg),
               encode(49, request_key),
               encode(len(padded_origin_name), padded_origin_name))
ct = context.Seal(aad, input)
encrypted_token_request = concat(enc, ct)
]]></artwork>
        <t>Issuers reverse this procedure to recover the InnerTokenRequest value by computing the AAD as
described above and decrypting encrypted_token_request with their private key skI (the private
key corresponding to pkI). The <tt>origin_name</tt> value is recovered from InnerTokenRequest.padded_origin_name
by stripping off padding bytes. In pseudocode, this procedure is as follows:</t>
        <artwork><![CDATA[
enc, ct = parse(encrypted_token_request)
aad = concat(encode(1, keyID),
             encode(2, kemID),
             encode(2, kdfID),
             encode(2, aeadID),
             encode(2, token_type),
             encode(1, token_key_id),
             encode(32, issuer_encap_key_id))
context = SetupBaseR(enc, skI, "TokenRequest")
origin_token_request, error = context.Open(aad, ct)
]]></artwork>
        <t>The <tt>InnerTokenRequest.blinded_msg</tt> and <tt>InnerTokenRequest.request_key</tt> values, along
with the unpadded <tt>origin_name</tt> value, are used by the Issuer as described in <xref target="request-two"/>.</t>
      </section>
      <section anchor="encap-issuer-to-client">
        <name>Issuer to Client Encapsulation</name>
        <t>Given an HPKE context <tt>context</tt> computed in <xref target="encap-client-to-issuer"/>, Issuers encapsulate
their token response <tt>blind_sig</tt>, yielding an encrypted token response <tt>encrypted_token_response</tt>,
to the Client as follows:</t>
        <ol spacing="normal" type="1"><li>Export a secret <tt>secret</tt> from <tt>context</tt>, using the string "OriginTokenResponse" as context.
The length of this secret is <tt>max(Nn, Nk)</tt>, where <tt>Nn</tt> and <tt>Nk</tt> are the length of AEAD
key and nonce associated with <tt>context</tt>.</li>
          <li>Generate a random value of length <tt>max(Nn, Nk)</tt> bytes, called <tt>response_nonce</tt>.</li>
          <li>Extract a pseudorandom key <tt>prk</tt> using the <tt>Extract</tt> function provided by
the KDF algorithm associated with <tt>context</tt>. The <tt>ikm</tt> input to this
function is <tt>secret</tt>; the <tt>salt</tt> input is the concatenation of <tt>enc</tt> (from
<tt>enc_request</tt>) and <tt>response_nonce</tt></li>
          <li>Use the <tt>Expand</tt> function provided by the same KDF to extract an AEAD key
<tt>key</tt>, of length <tt>Nk</tt> - the length of the keys used by the AEAD associated
with <tt>context</tt>. Generating <tt>key</tt> uses a label of "key".</li>
          <li>Use the same <tt>Expand</tt> function to extract a nonce <tt>nonce</tt> of length <tt>Nn</tt> -
the length of the nonce used by the AEAD. Generating <tt>nonce</tt> uses a label of
"nonce".</li>
          <li>Encrypt <tt>blind_sig</tt>, passing the AEAD function Seal the values of <tt>key</tt>,
<tt>nonce</tt>, empty <tt>aad</tt>, and a <tt>pt</tt> input of <tt>request</tt>, which yields <tt>ct</tt>.</li>
          <li>Concatenate <tt>response_nonce</tt> and <tt>ct</tt>, yielding an Encapsulated Response
<tt>enc_response</tt>. Note that <tt>response_nonce</tt> is of fixed-length, so there is no
ambiguity in parsing either <tt>response_nonce</tt> or <tt>ct</tt>.</li>
        </ol>
        <t>In pseudocode, this procedure is as follows:</t>
        <artwork><![CDATA[
secret = context.Export("OriginTokenResponse", Nk)
response_nonce = random(max(Nn, Nk))
salt = concat(enc, response_nonce)
prk = Extract(salt, secret)
aead_key = Expand(prk, "key", Nk)
aead_nonce = Expand(prk, "nonce", Nn)
ct = Seal(aead_key, aead_nonce, "", blind_sig)
encrypted_token_response = concat(response_nonce, ct)
]]></artwork>
        <t>Clients decrypt <tt>encrypted_token_response</tt> by reversing this process. That is,
they first parse <tt>enc_response</tt> into <tt>response_nonce</tt> and <tt>ct</tt>. They then
follow the same process to derive values for <tt>aead_key</tt> and <tt>aead_nonce</tt>.</t>
        <t>The client uses these values to decrypt <tt>ct</tt> using the Open function provided by
the AEAD. Decrypting might produce an error, as follows:</t>
        <artwork><![CDATA[
blind_sig, error = Open(aead_key, aead_nonce, "", ct)
]]></artwork>
      </section>
    </section>
    <section anchor="anon-issuer-origin-id">
      <name>Anonymous Issuer Origin ID Computation</name>
      <t>This section describes the Client, Attester, and Issuer behavior in computing
Anonymous Issuer Origin ID, the stable mapping based on client identity and
origin name. At a high level, this functionality computes y = F(x, k), where x
is a per-Client secret and k is a per-Origin secret, subject to the following constraints:</t>
      <ul spacing="normal">
        <li>The Attester only learns y if the Client in possession of x engages with the protocol;</li>
