<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-transparency-tokens-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="SpiceTT">Transparency Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-transparency-tokens-00"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <date year="2024" month="January" day="07"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <keyword>cose</keyword>
    <keyword>jose</keyword>
    <keyword>transparency</keyword>
    <keyword>selective disclosure</keyword>
    <keyword>unlinkability</keyword>
    <keyword>untraceability</keyword>
    <abstract>
      <?line 57?>

<t>When professionals travel for business, they carry identity documents,
such as passports,
employer related payment capabilites,
such as corporate credit cards, and
security keys that might be used for both personal or professional reasons,
such as hotel or car keys.</t>
      <t>These credentials might be stored in a purse, briefcase or wallet.</t>
      <t>Digital storage systems struggle to support the various credential formats,
physical proximity and remote presentation protocols,
and assurance capabilities needed to enable international business.</t>
      <t>Device capabilities, cost and power consumption can preclude
access and adoption of digital credentials, or exclude communities
that require higher than normal privacy, sustainability, or availability guarantees.</t>
      <t>This specification describes a scalable solution to digital credentials,
that is market friendly, transport agnostic, privacy oriented,
and accountable to users of digital credentials above all other stakeholders.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-transparency-tokens/draft-steele-transparency-tokens.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-transparency-tokens/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials (spice) Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-transparency-tokens"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The "Complaint tablet to Ea-nāṣir" is considered to be the oldest known written complaint.
The tablet was written in Akkadian cuneiform, by a customer named Nanni to a merchant named Ea-nāṣir.
The complaint describes how Ea-nāṣir had agreed to sell copper ingots to Nanni, via Nanni's unnamed servant,
but the ingots were considered sub standard and were not accepted. Nanni created the complaint letter
for delivery to Ea-nāṣir to explain that the copper was not the correct grade, that his servant was treated poorly,
and that at the time of writing, he had not accepted the copper, but had paid for it.
Search for the wikipedia article for the full story.</t>
      <t>Although humanity has moved on from clay tablets, to paper, to byte streams on the internet,
some business challenges have remained the same.</t>
      <t>Travel is dangerous and expensive.</t>
      <t>The properties of the products we purchase,
do not always match the properties that were advertised.</t>
      <t>There is a need to delegate negotiation to trusted intermediaries,
while convincing counter parties that the intermediary is authorized to complete the transaction.</t>
      <t>There is a need to ensure that intermediaries do not tamper with the sale price
or technical specification of the product.</t>
      <t>And there is a need to provide transparency regarding supply chain activities,
so that consumers and businesses can make informed decisions regarding products and the known risks associated with them, as this information changes over time.</t>
      <t>If Nanni and Ea-nāṣir had transparency tokens, their trade would have been frictionless, and we would all be without the first written use case expressing the concept of credentials.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>To the best of our ability we reuse terminology from <xref target="RFC4949"/>.
For clarity, we provide more specific definitions when necessary.</t>
      <dl>
        <dt>principal:</dt>
        <dd>
          <t>A specific identity claimed by an entity when accessing a system.</t>
        </dd>
        <dt>identity:</dt>
        <dd>
          <t>The collective aspect of a set of attribute values (i.e., a
set of characteristics) by which a system entity is recognizable or known.</t>
        </dd>
        <dt>identifier:</dt>
        <dd>
          <t>A data object -- often, a printable, non-blank character
string -- that definitively represents a specific identity of a
system entity, distinguishing that identity from all others.</t>
        </dd>
        <dt>issuer:</dt>
        <dd>
          <t>An entity that makes statements. Also known as issuing authority. This entity may have multiple identifiers.</t>
        </dd>
        <dt>statement:</dt>
        <dd>
          <t>A definite or clear expression of something;
a judgement, opinion, attribute, predicate or proposition regarding a subject.</t>
        </dd>
        <dt>subject:</dt>
        <dd>
          <t>The entity being discussed, described or attributed. This entity may have multiple identifiers.</t>
        </dd>
        <dt>holder:</dt>
        <dd>
          <t>An entity which knows or possesses statements. This entity may have multiple identifiers.</t>
        </dd>
        <dt>verifier:</dt>
        <dd>
          <t>An entity which reviews, checks or confirms proofs and optionally statements. This entity may have multiple identifiers.</t>
        </dd>
        <dt>credential:</dt>
        <dd>
          <t>A token (usually an unforgeable data object)
that is a portable representation of the association between an
identifier and a unit of authentication information, or statement
and that can be presented by a holder.</t>
        </dd>
        <dt>issued credential:</dt>
        <dd>
          <t>A tamper-proof object that includes a set of attributes about an entity issued by an issuing authority.</t>
        </dd>
        <dt>anonymous credential:</dt>
        <dd>
          <t>An issued credential that has privacy-preserving properties to enable data minimization and correlation resistance. RFC4949, deprecated this term, but recent advances in cryptography have changed the common understanding from what it once was.</t>
        </dd>
        <dt>credential proof:</dt>
        <dd>
          <t>An unforgeable data object derived from an issued credential, constructed by the holder of they credential</t>
        </dd>
        <dt>presentation:</dt>
        <dd>
          <t>The activity a holder performs when transmiting a credential proofs, and optionally issued credentials to a verifier.</t>
        </dd>
        <dt>notary:</dt>
        <dd>
          <t>Provides a trusted timestamp for a document, so that
someone can later prove that the document existed at that point in
time; verifies the signature(s) on a signed document before
applying the stamp.</t>
        </dd>
        <dt>receipt:</dt>
        <dd>
          <t>A token (usually an unforgeable data object)
proving that notarization has taken place.</t>
        </dd>
        <dt>counter signature:</dt>
        <dd>
          <t>A token (usually an unforgeable data object)
proving that a second issuer, has seen a credential from a first issuer.</t>
        </dd>
        <dt>mediator:</dt>
        <dd>
          <t>A party that provides a transmission capability that protects
the confidentiality or presentations made by holders.</t>
        </dd>
      </dl>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <section anchor="credential-roles">
        <name>Credential Roles</name>
        <t>Credentials are essential to the efficient function of principals,
be they natural persons or legal entities.</t>
        <t>Throughout their lifetime, a principal might create many identifiers,
and these identifiers may be known to fulfill the various
roles associated with digital credentials.</t>
        <t>These roles include being the issuer of statements about a subject,
being the subject of statements made by issuers,
holding credentials regarding identifiers for the principal,
holding credentials regarding identifiers for other principals,
presenting credentials to verifiers, or receiving presentations from other holders.</t>
        <t>The same entity may play all these roles,
but for the sake of clarity we usually refer to interactions
where each distinct entity playes a specific role in a workflow.</t>
        <t>The canonical example is:</t>
        <t>An issuer makes statements about a subject and produces an unforgable token as the issued credential.
The issuer transmits the issued credential to a holder.
A verifier requests a credential be presented.
The holder derives a presentable form of the issued credential, called the presented credential.
