<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-10"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization>DataTrails</organization>
      <address>
        <postal>
          <city>Seattle</city>
          <region>WA</region>
          <code>98199</code>
          <country>United States</country>
        </postal>
        <email>steve.lasker@datatrails.ai</email>
      </address>
    </author>
    <date year="2024" month="November" day="13"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 146?>

<t>Traceability of physical and digital Artifacts in supply chains is a long-standing, but increasingly serious security concern.
The rise in popularity of verifiable data structures as a mechanism to make actors more accountable for breaching their compliance promises has found some successful applications to specific use cases (such as the supply chain for digital certificates), but lacks a generic and scalable architecture that can address a wider range of use cases.</t>
      <t>This document defines a generic, interoperable and scalable architecture to enable transparency across any supply chain with minimum adoption barriers.
It provides flexibility, enabling interoperability across different implementations of Transparency Services with various auditing and compliance requirements.
Issuers can register their Signed Statements on any Transparency Service, with the guarantee that any Relying Parties will be able to verify them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 155?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document describes the generic, interoperable, and scalable SCITT architecture.
Its goal is to enhance auditability and accountability across supply chains.</t>
      <t>In supply chains, downstream Artifacts are built upon upstream Artifacts.
The complexity of traceability and quality control for these supply chains increases with the number of Artifacts and parties contributing to them.
There are many parties who publish information about Artifacts:
For example, the original manufacturer may provide information about the state of the Artifact when it left the factory.
The shipping company may add information about the transport environment of the Artifact.
Compliance Auditors may provide information about their compliance assessment of the Artifact.
Security companies may publish vulnerability information about an Artifact.
Some of these parties may publish information about their analysis or use of an Artifact.</t>
      <t>SCITT provides a way for Relying Parties to obtain this information in a way that is "transparent", that is, parties cannot lie about the information that they publish without it being detected.
SCITT achieves this by having producers publish information in a Transparency Service, where Relying Parties can check the information.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="RFC9052"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl>
        <dt>Append-only Log (Ledger):</dt>
        <dd>
          <t>the verifiable append-only data structure that stores Signed Statements in a Transparency Service, often referred to by the synonym Ledger.
SCITT supports multiple Ledger and Receipt formats to accommodate different Transparency Service implementations, and the proof types associated with different types of Append-only Logs.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements issued by a Transparency Service.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where it is possible for a Transparency Service to provide different views of its Append-only log to Relying Parties about the same Artifact <xref target="EQUIVOCATION"/>.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where it is impossible for a Transparency Service to provide different views of its Append-only Log to Relying Parties about the same Artifact.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Append-only Log.
Receipts are signed proofs of verifiable data-structure properties.
The types of Receipts <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other proof types, such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Append-only Log, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>a Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version,  or any content an Issuer wishes to publish about an Artifact.
The additional Statements about an Artifact are correlated by the Subject defined in the <xref target="CWT_CLAIMS"/> protected header.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, that represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Append-only Log, and endorses its state.
A Transparency Service can be a complex system, requiring the Transparency Service to provide many security guarantees about its Append-only Log.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement, and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure which supports one or more proof types, such as "inclusion proofs" or "consistency proofs" (as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>).</t>
        </dd>
      </dl>
    </section>
    <section anchor="mybody">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the Append-only Log of a Transparency Service.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their Append-only Log using a combination of trusted hardware, replication and consensus protocols, and cryptographic evidence.
A Receipt is an offline, universally-verifiable proof that an entry is registered in the Append-only Log.
Requesting a receipt can result in the production of a new receipt for the same signed statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.
However, the Registrations on a separate Transparency Service is generally disjoint, though it is possible to take a Transparent Statement (i.e. a Signed Statement with a Receipt in its unprotected header, from a from the first Transparency Service) and register it on another Transparency Service, where the second Receipt will be over the first Receipt in the unprotected header.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Append-only Log, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency (CT) <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>
          <t>CAs (Issuers) sign the ASN.1 DER encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</t>
        </li>
        <li>
          <t>CAs submit the certificates to one or more CT logs (Transparency Services)</t>
        </li>
        <li>
          <t>CT logs produce Signed Certificate Timestamps (Transparent Statements)</t>
        </li>
        <li>
          <t>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</t>
        </li>
        <li>
          <t>The Append-only Log can be checked by Auditors</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture consists of a very loose federation of Transparency Services, and a set of common formats and protocols for issuing and registering Signed Statements, and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
Most of the details of the Receipt's contents are specified in the COSE Signed Merkle Tree Proof document <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a Transparency Service independent of any one use case.</t>
      <t>This section describes the three main roles and associated processes in SCITT:</t>
      <ul spacing="normal">
        <li>
          <t>Issuers that use their credentials to create Signed Statements about Artifacts</t>
        </li>
        <li>
          <t>Transparency Services that evaluate Signed Statements against Registration Policies, producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</t>
        </li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>
              <t>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</t>
            </li>
            <li>
              <t>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g. verification);</t>
            </li>
            <li>
              <t>or replay all the Transparent Statements to check for the consistency of the Transparency Service's Append-only Log (e.g. auditing)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple Transparency Services and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more Transparency Service.