        <li>The Attester prevents a Client with private input x from running the protocol for input x' that is not equal to x;</li>
        <li>The Issuer does not learn x, nor does it learn when two requests correspond to the same private value x; and</li>
        <li>Neither the Client nor Attester learn k.</li>
      </ul>
      <t>The interaction between Client, Attester, and Issuer in computing this
functionality is shown below.</t>
      <artwork><![CDATA[
Client               Attester                Issuer
    (request, signature)
  ---------------------->
                           (request, signature)
                         ---------------------->
                                (response)
                         <----------------------
]]></artwork>
      <t>The protocol for computing this functionality is divided into sections for
each of the participants. <xref target="client-anon-issuer-origin-id"/> describes Client behavior
for initiating the computation with its per-Client secret, <xref target="attester-anon-issuer-origin-id"/>
describes Attester behavior for verifying Client requests, <xref target="issuer-anon-issuer-origin-id"/>
describes Issuer behavior for computing the mapping with its per-Origin secret,
and <xref target="attester-output-anon-issuer-origin-id"/> describes the final Attester step for
computing the client-origin index.</t>
      <t>The index computation is based on a signature scheme with key blinding and unblinding
support, denoted BKS, as described in <xref target="KEYBLINDING"/>. Such a scheme has the following
functions:</t>
      <ul spacing="normal">
        <li>BKS-KeyGen(): Generate a random private and public key pair (sk, pk).</li>
        <li>BKS-BlindKeyGen(): Generate a random blinding key bk.</li>
        <li>BKS-BlindPublicKey(pk, bk): Produce a blinded public key based on the input public
key pk and blind key bk according to <xref target="KEYBLINDING"/>, Section 6.1.</li>
        <li>BKS-Verify(pk, msg, sig): Verify signature sig over input message msg against the
public key pk, producing a boolean value indicating success.</li>
        <li>BKS-BlindKeySign(sk_sign, sk_blind, msg): Sign input message msg with signing key sk_sign and
blind key sk_blind according to <xref target="KEYBLINDING"/>, Section 6.2, and produce a signature of size
<tt>Nsig</tt> bytes.</li>
        <li>BKS-SerializePrivatekey(sk): Serialize a private key to a byte string of length <tt>Nsk</tt>.</li>
        <li>BKS-DeserializePrivatekey(buf): Attempt to deserialize a private key from an <tt>Nsk</tt>-byte
string buf. This function can fail if buf does not represent a valid private key.</li>
        <li>BKS-SerializePublicKey(pk): Serialize a public key to a byte string of length <tt>Npk</tt>.</li>
        <li>BKS-DeserializePublicKey(buf): Attempt to deserialize a public key of length <tt>Npk</tt>.
This function can fail if buf does not represent a valid public key.</li>
      </ul>
      <t>Additionally, each BKS scheme has a corresponding hash function, denoted <tt>Hash</tt>.
The implementation of each of these functions depends on the issuance protocol
token type. See <xref target="iana-token-type"/> for more details.</t>
      <section anchor="client-anon-issuer-origin-id">
        <name>Client Behavior</name>
        <t>This section describes the Client behavior for generating an one-time-use
request key and signature. Clients provide their Client Secret as input
to the request key generation step, and the rest of the token request inputs
to the signature generation step.</t>
        <section anchor="index-request">
          <name>Request Key</name>
          <t>Clients produce <tt>request_key</tt> by masking Client Key and Client Secret with a
randomly chosen blind. Let <tt>pk_sign</tt> and <tt>sk_sign</tt> denote Client Key and
Client Secret, respectively. This process is done as follows:</t>
          <ol spacing="normal" type="1"><li>Generate a random blind key, sk_blind.</li>
            <li>Blind <tt>pk_sign</tt> with <tt>sk_blind</tt> to compute a blinded public key, <tt>request_key</tt>.</li>
            <li>Output the blinded public key.</li>
          </ol>
          <t>In pseudocode, this is as follows:</t>
          <artwork><![CDATA[
sk_blind = BKS-BlindKeyGen()
blinded_key = BKS-BlindPublicKey(pk_sign, sk_blind)
request_key = BKS-SerializePublicKey(blinded_key)
request_blind = BKS-SerializePrivatekey(sk_blind)
]]></artwork>
        </section>
        <section anchor="index-proof">
          <name>Request Signature</name>
          <t>Clients produce a signature of their request by signing its entire contents
consisting of the following values defined in <xref target="request-one"/>:
<tt>token_key_id</tt>, <tt>blinded_msg</tt>, <tt>request_key</tt>, <tt>issuer_encap_key_id</tt>, and <tt>encrypted_token_request</tt>.
This process requires the blind value <tt>sk_blind</tt> produced during the <xref target="index-request"/> process.