The holder transmits the presented credential to a verifier.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="664" viewBox="0 0 664 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 116,424 L 140,472" fill="none" stroke="black"/>
              <path d="M 140,376 L 164,424" fill="none" stroke="black"/>
              <path d="M 148,360 L 172,408" fill="none" stroke="black"/>
              <path d="M 196,456 L 204,472" fill="none" stroke="black"/>
              <path d="M 204,408 L 212,424" fill="none" stroke="black"/>
              <path d="M 172,312 L 196,360" fill="none" stroke="black"/>
              <path d="M 220,408 L 228,424" fill="none" stroke="black"/>
              <path d="M 180,296 L 204,344" fill="none" stroke="black"/>
              <path d="M 260,456 L 268,472" fill="none" stroke="black"/>
              <path d="M 236,344 L 244,360" fill="none" stroke="black"/>
              <path d="M 252,376 L 276,424" fill="none" stroke="black"/>
              <path d="M 204,248 L 228,296" fill="none" stroke="black"/>
              <path d="M 268,376 L 292,424" fill="none" stroke="black"/>
              <path d="M 212,232 L 236,280" fill="none" stroke="black"/>
              <path d="M 324,456 L 332,472" fill="none" stroke="black"/>
              <path d="M 268,280 L 276,296" fill="none" stroke="black"/>
              <path d="M 316,376 L 340,424" fill="none" stroke="black"/>
              <path d="M 236,184 L 260,232" fill="none" stroke="black"/>
              <path d="M 332,376 L 356,424" fill="none" stroke="black"/>
              <path d="M 244,168 L 268,216" fill="none" stroke="black"/>
              <path d="M 388,456 L 396,472" fill="none" stroke="black"/>
              <path d="M 300,216 L 308,232" fill="none" stroke="black"/>
              <path d="M 380,376 L 404,424" fill="none" stroke="black"/>
              <path d="M 268,120 L 292,168" fill="none" stroke="black"/>
              <path d="M 396,376 L 420,424" fill="none" stroke="black"/>
              <path d="M 276,104 L 300,152" fill="none" stroke="black"/>
              <path d="M 308,168 L 332,216" fill="none" stroke="black"/>
              <path d="M 340,232 L 364,280" fill="none" stroke="black"/>
              <path d="M 372,296 L 396,344" fill="none" stroke="black"/>
              <path d="M 404,360 L 412,376" fill="none" stroke="black"/>
              <path d="M 452,456 L 460,472" fill="none" stroke="black"/>
              <path d="M 444,376 L 468,424" fill="none" stroke="black"/>
              <path d="M 300,56 L 324,104" fill="none" stroke="black"/>
              <path d="M 332,120 L 356,168" fill="none" stroke="black"/>
              <path d="M 364,184 L 388,232" fill="none" stroke="black"/>
              <path d="M 396,248 L 420,296" fill="none" stroke="black"/>
              <path d="M 428,312 L 452,360" fill="none" stroke="black"/>
              <path d="M 460,376 L 484,424" fill="none" stroke="black"/>
              <path d="M 348,56 L 372,104" fill="none" stroke="black"/>
              <path d="M 380,120 L 404,168" fill="none" stroke="black"/>
              <path d="M 412,184 L 436,232" fill="none" stroke="black"/>
              <path d="M 444,248 L 468,296" fill="none" stroke="black"/>
              <path d="M 476,312 L 500,360" fill="none" stroke="black"/>
              <path d="M 508,376 L 532,424" fill="none" stroke="black"/>
              <path d="M 116,424 L 140,376" fill="none" stroke="black"/>
              <path d="M 148,360 L 172,312" fill="none" stroke="black"/>
              <path d="M 180,296 L 204,248" fill="none" stroke="black"/>
              <path d="M 212,232 L 236,184" fill="none" stroke="black"/>
              <path d="M 244,168 L 268,120" fill="none" stroke="black"/>
              <path d="M 276,104 L 300,56" fill="none" stroke="black"/>
              <path d="M 140,472 L 164,424" fill="none" stroke="black"/>
              <path d="M 172,408 L 196,360" fill="none" stroke="black"/>
              <path d="M 204,344 L 228,296" fill="none" stroke="black"/>
              <path d="M 236,280 L 260,232" fill="none" stroke="black"/>
              <path d="M 268,216 L 292,168" fill="none" stroke="black"/>
              <path d="M 300,152 L 324,104" fill="none" stroke="black"/>
              <path d="M 308,168 L 332,120" fill="none" stroke="black"/>
              <path d="M 188,472 L 212,424" fill="none" stroke="black"/>
              <path d="M 220,408 L 244,360" fill="none" stroke="black"/>
              <path d="M 252,344 L 276,296" fill="none" stroke="black"/>
              <path d="M 284,280 L 308,232" fill="none" stroke="black"/>
              <path d="M 316,216 L 324,200" fill="none" stroke="black"/>
              <path d="M 364,120 L 372,104" fill="none" stroke="black"/>
              <path d="M 204,472 L 228,424" fill="none" stroke="black"/>
              <path d="M 332,216 L 356,168" fill="none" stroke="black"/>
              <path d="M 260,392 L 268,376" fill="none" stroke="black"/>
              <path d="M 340,232 L 364,184" fill="none" stroke="black"/>
              <path d="M 252,472 L 276,424" fill="none" stroke="black"/>
              <path d="M 396,184 L 404,168" fill="none" stroke="black"/>
              <path d="M 268,472 L 292,424" fill="none" stroke="black"/>
              <path d="M 364,280 L 388,232" fill="none" stroke="black"/>
              <path d="M 324,392 L 332,376" fill="none" stroke="black"/>
              <path d="M 372,296 L 396,248" fill="none" stroke="black"/>
              <path d="M 316,472 L 340,424" fill="none" stroke="black"/>
              <path d="M 428,248 L 436,232" fill="none" stroke="black"/>
              <path d="M 332,472 L 356,424" fill="none" stroke="black"/>
              <path d="M 396,344 L 420,296" fill="none" stroke="black"/>
              <path d="M 388,392 L 396,376" fill="none" stroke="black"/>
              <path d="M 404,360 L 428,312" fill="none" stroke="black"/>
              <path d="M 380,472 L 404,424" fill="none" stroke="black"/>
              <path d="M 460,312 L 468,296" fill="none" stroke="black"/>
              <path d="M 396,472 L 420,424" fill="none" stroke="black"/>
              <path d="M 444,376 L 452,360" fill="none" stroke="black"/>
              <path d="M 452,392 L 460,376" fill="none" stroke="black"/>
              <path d="M 444,472 L 468,424" fill="none" stroke="black"/>
              <path d="M 492,376 L 500,360" fill="none" stroke="black"/>
              <path d="M 460,472 L 484,424" fill="none" stroke="black"/>
              <path d="M 508,472 L 532,424" fill="none" stroke="black"/>
              <path d="M 300,56 L 348,56" fill="none" stroke="black"/>
              <path d="M 324,104 L 372,104" fill="none" stroke="black"/>
              <path d="M 332,120 L 364,120" fill="none" stroke="black"/>
              <path d="M 292,168 L 308,168" fill="none" stroke="black"/>
              <path d="M 356,168 L 404,168" fill="none" stroke="black"/>
              <path d="M 364,184 L 396,184" fill="none" stroke="black"/>
              <path d="M 268,216 L 316,216" fill="none" stroke="black"/>
              <path d="M 260,232 L 308,232" fill="none" stroke="black"/>
              <path d="M 388,232 L 436,232" fill="none" stroke="black"/>
              <path d="M 396,248 L 428,248" fill="none" stroke="black"/>
              <path d="M 236,280 L 284,280" fill="none" stroke="black"/>
              <path d="M 228,296 L 276,296" fill="none" stroke="black"/>
              <path d="M 420,296 L 468,296" fill="none" stroke="black"/>
              <path d="M 428,312 L 460,312" fill="none" stroke="black"/>
              <path d="M 204,344 L 252,344" fill="none" stroke="black"/>
              <path d="M 196,360 L 244,360" fill="none" stroke="black"/>
              <path d="M 452,360 L 500,360" fill="none" stroke="black"/>
              <path d="M 268,376 L 316,376" fill="none" stroke="black"/>
              <path d="M 332,376 L 380,376" fill="none" stroke="black"/>
              <path d="M 412,376 L 444,376" fill="none" stroke="black"/>
              <path d="M 460,376 L 492,376" fill="none" stroke="black"/>
              <path d="M 172,408 L 220,408" fill="none" stroke="black"/>
              <path d="M 164,424 L 212,424" fill="none" stroke="black"/>
              <path d="M 228,424 L 276,424" fill="none" stroke="black"/>
              <path d="M 292,424 L 340,424" fill="none" stroke="black"/>
              <path d="M 356,424 L 404,424" fill="none" stroke="black"/>
              <path d="M 420,424 L 468,424" fill="none" stroke="black"/>
              <path d="M 484,424 L 532,424" fill="none" stroke="black"/>
              <path d="M 140,472 L 188,472" fill="none" stroke="black"/>
              <path d="M 204,472 L 252,472" fill="none" stroke="black"/>
              <path d="M 268,472 L 316,472" fill="none" stroke="black"/>
              <path d="M 332,472 L 380,472" fill="none" stroke="black"/>
              <path d="M 396,472 L 444,472" fill="none" stroke="black"/>
              <path d="M 460,472 L 508,472" fill="none" stroke="black"/>
              <g class="text">
                <text x="320" y="36">Holders</text>
                <text x="272" y="116">_</text>
                <text x="376" y="116">_</text>
                <text x="312" y="148">_</text>
                <text x="240" y="180">_</text>
                <text x="408" y="180">_</text>
                <text x="344" y="212">_</text>
                <text x="96" y="244">Credentials</text>
                <text x="208" y="244">_</text>
                <text x="440" y="244">_</text>
                <text x="532" y="244">Proofs</text>
                <text x="376" y="276">_</text>
                <text x="176" y="308">_</text>
                <text x="472" y="308">_</text>
                <text x="408" y="340">_</text>
                <text x="144" y="372">_</text>
                <text x="248" y="372">_</text>
                <text x="400" y="372">_</text>
                <text x="504" y="372">_</text>
                <text x="32" y="468">Issuers</text>
                <text x="624" y="468">Verifiers</text>
                <text x="300" y="500">Status</text>
                <text x="356" y="500">Checks</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                                    Holders
                                     ______
                                    /\     \
                                   /  \     \
                                  /    \_____\
                                 _\    / ____/_
                                /\ \  / /\     \
                               /  \ \/_/  \     \
                              /    \__/    \_____\
                             _\    /  \    / ____/_
                            /\ \  /    \  / /\     \
                           /  \ \/_____/\/_/  \     \
                          /    \_____\    /    \_____\
      Credentials        _\    /     /    \    / ____/_        Proofs
                        /\ \  /     /      \  / /\     \
                       /  \ \/_____/        \/_/  \     \
                      /    \_____\            /    \_____\
                     _\    /     /            \    / ____/_
                    /\ \  /     /              \  / /\     \
                   /  \ \/_____/                \/_/  \     \