Each Transparency Service produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple Transparency Services.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="768" width="376" viewBox="0 0 376 768" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,304 L 32,384" fill="none" stroke="black"/>
              <path d="M 56,80 L 56,104" fill="none" stroke="black"/>
              <path d="M 56,144 L 56,200" fill="none" stroke="black"/>
              <path d="M 56,320 L 56,336" fill="none" stroke="black"/>
              <path d="M 56,464 L 56,480" fill="none" stroke="black"/>
              <path d="M 56,720 L 56,752" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,272" fill="none" stroke="black"/>
              <path d="M 80,352 L 80,368" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 88,496 L 88,680" fill="none" stroke="black"/>
              <path d="M 112,416 L 112,440" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 144,320 L 144,336" fill="none" stroke="black"/>
              <path d="M 144,624 L 144,656" fill="none" stroke="black"/>
              <path d="M 160,352 L 160,368" fill="none" stroke="black"/>
              <path d="M 168,464 L 168,480" fill="none" stroke="black"/>
              <path d="M 176,128 L 176,144" fill="none" stroke="black"/>
              <path d="M 184,272 L 184,336" fill="none" stroke="black"/>
              <path d="M 184,720 L 184,752" fill="none" stroke="black"/>
              <path d="M 200,32 L 200,64" fill="none" stroke="black"/>
              <path d="M 200,544 L 200,568" fill="none" stroke="black"/>
              <path d="M 208,336 L 208,400" fill="none" stroke="black"/>
              <path d="M 216,64 L 216,88" fill="none" stroke="black"/>
              <path d="M 216,176 L 216,264" fill="none" stroke="black"/>
              <path d="M 216,544 L 216,568" fill="none" stroke="black"/>
              <path d="M 224,720 L 224,752" fill="none" stroke="black"/>
              <path d="M 272,624 L 272,656" fill="none" stroke="black"/>
              <path d="M 280,208 L 280,264" fill="none" stroke="black"/>
              <path d="M 288,64 L 288,88" fill="none" stroke="black"/>
              <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
              <path d="M 312,128 L 312,176" fill="none" stroke="black"/>
              <path d="M 312,272 L 312,336" fill="none" stroke="black"/>
              <path d="M 312,400 L 312,520" fill="none" stroke="black"/>
              <path d="M 312,536 L 312,680" fill="none" stroke="black"/>
              <path d="M 328,320 L 328,400" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,512" fill="none" stroke="black"/>
              <path d="M 352,720 L 352,752" fill="none" stroke="black"/>
              <path d="M 200,32 L 304,32" fill="none" stroke="black"/>
              <path d="M 24,48 L 96,48" fill="none" stroke="black"/>
              <path d="M 200,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 24,80 L 96,80" fill="none" stroke="black"/>
              <path d="M 144,96 L 232,96" fill="none" stroke="black"/>
              <path d="M 272,96 L 360,96" fill="none" stroke="black"/>
              <path d="M 24,112 L 88,112" fill="none" stroke="black"/>
              <path d="M 128,128 L 216,128" fill="none" stroke="black"/>
              <path d="M 256,128 L 344,128" fill="none" stroke="black"/>
              <path d="M 24,144 L 88,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 160,160" fill="none" stroke="black"/>
              <path d="M 192,160 L 200,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 184,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 48,288 L 56,288" fill="none" stroke="black"/>
              <path d="M 88,288 L 176,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 128,304" fill="none" stroke="black"/>
              <path d="M 152,320 L 184,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 328,320" fill="none" stroke="black"/>
              <path d="M 184,336 L 312,336" fill="none" stroke="black"/>
              <path d="M 72,352 L 128,352" fill="none" stroke="black"/>
              <path d="M 168,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 96,384 L 144,384" fill="none" stroke="black"/>
              <path d="M 48,400 L 96,400" fill="none" stroke="black"/>
              <path d="M 208,400 L 328,400" fill="none" stroke="black"/>
              <path d="M 72,448 L 152,448" fill="none" stroke="black"/>
              <path d="M 72,496 L 152,496" fill="none" stroke="black"/>
              <path d="M 104,528 L 184,528" fill="none" stroke="black"/>
              <path d="M 232,528 L 328,528" fill="none" stroke="black"/>
              <path d="M 128,576 L 296,576" fill="none" stroke="black"/>
              <path d="M 104,624 L 272,624" fill="none" stroke="black"/>
              <path d="M 144,656 L 272,656" fill="none" stroke="black"/>
              <path d="M 24,688 L 200,688" fill="none" stroke="black"/>
              <path d="M 224,688 L 368,688" fill="none" stroke="black"/>
              <path d="M 8,720 L 184,720" fill="none" stroke="black"/>
              <path d="M 208,720 L 352,720" fill="none" stroke="black"/>
              <path d="M 56,752 L 184,752" fill="none" stroke="black"/>
              <path d="M 224,752 L 352,752" fill="none" stroke="black"/>
              <path d="M 128,128 L 144,96" fill="none" stroke="black"/>
              <path d="M 216,128 L 232,96" fill="none" stroke="black"/>
              <path d="M 256,128 L 272,96" fill="none" stroke="black"/>
              <path d="M 8,720 L 24,688" fill="none" stroke="black"/>
              <path d="M 344,128 L 360,96" fill="none" stroke="black"/>
              <path d="M 104,624 L 128,576" fill="none" stroke="black"/>
              <path d="M 184,720 L 200,688" fill="none" stroke="black"/>
              <path d="M 208,720 L 224,688" fill="none" stroke="black"/>
              <path d="M 272,624 L 296,576" fill="none" stroke="black"/>
              <path d="M 352,720 L 368,688" fill="none" stroke="black"/>
              <path d="M 24,48 C 15.16936,48 8,55.16936 8,64" fill="none" stroke="black"/>
              <path d="M 96,48 C 104.83064,48 112,55.16936 112,64" fill="none" stroke="black"/>
              <path d="M 24,80 C 15.16936,80 8,72.83064 8,64" fill="none" stroke="black"/>
              <path d="M 96,80 C 104.83064,80 112,72.83064 112,64" fill="none" stroke="black"/>
              <path d="M 24,112 C 15.16936,112 8,119.16936 8,128" fill="none" stroke="black"/>
              <path d="M 88,112 C 96.83064,112 104,119.16936 104,128" fill="none" stroke="black"/>
              <path d="M 24,144 C 15.16936,144 8,136.83064 8,128" fill="none" stroke="black"/>
              <path d="M 88,144 C 96.83064,144 104,136.83064 104,128" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 160,160 C 168.83064,160 176,152.83064 176,144" fill="none" stroke="black"/>
              <path d="M 192,160 C 183.16936,160 176,152.83064 176,144" fill="none" stroke="black"/>
              <path d="M 200,160 C 208.83064,160 216,167.16936 216,176" fill="none" stroke="black"/>
              <path d="M 296,192 C 287.16936,192 280,199.16936 280,208" fill="none" stroke="black"/>
              <path d="M 296,192 C 304.83064,192 312,184.83064 312,176" fill="none" stroke="black"/>
              <path d="M 328,192 C 319.16936,192 312,184.83064 312,176" fill="none" stroke="black"/>