As above, let pk and sk denote Client Key and Client Secret, respectively. Given these
values, this signature process works as follows:</t>
          <ol spacing="normal" type="1"><li>Concatenate all signature inputs to yield a message to sign.</li>
            <li>Compute a signature with the blind <tt>sk_blind</tt> over the input message using
Client Secret, <tt>sk_sign</tt> as the signing key.</li>
            <li>Output the signature.</li>
          </ol>
          <t>In pseudocode, this is as follows:</t>
          <artwork><![CDATA[
context = concat(token_type,
                 token_key_id,
                 issuer_encap_key_id,
                 encode(2, len(encrypted_token_request)),
                 encrypted_token_request)
request_signature = BKS-BlindKeySign(sk_sign, sk_blind, context)
]]></artwork>
        </section>
      </section>
      <section anchor="attester-anon-issuer-origin-id">
        <name>Attester Behavior (Client Request Validation)</name>
        <t>Given a TokenRequest request containing <tt>request_key</tt>, <tt>request_signature</tt>, and <tt>request_blind</tt>,
as well as Client Key <tt>pk_blind</tt>, Attesters verify the signature as follows:</t>
        <ol spacing="normal" type="1"><li>Check that <tt>request_key</tt> is a valid public key. If this fails, abort.</li>
          <li>Check that <tt>request_blind</tt> is a valid private key. If this fails, abort.</li>
          <li>Blind the Client Key <tt>pk_sign</tt> by blind <tt>sk_blind</tt>, yielding a blinded key.
If this does not match <tt>request_key</tt>, abort.</li>
          <li>Verify <tt>request_signature</tt> over the contents of the request, excluding the
signature itself, using <tt>request_key</tt>. If signature verification fails, abort.</li>
        </ol>
        <t>In pseudocode, this is as follows:</t>
        <artwork><![CDATA[
blind_key = BKS-DeserializePublicKey(request_key)
sk_blind = BKS-DeserializePrivatekey(request_blind)
pk_blind = BKS-BlindPublicKey(pk_sign, sk_blind)
if pk_blind != blind_key:
  raise InvalidParameterError

context = parse(request[..len(request)-Nsig]) // this matches context computed during signing
valid = BKS-Verify(blind_key, context, request_signature)
if not valid:
  raise InvalidSignatureError
]]></artwork>
      </section>
      <section anchor="issuer-anon-issuer-origin-id">
        <name>Issuer Behavior</name>
        <t>Given an Issuer Origin Secret (denoted <tt>sk_origin</tt>) and a TokenRequest, from which
<tt>request_key</tt> and <tt>request_signature</tt> are parsed, Issuers verify
the request signature and compute a response as follows:</t>
        <ol spacing="normal" type="1"><li>Check that <tt>request_key</tt> is a valid public key. If this fails, abort.</li>
          <li>Verify <tt>request_signature</tt> over the contents of the request, excluding the
signature itself, using <tt>request_key</tt>. If signature verification fails, abort.</li>
          <li>Blind <tt>request_key</tt> by Issuer Origin Secret, <tt>sk_origin</tt>, yielding an index key.</li>
          <li>Output the index key.</li>
        </ol>
        <t>In pseudocode, this is as follows:</t>
        <artwork><![CDATA[
blind_key = BKS-DeserializePublicKey(request_key)
context = parse(request[..len(request)-Nsig]) // this matches context computed during signing
valid = BKS-Verify(blind_key, context, request_signature)
if not valid:
  raise InvalidSignatureError

evaluated_key = BKS-BlindPublicKey(request_key, sk_origin)
index_key = BKS-SerializePublicKey(evaluated_key)
]]></artwork>
      </section>
      <section anchor="attester-output-anon-issuer-origin-id">
        <name>Attester Behavior (Index Computation)</name>
        <t>Given an Issuer response <tt>index_key</tt>, Client blind <tt>sk_blind</tt>, and Client
Key (denoted pk_sign), Attesters complete the Anonymous Issuer Origin ID computation as follows:</t>
        <ol spacing="normal" type="1"><li>Check that <tt>index_key</tt> is a valid public key. If this fails, abort.</li>
          <li>Unblind the <tt>index_key</tt> using the Client blind <tt>sk_blind</tt>, yielding the index result.</li>
          <li>Run HKDF <xref target="RFC5869"/> with the hash function corresponding to the BKS scheme,
using the index result as the secret, Client Key <tt>pk_sign</tt> as the salt, and
ASCII string "anon_issuer_origin_id" as the info string, yielding Anonymous Issuer Origin ID.</li>
        </ol>
        <t>In pseudocode, this is as follows:</t>
        <artwork><![CDATA[
evaluated_key = BKS-DeserializePublicKey(index_key)
unblinded_key = BKS-UnblindPublicKey(evaluated_key, sk_blind)

index_result = BKS-SerializePublicKey(unblinded_key)
pk_encoded = BKS-SerializePublicKey(pk_sign)

anon_issuer_origin_id = HKDF-Hash(secret=index_result,
  salt=pk_encoded, info="anon_issuer_origin_id")
]]></artwork>
      </section>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>This section describes security considerations relevant to the use of this protocol.</t>
      <section anchor="client-secret-use">
        <name>Client Secret Use</name>
        <t>The Client Secret key is used for two purposes in this protocol: (1) computing request
signatures and (2) computing the Anonymous Issuer Origin ID (with the corresponding
public key). This is necessary to ensure the client associated with the Anonymous Issuer
Origin ID is the same client that produced a corresponding request. In general, using
the same cryptographic key for two distinct purposes is considered bad practice.
However, analysis of this protocol demonstrates that it is safe in this context.
