<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-oblivious-credential-state-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title>Oblivious Credential State</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-oblivious-credential-state-00"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <date year="2024" month="January" day="13"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>credential status</keyword>
    <keyword>privacy preserving</keyword>
    <keyword>oblivious</keyword>
    <abstract>
      <?line 55?>

<t>Issuers of Digital Credentials enable dynamic state or status checks through the use of dereferenceable identifiers, that resolve to resources providing herd privacy.
Privacy in such systems is determined not just from the size of the herd, and the cryptographic structure encoding it, but also from the observability of access to shared state.
This document describes a privacy preserving state management system for digital credentials based on Oblivious HTTP that addresses both data model and protocol risks associated with digital credentials with dynamic state.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-oblivious-credential-state/draft-steele-spice-oblivious-credential-state.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-oblivious-credential-state/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-oblivious-credential-state"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Digitial Credentials often have a validity period, which indicates the time at which the claims become active for the subject according to the issuer, and the time at which the issuer specifies the claims are no longer to be considered asserted by the issuer.</t>
      <t>A typical example is a digital drivers license, which has an activation date, and an expiration date.</t>
      <t>When the activation date is in the past, and the expiration date is in the future, we consider the license to be valid at the current time.</t>
      <t>A verifier might wonder if such licenses are suspended or revoked, even if the validity period is acceptable.</t>
      <t>A common solution is to the issuer of the credential to provide a resource that reflects information about the state of the credential over time.</t>
      <t>Because issuer's track the presentation of digital credentials if a verifier where to ask the issuer about the state of a specific digital credential, it common to see credential states be merged into blocks, or herds, where an issuer can deliver the block to the verifier upon request, without learning which specific digital credential the verifier is interested in.</t>
      <t>Unfortunatly, the metadata associated with resolving credential state can leak time and location information about the presentation of credentials over time.</t>
      <t>This document addresses this risk by introducing a mediator which is trusted by the verifier.</t>
    </section>
    <section anchor="credential-state">
      <name>Credential State</name>
      <t>To simplify interpretation of resolution of credential state resources, this document uses the following aliases for the terms defined in <xref target="RFC9458"/>.</t>
      <t>The <tt>Verifier's Software</tt> is the <tt>Oblivious HTTP Client</tt>.</t>
      <t>The <tt>Mediator's Credential State Resource</tt> is the <tt>Oblivious Relay Resource</tt>.</t>
      <t>The <tt>Issuer's Gateway Resource</tt> is the <tt>Gateway Resource</tt>.</t>
      <t>The <tt>Issuer's Credential State Resource</tt> is the <tt>Target Resource</tt>.</t>
      <t>The critical privacy property is obtained by the verifier's client relying on the <tt>Mediator's Credential State Resource</tt> instead of <tt>Issuer's Credential State Resource</tt>.</t>
      <t>In order to achieve this property, while preserving the property that issuer's do not know which verifier's will be interested in dynamic state information associated with their credentials, the issuer includes the identifier for their <tt>Issuer's Credential State Resource</tt> in their credential claim sets, however the verifier rewrites this URL to be their <tt>Mediator's Credential State Resource</tt> before resolution.</t>
      <t>Editor note: is there a simpler solution here?</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="80" width="416" viewBox="0 0 416 80" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 168,32 L 168,64" fill="none" stroke="black"/>
            <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
            <path d="M 24,32 L 80,32" fill="none" stroke="black"/>
            <path d="M 168,32 L 256,32" fill="none" stroke="black"/>
            <path d="M 344,32 L 392,32" fill="none" stroke="black"/>
            <path d="M 104,48 L 160,48" fill="none" stroke="black"/>
            <path d="M 264,48 L 320,48" fill="none" stroke="black"/>
            <path d="M 24,64 L 80,64" fill="none" stroke="black"/>
            <path d="M 168,64 L 256,64" fill="none" stroke="black"/>
            <path d="M 344,64 L 392,64" fill="none" stroke="black"/>
            <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
            <path d="M 80,32 C 88.83064,32 96,39.16936 96,48" fill="none" stroke="black"/>
            <path d="M 344,32 C 335.16936,32 328,39.16936 328,48" fill="none" stroke="black"/>
            <path d="M 392,32 C 400.83064,32 408,39.16936 408,48" fill="none" stroke="black"/>
            <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
            <path d="M 80,64 C 88.83064,64 96,56.83064 96,48" fill="none" stroke="black"/>
            <path d="M 344,64 C 335.16936,64 328,56.83064 328,48" fill="none" stroke="black"/>
            <path d="M 392,64 C 400.83064,64 408,56.83064 408,48" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="328,48 316,42.4 316,53.6" fill="black" transform="rotate(0,320,48)"/>
            <polygon class="arrowhead" points="272,48 260,42.4 260,53.6" fill="black" transform="rotate(180,264,48)"/>
            <polygon class="arrowhead" points="168,48 156,42.4 156,53.6" fill="black" transform="rotate(0,160,48)"/>
            <polygon class="arrowhead" points="112,48 100,42.4 100,53.6" fill="black" transform="rotate(180,104,48)"/>
            <g class="text">
              <text x="52" y="52">Verifier</text>
              <text x="212" y="52">Mediator</text>
              <text x="364" y="52">Issuer</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
 .--------.         +----------+         .-------.