              <path d="M 328,192 C 336.83064,192 344,199.16936 344,208" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 48,288 C 39.16936,288 32,295.16936 32,304" fill="none" stroke="black"/>
              <path d="M 56,288 C 64.83064,288 72,280.83064 72,272" fill="none" stroke="black"/>
              <path d="M 88,288 C 79.16936,288 72,280.83064 72,272" fill="none" stroke="black"/>
              <path d="M 72,304 C 63.16936,304 56,311.16936 56,320" fill="none" stroke="black"/>
              <path d="M 128,304 C 136.83064,304 144,311.16936 144,320" fill="none" stroke="black"/>
              <path d="M 144,336 C 152.83064,336 160,343.16936 160,352" fill="none" stroke="black"/>
              <path d="M 72,352 C 63.16936,352 56,344.83064 56,336" fill="none" stroke="black"/>
              <path d="M 128,352 C 136.83064,352 144,344.83064 144,336" fill="none" stroke="black"/>
              <path d="M 96,384 C 87.16936,384 80,376.83064 80,368" fill="none" stroke="black"/>
              <path d="M 144,384 C 152.83064,384 160,376.83064 160,368" fill="none" stroke="black"/>
              <path d="M 48,400 C 39.16936,400 32,392.83064 32,384" fill="none" stroke="black"/>
              <path d="M 96,400 C 104.83064,400 112,407.16936 112,416" fill="none" stroke="black"/>
              <path d="M 128,400 C 119.16936,400 112,407.16936 112,416" fill="none" stroke="black"/>
              <path d="M 128,400 C 136.83064,400 144,392.83064 144,384" fill="none" stroke="black"/>
              <path d="M 72,448 C 63.16936,448 56,455.16936 56,464" fill="none" stroke="black"/>
              <path d="M 152,448 C 160.83064,448 168,455.16936 168,464" fill="none" stroke="black"/>
              <path d="M 72,496 C 63.16936,496 56,488.83064 56,480" fill="none" stroke="black"/>
              <path d="M 152,496 C 160.83064,496 168,488.83064 168,480" fill="none" stroke="black"/>
              <path d="M 104,528 C 95.16936,528 88,520.83064 88,512" fill="none" stroke="black"/>
              <path d="M 184,528 C 192.83064,528 200,535.16936 200,544" fill="none" stroke="black"/>
              <path d="M 232,528 C 223.16936,528 216,535.16936 216,544" fill="none" stroke="black"/>
              <path d="M 328,528 C 336.83064,528 344,520.83064 344,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="320,680 308,674.4 308,685.6" fill="black" transform="rotate(90,312,680)"/>
              <path class="jump" d="M 312,536 C 318,536 318,520 312,520" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="296,88 284,82.4 284,93.6" fill="black" transform="rotate(90,288,88)"/>
              <polygon class="arrowhead" points="288,264 276,258.4 276,269.6" fill="black" transform="rotate(90,280,264)"/>
              <polygon class="arrowhead" points="224,568 212,562.4 212,573.6" fill="black" transform="rotate(90,216,568)"/>
              <polygon class="arrowhead" points="224,264 212,258.4 212,269.6" fill="black" transform="rotate(90,216,264)"/>
              <polygon class="arrowhead" points="224,88 212,82.4 212,93.6" fill="black" transform="rotate(90,216,88)"/>
              <polygon class="arrowhead" points="208,568 196,562.4 196,573.6" fill="black" transform="rotate(90,200,568)"/>
              <polygon class="arrowhead" points="184,288 172,282.4 172,293.6" fill="black" transform="rotate(0,176,288)"/>
              <polygon class="arrowhead" points="176,368 164,362.4 164,373.6" fill="black" transform="rotate(180,168,368)"/>
              <polygon class="arrowhead" points="160,320 148,314.4 148,325.6" fill="black" transform="rotate(180,152,320)"/>
              <polygon class="arrowhead" points="120,440 108,434.4 108,445.6" fill="black" transform="rotate(90,112,440)"/>
              <polygon class="arrowhead" points="96,680 84,674.4 84,685.6" fill="black" transform="rotate(90,88,680)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6" fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6" fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,104 52,98.4 52,109.6" fill="black" transform="rotate(90,56,104)"/>
              <g class="text">
                <text x="252" y="52">Issuer</text>
                <text x="60" y="68">Artifact</text>
                <text x="180" y="116">sign</text>
                <text x="308" y="116">verify</text>
                <text x="56" y="132">Statement</text>
                <text x="68" y="228">Signed</text>
                <text x="72" y="244">Statement</text>
                <text x="244" y="292">Transparency</text>
                <text x="96" y="324">Receipt</text>
                <text x="240" y="324">Service</text>
                <text x="268" y="356">Transparency</text>
                <text x="120" y="372">Receipt</text>
                <text x="264" y="388">Service</text>
                <text x="112" y="468">Transparent</text>
                <text x="112" y="484">Statement</text>
                <text x="156" y="596">Verify</text>
                <text x="232" y="596">Transparent</text>
                <text x="200" y="612">Statement</text>
                <text x="184" y="644">Relying</text>
                <text x="240" y="644">Party</text>
                <text x="68" y="708">Collecting</text>
                <text x="148" y="708">Receipts</text>
                <text x="268" y="708">Replay</text>
                <text x="312" y="708">Log</text>
                <text x="96" y="740">Relying</text>
                <text x="152" y="740">Party</text>
                <text x="264" y="740">Relying</text>
                <text x="320" y="740">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                        +------------+
 .----------.           |   Issuer   |
|  Artifact  |          +-+--------+-+
 '----+-----'             v        v
      v          .--------+-.    .-+--------.
 .----+----.    /   sign   /    /  verify  /
| Statement |  '-----+----+    '------+---+
 '----+----'         |                |
      |    .--------' '--.            |
      |   |               |           |
      v   v               |        .-' '-.
 .----+---+---.           |       |       |
|    Signed    |          |       |       |
|   Statement  |          |       |       |
 '------+-----'           v       v       |
        |             +---+-------+---+   |
    .--' '----------->+ Transparency  |   |
   |   .--------.     |               |   |
   |  | Receipt  +<---+   Service     +-+ |
   |  |          +.   +--+------------+ | |
   |   '-+------'  |     | Transparency | |
   |     | Receipt +<----+              | |
   |      '------+'      |   Service    | |
    '-------. .-'        +------------+-+ |
             |                        |   |
             v                        |   |
       .-----+-----.                  |   |
      | Transparent |                 |   |
      |  Statement  |                 |   |
       '--+--------'                  |   |
          |                           |   |
          |'-----------.   .----------)--'
          |             | |           |
          |             v v           |
          |    .--------+-+---------. |
          |   / Verify Transparent /  |
          |  /      Statement     /   |
          | '----+---------------+    |
          |      | Relying Party |    |
          |      +---------------+    |
          v                           v
  .-------+-------------.  .----------+------.