                  /    \_____\                    /    \_____\
                 _\    /     /_  ______  ______  _\____/ ____/_
                /\ \  /     /  \/\     \/\     \/\     \/\     \
               /  \ \/_____/    \ \     \ \     \ \     \ \     \
              /    \_____\ \_____\ \_____\ \_____\ \_____\ \_____\
              \    /     / /     / /     / /     / /     / /     /
               \  /     / /     / /     / /     / /     / /     /
Issuers         \/_____/\/_____/\/_____/\/_____/\/_____/\/_____/         Verifiers

                                  Status Checks
]]></artwork>
        </artset>
        <t>There are auxillary roles which are special cases of the issuer, holder or verifier which are common
in scenarious requiring additional assurance or confidentiality.</t>
        <t>In cases where the issuer, or holder lacks credibility,
a countersignature or endorsement from a more reputatible entity
might be required to convince a warry verifier.</t>
        <t>In cases where the issuer or holder might rotate verification keys frequently,
or where the issuer or holder might not be well known to a verifier,
a receipt from a notary can provide assurance to the verifier.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="640" width="504" viewBox="0 0 504 640" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 176,320 L 176,368" fill="none" stroke="black"/>
              <path d="M 184,64 L 184,80" fill="none" stroke="black"/>
              <path d="M 184,480 L 184,496" fill="none" stroke="black"/>
              <path d="M 208,224 L 208,288" fill="none" stroke="black"/>
              <path d="M 240,112 L 240,136" fill="none" stroke="black"/>
              <path d="M 240,176 L 240,192" fill="none" stroke="black"/>
              <path d="M 240,432 L 240,456" fill="none" stroke="black"/>
              <path d="M 240,512 L 240,528" fill="none" stroke="black"/>
              <path d="M 248,352 L 248,368" fill="none" stroke="black"/>
              <path d="M 272,256 L 272,296" fill="none" stroke="black"/>
              <path d="M 272,360 L 272,400" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,80" fill="none" stroke="black"/>
              <path d="M 304,480 L 304,496" fill="none" stroke="black"/>
              <path d="M 320,560 L 320,584" fill="none" stroke="black"/>
              <path d="M 352,560 L 352,584" fill="none" stroke="black"/>
              <path d="M 368,288 L 368,352" fill="none" stroke="black"/>
              <path d="M 368,480 L 368,496" fill="none" stroke="black"/>
              <path d="M 376,192 L 376,256" fill="none" stroke="black"/>
              <path d="M 408,352 L 408,456" fill="none" stroke="black"/>
              <path d="M 432,512 L 432,528" fill="none" stroke="black"/>
              <path d="M 456,256 L 456,280" fill="none" stroke="black"/>
              <path d="M 456,360 L 456,456" fill="none" stroke="black"/>
              <path d="M 488,288 L 488,352" fill="none" stroke="black"/>
              <path d="M 488,480 L 488,496" fill="none" stroke="black"/>
              <path d="M 496,192 L 496,256" fill="none" stroke="black"/>
              <path d="M 152,32 L 224,32" fill="none" stroke="black"/>
              <path d="M 264,32 L 344,32" fill="none" stroke="black"/>
              <path d="M 104,48 L 120,48" fill="none" stroke="black"/>
              <path d="M 152,64 L 224,64" fill="none" stroke="black"/>
              <path d="M 264,64 L 344,64" fill="none" stroke="black"/>
              <path d="M 200,96 L 224,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 288,96" fill="none" stroke="black"/>
              <path d="M 192,144 L 288,144" fill="none" stroke="black"/>
              <path d="M 192,176 L 288,176" fill="none" stroke="black"/>
              <path d="M 376,192 L 496,192" fill="none" stroke="black"/>
              <path d="M 256,208 L 368,208" fill="none" stroke="black"/>
              <path d="M 248,224 L 320,224" fill="none" stroke="black"/>
              <path d="M 104,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 344,240 L 376,240" fill="none" stroke="black"/>
              <path d="M 248,256 L 320,256" fill="none" stroke="black"/>
              <path d="M 376,256 L 496,256" fill="none" stroke="black"/>
              <path d="M 368,288 L 488,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 360,304" fill="none" stroke="black"/>
              <path d="M 216,320 L 288,320" fill="none" stroke="black"/>
              <path d="M 104,336 L 120,336" fill="none" stroke="black"/>
              <path d="M 312,336 L 368,336" fill="none" stroke="black"/>
              <path d="M 216,352 L 288,352" fill="none" stroke="black"/>
              <path d="M 368,352 L 488,352" fill="none" stroke="black"/>
              <path d="M 224,384 L 232,384" fill="none" stroke="black"/>
              <path d="M 200,464 L 288,464" fill="none" stroke="black"/>
              <path d="M 384,464 L 472,464" fill="none" stroke="black"/>
              <path d="M 200,512 L 288,512" fill="none" stroke="black"/>
              <path d="M 384,512 L 472,512" fill="none" stroke="black"/>
              <path d="M 256,544 L 304,544" fill="none" stroke="black"/>
              <path d="M 368,544 L 416,544" fill="none" stroke="black"/>
              <path d="M 232,592 L 432,592" fill="none" stroke="black"/>
              <path d="M 112,608 L 128,608" fill="none" stroke="black"/>
              <path d="M 248,624 L 416,624" fill="none" stroke="black"/>
              <path d="M 232,592 L 248,624" fill="none" stroke="black"/>
              <path d="M 416,624 L 432,592" fill="none" stroke="black"/>
              <path d="M 152,32 C 143.16936,32 136,39.16936 136,48" fill="none" stroke="black"/>
              <path d="M 224,32 C 232.83064,32 240,39.16936 240,48" fill="none" stroke="black"/>
              <path d="M 264,32 C 255.16936,32 248,39.16936 248,48" fill="none" stroke="black"/>
              <path d="M 344,32 C 352.83064,32 360,39.16936 360,48" fill="none" stroke="black"/>
              <path d="M 152,64 C 143.16936,64 136,56.83064 136,48" fill="none" stroke="black"/>
              <path d="M 224,64 C 232.83064,64 240,56.83064 240,48" fill="none" stroke="black"/>
              <path d="M 264,64 C 255.16936,64 248,56.83064 248,48" fill="none" stroke="black"/>
              <path d="M 344,64 C 352.83064,64 360,56.83064 360,48" fill="none" stroke="black"/>
              <path d="M 200,96 C 191.16936,96 184,88.83064 184,80" fill="none" stroke="black"/>
              <path d="M 224,96 C 232.83064,96 240,103.16936 240,112" fill="none" stroke="black"/>
              <path d="M 256,96 C 247.16936,96 240,103.16936 240,112" fill="none" stroke="black"/>
              <path d="M 288,96 C 296.83064,96 304,88.83064 304,80" fill="none" stroke="black"/>
              <path d="M 192,144 C 183.16936,144 176,151.16936 176,160" fill="none" stroke="black"/>
              <path d="M 288,144 C 296.83064,144 304,151.16936 304,160" fill="none" stroke="black"/>
              <path d="M 192,176 C 183.16936,176 176,168.83064 176,160" fill="none" stroke="black"/>
              <path d="M 288,176 C 296.83064,176 304,168.83064 304,160" fill="none" stroke="black"/>
              <path d="M 224,208 C 215.16936,208 208,215.16936 208,224" fill="none" stroke="black"/>
              <path d="M 224,208 C 232.83064,208 240,200.83064 240,192" fill="none" stroke="black"/>
              <path d="M 256,208 C 247.16936,208 240,200.83064 240,192" fill="none" stroke="black"/>
              <path d="M 248,224 C 239.16936,224 232,231.16936 232,240" fill="none" stroke="black"/>
              <path d="M 320,224 C 328.83064,224 336,231.16936 336,240" fill="none" stroke="black"/>
              <path d="M 248,256 C 239.16936,256 232,248.83064 232,240" fill="none" stroke="black"/>
              <path d="M 320,256 C 328.83064,256 336,248.83064 336,240" fill="none" stroke="black"/>
              <path d="M 192,304 C 183.16936,304 176,311.16936 176,320" fill="none" stroke="black"/>
              <path d="M 192,304 C 200.83064,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 216,320 C 207.16936,320 200,327.16936 200,336" fill="none" stroke="black"/>
              <path d="M 288,320 C 296.83064,320 304,327.16936 304,336" fill="none" stroke="black"/>
              <path d="M 216,352 C 207.16936,352 200,344.83064 200,336" fill="none" stroke="black"/>
              <path d="M 288,352 C 296.83064,352 304,344.83064 304,336" fill="none" stroke="black"/>
              <path d="M 192,384 C 183.16936,384 176,376.83064 176,368" fill="none" stroke="black"/>
              <path d="M 192,384 C 200.83064,384 208,391.16936 208,400" fill="none" stroke="black"/>
              <path d="M 224,384 C 215.16936,384 208,391.16936 208,400" fill="none" stroke="black"/>
              <path d="M 232,384 C 240.83064,384 248,376.83064 248,368" fill="none" stroke="black"/>
              <path d="M 224,416 C 215.16936,416 208,408.83064 208,400" fill="none" stroke="black"/>
              <path d="M 224,416 C 232.83064,416 240,423.16936 240,432" fill="none" stroke="black"/>
              <path d="M 256,416 C 247.16936,416 240,423.16936 240,432" fill="none" stroke="black"/>
              <path d="M 256,416 C 264.83064,416 272,408.83064 272,400" fill="none" stroke="black"/>
              <path d="M 200,464 C 191.16936,464 184,471.16936 184,480" fill="none" stroke="black"/>
              <path d="M 288,464 C 296.83064,464 304,471.16936 304,480" fill="none" stroke="black"/>
              <path d="M 384,464 C 375.16936,464 368,471.16936 368,480" fill="none" stroke="black"/>
              <path d="M 472,464 C 480.83064,464 488,471.16936 488,480" fill="none" stroke="black"/>
              <path d="M 200,512 C 191.16936,512 184,504.83064 184,496" fill="none" stroke="black"/>
              <path d="M 288,512 C 296.83064,512 304,504.83064 304,496" fill="none" stroke="black"/>
              <path d="M 384,512 C 375.16936,512 368,504.83064 368,496" fill="none" stroke="black"/>
              <path d="M 472,512 C 480.83064,512 488,504.83064 488,496" fill="none" stroke="black"/>
              <path d="M 256,544 C 247.16936,544 240,536.83064 240,528" fill="none" stroke="black"/>
              <path d="M 304,544 C 312.83064,544 320,551.16936 320,560" fill="none" stroke="black"/>
              <path d="M 368,544 C 359.16936,544 352,551.16936 352,560" fill="none" stroke="black"/>
              <path d="M 416,544 C 424.83064,544 432,536.83064 432,528" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="464,456 452,450.4 452,461.6" fill="black" transform="rotate(90,456,456)"/>
              <polygon class="arrowhead" points="416,456 404,450.4 404,461.6" fill="black" transform="rotate(90,408,456)"/>
              <polygon class="arrowhead" points="376,208 364,202.4 364,213.6" fill="black" transform="rotate(0,368,208)"/>
              <polygon class="arrowhead" points="368,304 356,298.4 356,309.6" fill="black" transform="rotate(0,360,304)"/>
              <polygon class="arrowhead" points="360,584 348,578.4 348,589.6" fill="black" transform="rotate(90,352,584)"/>
              <polygon class="arrowhead" points="352,240 340,234.4 340,245.6" fill="black" transform="rotate(180,344,240)"/>