The Client Secret MUST NOT be used for any purpose outside of this protocol.</t>
      </section>
      <section anchor="custom-token-request-encapsulation">
        <name>Custom Token Request Encapsulation</name>
        <t>The protocol in this document uses <xref target="HPKE"/> directly to encrypt token request information
to the issuer while also authenticating information exposed to the attester. Oblivious HTTP
<xref target="OHTTP"/>, which is a protocol built on top of HPKE for
request encapsulation, is not suitable for this purpose since it does not allow clients to
additionally authenticate application-layer information that is visible to intermediaries,
which is the case for the data visible to the Attester.</t>
      </section>
      <section anchor="channel-security">
        <name>Channel Security</name>
        <t>An attacker that can act as an intermediate between Attester and Issuer
communication can influence or disrupt the ability for the Issuer to correctly
rate-limit token issuance.  All communication channels use server-authenticated
HTTPS. Some connections, e.g., between an Attester and an Issuer, require
mutual authentication between both endpoints. Where appropriate, endpoints
MAY use further enhancements such as TLS certificate pinning to mitigate
the risk of channel compromise.</t>
      </section>
      <section anchor="issuance-unlinkability">
        <name>Token Request Unlinkability and Unforgeability</name>
        <t>Client token requests are constructed such that an Issuer cannot distinguish between
any two token requests from the same Client and two requests from different Clients.
We refer to this property as issuance unlinkability. This property is achieved
by the way the tokens are constructed. In particular, TokenRequest.request_key and TokenRequest.request_signature
are the only value in a TokenRequest that is derived from per-Client information, i.e.,
the Client Secret.</t>
        <t>TokenRequest.request_key is computed using a freshly generated blind for each token
request. As a result, the value of TokenRequest.request_key in one token request is
statistically independent from Client Key. Similarly, TokenRequest.request_signature
is computed using the same freshly generated blind as TokenRequest.request_key for each
token request, and the resulting signature is therefore independent from signatures
produced using Client Secret. More details about this unlinkability property can be
found in <xref target="KEYBLINDING"/>.</t>
        <t>This unlinkability property is only intended for requests observed by the Issuer.
In contrast, the Attester is required to link requests from the same Client together
for the purposes of enforcing rate limits. This Attester does this by observing the
Client Key. Importantly, the Client Key is not sent to the Issuer during the issuance
flow, as doing this would allow the Issuer to trivially link two requests to the same
Client.</t>
        <t>The token request signature is also required to be unforgeable. Informally, unforgeability
means that no entity can produce a valid (message, signature) pair for any blinding key without
access to the private signing key. Importantly, the means the Attester cannot forge
signatures on behalf of a given Client in an attempt to learn the origin name.</t>
      </section>
      <section anchor="info-disclosure">
        <name>Information Disclosure</name>
        <t>The protocol in this document is designed such that information pertaining to issuance
of a token is limited to parties that need it for completing the protocol. In particular,
honest-but-curious Attesters learn only the Anonymous Issuer Origin ID as described in
<xref target="anon-issuer-origin-id"/>, any per-Client information necessary for attestation, and the
target Issuer for a given token request. The Attester does not directly learn the origin
name associated with a given token request, though it does learn the distribution of tokens
across Client interactions. This auxiliary information could be used to infer the Origin
for a given token. For example, if an Issuer has only two configured Origins, each with
a different token request pattern, then the distribution of Client tokens might reveal
the Origin associated with a given token.</t>
        <t>Malicious or otherwise compromised Attesters can choose to not follow the protocol described
in this specification, allowing, for example, Clients to bypass rate limits imposed by
Origins. Moreover, malicious Attesters could reveal the per-request blind (request_blind)
to Issuers, breaking the unlinkability property described in <xref target="issuance-unlinkability"/>.</t>
        <t>Honest-but-curious Issuers only learn the Attester that vouches for a particular Client's
token request and the origin name associated with a token request. Issuers do not learn
the Anonymous Issuer Origin ID or any per-Client information used when creating a token
request.</t>
        <t>Conversely, malicious Issuers that do not follow the protocol can choose to not validate
the token request signature, thereby allowing others to forge token requests in an attempt
to learn the origin name. Malicious Issuers can also rotate token signing keys or Issuer
Origin Secret values frequently in an attempt to bypass Attester-enforced rate limits.