 / Collecting Receipts /  /   Replay Log    /
'-----+---------------+  '-+---------------+
      | Relying Party |    | Relying Party |
      +---------------+    +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely Transparency Service, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature an Append-only Log.
The Append-only Log is the verifiable data structure that records registered Signed Statements and supports the production of Receipts.</t>
        <t>All Transparency Services <bcp14>MUST</bcp14> expose APIs for the Registration of Signed Statements and issuance of Receipts.</t>
        <t>Transparency Services <bcp14>MAY</bcp14> support additional APIs for auditing, for instance, to query the history of Signed Statements.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example</tt> may have a distinct Issuer identity for each sub domain, such as <tt>customer1.ts.example</tt> and <tt>customer2.ts.example</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is accepted to be registered to the Append-only Log.</t>
          <t>Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.
Transparency Services <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>).
Transparency Services <bcp14>MUST</bcp14> authenticate signed statements as part of a Registration Policy.
For instance, a trust anchor could be an X.509 root certificate, a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.</t>
          <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made transparent and available to all Relying Parties of the Transparency Service by registering them as Signed Statements on the Append-only Log, and distributing the associated Receipts.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="RFC9052"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>In essence, when using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates most recently registered as a trust anchor by the Transparency Service.</t>
            <t>The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently added to the Append-only Log at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors (either in the Append-only Log and retrievable through audit APIs, or included in the Receipt) to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>
              <t>Pre-configured Registration Policy and trust anchors;</t>
            </li>
            <li>
              <t>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</t>
            </li>
            <li>
              <t>An out-of-band authenticated management interface</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-append-only-log">
          <name>Append-only Log</name>
          <t>The security properties of the Append-only Log are determined by the choice of the verifiable data structure used by the Transparency Service to implement the Log.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>once included in the verifiable data structure, a Signed Statement cannot be modified, deleted, or reordered; hence its Receipt provides an offline verifiable proof of Registration.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the Append-only Log.
Everyone with access to its content sees the same collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Append-only Log includes sufficient information to enable authorized actors with access to its content to check that each included Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that is supporting a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
      <section anchor="sec-signed-statements">
        <name>Signed Statements</name>
        <t>This specification prioritizes conformance to <xref target="RFC9052"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissability of conforming messages.
This specification is left intentionally open to allow implementations to make the restrictions that make the most sense for their operational use cases.</t>
        <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="COSWID"/></t>
          </li>
          <li>
            <t><xref target="CycloneDX"/></t>
          </li>
          <li>
            <t><xref target="in-toto"/></t>
          </li>
          <li>
            <t><xref target="SPDX-CBOR"/></t>
          </li>
          <li>
            <t><xref target="SPDX-JSON"/></t>
          </li>
          <li>
            <t><xref target="SLSA"/></t>
          </li>
          <li>
            <t><xref target="SWID"/></t>
          </li>
        </ul>
        <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.
The SCITT tag <tt>COSE_Sign1_Tagged</tt> is outside the scope of COSE, and used to indicate that a signed object is a Signed Statement.</t>
        <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
        <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header) for different Artifacts, or sign all Signed Statements under the same key.</t>
        <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
        <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
        <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
        <t>At least one identifier representing one credential <bcp14>MUST</bcp14> be included in the protected header of the COSE Envelope, as one of <tt>x5t</tt>, <tt>x5chain</tt> or <tt>kid</tt>.
Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
        <ul spacing="normal">
          <li>
            <t>When using x.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</t>
          </li>
          <li>
            <t>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</t>
          </li>
        </ul>
        <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, <tt>iss</tt> <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in length.</t>
        <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out-of-scope of this document.</t>
        <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="CWT_CLAIMS_COSE"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
        <t>A Receipt is a Signed Statement, (cose-sign1), with addition Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
        <section anchor="sec-signed-statement-examples">
          <name>Signed Statement Examples</name>
          <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition (see <xref target="RFC8610"/>) for of the protected header and unprotected header of Signed Statements and Receipts.</t>
          <t>This definition specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.
A Transparency Service implementation <bcp14>MUST</bcp14> reject registering Signed Statements that do not meet their current Registration Policy requirements.
Each implementation <bcp14>SHOULD</bcp14> provide details for their registration policies through documentation or discovery APIs.</t>
          <figure anchor="fig-signed-statement-cddl">
            <name>CDDL definition for Signed Statements and Receipts</name>
            <sourcecode type="cddl"><![CDATA[
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &(CWT_Claims: 15) => CWT_Claims
  ? &(alg: 1) => int
  ? &(content_type: 3) => tstr / uint
  ? &(kid: 4) => bstr
  ? &(x5t: 34) => COSE_CertHash
  * int => any
}

CWT_Claims = {
  &(iss: 1) => tstr
  &(sub: 2) => tstr
  * int => any
}

Unprotected_Header = {
  ? &(x5chain: 33) => COSE_X509
  ? &(receipts: 394)  => [+ Receipt]
  * int => any
}
]]></sourcecode>
          </figure>
          <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
          <figure anchor="fig-signed-statement-edn">
            <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
            <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1      /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)
]]></sourcecode>
          </figure>
          <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
          <figure anchor="fig-signed-statement-protected-header-edn">
            <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
            <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}
]]></sourcecode>
          </figure>
        </section>
      </section>
      <section anchor="sec-registration">
        <name>Registration</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Client authentication:</strong> A Client authenticates with the Transparency Service before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation-specific and out of scope of the SCITT architecture.</t>
          </li>
          <li>
            <t><strong>TS Signed Statement Verification and Validation:</strong> The Transparency Service <bcp14>MUST</bcp14> perform signature verification per <xref section="4.4" sectionFormat="of" target="RFC9052"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The Transparency Service <bcp14>MUST</bcp14> also check the Signed Statement includes the required protected headers.