| Verifier +<------>+ Mediator +<------>+ Issuer  |
 '--------'         +----------+         '-------'
]]></artwork>
      </artset>
      <section anchor="identifier">
        <name>Identifier</name>
        <t>While many different protocol schemes can be used to identify resources, to improve interoperability and reduce attack surface, this document requires credential state resources to be identified with https URLS, as described in <xref target="WHATWG.URL"/>.</t>
        <t>The following URI Templates, as described in <xref target="RFC6570"/> are required to improve interoperability and reduce the chances of degrading the privacy properties through the inclusion of extraneos information in the identifiers embedded in credentials.</t>
        <ul spacing="normal">
          <li>
            <t><tt>issuer</tt> <bcp14>MUST</bcp14> support internationalizaton considerations, as described in <xref target="WHATWG.URL"/>, for example: <tt>🏛️.example</tt></t>
          </li>
          <li>
            <t><tt>mediator</tt> <bcp14>MUST</bcp14> support internationalizaton considerations, as described in <xref target="WHATWG.URL"/>, for example: <tt>🚛.example</tt></t>
          </li>
          <li>
            <t><tt>resource-name</tt> <bcp14>MUST</bcp14> be a URN as described in <xref target="RFC4122"/>, for example: <tt>urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt></t>
          </li>
        </ul>
        <section anchor="issuers-credential-state-resource">
          <name>Issuer's Credential State Resource</name>
          <artwork><![CDATA[
https://{issuer}\
/credential-states/{resource-name}
]]></artwork>
          <figure anchor="example-issuer-credential-state-resource-urls">
            <name>Issuer Credential State Resources</name>
            <artwork align="left"><![CDATA[
https://🏛️.example\
/credential-states/urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6
]]></artwork>
          </figure>
        </section>
        <section anchor="mediators-credential-state-resource">
          <name>Mediator's Credential State Resource</name>
          <artwork><![CDATA[
https://{issuer}.{mediator}\
/credential-states/{resource-name}
]]></artwork>
          <figure anchor="example-mediator-credential-state-resource-urls">
            <name>Mediator Credential State Resources</name>
            <artwork align="left"><![CDATA[
https://🏛️.example.🚛.example\
/credential-states/urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="resources">
        <name>Resources</name>
        <t>Credential state resources typically rely on a similar content type as the credentials that require them.</t>
        <t>Mixing different content types for credentials and their state, increases implementation costs and harms interoperability.</t>
        <t>The credential state resource <bcp14>MUST</bcp14> be secured with the same content type that was used to secure the digital credential that has dynamic state.</t>
        <t>For example, a JSON Web Token, <xref target="RFC7519"/> based digital credential must rely on a <xref target="RFC7519"/> based credential state resource.</t>
        <t>There are many different content types that can be used to secure digital credentials, this document does not require a specific content type to be used.</t>
        <t>The <tt>Accept</tt> header <bcp14>MUST</bcp14> be supported, and the <tt>application/cose</tt> content type <bcp14>SHOULD</bcp14> be supported.</t>
      </section>
      <section anchor="processing-credential-state-resources">
        <name>Processing Credential State Resources</name>
        <t>Validation of the digital credential state <bcp14>MUST</bcp14> occur after verification.</t>
        <t>Validation of the digital credential validity period <bcp14>MUST</bcp14> occur before credential state checks.</t>
        <t>Implementers are cautioned that concepts like "suspended" or "revoked" are interpretted differently and used differently by issuers.</t>
        <t>All dynamic claims provided through credential state resources <bcp14>MUST</bcp14> be considered issuer defined, and cannot be interpretted globally.</t>
        <t>Interpretting the structure of the <tt>Issuer's Credential State Resource</tt> is outside the scope of this document.</t>
        <t>However, other documents describe this process in detail.</t>
        <t><xref target="W3C.VC-BITSTRING-STATUS-LIST"/> provides guidance on processing resources that secure the content type <tt>application/vc+ld+json</tt>, such as <tt>application/cose</tt>.</t>
        <t><xref target="I-D.draft-ietf-oauth-status-list"/> provides guidance on processing resources of the content type <tt>application/cwt</tt>, and <tt>application/jwt</tt>.</t>
      </section>
      <section anchor="techniques">
        <name>Techniques</name>
        <section anchor="crl-distribution-points">
          <name>CRL Distribution Points</name>
          <t><xref target="RFC5755"/> described a mechanism for verifiers to check the revocation status of attribute certificates.</t>
        </section>
        <section anchor="online-certificate-status-protocol">
          <name>Online Certificate Status Protocol</name>
          <t><xref target="RFC2560"/> described a protocol useful in determining the current status of a digital certificate without requiring CRLs.</t>
        </section>
        <section anchor="bitmaps">
          <name>Bitmaps</name>
          <t>In this approach, the size of the herd is the length of the bitmap, and the state of a digital credential claim is the value of the bit at a given index.</t>
          <t>Scaling this approach can be difficult, as a seperate list is needed for each dynamic claim in a digital credential.</t>
          <t>This scalling challenge can be partially addressed by consuming multiple bits at a given index, however, the resulting enumeration needs to be consistently understood.</t>