Both of these are detectable by the Attester, though. Issuers can also lie about per-origin
rate limits without detection, e.g., by increasing the limit to a value well beyond any configured
limit by an Origin, or return different limits for different origins to the Attester.</t>
        <t>Clients learn the output token. They do not learn the Anonymous Issuer Origin ID, though the
security of the protocol does not depend on keeping this value secret from Clients. Moreover,
even malicious Clients cannot tamper with per-Client state stored on the Attester for other
Clients, as doing so requires knowledge of their unique Client Secret.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This section describes privacy considerations relevant to use of this protocol.</t>
      <section anchor="client-token-state-and-origin-tracking">
        <name>Client Token State and Origin Tracking</name>
        <t>Origins SHOULD only generate token challenges based on client action, such as when a user
loads a website. Clients SHOULD ignore token challenges if an Origin tries to force the
client to present tokens multiple times without any new client-initiated action. Failure
to do so can allow malicious origins to track clients across contexts. Specifically, an
origin can abuse per-user token limits for tracking by assigning each new client a random
token count and observing whether or not the client can successfully redeem that many
tokens in a given context. If any token redemption fails, then the origin learns information
about how many tokens that client had previously been issued.</t>
        <t>By rejecting repeated or duplicative challenges within a single context, the origin only
learns a single bit of information: whether or not the client had any token quota left
in the given policy window.</t>
      </section>
      <section anchor="origin-verification">
        <name>Origin Verification</name>
        <t>Rate-limited tokens are defined in terms of a Client authenticating to an Origin, where
the "origin" is used as defined in <xref target="RFC6454"/>. In order to limit cross-origin correlation,
Clients MUST verify that the name of the origin that is providing the HTTP authentication
challenge is present in the TokenChallenge.origin_info list (<xref target="AUTHSCHEME"/>), where the
matching logic is defined for same-origin policies in <xref target="RFC6454"/>. Clients MAY further limit
which authentication challenges they are willing to respond to, for example by only accepting
challenges when the origin is a web site to which the user navigated.</t>
      </section>
      <section anchor="client-identification-with-unique-encapsulation-keys">
        <name>Client Identification with Unique Encapsulation Keys</name>
        <t>Client activity could be linked if an Origin and Issuer collude to have unique keys targeted
at specific Clients or sets of Clients.</t>
        <t>As with the basic issuance protocol <xref target="ISSUANCE"/>, the token_key_id is truncated to a single
octet to mitigate the risk of unique keys per client.</t>
        <t>To mitigate the risk of a targeted Issuer Encapsulation Key, the Attester can observe and validate
the issuer_encap_key_id presented by the Client to the Issuer. As described in <xref target="request-one"/>, Attesters
MUST validate that the issuer_encap_key_id in the Client's TokenRequest matches a known Issuer
Encapsulation Key public key for the Issuer. The Attester needs to support key rotation, but
ought to disallow very rapid key changes, which could indicate that an Origin is colluding with
an Issuer to try to rotate the key for each new Client in order to link the client activity.</t>
      </section>
      <section anchor="origin-identification">
        <name>Origin Identification</name>
        <t>As stated in <xref target="properties"/>, the design of this protocol is such that Attesters cannot
learn the identity of origins that Clients are accessing. The Origin Name itself is
encrypted in the request between the Client and the Issuer, so the Attester cannot
directly learn the value. However, in order to prevent the Attester from inferring the
value, additional constraints need to be added:</t>
        <ul spacing="normal">
          <li>Each Issuer SHOULD serve tokens to a large number of Origins. A one-to-one relationship
between Origin and Issuer would allow an Attester to infer which Origin is accessed
simply by observing the Issuer identity.</li>
          <li>Issuers SHOULD NOT return rate-limit values that are specific to Origins, such
that an Attester can infer which Origin is accessed by observing the rate limit. This
can be mitigated by having many Origins share the same rate-limit value.</li>
          <li>If an Issuer changes the rate-limit values for a single Origin, that change occurring
at the same time across multiple Clients could allow Attesters to recognize an Origin
in common across Clients. To mitigate this, Issuers either can change the limits for
multiple Origins simultaneously, or have an Origin switch to a separate Issuer.</li>
        </ul>
        <t>Some deployments MAY choose to relax these requirements, such as in cases where the
origins being accessed are ubiquitous or do not correspond to user-specific behavior.</t>
      </section>
      <section anchor="collusion">
        <name>Collusion Among Different Entities</name>
        <t>Collusion among the different entities in the Privacy Pass architecture can result in
exposure of a client's per-origin access patterns.</t>
        <t>For this issuance protocol, Issuers and Attesters should be run by mutually distinct
organizations to limit information sharing. A single entity running an Issuer and Attester
for a single token issuance flow can view the origins being accessed by a given client.
Running the Issuer and Attester in this 'single Issuer/Attester' fashion reduces the privacy
promises of no one entity being able to learn Client browsing patterns. This may be desirable
for a redemption flow that is limited to specific Issuers and Attesters, but should be avoided
where hiding origin names from the Attester is desirable.</t>
        <t>If a Attester and Origin are able to collude, they can correlate a client's identity
and origin access patterns through timestamp correlation. The timing of a request to an
Origin and subsequent token issuance to a Attester can reveal the Client
identity (as known to the Attester) to the Origin, especially if repeated over multiple accesses.</t>
      </section>
    </section>
    <section anchor="deploy">
      <name>Deployment Considerations</name>
      <section anchor="token-key-management">
        <name>Token Key Management</name>
        <t>Issuers SHOULD generate a new (Token Key, Issuer Origin Secret) regularly, and
SHOULD maintain old and new secrets to allow for graceful updates. The RECOMMENDED
rotation interval is two times the length of the policy window for that
information. During generation, issuers must ensure the <tt>token_key_id</tt> (the 8-bit
prefix of SHA256(Token Key)) is different from all other <tt>token_key_id</tt>