The Transparency Service <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain specific registration policies that apply to specific content types.</t>
          </li>
          <li>
            <t><strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope, and may use information contained in the attributes of named policies.</t>
          </li>
          <li>
            <t><strong>Register the Signed Statement</strong> to the Append-only Log.</t>
          </li>
          <li>
            <t><strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</t>
          </li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the Append-only Log.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
      </section>
      <section anchor="Receipt">
        <name>Transparent Statements</name>
        <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
        <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
        <t>Receipts are based on Signed Inclusion Proofs as described in COSE Signed Merkle Tree Proofs (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) that also provides the COSE header parameter semantics for label 394.</t>
        <t>The Registration time is recorded as the timestamp when the Transparency Service added this Signed Statement to its Append-only Log.</t>
        <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.</t>
        <figure anchor="fig-transparent-statement-cddl">
          <name>CDDL definition for a Transparent Statement</name>
          <sourcecode type="cddl"><![CDATA[
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &(receipts: 394)  => [+ Receipt]
}
]]></sourcecode>
        </figure>
        <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
        <figure anchor="fig-transparent-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1               /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        394: [                      / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Per the COSE Verifiable Data Structure Registry documented in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, the COSE key type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
        <figure anchor="fig-receipt-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1               /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
        <figure anchor="fig-receipt-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}
]]></sourcecode>
        </figure>
        <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Append-only Log was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
        <figure anchor="fig-receipt-inclusion-proof-edn">
          <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
          <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]
]]></sourcecode>
        </figure>
        <section anchor="validation">
          <name>Validation</name>
          <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in Section 4.4 of RFC9052, when checking the signature of Signed Statements and Receipts.</t>
          <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
          <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them, and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
          <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
          <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
          <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Transparency Services <bcp14>MAY</bcp14> support anonymous access.
Issuers <bcp14>SHOULD</bcp14> ensure Signed Statements submitted to public access services are acceptable for public disclosure.
Publicly accessible Signed Statements <bcp14>MUST NOT</bcp14> carry confidential information.
Once a Signed Statement is inserted into the Append-only Log maintained by a Transparency Service, it cannot be removed from the Log.
In some deployments, a special role, such as an Auditor, might require access to Signed Statements.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>On its own, verifying a Transparent Statement does not guarantee that its Envelope or contents are trustworthy.
Just that they have been signed by the apparent Issuer and counter-signed by the Transparency Service.
If the Relying Party trusts the Issuer, after validation of the Issuer identity, it can infer that an Issuer's Signed Statement was issued with this Envelope and contents, which may be interpreted as the Issuer saying the Artifact is fit for its intended purpose.
If the Relying Party trusts the Transparency Service, it can independently infer that the Signed Statement passed the Transparency Service Registration Policy and that has been persisted in the Append-only Log.
Unless advertised in the Transparency Service Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the Append-only Log matches the ordering of their issuance.</t>
      <t>Similarly, the fact that an Issuer can be held accountable for its Transparent Statements does not on its own provide any mitigation or remediation mechanism in case one of these Transparent Statements turned out to be misleading or malicious.
Just that signed evidence will be available to support them.</t>
      <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      <t>Issuers <bcp14>MUST</bcp14> ensure that the Statement payloads in their Signed Statements are correct and unambiguous, for example by avoiding ill-defined or ambiguous formats that may cause Relying Parties to interpret the Signed Statement as valid for some other purpose.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> carefully protect their private signing keys and avoid these keys being used for any purpose not described in this architecture document.
In cases where key re-use is unavoidable, keys <bcp14>MUST NOT</bcp14> sign any other message that may be verified as an Envelope as part of a Signed Statement.</t>
      <t>For instance, the code for the Registration Policy evaluation and endorsement may be protected by running in a Trusted Execution Environment (TEE).</t>
      <t>The Transparency Service may be replicated with a consensus algorithm, such as Practical Byzantine Fault Tolerance <xref target="PBFT"/> and may be used to protect against malicious or vulnerable replicas.
Threshold signatures may be use to protect the service key, etc.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> rotate their keys in well-defined cryptoperiods, see <xref target="KEY-MANAGEMENT"/>.</t>
      <t>A Transparency Service <bcp14>MAY</bcp14> provide additional authenticity assurances about its secure implementation and operation, enabling remote attestation of the hardware platforms and/or software Trusted Computing Bases (TCB) that run the Transparency Service.
If present, these additional authenticity assurances <bcp14>MUST</bcp14> be registered in the Append-only Log and <bcp14>MUST</bcp14> always be exposed by the Transparency Services' APIs.
An example of Signed Statement's payloads that can improve authenticity assurances are trustworthiness assessments that are RATS Conceptual Messages, such as Evidence, Endorsements, or corresponding Attestation Results (see <xref target="RFC9334"/>).</t>
      <t>For example, if a Transparency Service is implemented using a set of redundant replicas, each running within its own hardware-protected trusted execution environments (TEEs), then each replica can provide fresh Evidence or fresh Attestation Results about its TEEs.
The respective Evidence can show, for example, the binding of the hardware platform to the software that runs the Transparency Service, the long-term public key of the service, or the key used by the replica for signing Receipts.
The respective Attestation Result, for example, can show that the remote attestation Evidence was appraised by a Relying Party and complies with well-known Reference Values and Endorsements.</t>
      <t>Auditors should be aware that the certification path information included in an unprotected <tt>x5chain</tt> header of a to-be-registered Signed Statement can be tampered with by a malicious Transparency Service (e.g., one that does not incorporate remote attestation), which may replace the intermediate certificates and ultimately connect to an unexpected root.
This modification helps protect against person-in-the-middle attacks, but not denial-of-service.
Auditors <bcp14>MUST</bcp14> perform certification path validation in accordance with PKIX rules specified in <xref target="RFC5280"/>.
In particular, Auditors <bcp14>MUST</bcp14> verify that certification paths chain to one or more trust anchors (often represented as root certificates).</t>
      <section anchor="sec-security-guarantees">
        <name>Security Guarantees</name>
        <t>SCITT provides the following security guarantees:</t>
        <ol spacing="normal" type="1"><li>
            <t>Statements made by Issuers about supply chain Artifacts are identifiable, can be authenticated, and once authenticated, are non-repudiable</t>
          </li>
          <li>
            <t>Statement provenance and history can be independently and consistently audited</t>
          </li>
          <li>
            <t>Issuers can efficiently prove that their Statement is logged by a Transparency Service</t>
          </li>
        </ol>
        <t>The first guarantee is achieved by requiring Issuers to sign their Statements and associated metadata using a distributed public key infrastructure.
The second guarantee is achieved by storing the Signed Statement on an Append-only Log.