          <t>A common solution to consistent interpretation of enumerations is the establishment of a registry, however this can become impractical depending on the nature of the issuer's need to express dynamic state.</t>
          <t>Publishing a dictionary per issuer, or per sets of issuer's can help address these challenges for some use cases.</t>
        </section>
        <section anchor="cryptographic-accumulators">
          <name>Cryptographic Accumulators</name>
          <t><xref target="ZKA"/> describes an approach to expressing proofs of set membership.</t>
        </section>
        <section anchor="bloom-filters">
          <name>Bloom Filters</name>
          <t><xref section="B.2.7" sectionFormat="of" target="RFC8932"/> mentions an application of bloom filters, that can be applied to communicating credential state assuming the probabilistic nature of bloom filters is acceptable to the verifier.</t>
        </section>
        <section anchor="transparency-services">
          <name>Transparency Services</name>
          <t>Tree structures, such as described in <xref target="I-D.draft-mcmillion-keytrans-architecture"/> can be used to provide advanced membership proofs, such as proving inclusion, consistency, non inclusion, and freshness.</t>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4122">
          <front>
            <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4122"/>
          <seriesInfo name="DOI" value="10.17487/RFC4122"/>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="WHATWG.URL" target="https://url.spec.whatwg.org/">
          <front>
            <title>URL - Living Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8932">
          <front>
            <title>Recommendations for DNS Privacy Service Operators</title>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="B. Overeinder" initials="B." surname="Overeinder"/>
            <author fullname="R. van Rijswijk-Deij" initials="R." surname="van Rijswijk-Deij"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="October" year="2020"/>
            <abstract>
              <t>This document presents operational, policy, and security considerations for DNS recursive resolver operators who choose to offer DNS privacy services. With these recommendations, the operator can make deliberate decisions regarding which services to provide, as well as understanding how those decisions and the alternatives impact the privacy of users.</t>
              <t>This document also presents a non-normative framework to assist writers of a Recursive operator Privacy Statement, analogous to DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements described in RFC 6841.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="232"/>
          <seriesInfo name="RFC" value="8932"/>
          <seriesInfo name="DOI" value="10.17487/RFC8932"/>
        </reference>
        <reference anchor="RFC2560">
          <front>
            <title>X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP</title>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <author fullname="R. Ankney" initials="R." surname="Ankney"/>
            <author fullname="A. Malpani" initials="A." surname="Malpani"/>
            <author fullname="S. Galperin" initials="S." surname="Galperin"/>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <date month="June" year="1999"/>
            <abstract>
              <t>This document specifies a protocol useful in determining the current status of a digital certificate without requiring CRLs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2560"/>
          <seriesInfo name="DOI" value="10.17487/RFC2560"/>
        </reference>
        <reference anchor="RFC5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications. This document obsoletes RFC 3281. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="I-D.draft-mcmillion-keytrans-architecture">
          <front>
            <title>Key Transparency Architecture</title>
            <author fullname="Brendan McMillion" initials="B." surname="McMillion">
         </author>
            <date day="4" month="December" year="2023"/>
            <abstract>
              <t>   This document defines the terminology and interaction patterns
   involved in the deployment of Key Transparency (KT) in a general
   secure group messaging infrastructure, and specifies the security
   properties that the protocol provides.  It also gives more general,
   non-prescriptive guidance on how to securely apply KT to a number of
   common applications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mcmillion-keytrans-architecture-01"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-status-list">
          <front>
            <title>OAuth Status List</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
         </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
         </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This specification defines status list data structures for
   representing the status of JSON Web Tokens (JWTs) [RFC7519] and CBOR
   Web Tokens (CWTs) [RFC8392].  The status list data structures
   themselves are also represented as JWTs or CWTs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-00"/>
        </reference>
        <reference anchor="ZKA" target="https://eprint.iacr.org/2015/404.pdf">
          <front>
            <title>Zero-Knowledge Accumulators and Set Operations</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="W3C.VC-BITSTRING-STATUS-LIST" target="https://www.w3.org/TR/vc-bitstring-status-list/">
          <front>
            <title>Bitstring Status List v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 242?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