values for that origin currently in rotation. One way to ensure this uniqueness
is via rejection sampling, where a new key is generated until its <tt>token_key_id</tt> is
unique among all currently in rotation for the origin.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="iana-token-type">
        <name>Token Type</name>
        <t>This document updates the "Token Type" Registry (<xref target="AUTHSCHEME"/>) with the following value:</t>
        <table anchor="aeadid-values">
          <name>Token Types</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Name</th>
              <th align="left">Publicly Verifiable</th>
              <th align="left">Public Metadata</th>
              <th align="left">Private Metadata</th>
              <th align="left">Nk</th>
              <th align="left">Nid</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0003</td>
              <td align="left">Rate-Limited Blind RSA(SHA-384, 2048-bit) with ECDSA(P-384, SHA-384)</td>
              <td align="left">Y</td>
              <td align="left">N</td>
              <td align="left">N</td>
              <td align="left">512</td>
              <td align="left">32</td>
              <td align="left">This document</td>
            </tr>
            <tr>
              <td align="left">0x0004</td>
              <td align="left">Rate-Limited Blind RSA(SHA-384, 2048-bit) with Ed25519(SHA-512)</td>
              <td align="left">Y</td>
              <td align="left">N</td>
              <td align="left">N</td>
              <td align="left">512</td>
              <td align="left">32</td>
              <td align="left">This document</td>
            </tr>
          </tbody>
        </table>
        <t>The details of the signature scheme with key blinding and unblinding functions for each token type above are described in the following sections.</t>
        <section anchor="ecdsa-sig-functions">
          <name>ECDSA-based Token Type</name>
          <t>This section describes the implementation details of the signature scheme with key
blinding and unblinding functions introduced in <xref target="anon-issuer-origin-id"/> using
<xref target="ECDSA"/> with P-384 as the underlying elliptic curve and SHA-384 as the corresponding
hash function.</t>
          <ul spacing="normal">
            <li>BKS-KeyGen(): Generate a random ECDSA private and public key pair (sk, pk).</li>
            <li>BKS-BlindKeyGen(): Generate a random ECDSA private key bk.</li>
            <li>BKS-BlindPublicKey(pk, bk): Produce a blinded public key based on the input public
key pk and blind bk according to <xref target="KEYBLINDING"/>, Section 6.1.</li>
            <li>BKS-Verify(pk, msg, sig): Verify the DER-encoded <xref target="X690"/> BKS-Sig-Value signature
sig over input message msg against the ECDSA public key pk, producing a boolean value indicating success.</li>
            <li>BKS-BlindKeySign(sk_sign, sk_blind, msg): Sign input message msg with signing key sk_sign and
blind sk_blind according to <xref target="KEYBLINDING"/>, Section 6.2, and serializes the resulting signature
pair (r, s) in "raw" form, i.e., as the concatenation of two 48-byte, big endian scalars,
yielding an <tt>Nsig=96</tt> byte signature.</li>
            <li>BKS-SerializePrivatekey(sk): Serialize an ECDSA private key using the Field-Element-to-Octet-String
conversion according to <xref target="SECG"/>.</li>
            <li>BKS-DeserializePrivatekey(buf): Attempt to deserialize an ECDSA private key from a 48-byte
string buf using Octet-String-to-Field-Element from <xref target="SECG"/>. This function can fail if buf
does not represent a valid private key.</li>
            <li>BKS-SerializePublicKey(pk): Serialize an ECDSA public key using the
compressed Elliptic-Curve-Point-to-Octet-String method according to <xref target="SECG"/>.</li>
            <li>BKS-DeserializePublicKey(buf): Attempt to deserialize a public key using
the compressed Octet-String-to-Elliptic-Curve-Point method according to <xref target="SECG"/>,
and then performs partial public-key validation as defined in section 5.6.2.3.4 of
<xref target="KEYAGREEMENT"/>. This validation includes checking
that the coordinates are in the correct range, that the point is on the curve, and
that the point is not the point at infinity.</li>
          </ul>
        </section>
        <section anchor="eddsa-sig-functions">
          <name>Ed25519-based Token Type</name>
          <t>This section describes the implementation details of the signature scheme with key
blinding and unblinding functions introduced in <xref target="anon-issuer-origin-id"/> using
Ed25519 as described in <xref target="RFC8032"/>.</t>
          <ul spacing="normal">
            <li>BKS-KeyGen(): Generate a random Ed25519 private and public key pair (sk, pk), where
sk is randomly generated 32 bytes (See <xref target="RFC4086"/> for information about randomness
generation) and pk is computed according to <xref section="5.1.5" sectionFormat="comma" target="RFC8032"/>.</li>
            <li>BKS-BlindKeyGen(): Generate and output 32 random bytes.</li>
            <li>BKS-BlindPublicKey(pk, bk): Produce a blinded public key based on the input public
key pk and blind bk according to <xref section="5.1" sectionFormat="comma" target="KEYBLINDING"/>.</li>
            <li>BKS-Verify(pk, msg, sig): Verify the signature sig over input message msg against
the Ed25519 public key pk, as defined in <xref section="5.1.7" sectionFormat="comma" target="RFC8032"/>, producing a
boolean value indicating success.</li>
            <li>BKS-BlindKeySign(sk_sign, sk_blind, msg): Sign input message msg with signing key sk_sign and
blind sk_blind according to <xref section="5.2" sectionFormat="comma" target="KEYBLINDING"/>, yielding an <tt>Nsig=64</tt> byte signature.</li>
            <li>BKS-SerializePrivatekey(sk): Identity function which outputs sk as an <tt>Nsk=32</tt> byte buffer.</li>
            <li>BKS-DeserializePrivatekey(buf): Identity function which outputs buf interpreted as <tt>sk</tt>.</li>
            <li>BKS-SerializePublicKey(pk): Identity function which outputs pk as an <tt>Npk=32</tt> byte buffer.</li>
            <li>BKS-DeserializePublicKey(buf): Identity function which outputs buf interpreted as <tt>pk</tt>.</li>
          </ul>
        </section>
      </section>
      <section anchor="iana-headers">
        <name>HTTP Headers</name>
        <t>This document registers four new headers for use on the token issuance path
in the "Permanent Message Header Field Names" &lt;<eref target="https://www.iana.org/assignments/message-headers"/>&gt;.</t>
        <figure anchor="iana-header-type-table">
          <name>Registered HTTP Header</name>
          <artwork><![CDATA[
    +-------------------------+----------+--------+---------------+
    | Header Field Name       | Protocol | Status |   Reference   |
    +-------------------------+----------+--------+---------------+
    | Sec-Token-Origin        |   http   |  std   | This document |
    +-------------------------+----------+--------+---------------+
    | Sec-Token-Client        |   http   |  std   | This document |