The third guarantee is achieved by implementing the Append-only Log using a verifiable data structure (such as a Merkle Tree <xref target="MERKLE"/>).</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, Transparency Services, and Auditors) are corrupt or compromised.</t>
        <t>This threat model may need to be refined to account for specific supply chain use cases.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
These guarantees are meant to hold for extensive periods of time, possibly decades.</t>
        <t>It can never be assumed that some Issuers and some Transparency Services will not be corrupt.</t>
        <t>SCITT entities explicitly trust one another on the basis of their long-term identity, which maps to shorter-lived cryptographic credentials.
A Relying Party <bcp14>SHOULD</bcp14> validate a Transparent Statement originating from a given Issuer, registered at a given Transparency Service (both identified in the Relying Party's local authorization policy) and would not depend on any other Issuer or Transparency Services.</t>
        <t>Issuers cannot be stopped from producing Signed Statements including false assertions in their Statement payload (either by mistake or by corruption), but these Issuers can made accountable by ensuring their Signed Statements are systematically registered at a Transparency Service.</t>
        <t>Similarly, providing strong residual guarantees against faulty/corrupt Transparency Services is a SCITT design goal.
Preventing a Transparency Service from registering Signed Statements that do not meet its stated Registration Policy, or to issue Receipts that are not consistent with their Append-only Log is not possible.
In contrast Transparency Services can be held accountable and they can be called out by any Auditor that replays their Append-only Log against any contested Receipt.
Note that the SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.</t>
        <t>In both cases, the SCITT architecture provides generic, universally-verifiable cryptographic proofs to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
In particular, so long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
        <section anchor="sec-append-only-log-1">
          <name>Append-only Log</name>
          <t>If a Transparency Service is honest, then a Transparent Statement including a correct Receipt ensures that the associated Signed Statement passed its Registration Policy and was registered appropriately.</t>
          <t>Conversely, a corrupt Transparency Service may:</t>
          <ol spacing="normal" type="1"><li>
              <t>refuse or delay the Registration of Signed Statements</t>
            </li>
            <li>
              <t>register Signed Statements that do not pass its Registration Policy (e.g., Signed Statement with Issuer identities and signatures that do not verify)</t>
            </li>
            <li>
              <t>issue verifiable Receipts for Signed Statements that do not match its Append-only Log</t>
            </li>
            <li>
              <t>refuse access to its Transparency Service (e.g., to Auditors, possibly after storage loss)</t>
            </li>
          </ol>
          <t>An Auditor granted (partial) access to a Transparency Service and to a collection of disputed Receipts will be able to replay it, detect any invalid Registration (2) or incorrect Receipt in this collection (3), and blame the Transparency Service for them.
This ensures any Relying Party that trusts at least one such Auditor that (2, 3) will be blamed to the Transparency Service.</t>
          <t>Due to the operational challenge of maintaining a globally consistent Append-only Log, some Transparency Services may provide limited support for historical queries on the Signed Statements they have registered, and accept the risk of being blamed for inconsistent Registration or Issuer Equivocation.</t>
          <t>Relying Parties and Auditors may also witness (1, 4) but may not be able to collect verifiable evidence for it.</t>
        </section>
        <section anchor="sec-availability-of-receipts">
          <name>Availability of Receipts</name>
          <t>Networking and Storage are trusted only for availability.</t>
          <t>Auditing may involve access to data beyond what is persisted in the Transparency Services.
For example, the registered Transparency Service may include only the hash of a detailed SBOM, which may limit the scope of auditing.</t>
          <t>Resistance to denial-of-service is implementation specific.</t>
          <t>Actors may want to independently keep their own record of the Signed Statements they issue, endorse, verify, or audit.</t>
        </section>
        <section anchor="sec-confidentiality-and-privacy">
          <name>Confidentiality and Privacy</name>
          <t>All contents exchanged between actors is protected using secure authenticated channels (e.g., TLS) but may not exclude network traffic analysis.</t>
          <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Some Transparency Services may publish every Signed Statement in their logs, to facilitate their dissemination and auditing.
Transparency Services <bcp14>MAY</bcp14> return Receipts to Client applications synchronously or asynchronously.</t>
          <t>A collection of Signed Statements must not leak information about the contents of other Signed Statements registered on the Transparency Service.</t>
          <t>Issuers must carefully review the inclusion of private/confidential materials in their Statements.
For example, Issuers must remove Personally Identifiable Information (PII) as clear text in the Statement.
Alternatively, Issuers may include opaque cryptographic Statements, such as hashes.</t>
          <t>The confidentiality of queries is implementation-specific, and generally not guaranteed.
For example, while offline Envelope validation of Signed Statements is private, a Transparency Service may monitor which of its Transparent Statements are being verified from lookups to ensure their freshness.</t>
        </section>
        <section anchor="sec-cryptographic-agility">
          <name>Cryptographic Agility</name>
          <t>The SCITT Architecture supports cryptographic agility.
The actors depend only on the subset of signing and Receipt schemes they trust.
This enables the gradual transition to stronger algorithms, including e.g. post-quantum signature algorithms.</t>
        </section>
        <section anchor="sec-transparency-service-client-applications">
          <name>Transparency Service Client Applications</name>
          <t>Authentication of Client applications is out of scope for this document.
Transparency Services <bcp14>MUST</bcp14> authenticate both Client applications and the Issuer of Signed Statements in order to ensure that implementation specific authentication and authorization policies are enforced.
The specification of authentication and authorization policies is out of scope for this document.</t>
        </section>
        <section anchor="sec-impersonation">
          <name>Impersonation</name>
          <t>The identity resolution mechanism is trusted to associate long-term identifiers with their public signature-verification keys.
Transparency Services and other parties may record identity-resolution evidence to facilitate its auditing.</t>
          <t>If one of the credentials of an Issuer gets compromised, the SCITT Architecture still guarantees the authenticity of all Signed Statements signed with this credential that have been registered on a Transparency Service before the compromise.