              <polygon class="arrowhead" points="328,584 316,578.4 316,589.6" fill="black" transform="rotate(90,320,584)"/>
              <polygon class="arrowhead" points="320,336 308,330.4 308,341.6" fill="black" transform="rotate(180,312,336)"/>
              <polygon class="arrowhead" points="248,456 236,450.4 236,461.6" fill="black" transform="rotate(90,240,456)"/>
              <polygon class="arrowhead" points="248,136 236,130.4 236,141.6" fill="black" transform="rotate(90,240,136)"/>
              <polygon class="arrowhead" points="136,608 124,602.4 124,613.6" fill="black" transform="rotate(0,128,608)"/>
              <polygon class="arrowhead" points="128,336 116,330.4 116,341.6" fill="black" transform="rotate(0,120,336)"/>
              <polygon class="arrowhead" points="128,240 116,234.4 116,245.6" fill="black" transform="rotate(0,120,240)"/>
              <polygon class="arrowhead" points="128,48 116,42.4 116,53.6" fill="black" transform="rotate(0,120,48)"/>
              <g class="text">
                <text x="32" y="52">Issuers</text>
                <text x="188" y="52">Statements</text>
                <text x="304" y="52">Envelopes</text>
                <text x="240" y="164">Credentials</text>
                <text x="436" y="212">Transparency</text>
                <text x="40" y="244">Authority</text>
                <text x="88" y="244">A</text>
                <text x="272" y="244">Receipt</text>
                <text x="312" y="244">1</text>
                <text x="432" y="244">Service</text>
                <text x="472" y="244">1</text>
                <text x="428" y="308">Transparency</text>
                <text x="40" y="340">Authority</text>
                <text x="88" y="340">B</text>
                <text x="240" y="340">Receipt</text>
                <text x="280" y="340">2</text>
                <text x="424" y="340">Service</text>
                <text x="464" y="340">2</text>
                <text x="244" y="484">Transparency</text>
                <text x="412" y="484">Identity</text>
                <text x="220" y="500">Tokens</text>
                <text x="416" y="500">Documents</text>
                <text x="40" y="612">Verifiers</text>
                <text x="308" y="612">Credential</text>
                <text x="380" y="612">Proofs</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                 .----+-----.  .-----------.
Issuers     --> | Statements ||  Envelopes  |
                 '----+-----'  '-----+-----'
                      |              |
                       '----. .-----'
                             |
                             v
                      .------+------.
                     |  Credentials  |
                      '------+------'
                             |                +--------------+
                          .-' '-------------->+ Transparency |
                         |   .----------.     |              |
Authority A -->          |  | Receipt 1  +<---+   Service 1  |
                         |   '---+------'     +---------+----+
                         |       |                      |
                         |       |           +--------------+
                      .-' '------)---------->+ Transparency |
                     |   .----------.        |              |
Authority B -->      |  | Receipt 2  +<------+   Service 2  |
                     |   '----+-----'        +----+---------+
                     |        |  |                |     |
                      '-. .--'   |                |     |
                         |       |                |     |
                          '-. .-'                 |     |
                             |                    |     |
                             v                    v     v
                       .-----+------.         .---+-----+--.
                      | Transparency |       | Identity     |
                      | Tokens       |       | Documents    |
                       '-----+------'         '------+-----'
                             |                       |
                              '-------.     .-------'
                                       |   |
                                       v   v
                            .-----------+---+--------.
Verifiers    -->             \   Credential Proofs  /
                              '--------------------'
]]></artwork>
        </artset>
        <t>In cases where a holder requires untraceability or is required
to provide confidentiality regarding the provenance of a credential,
delegation with or without attenutation to intermediate, or mediators holders, may be necessary.</t>
        <t>Notaries and mediators can leverage receipts and counter signatures to adjust the transparency,
traceability and confidentiality associated with credentials.</t>
        <t>Giving unique and meaningful names to these roles,
allows for digital trust systems to optimize for the properties that are most needed for credential use cases.</t>
      </section>
      <section anchor="identity-documents">
        <name>Identity Documents</name>
        <t>In order to verify a credential proof, verification material from the issuer and holder needs to be available at the time the verification algorithm is called.</t>
        <t>Resolving key material just in time negatively impacts privacy, security and performance.</t>
        <t>Whenever possible, it recommended to fetch verification keys and any associated metadata from a trusted source, and cache them locally.</t>
        <t>Key material can also be delivered out of band or in band depending on the envelope format used.</t>
        <t>This specification defines an identity document format based on transparency receipts that is compact, integrity protected, and can be delivered in band to verifiers in a network denied environment.</t>
        <t>This example is not normative.</t>
        <t>The identity document is a COSE Key, which has been signed and made transparent:</t>
        <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1                   /
    [
      h'a4013822...31333337',       / Protected                     /
      {                             / Unprotected                   /
        -333: [                     / Receipts (1)                  /
          h'd2845867...cf71886e'    / Receipt 1                     /
        ]
      },
      nil,                          / Detached payload              /
      h'1c3271fb...b5df03d7'        / Signature                     /
    ]
)
]]></sourcecode>
        <t>The protected header includes identifiers for the entity, and the issuer of the identity document:</t>
        <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -35,                           / Algorithm                     /
  3: application/cose-key,          / Content type                  /
  4: h'5b55dd99...8a2acc6b',        / Key identifier                /
  13: {                             / CWT Claims                    /
    1: issuer.example,              / Issuer                        /
    2: holder.example,              / Subject                       /
  },
}
]]></sourcecode>
        <t>Because the payload is opaque that content type can be used to support key formats that are present in <eref target="https://www.iana.org/assignments/media-types/media-types.xhtml">IANA Media Types</eref></t>
        <t>A verifier will need to discover or obtain the identity documents for the issuer and the holder.</t>
        <t>The identifier for the entity (issuer / holder) might be present in identifiers for resources representing the identity document for the identifier.</t>
        <t>This can be accomplished several ways.</t>
        <t>A verifier might discover an identity document through <xref target="RFC5785"/></t>
        <t>For example:</t>
        <sourcecode type="text"><![CDATA[
https://issuer.example/.well-known/id
]]></sourcecode>
        <t>A verifier might look up an identity document through a trusted key server, distributed database, or transparency service:</t>
        <sourcecode type="text"><![CDATA[
https://service.example/keys/issuer.example
]]></sourcecode>
        <t>In some cases, a verifier might require multiple receipts for an identity document,
proving the same key information is bound to an identifier in multiple independent systems.</t>
        <sourcecode type="text"><![CDATA[
https://government1.example/receipts/keys/issuer.example

https://government2.example/receipts/keys/issuer.example
]]></sourcecode>
        <t>The verifier can then decide to reject credential proofs from holder's that are unable to demonstrate enough transparency.</t>
        <t>During verification, the holder of a credential might be required to demonstrate possession of an identity document similar to <xref target="RFC9449"/></t>
        <t>A verifier can prepare a challenge token (signed nonce) or nonce for the holder.</t>
        <t>The holder can sign the challenge or nonce, along with an audience claim binding their response to the requesting verifier.</t>
        <t>This "key binding token" is defined similar to <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/></t>
        <t>A credential requiring identity document confirmation (traceability, NOT unlinkability) can contain a <tt>cnf</tt> claim with an identifier that resolves to an identity document,
and verifiers can confirm the associated key binding token is signed with the public key in an identity document for the holder.</t>
        <t>An example of a credential with identity confirmation:</t>
        <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                     /
  1: -35,                           / Algorithm                     /
  3: application/example+xml,       / Content type                  /
  4: h'5b55dd99...8a2acc6b',        / Issuer Key identifier         /
  13: {                             / CWT Claims                    /
    1: issuer.example,              / Issuer                        /
    2: holder.example,              / Subject                       /
    8: {                            / Confirmation                  /
      3: h'a04bfe57...296ea037'     / Holder Identity Doc URI       /
    }
  },
}
]]></sourcecode>
        <t>In order to verify credential proofs for this credential with identity binding, the verifier must:</t>
        <ul spacing="normal">
          <li>
            <t>decode the protected header, and lookup the issuer identity document.</t>
          </li>
          <li>
            <t>confirm the issuer's identity document is still valid according to the verifier's policy
            </t>
            <ul spacing="normal">
              <li>
                <t>check the validity period, ensure the credential is not activated in the future or expired in the past.</t>
              </li>
              <li>
                <t>check the status, in case the issuer of the issuer's identity docment has suspended or revoked the document.</t>
              </li>
              <li>
                <t>check the key used to sign the credential proof, is present in the issuer's identity document.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>verify the credential proof with the issuer's public key, from their identity document.