    +-------------------------+----------+--------+---------------+
    | Sec-Token-Request-Blind |   http   |  std   | This document |
    +-------------------------+----------+--------+---------------+
    | Sec-Token-Request-Key   |   http   |  std   | This document |
    +-------------------------+----------+--------+---------------+
    | Sec-Token-Limit         |   http   |  std   | This document |
    +-------------------------+----------+--------+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ISO/IEC 8824-1:2021" value=""/>
        </reference>
        <reference anchor="ECDSA">
          <front>
            <title>Public Key Cryptography for the Financial Services Industry - The Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author>
              <organization>American National Standards Institute</organization>
            </author>
            <date year="2005" month="November"/>
          </front>
          <seriesInfo name="ANSI" value="ANS X9.62-2005"/>
        </reference>
        <reference anchor="SECG" target="https://secg.org/sec1-v2.pdf">
          <front>
            <title>Elliptic Curve Cryptography, Standards for Efficient Cryptography Group, ver. 2</title>
            <author>
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="ARCH">
          <front>
            <title>Privacy Pass Architectural Framework</title>
            <author fullname="Alex Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies the architectural framework for constructing
   secure and anonymity-preserving instantiations of the Privacy Pass
   protocol.  It provides recommendations on how the protocol ecosystem
   should be constructed to ensure the privacy of clients, and the
   security of all participating entities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-05"/>
        </reference>
        <reference anchor="ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofía Celi">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Alex Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Armando Faz-Hernandez">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Steven Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="1" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies two variants of the the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable, and another that produces tokens that are
   publicly verifiable.  The privately verifiable issuance protocol
   optionally supports public metadata during the issuance flow.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-05"/>
        </reference>
        <reference anchor="BLINDSIG">
          <front>
            <title>RSA Blind Signatures</title>
            <author fullname="Frank Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Frederic Jacobs">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="2" month="February" year="2022"/>
            <abstract>
              <t>   This document specifies the RSA-based blind signature protocol with
   appendix (RSA-BSSA).  RSA blind signatures were first introduced by
   Chaum for untraceable payments [Chaum83].  It extends RSA-PSS
   encoding specified in [RFC8017] to enable blind signature support.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/chris-wood/draft-wood-cfrg-blind-signatures.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-rsa-blind-signatures-03"/>
        </reference>
        <reference anchor="AUTHSCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="1" month="July" year="2022"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme that can be used
   by clients to redeem Privacy Pass tokens with an origin.  It can also
   be used by origins to challenge clients to present an acceptable
   Privacy Pass token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="HPKE">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author fullname="B. Lipp" initials="B." surname="Lipp">
              <organization/>
            </author>
            <author fullname="C. Wood" initials="C." surname="Wood">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
        <reference anchor="KEYBLINDING">
          <front>
            <title>Key Blinding for Signature Schemes</title>
            <author fullname="Frank Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Edward Eaton">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Christopher A. Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="21" month="June" year="2022"/>
            <abstract>
              <t>   This document describes extensions to existing digital signature
   schemes for key blinding.  The core property of signing with key
   blinding is that a blinded public key and all signatures produced
   using the blinded key pair are independent of the unblinded key pair.
   Moreover, signatures produced using blinded key pairs are
   indistinguishable from signatures produced using unblinded key pairs.
   This functionality has a variety of applications, including Tor onion
   services and privacy-preserving airdrop for bootstrapping
   cryptocurrency systems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-signature-key-blinding-00"/>
        </reference>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth">
              <organization/>
            </author>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents.  Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites.  In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string.  It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC8941">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P-H. Kamp" initials="P-H." surname="Kamp">
              <organization/>
            </author>
            <date month="February" year="2021"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8941"/>
          <seriesInfo name="DOI" value="10.17487/RFC8941"/>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Hadley" initials="M." surname="Hadley">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="D. Orchard" initials="D." surname="Orchard">
              <organization/>
            </author>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="KEYAGREEMENT">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="National Institute of Standards and Technology" value="report"/>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="OHTTP">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd">
              <organization/>
            </author>
            <author fullname="J. Schiller" initials="J." surname="Schiller">
              <organization/>
            </author>
            <author fullname="S. Crocker" initials="S." surname="Crocker">
              <organization/>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts.  However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities.  The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult.  This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities.  It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors of this document would like to acknowledge feedback from contributors
to the Privacy Pass working group for their help in improving this document.