It is up to the Issuer to notify Transparency Services of credential revocation to stop Relying Parties from accepting Signed Statements signed with compromised credentials.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-media-type-registration">
        <name>Media Type Registration</name>
        <t>Pending WG discussion.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="COSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="17" month="October" year="2024"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-07"/>
        </reference>
        <reference anchor="CWT_CLAIMS_COSE">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.named-information" target="https://www.iana.org/assignments/named-information">
          <front>
            <title>Named Information</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC6570">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
        </reference>
        <reference anchor="NIST.SP.800-63-3" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">
          <front>
            <title>Digital identity guidelines: revision 3</title>
            <author fullname="Paul A Grassi" surname="Grassi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael E Garcia" surname="Garcia">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="James L Fenton" surname="Fenton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="22" month="June" year="2017"/>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="800-63-3"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-63-3"/>
        </reference>
        <reference anchor="FIPS.201">
          <front>
            <title>Personal identity verification (PIV) of federal employees and contractors</title>
            <author>
              <organization/>
            </author>
            <date month="January" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.201-3"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="ISO.17000.2020" target="https://www.iso.org/standard/73029.html">
          <front>
            <title>ISO/IEC 17000:2020</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC8141">
          <front>
            <title>Uniform Resource Names (URNs)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that is assigned under the "urn" URI scheme and a particular URN namespace, with the intent that the URN will be a persistent, location-independent resource identifier. With regard to URN syntax, this document defines the canonical syntax for URNs (in a way that is consistent with URI syntax), specifies methods for determining URN-equivalence, and discusses URI conformance. With regard to URN namespaces, this document specifies a method for defining a URN namespace and associating it with a namespace identifier, and it describes procedures for registering namespace identifiers with the Internet Assigned Numbers Authority (IANA). This document obsoletes both RFCs 2141 and 3406.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8141"/>
          <seriesInfo name="DOI" value="10.17487/RFC8141"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="CWT_CLAIMS" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION">
          <front>
            <title>Attested append-only memory: making adversaries stick to their word</title>
            <author fullname="Byung-Gon Chun" initials="B." surname="Chun">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="Petros Maniatis" initials="P." surname="Maniatis">
              <organization>Intel Research Berkeley, Berkeley</organization>
            </author>
            <author fullname="Scott Shenker" initials="S." surname="Shenker">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="John Kubiatowicz" initials="J." surname="Kubiatowicz">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <date month="October" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGOPS Operating Systems Review" value="vol. 41, no. 6, pp. 189-204"/>
          <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MERKLE">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author fullname="Ralph C. Merkle" initials="R." surname="Merkle">
              <organization/>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="Lecture Notes in Computer Science" value="pp. 369-378"/>
          <seriesInfo name="DOI" value="10.1007/3-540-48184-2_32"/>
          <seriesInfo name="ISBN" value="[&quot;9783540187967&quot;, &quot;9783540481843&quot;]"/>
          <refcontent>Springer Berlin Heidelberg</refcontent>
        </reference>
        <reference anchor="PBFT">
          <front>
            <title>Practical byzantine fault tolerance and proactive recovery</title>
            <author fullname="Miguel Castro" initials="M." surname="Castro">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Barbara Liskov" initials="B." surname="Liskov">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 20, no. 4, pp. 398-461"/>
          <seriesInfo name="DOI" value="10.1145/571637.571640"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="URLs" target="https://url.spec.whatwg.org/">
          <front>
            <title>URL Living Standard</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="24" month="July" year="2024"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) instead of in a
   sequence of characters.  This simplifies parsing, comparison, and
   reference resolution in environments with severe limitations on
   processing power, code size, and memory size.

   This RFC updates RFC 7595 to add a note on how the URI Schemes
   registry RFC 7595 describes cooperates with the CRI Scheme Numbers
   registry created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –16 of this draft continues -15 by picking up
   // more comments; it was made specifically for IETF 120.  This
   // revision still contains open issues and is intended to serve as a
   // snapshot.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-16"/>
        </reference>
        <reference anchor="KEY-MANAGEMENT">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 926?>

<section anchor="sec-common-terminology-disambiguation">
      <name>Common Terminology Disambiguation</name>
      <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups.</t>
      <t>This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and in particular, the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
      <t>The terms "verifier" and "Relying Party" are used interchangeably through the document.
While these terms are related to "Verifier" and "Relying Party" as used in <xref target="RFC9334"/>, they do not imply the processing of RATS conceptual messages, such as Evidence or Attestation Results that are specific to remote attestation.
A SCITT "verifier" and "Relying Party" and "Issuer" of Receipts or Statements might take on the role of a RATS "Attester".
Correspondingly, all RATS conceptual messages, such as Evidence and Attestation Results, can be the content of SCITT Statements and a SCITT "verifier" can also take on the role of a RATS "Verifier" to, for example, conduct the procedure of Appraisal of Evidence as a part of a SCITT "verifier"'s verification capabilities.</t>
      <t>The terms "Claim" and "Statement" are used throughout this document, where Claim is consistent with the usage in <xref target="I-D.draft-ietf-rats-eat"/> and <xref target="RFC7523"/>, and Statement is reserved for any arbitrary bytes, possibly identified with a media type, about which the Claims are made.</t>
      <t>The term "Subject" provides an identifier of the Issuer's choosing to refer to a given Artifact, and ensures that all associated Statements can be attributed to the identifier chosen by the Issuer.</t>
      <t>In simpler language, a SCITT Statement could be some vendor-specific software bill of materials (SBOM), results from a model checker, static analyzer, or RATS Evidence about the authenticity of an SBOM creation process, where the Issuer identifies themselves using the <tt>iss</tt> Claim, and the specific software that was analyzed as the Subject using the <tt>sub</tt> Claim.</t>
      <t>In <xref target="RFC7523"/>, the Authorization Server (AS) verifies Private Key JWT client authentication requests, and issues access tokens to clients configured to use "urn:ietf:params:oauth:client-assertion-type:jwt-bearer".
This means the AS initially acts as a "verifier" of the authentication credentials in form of a JWT, and then later as an "Issuer" of access and refresh tokens.
This mirrors how Signed Statements are verified before Receipts are issued by a Transparency Service.
Note that the use of <xref target="RFC7523"/> is only one possible approach for client authentication in OAuth.</t>
      <t><xref target="FIPS.201"/> defines "assertion" as "A verifiable statement from an IdP to an RP that contains information about an end user".</t>
      <t><xref target="NIST.SP.800-63-3"/> defines "assertion" as "A statement from a verifier to an RP that contains information about a subscriber.
Assertions may also contain verified attributes."</t>
      <t>This document uses the term Statement to refer to potentially unsecured data and associated Claims, and Signed Statement and Receipt to refer to assertions from an Issuer, or the Transparency Service.</t>
      <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."</t>
      <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="ISO.17000.2020"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.".
In the RATS context, a "NIST attestation" is similar to a RATS "Endorsement".