            </t>
            <ul spacing="normal">
              <li>
                <t>decode the protected header, and validate the claims</t>
              </li>
              <li>
                <t>lookup the holder's identity document using the hints inside the <tt>cnf</tt> claim</t>
              </li>
              <li>
                <t>perform the same validation checks as were done for the issuer's identity document on the holder's identity document.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>verify the credential identity confirmation token using the holder's public key from the holder's identity document.
            </t>
            <ul spacing="normal">
              <li>
                <t>check the validity period, ensure the token is not activated in the future or expired in the past.</t>
              </li>
              <li>
                <t>check the key used to sign the credential identity confirmation token, is present in the holder's identity document.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>After these verifications and validations have been completed, if they have all succeeded the verifier should believe the following:</t>
        <t>The issuer's intention to assert the payload's relation to the subject has not been tampered with, the intention is still valid and has not changed since the credential was issued.
The holder is in possession of the credential at the time of verification.
The identity documents for both the issuer and holder are still valid.</t>
        <t>With these basics confirmed, the verifier can proceed to application / business layer processing of the payload.</t>
        <t>In the example above the payload is XML, and could represent some required legacy identity credential format.</t>
        <t>The verifier can then advertise that the legacy identity credential system is nearing end of life and that in order to support sustainability initiatives,
reduce attack surface, and reduce carbon emmissions, only compact binary representations will be supported in the future.</t>
        <t>By keeping the payload opaque,
transparency tokens can be intergrated into legacy systems that require larger and older media types,
and assist those systems in modernizing to support compact binary.</t>
      </section>
    </section>
    <section anchor="credential-principles">
      <name>Credential Principles</name>
      <t>Identification happens before we recognize threat or opportunity.</t>
      <t>Digital credentials are tools but like most tools,
access and authority to use them are controlled by social,
economic and political factors.</t>
      <t>Because this technology has the potential to adversly impact the freedom
and inalienable rights of human beings, and healthy competition of legal entities,
we state these principles of digital credentials,
but caution that not all these properties can be easily achieved without sacrifice,
and where some principles may be appropriatly degraded for legal entities,
other principles ought to be preserved for natural persons.</t>
      <section anchor="format-agility">
        <name>Format Agility</name>
        <t>Modern paper credentials come in many different shapes and sizes, from notary stamped paper documents with wet ink signatures,
to ASN.1 and X.509 signed XML documents representing commercial invoices.</t>
        <t>New formats are created to address the challenges and shortcoming of the formats that came before. Clay tablets were heavy, paper is easily destroyed, XML Signatures were expensive to compute and error prone, JSON while readable and writable by humans was wasteful of compute and storage when processed by machines.</t>
        <t>CBOR stands on the shoulders of giants, having benefitted from being created last, and suffering for being less well adopted than XML and JSON.</t>
        <t>It is natural to wish for there to be only one format, for digital credentials, as this would improve interoperability and reduce the costs associated with verifying credentials as part of business transactions, but nature does not produce discrete steps in technology deployment. Horses and automobiles shared the streets of cities in the early 19th century, and XML, ASN.1, JSON and CBOR will coexist so long as business requires them too.</t>
        <t>There are advantages to having multiple formats for digital credentials, particular when attempting to give privacy or security benefits to users that depend on specific protocols, that are only able to handle certain credential formats. For example, OAuth and OpenID Connect tend to require JSON claimsets and JWT credential formats.</t>
        <t>In order to preserve format agility, while leveraging existing claims and terminology, this document recommends a convention of preserving payload content as opaque bytes, leveraging protected headers to signature media types associated with validation of payloads, and claims in headers, in cases where format specific claims need to be consistently understood by verifiers.</t>
      </section>
      <section anchor="autonomy">
        <name>Autonomy</name>
        <t>Issuers reserve the right to make statements.
Holders reserve the right to present credentials.
Verifiers reserve the right to reject presentation.</t>
        <t>Issuers may be subject to local, regional or global laws regarding statements.
Holders might be denied service, if they are unwilling to present credentials.
Verifiers might be subject to legal action for rejecting presentations in ways that violate local laws.</t>
        <t>When developing digital credential technology,
consideration should be given to allow these roles to perform their function,
with respect to local culture and conventions.</t>
        <t>Globally compelling behavior reduces the value of digital reputation over time,
and degrades the ability of individual entities to provide better security and privacy properties,
by applying least privledge and minimal disclosure.</t>
      </section>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>All information should be considered sensitive, including timing,
transmission metadata, the social graph that is built between issuers, subjects, holders and verifiers,
and of course the content of statements.</t>
        <t>All encryption has a shelf life, these signals should be protected with cryptography
appropriate for maintaining confidentiality for as long as is necessary to prevent harm.</t>
      </section>
      <section anchor="anonymity">
        <name>Anonymity</name>
        <t>The act of observation changes the outcome, and character is what you do when nobody is watching.</t>
        <t>These technologies can be used to erode the abilty to create unlinkable digital identifiers,
which are necessary for maintaining distinct digital identities.</t>
        <t>At the same time, these technologies can be used to create unlinkable digital identifers,
which can be used in ways that are unpredictable.</t>
        <t>When designing digital trust systems, implementers should be cautious to preserve anonymity when it is essential,</t>
      </section>
      <section anchor="authenticity">
        <name>Authenticity</name>
        <t>Perhaps the most essential property of digital credentials is assuring that statements can be made unforgable.</t>
        <t>Verifiers require this property to be able to make use of presentations from holders,
with confidence that the holder is not able to tamper with or alter the statements made by issuers.</t>
        <t>This property also applies to the act of presenting by the holder.</t>
        <t>Assurance regarding the capabilities of the holder's device, or other evidence regarding
the presence or awareness of the holder can be essential to convincing a verifier to accept a presentation.</t>
        <t>See FIDO, etc...</t>
      </section>
      <section anchor="transparency">
        <name>Transparency</name>
        <t>Transparency does not mean lack of confidentiality, it means commiting to be honest, in a way that dishonesty can be detected.</t>
        <t>This property is essential to service providers who maintain public key to identity bindings such as the work describes in key transparency.</t>
        <t>This property is also essential to statements about artifacts or ingredients that are assembled into more complex structures,
so that is a problem in a sub component is detected, the potential damage can be mitigated, and the relying parties can be notified
to protect their systems from cascading faults.</t>
      </section>
      <section anchor="accountability">
        <name>Accountability</name>
        <t>Of the various credential roles, holders and subjects are most vulnerable, and have the least power or incentive to adopt digital credential systems.</t>
        <t>Issuers and verifiers have great power and responsibility, and in cases where holders might not have the
choices regarding credential storage, credential transmission, privacy and security features or the principles above,
it will be due to the choices made by issuers and verifiers.</t>
        <t>Implementers should seek to frame the design of digital trust systems in terms of supporting the needs of holders,
and challenged seek accountability to holders before all other parties.</t>
      </section>
    </section>
    <section anchor="credential-workflows">
      <name>Credential Workflows</name>
      <t>Credentials can be exchanged over differrent protocols.