The authors also thank Frank Denis and David Schinazi for their contributions.</t>
    </section>
    <section anchor="test-vectors">
      <name>Test Vectors</name>
      <t>This section includes test vectors for Origin Name encryption in <xref target="encrypt-origin"/>
and Anonymous Origin ID computation in <xref target="anon-issuer-origin-id"/>. Test vectors for
the token request and response protocol can be found in <xref target="ISSUANCE"/>.</t>
      <section anchor="origin-name-encryption-test-vector">
        <name>Origin Name Encryption Test Vector</name>
        <t>The test vector below for the procedure in <xref target="encrypt-origin"/> lists the following values:</t>
        <ul spacing="normal">
          <li>origin_name: The Origin Name to encrypt, represented as a hexadecimal string.</li>
          <li>kem_id, kdf_id, aead_id: The HPKE algorithms comprising the ciphersuite DHKEM(X25519, HKDF-SHA256), HKDF-SHA256, AES-128-GCM.</li>
          <li>issuer_encap_key_seed: The seed used to derive the private key corresponding to
Issuer Encapsulation Key via the DeriveKeyPair function as defined in <xref section="7.1.3." sectionFormat="of" target="HPKE"/>,
represented as a hexadecimal string.</li>
          <li>issuer_encap_key: The public Issuer Encapsulation Key, represented as a hexadecimal string.</li>
          <li>token_type: The type of the protocol specified in this document.</li>
          <li>token_key_id: The ID of Token Key computed as in <xref target="request-one"/>, a single octet.</li>
          <li>blinded_msg: A random blinded_msg value, represented as a hexadecimal string.</li>
          <li>request_key: A random request_key value, represented as a hexadecimal string.</li>
          <li>issuer_encap_key_id: The Issuer Encapsulation Key ID computed as in <xref target="request-one"/>, represented as a hexadecimal string.</li>
          <li>encrypted_token_request: The encrypted InnerTokenRequest, represented as a hexadecimal string.</li>
        </ul>
        <artwork><![CDATA[
origin_name: 746573742e6578616d706c65
kem_id: 32
kdf_id: 1
aead_id: 1
issuer_encap_key_seed:
d2653816496f400baec656f213f1345092f4406af4f2a63e164956c4c3d240ca
issuer_encap_key: 010020d7b6a2c10e75c4239feb9897e8d23f3f3c377d78e7903611
53167736a24a9c5400010001
token_type: 3
token_key_id: 125
blinded_msg: 89da551a48270b053e53c9eb741badf89e43cb7e66366bb936e11fb2aa0
d30866986a790378bb9fc6a7cf5c32b7b7584d448ffa4ced3be650e354b3136428a52ec0
b27c4103c5855c2b9b4f521ad0713c800d7e6925b6c62e1a6f58b31d13335f468cf509b7
46a16e79b23862d277d0880706c3fb84b127d94faf8d6d2f3e124e681994441b19be084e
c5c159bcd0abab433bbc308d90ea2cabdf4216e1b07155be66a048d686e383ca1e517ab8
0025bb4849d98beb8c3d05d045c1167cb74f4451d8f85695babb604418385464f21f9a81
5fb850ed83fd16a966130427e5637816501f7a79c0010e06adeba55781ceb50f56eae152
ebd06f3cef80dc7ab121d
request_key: 0161d905e4e37f515cb61f863b60e5896aa9e4a17dbe238e752a144c64a
5412e244f0b1f75e010831e185cac023d33cb20
issuer_encap_key_id:
dd2c6de3091f1873643233d229a7a0e9defe0f9fe43f6a7c42ae3a6b16f77837
encrypted_token_request: 82ef7c068506bcabc27d068a51c7ead2cbaf600b76a15e4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]]></artwork>
      </section>
      <section anchor="anonymous-origin-id-test-vector">
        <name>Anonymous Origin ID Test Vector</name>
        <t>The test vector below for the procedure in <xref target="anon-issuer-origin-id"/> lists the following values:</t>
        <ul spacing="normal">
          <li>sk_client: Client Secret, serialized and represented as a hexadecimal string.</li>
          <li>pk_client: Client Key, serialized and represented as a hexadecimal string.</li>
          <li>sk_origin: Origin Secret, serialized and represented as a hexadecimal string.</li>
          <li>request_blind: The request_blind value computed in <xref target="index-request"/>, represented as a hexadecimal string.</li>
          <li>index_key: The index_key value computed in <xref target="issuer-anon-issuer-origin-id"/>, represented as a hexadecimal string.</li>
          <li>anon_issuer_origin_id: The anon_issuer_origin_id value computed in <xref target="attester-output-anon-issuer-origin-id"/>, represented as a hexadecimal string.</li>
        </ul>
        <artwork><![CDATA[
sk_sign: f6e6a0c9de38663ca539ff2e6a04e4fca11dc569794dc405e2d17439d6ce4f6
7abb2b81a1852e0db993b6a0452eb60d6
pk_sign: 032db7483c710673e6999a5fb2a2c6eac1d891f89bbf58d985ff168d182ad51
605c4369280efabb7692f661162e683f03c
sk_origin: 85de5fbbd787da5093da0adb240eba0cc6ea90d72032fc4b6925dd7d0ab1d
a1e5ae0be27fe9f59e9ec7e1f1b15b28696
request_blind: 0698a149fb9d16bcb0a856062f74f9191e82b35e91224a57abce60f5b
79f03a669c6b5e093d57e647865f9fd4305b5a9
request_key: 0287b0ce6b957111263d8c6126af96d400bd5a9d0b0f62ade15ab789446
06c209470ced7086d3c418dd32bf9245fd42678
index_key: 03188bec3dc02d2382b5251b6b4fd729d0472bbddf008c5e93b7c12270d9f
57dde111c861c13be53822a1cebb604946066
anon_issuer_origin_id: 9b0f980e5c1142fddb4401e5cd2107a87d22b73753b0d5dc9
3f9a8f5ed2ee7db78163c6a93cc41ae8158d562381c51ee
]]></artwork>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