In this section we outline a few exemplar exchange scenarios,
however, this list is not exhaustive and some protocols might
define additional variations on these examples.</t>
      <section anchor="credential-delivery">
        <name>Credential Delivery</name>
        <t>A subject will request a credential be created by an issuer,
or an issuer will create a credential for a subject.</t>
        <t>The next step requires the credential to be delivered to the subject,
so they can become a holder, and make presentations to verifiers.</t>
        <t>This workflow is commonly referred to as credential delivery.</t>
      </section>
      <section anchor="presentation-delivery">
        <name>Presentation Delivery</name>
        <t>A holder will be challenged to present credentials to a verifier.</t>
        <t>It common for the verifier to specify the details of the credentials requested along with with nonce,
to prevent replay attacks.</t>
        <t>The holder will craft a presentation for the verifier,
possibly proving they control key material commited to be the issuer,
by signing the nonce with a public key endorsed by the issuer.</t>
        <t>The holder will then transmit the presentation to the verifier.</t>
        <t>The verifier will check the signature from the issuer,
the signature from the holder, and evaluate the nonce
and other time related data to determine if the presentation is valid.</t>
      </section>
      <section anchor="credential-endorsement">
        <name>Credential Endorsement</name>
        <t>Some holders may request a counter signature on an existing credential.</t>
        <t>This can help convince a verifier who is not familiar with a given issuer.</t>
      </section>
      <section anchor="presentation-notarization">
        <name>Presentation Notarization</name>
        <t>Some holders may request a receipt from a notary when making presentations.</t>
        <t>This can help them prove that a notary, or intermediary offering notarization
had accepted a presentaton in the past.</t>
      </section>
    </section>
    <section anchor="credential-formats">
      <name>Credential Formats</name>
      <t>A credential format combines a well known and popular serialization, such as JSON or CBOR,
with a well known and popular securing capability, such as JOSE and COSE.</t>
      <t>Different serializations offer benefits over each other, but some terminology is so consistently needed,
that we see the same concepts emerging in each content type specific securing specifications.</t>
      <t>A good example is <tt>iss</tt> and <tt>sub</tt> which are popular in both JWT and CWT claims, and express the identifier of the issuer and the subject.</t>
      <t>Another is <tt>alg</tt> which expresses the cryptographic suite associated with providing the unforgable property of a credential.</t>
      <t>Another is <tt>nbf</tt> which expresses a time at which the statements made by the issuer become authoriative for the subject.</t>
      <t>Another is <tt>exp</tt> which expresses a time at which the statements made by the issuer cease being auuthoritative for the subject.</t>
      <t>Another is <tt>cnf</tt> which is a popular way to enable a holder to prove possession of a public key identity.</t>
      <t>Registries such as https://www.iana.org/assignments/cwt/cwt.xhtml and https://www.iana.org/assignments/jwt/jwt.xhtml</t>
      <t>over the ability for issuers, holders and verifiers to have unambious and well understood terminology,
but they cannot scale to express all the possible statements about the possible subjects,
in all the possible industry veriticals and contexts.</t>
      <t>Several competing solutions to this problem have emerged over time:</t>
      <ol spacing="normal" type="1"><li>
          <t>collision-resistant-names</t>
        </li>
      </ol>
      <t>In JSON, it is often recommended to prefix private claim names (names that are not registered), for example:</t>
      <figure anchor="collision-resistant-names">
        <name>Example Collision-Resistant Name</name>
        <sourcecode type="json"><![CDATA[
{
  "iss": "joe",
  "exp": 1300819380,
  "http://example.com/is_root":true
}
]]></sourcecode>
      </figure>
      <t>In this scenario, since "is_root" is a private claim,
and there is a risk that it might not be interpretted consistently,
or that there might be collisions, since it is not registered,
it is prefixed with a URL.</t>
      <ol spacing="normal" type="1"><li>
          <t>embedding type information</t>
        </li>
      </ol>
      <t>The JWT BCP recomments to use explict typing to avoid similar looking tokens from being confused,
which could lead to faults in verification or processing. See <xref target="RFC8725"/> section on explicit typing.</t>
      <figure anchor="explict-typing">
        <name>Example Explict Typing</name>
        <sourcecode type="json"><![CDATA[
{
  "typ": "application/cool+jwt",
  "cty": "application/cool",
  "iss": "joe",
  "exp": 1300819380,
  "http://example.com/is_root":true
}
]]></sourcecode>
      </figure>
      <ol spacing="normal" type="1"><li>
          <t>embedding schema references</t>
        </li>
      </ol>
      <t>A schema language can help provide a clear, unambigious name for certain shapes of data, or certain properties of data.</t>
      <t>In JSON, this can be accomplished with JSON Schema, or JSON-LD:</t>
      <figure anchor="embbedded-schema">
        <name>Example Embedded Schema</name>
        <sourcecode type="json"><![CDATA[
{
  "@context": "https://ontology.provider.example/v4346",
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "$id": "https://example.com/product.schema.json",
  "iss": "joe",
  "exp": 1300819380,
  "http://example.com/is_root":true
}
]]></sourcecode>
      </figure>
      <t>Another solution is to leverage knowledge about the protocol to reduce the need to communicate redundant information,
for example, if unicorn-protocol only uses JWT or only uses CWT,
then signaling that a token is of these types is unnecessary.</t>
      <t>If the protocol grows to support new types in the future, a protocol specific parameter can be used remove ambiguity,
or common solutions such as media types can be used to distinguish different kinds of statements and secure envelopes.</t>
      <section anchor="cbor-web-tokens">
        <name>CBOR Web Tokens</name>
        <t>CBOR Web Tokens are defined in <xref target="RFC8392"/> and extended to support selective disclosure in <xref target="I-D.prorock-cose-sd-cwt"/>.</t>
      </section>
      <section anchor="json-web-tokens">
        <name>JSON Web Tokens</name>
        <t>JSON Web Tokens are defined in <xref target="RFC7519"/> and extended to support selective disclosure in <xref target="I-D.ietf-oauth-selective-disclosure-jwt"/>.</t>
      </section>
      <section anchor="cbor-web-proofs">
        <name>CBOR Web Proofs</name>
        <t>CBOR Web Proofs are defined in <xref target="I-D.ietf-jose-json-web-proof"/> and extended to support credentials in this specification.</t>
      </section>
      <section anchor="json-web-proofs">
        <name>JSON Web Proofs</name>
        <t>JSON Web Proofs are defined in <xref target="I-D.ietf-jose-json-web-proof"/> and extended to support credentials in this specification.</t>
      </section>
      <section anchor="transparency-tokens">
        <name>Transparency Tokens</name>
        <t>Transparency Tokens build on lessons learned from deploying JWTs, CWTs and attribute certificates.</t>
        <section anchor="opaque-payloads">
          <name>Opaque Payloads</name>
          <t>A major structural difference between transparency tokens and previous token formats is the opacity of statements (the use of opaque payloads).</t>
          <t>Opaque payloads allow for arbitrary content to be easily integrated in statements,
which enables issuers and verifiers to keep using serializations they are familar with,
instead of mapping them to a new claims structure.</t>
          <t>For example, XML files can be signed and exchanged using JWS or COSE Sign 1 envelopes.</t>
          <t>Because transparency tokens secure payloads that are not required to be JSON objects or CBOR Maps,
it is best to think of them as a new kind of token.</t>
          <t>Because the payload is opaque, it is common to play all the statement metadata in the protected header.</t>
          <t>In cases where selective disclosure or zero knowledge proofs need to be applied, this specification extends the related work to enable these capabilies over protected header metadata.</t>
        </section>
        <section anchor="detached-payloads">
          <name>Detached Payloads</name>
          <t>Transparency Token also recommend support for detached payloads, this allows for easier integration with protocols that already transport well known content types, such as HTTP or file systems that support directory and file structures such as UNIX.</t>
        </section>
        <section anchor="redundant-claims">
          <name>Redundant Claims</name>
          <t>In some cases, a JWT or CWT claim might be present in both the protected header and the payload.
This can lead to protocol confusion vulnerabilities.
The <tt>typ</tt> parameter <bcp14>MUST</bcp14> be used to distiniguish such tokens from similar looking tokens.</t>
        </section>
        <section anchor="key-discovery">
          <name>Key Discovery</name>
          <t>Editors note: consider moving out of scope.</t>
          <t>As a general rule, any well defined <tt>typ</tt> values <bcp14>SHOULD</bcp14> describe the available key discovery mechanisms.</t>
          <t>As a best practice the protected header should be the only location a verifier needs to look for hints related to discovering verification or decryption keys.</t>
          <t>The following fields are commonly used to discovery verification material: <tt>iss</tt>, <tt>kid</tt>, <tt>jwk</tt>, <tt>cnf</tt>.</t>
        </section>
        <section anchor="mutable-claims">
          <name>Mutable Claims</name>
          <t>The unprotected header provides a useful extension point, but requires careful consideration, due to the lack of built in integrity checking.</t>
          <t>Common uses for the unprotected header include:</t>
          <ul spacing="normal">
            <li>
              <t>adding counter signatures</t>
            </li>
            <li>
              <t>adding transparency receipts</t>
            </li>
            <li>
              <t>disclosing redacted commitments</t>
            </li>
            <li>
              <t>providing proofs of knowledge</t>
            </li>
          </ul>
        </section>
        <section anchor="entity-identifiers">
          <name>Entity Identifiers</name>
          <t>JOSE and COSE have claims that are need to be text, but could be strings or URIs.</t>
          <t>Transparency tokens do not require these fields to be URIs.</t>
          <t>As a general preference, these fields should be a small as possible, and avoid transmitting information that is redundant to either:</t>
          <ol spacing="normal" type="1"><li>
              <t>the protocol specification (https can be ommmited when its known to be required...)</t>
            </li>
            <li>
              <t>other protected claims (<tt>kid</tt> and <tt>sub</tt> can be relative to <tt>iss</tt>, if your <tt>typ</tt> says so...)</t>
            </li>
          </ol>
        </section>
        <section anchor="trusted-hardware">
          <name>Trusted Hardware</name>
          <t>Application developers need the ability to communciate the assurances associated with a harware and software platform such as iOS and Android,
so that issuers can have confidence in the key material that digital credentials will be bound too.</t>
          <t>In order to accomplish this, the app developer needs both RATS Evidence and a RATS Endorsement.</t>
          <t>By presenting both evidence and endorsement associated with a private key to an issuer, the issuer can be convinced that
the digital credential store has the necessary security properties to hold high value credentials.</t>
        </section>
        <section anchor="architectural-alignment">
          <name>Architectural Alignment</name>
          <t>Transparency Tokens require some consistency in functionality between JOSE and COSE.</t>
          <t>Editors note: consider focusing only on COSE.</t>
          <t>In order to enable similar experience, while leveraging existing RFCs, the following structural changes and recommendations have been made.</t>
          <t>In cases where a break in conventions needs to be made, Transparency Tokens prioritize CBOR / COSE over JSON / JOSE.</t>
          <section anchor="unprotected-headers">
            <name>Unprotected headers</name>
            <t>JOSE Compact and JSON serializations have been extended to support an unprotected header.</t>
          </section>
          <section anchor="claims-in-headers">
            <name>Claims in headers</name>
            <t>In JOSE, JWT claims go directly in the protected header.</t>
            <figure anchor="jose-claims-in-headers">
              <name>Example JOSE Claims in Headers</name>
              <sourcecode type="json"><![CDATA[
{
  "alg": "ES384",
  "iss": "vendor.example",
  "sub": "service.example"
}
]]></sourcecode>
            </figure>
            <t>In COSE, CWT claims go in the CWT Claims map, which is placed inside the protected header.</t>
            <figure anchor="cose-claims-in-headers">
              <name>Example COSE Claims in Headers</name>
              <sourcecode type="cbor-diag"><![CDATA[
{
  1: -35,                / Algorithm                     /
  13: {                  / CWT Claims                    /
    1: vendor.example,   / Issuer                        /
    2: service.example,  / Subject                       /
  },
}
]]></sourcecode>
            </figure>
          </section>
          <section anchor="fully-specified-algorithms">
            <name>Fully Specified Algorithms</name>
            <t>Parametric algorithms <bcp14>MUST NOT</bcp14> be used.</t>
            <t>Algorithms <bcp14>MUST</bcp14> exist in both JOSE and COSE registries, and have the same security properties to be suitable for Transparency Tokens.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="credential-forms">
      <name>Credential Forms</name>
      <t>In order to be a well recognized digital credential,
there must be a specification defining the privacy and security properties of the format.</t>
      <t>The must be a registered media type which distinguishes the format from similar formats, for example:</t>
      <t>application/sd-jwt is different than application/jwt.</t>
      <t>There must be at least one way of extending the well known terminology associated with the credential format,
to support industry use cases.</t>
      <t>The core operations of issuance, presentation and verification must be defined in a specification with privacy and security considerations.</t>
      <t>There must be clear definitions of the forms of credentials supported by the format,
and the privacy and security considerations associated with each form.</t>
      <section anchor="issued-credential">
        <name>Issued Credential</name>
        <t>This form is produced by an issuer and delivered to a holder.</t>
      </section>
      <section anchor="presented-credential">
        <name>Presented Credential</name>
        <t>This form is prepared by a holder and delivered to a verifier.</t>
        <t>In the simple case of credentials, this form is indistinguishable from the issued credential.</t>
        <t>In more privacy preserving forms,
this from reveals a subset of the information commited to by the issuer,
and possibly hides the identity of the subject in the process.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TODO Privacy</t>
      <section anchor="collection-limitation-of-attributes-by-verifiers">
        <name>Collection limitation of attributes by Verifiers</name>
        <t>## Holder consent for sending credential proofs to verifiers
## Unlinkability of credential proofs between Verifiers
## Untrackability of a credential proof by an Issuer
## Holder observability of both issued credentials and credential proofs
## Issuer anonymity among a set of Issuers</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
      <section anchor="binding-of-an-issued-credential-to-the-correct-owner">
        <name>Binding of an issued credential to the correct owner</name>
        <t>## Verification by a Holder that an issued credential matches with an expected object structure
## Verification by a Verifier that a credential proof matches with a supported object structure
## Binding of a credential proof to the correct owner
## Detection of collusion attacks between individuals
## Detection of the freshness or of the validity of a credential proof by a Verifier
## Binding of a credential proof to the intended verifier
## Prevention of the forwarding of a credential proof by a verifier to another Verifier</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-privacypass-architecture">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for authorization
   based on privacy-preserving authentication mechanisms.  It describes
   the conceptual model of Privacy Pass and its protocols, its security
   and privacy goals, practical deployment models, and recommendations
   for each deployment model that helps ensure the desired security and
   privacy goals are fulfilled.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-16"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cwt-claims-in-headers">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
        </reference>
        <reference anchor="I-D.ietf-cose-typ-header-parameter">
          <front>
            <title>COSE "typ" (type) Header Parameter</title>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="8" month="December" year="2023"/>
            <abstract>
              <t>   This specification adds the equivalent of the JOSE typ (type) header
   parameter to COSE so that the benefits of explicit typing, as defined
   in the JSON Web Token Best Current Practices BCP, can be brought to
   COSE objects.  The syntax of the COSE type header parameter value is
   the same as the existing COSE content type header parameter.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-typ-header-parameter-02"/>
        </reference>
        <reference anchor="I-D.ietf-cose-merkle-tree-proofs">
          <front>
            <title>Concise Encoding of Signed Merkle Tree Proofs</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="11" month="December" year="2023"/>
            <abstract>
              <t>   This specification describes verifiable data structures and
   associated proof types for use with COSE.  The extensibility of the
   approach is demonstrated by providing CBOR encodings for RFC9162.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the CBOR Object Signing
   and Encryption Working Group mailing list (cose@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/cose/.

   Source for this draft and an issue tracker can be found at
   https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-03"/>
        </reference>
        <reference anchor="I-D.ietf-jose-json-web-proof">
          <front>
            <title>JSON Web Proof</title>
            <author fullname="Jeremie Miller" initials="J." surname="Miller">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="David Waite" initials="D." surname="Waite">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="21" month="October" year="2023"/>
            <abstract>
              <t>   The JOSE set of standards established JSON-based container formats
   for Keys (https://datatracker.ietf.org/doc/rfc7517/), Signatures
   (https://datatracker.ietf.org/doc/rfc7515/), and Encryption
   (https://datatracker.ietf.org/doc/rfc7516/).  They also established
   IANA registries (https://www.iana.org/assignments/jose/jose.xhtml) to
   enable the algorithms and representations used for them to be
   extended.  Since those were created, newer cryptographic algorithms
   that support selective disclosure and unlinkability have matured and
   started seeing early market adoption.

   This document defines a new container format similar in purpose and
   design to JSON Web Signature (JWS) called a _JSON Web Proof (JWP)_.
   Unlike JWS, which integrity-protects only a single payload, JWP can
   integrity-protect multiple payloads in one message.  It also
   specifies a new presentation form that supports selective disclosure
   of individual payloads, enables additional proof computation, and
   adds a protected header to prevent replay and support binding
   mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-jose-json-web-proof-02"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-selective-disclosure-jwt">
          <front>
            <title>Selective Disclosure for JWTs (SD-JWT)</title>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Kristina Yasuda" initials="K." surname="Yasuda">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="11" month="December" year="2023"/>
            <abstract>
              <t>   This specification defines a mechanism for selective disclosure of
   individual elements of a JSON object used as the payload of a JSON
   Web Signature (JWS) structure.  It encompasses various applications,
   including but not limited to the selective disclosure of JSON Web
   Token (JWT) claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-selective-disclosure-jwt-07"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-sd-jwt-vc">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>Spruce Systems, Inc.</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-01"/>
        </reference>
        <reference anchor="I-D.prorock-cose-sd-cwt">
          <front>
            <title>Selective Disclosure CWTs (SD-CWT)</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="31" month="August" year="2023"/>
            <abstract>
              <t>   This document describes how to perform selective disclosure of claims
   withing a CBOR Web Token (CWT) [RFC8392] as well as how to create and
   verify those tokens.

   This document does not define any new cryptography.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-prorock-cose-sd-cwt-01"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols. Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements. The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements. The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications. This document obsoletes RFC 3281. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
      </references>
    </references>
    <?line 900?>

<section anchor="examples">
      <name>Examples</name>
      <t>These examples are "JOSE-like", because thats easier to generate than "COSE-like",
however, they are designed to be easily translated to COSE.</t>
      <t>Editors note: There are currently no examples using BBS Blind Signatures, but we plan to add some when its easy to do so.</t>
      <section anchor="presented-token-with-receipts">
        <name>Presented Token with Receipts</name>
        <section anchor="protected-header">
          <name>Protected Header</name>
          <sourcecode type="json"><![CDATA[
{
  "alg": "ES384",
  "b64": false,
  "crit": [
    "b64"
  ],
  "kid": "https://subject.example/subjects/6320cb92-fffe-4538-8c82-2ad3b6e7fbf8#QtCd_YvNG8IkhRwQUH3wNqScXzKvRyI0SPjuEy8Ms1A",
  "jwt_claims": {
    "_sd_hash_alg": "sha-256",
    "_sd_hash": "d_4N34CMEwjuBSKEFFk7GyfKQS_GPgCj_Mo2KWdOFUU",
    "iat": 1700518433,
    "aud": "https://verifier.example/transactions/b9a87c99-1fc3-4292-a324-756d680fa4cf",
    "nonce": "860fc8e5-1ed9-4f25-92ad-964c4197df15"
  }
}
]]></sourcecode>
        </section>
        <section anchor="unprotected-header">
          <name>Unprotected Header</name>
          <sourcecode type="json"><![CDATA[
{
  "issued_token": "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.._hmFSFDpUpUsOYeF3O0o-buB6-R_2cuMu85p6NQtK3uQ8UsHolx_icHEgpDbgKv-FomxVUoCqs0GfUVmUwraor_tDEwmdteP7u2L9YpfTp95XlGWhLRMqyMMUzT563Ib~e30",
  "issued_disclosures": [],
  "receipts": [
    "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..vq1LVcsS5Uf9W4TQOXPgy2X-j8n0Gbc5jf2ZI-hlcdNHpwtZ60hYbUwa5qBCfktjVBumqXi6qgkrfLmC8uO9_RRxoPYLB-nA5-Ip5xYzjM9hQ-_bVb0c2voAfj73HM8k~eyJwcm9vZnMiOnsiaW5jbHVzaW9uIjpbIlcxMCJdfX0"
  ]
}
]]></sourcecode>
        </section>
        <section anchor="json">
          <name>JSON</name>
          <sourcecode type="text"><![CDATA[
{
  "protected": "eyJhbGciOiJFUzM4NCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il0sImtpZCI6Imh0dHBzOi8vc3ViamVjdC5leGFtcGxlL3N1YmplY3RzLzYzMjBjYjkyLWZmZmUtNDUzOC04YzgyLTJhZDNiNmU3ZmJmOCNRdENkX1l2Tkc4SWtoUndRVUgzd05xU2NYekt2UnlJMFNQanVFeThNczFBIiwiand0X2NsYWltcyI6eyJfc2RfaGFzaF9hbGciOiJzaGEtMjU2IiwiX3NkX2hhc2giOiJkXzROMzRDTUV3anVCU0tFRkZrN0d5ZktRU19HUGdDal9NbzJLV2RPRlVVIiwiaWF0IjoxNzAwNTE4NDMzLCJhdWQiOiJodHRwczovL3ZlcmlmaWVyLmV4YW1wbGUvdHJhbnNhY3Rpb25zL2I5YTg3Yzk5LTFmYzMtNDI5Mi1hMzI0LTc1NmQ2ODBmYTRjZiIsIm5vbmNlIjoiODYwZmM4ZTUtMWVkOS00ZjI1LTkyYWQtOTY0YzQxOTdkZjE1In19",
  "unprotected": {
    "issued_token": "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.._hmFSFDpUpUsOYeF3O0o-buB6-R_2cuMu85p6NQtK3uQ8UsHolx_icHEgpDbgKv-FomxVUoCqs0GfUVmUwraor_tDEwmdteP7u2L9YpfTp95XlGWhLRMqyMMUzT563Ib~e30",
    "issued_disclosures": [],
    "receipts": [
      "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..vq1LVcsS5Uf9W4TQOXPgy2X-j8n0Gbc5jf2ZI-hlcdNHpwtZ60hYbUwa5qBCfktjVBumqXi6qgkrfLmC8uO9_RRxoPYLB-nA5-Ip5xYzjM9hQ-_bVb0c2voAfj73HM8k~eyJwcm9vZnMiOnsiaW5jbHVzaW9uIjpbIlcxMCJdfX0"
    ]
  },
  "payload": null,
  "signature": "3VQlvmoSwm4VYielECL38_RqkKI41XL-eS4etFpRgWUxL4UpcGE_jSEaLh4Aou0syF5Kto3F7An1QSjE6Jz3_GhmhyZvYxKiIyb8HAcuI_L4KHGs1riPSk9NO9r279i3"
}
]]></sourcecode>
        </section>
        <section anchor="compact">
          <name>Compact</name>
          <sourcecode type="text"><![CDATA[
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..3VQlvmoSwm4VYielECL38_RqkKI41XL-eS4etFpRgWUxL4UpcGE_jSEaLh4Aou0syF5Kto3F7An1QSjE6Jz3_GhmhyZvYxKiIyb8HAcuI_L4KHGs1riPSk9NO9r279i3~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
]]></sourcecode>
        </section>
      </section>
      <section anchor="issued-token">
        <name>Issued Token</name>
        <section anchor="protected-header-1">
          <name>Protected Header</name>
          <sourcecode type="json"><![CDATA[
{
  "alg": "ES384",
  "b64": false,
  "crit": [
    "b64"
  ],
  "kid": "https://issuer.example/issuers/4fd94f63-4e8d-4ba0-8b08-496c6087acf0#ZoTnc8qt31MLZMgTwrBufMlXIzA7Pk_h_Jl16c_nfwc",
  "typ": "application/cool+jose",
  "cty": "text/plain; charset=utf-8",
  "jwt_claims": {
    "cnf": {
      "kid": "https://subject.example/subjects/6320cb92-fffe-4538-8c82-2ad3b6e7fbf8#QtCd_YvNG8IkhRwQUH3wNqScXzKvRyI0SPjuEy8Ms1A"
    },
    "iat": 1700518433,
    "_sd_hash_alg": "sha-256",
    "iss": "https://issuer.example/issuers/4fd94f63-4e8d-4ba0-8b08-496c6087acf0",
    "sub": "https://subject.example/subjects/6320cb92-fffe-4538-8c82-2ad3b6e7fbf8"
  }
}
]]></sourcecode>
        </section>
        <section anchor="unprotected-header-1">
          <name>Unprotected Header</name>
          <sourcecode type="json"><![CDATA[
{}
]]></sourcecode>
        </section>
        <section anchor="json-1">
          <name>JSON</name>
          <sourcecode type="text"><![CDATA[
{
  "protected": "eyJhbGciOiJFUzM4NCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il0sImtpZCI6Imh0dHBzOi8vaXNzdWVyLmV4YW1wbGUvaXNzdWVycy80ZmQ5NGY2My00ZThkLTRiYTAtOGIwOC00OTZjNjA4N2FjZjAjWm9UbmM4cXQzMU1MWk1nVHdyQnVmTWxYSXpBN1BrX2hfSmwxNmNfbmZ3YyIsInR5cCI6ImFwcGxpY2F0aW9uL2Nvb2wram9zZSIsImN0eSI6InRleHQvcGxhaW47IGNoYXJzZXQ9dXRmLTgiLCJqd3RfY2xhaW1zIjp7ImNuZiI6eyJraWQiOiJodHRwczovL3N1YmplY3QuZXhhbXBsZS9zdWJqZWN0cy82MzIwY2I5Mi1mZmZlLTQ1MzgtOGM4Mi0yYWQzYjZlN2ZiZjgjUXRDZF9Zdk5HOElraFJ3UVVIM3dOcVNjWHpLdlJ5STBTUGp1RXk4TXMxQSJ9LCJpYXQiOjE3MDA1MTg0MzMsIl9zZF9oYXNoX2FsZyI6InNoYS0yNTYiLCJpc3MiOiJodHRwczovL2lzc3Vlci5leGFtcGxlL2lzc3VlcnMvNGZkOTRmNjMtNGU4ZC00YmEwLThiMDgtNDk2YzYwODdhY2YwIiwic3ViIjoiaHR0cHM6Ly9zdWJqZWN0LmV4YW1wbGUvc3ViamVjdHMvNjMyMGNiOTItZmZmZS00NTM4LThjODItMmFkM2I2ZTdmYmY4In19",
  "unprotected": {},
  "payload": null,
  "signature": "_hmFSFDpUpUsOYeF3O0o-buB6-R_2cuMu85p6NQtK3uQ8UsHolx_icHEgpDbgKv-FomxVUoCqs0GfUVmUwraor_tDEwmdteP7u2L9YpfTp95XlGWhLRMqyMMUzT563Ib"
}
]]></sourcecode>
        </section>
        <section anchor="compact-1">
          <name>Compact</name>
          <sourcecode type="text"><![CDATA[
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..3VQlvmoSwm4VYielECL38_RqkKI41XL-eS4etFpRgWUxL4UpcGE_jSEaLh4Aou0syF5Kto3F7An1QSjE6Jz3_GhmhyZvYxKiIyb8HAcuI_L4KHGs1riPSk9NO9r279i3~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
]]></sourcecode>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The following individuals provided input into the final form of the document:</t>
      <ul spacing="normal">
        <li>
          <t>Ea-nāṣir</t>
        </li>
        <li>
          <t>Nanni</t>
        </li>
        <li>
          <t>Nis Jespersen</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