Occasionally, RATS Evidence and RATS Attestation Results or the procedures of creating these conceptual messages are referred to as "attestation" or (in cases of the use as a verb) "to attest".
The stand-alone use of "attestation" and "to attest" is discouraged outside a well-defined context, such as specification text that highlights the application of terminology, explicitly.
Correspondingly, it is often useful for the intended audience to qualify the term "attestation" to avoid confusion and ambiguity.</t>
    </section>
    <section anchor="sec-identifiers">
      <name>Identifiers</name>
      <t>This section provides informative examples of identifiers for Statements, Signed Statements, and Receipts.</t>
      <t>SCITT Identifiers are primarily meant to be understood by humans and secondarily meant to be understood by machines, as such we define text encodings for message identifiers first, and then provide binary translations according to standard transformations for URLs and URNs to binary formats.</t>
      <t>SCITT Identifiers for URLs and URNs that are not Data URLs <bcp14>MUST</bcp14> be represented in binary using <xref target="I-D.draft-ietf-core-href"/>.</t>
      <t>For each SCITT conceptual message, we define a Data URL format according to <xref target="RFC2397"/>, a URN format according to <xref target="RFC8141"/> and a URL format according to <xref target="URLs"/>.</t>
      <t>Note that Data URLs require base64 encoding, but the URN definitions require base64url encoding.</t>
      <t>Resolution and dereferencing of these identifiers is out of scope for this document, and can be implemented by any concrete api implementing the abstract interface defined as follows:</t>
      <artwork><![CDATA[
resource: content-type = dereference(identifier: identifier-type)
]]></artwork>
      <t>These identifiers <bcp14>MAY</bcp14> be present in a <tt>tstr</tt> field that does not otherwise restrict the string in ways that prevent a URN or URL from being present.</t>
      <t>This includes <tt>iss</tt>, and <tt>sub</tt> which are used to express the Issuer and Subject of a Signed Statement or Receipt.</t>
      <t>This also includes <tt>kid</tt> which is used to express a hint for which public key should be used to verify a signature.</t>
      <t>All SCITT identifiers share common parameters to promote interoperability:</t>
      <t>Let hash-name be an algorithm name registered in <xref target="IANA.named-information"/>.</t>
      <t>To promote interoperability, the hash-name <bcp14>MUST</bcp14> be "sha-256".</t>
      <t>Let base-encoding, be a base encoding defined in <xref target="RFC4648"/>.</t>
      <t>To promote interoperability, the base encoding <bcp14>MUST</bcp14> be "base64url".</t>
      <t>In the blocks and examples that follow, note '' line wrapping per RFC 8792.</t>
      <section anchor="sec-identifiers-for-binary-content">
        <name>Identifiers For Binary Content</name>
        <t>Identifiers for binary content, such as Statements, or even Artifacts themselves are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of bytes / octets.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "statement" for Statements about Artifacts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
      </section>
      <section anchor="sec-identifiers-for-scitt-messages">
        <name>Identifiers For SCITT Messages</name>
        <t>Identifiers for COSE Sign 1 based messages, such as identifiers for Signed Statements and Receipts are computed as follows:</t>
        <t>Let the <tt>base64url-encoded-to-be-signed-bytes-digest</tt> for the message be the base64url encoded digest with the chosen hash algorithm of the "to-be-signed bytes", according to <xref section="8.1" sectionFormat="of" target="RFC9052"/>.</t>
        <t>Let the SCITT name for the message be the URN constructed from the following URI template, according to <xref target="RFC6570"/>:</t>
        <t>Let the <tt>message-type</tt>, be "signed-statement" for Signed Statements, and "receipt" for Receipts.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-to-be-signed-bytes-digest}
]]></artwork>
        <t>Note that this means the content of the signature is not included in the identifier, even though signature related Claims, such as activation or expiration information in protected headers are included.</t>
        <t>As a result, an attacker may construct a new Signed Statement that has the same identifier as a previous Signed Statement, but has a different signature.</t>
      </section>
      <section anchor="sec-identifiers-for-transparent-statements">
        <name>Identifiers For Transparent Statements</name>
        <t>Identifiers for Transparent Statements are defined as identifiers for binary content, but with "transparent-statement" as the <tt>message-type</tt>.</t>
        <artwork><![CDATA[
urn:ietf:params:scitt:\
{message-type}:\
{hash-name}:{base-encoding}:\
{base64url-encoded-bytes-digest}
]]></artwork>
        <t>Note that because this identifier is computed over the unprotected header of the Signed Statement, any changes to the unprotected header, such as changing the order of the unprotected header map key value pairs, adding additional Receipts, or adding additional proofs to a Receipt, will change the identifier of a Transparent Statement.</t>
        <t>Note that because this identifier is computed over the signatures of the Signed Statement and signatures in each Receipt, any canonicalization of the signatures after the fact will produce a distinct identifier.</t>
      </section>
      <section anchor="sec-statements">
        <name>Statements</name>
        <section anchor="sec-statement-urn">
          <name>Statement URN</name>
          <figure anchor="example-statement-urn">
            <name>Example Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-url">
          <name>Statement URL</name>
          <figure anchor="example-statement-url">
            <name>Example Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:statement:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-statement-data-url">
          <name>Statement Data URL</name>
          <figure anchor="example-statement-data-url">
            <name>Example Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/json;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-signed-statements-1">
        <name>Signed Statements</name>
        <section anchor="sec-signed-statement-urn">
          <name>Signed Statement URN</name>
          <figure anchor="example-signed-statement-urn">
            <name>Example Signed Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-url">
          <name>Signed Statement URL</name>
          <figure anchor="example-signed-statement-url">
            <name>Example Signed Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
signed-statement:sha-256:base64url:5i6...r1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-signed-statement-data-url">
          <name>Signed Statement Data URL</name>
          <figure anchor="example-signed-statement-data-url">
            <name>Example Signed Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-receipts">
        <name>Receipts</name>
        <section anchor="sec-receipt-urn">
          <name>Receipt URN</name>
          <figure anchor="example-receipt-urn">
            <name>Example Receipt URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-url">
          <name>Receipt URL</name>
          <figure anchor="example-receipt-url">
            <name>Example Receipt URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:receipt:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-receipt-data-url">
          <name>Receipt Data URL</name>
          <figure anchor="example-receipt-data-url">
            <name>Example Receipt Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-transparent-statements">
        <name>Transparent Statements</name>
        <section anchor="sec-transparent-statement-urn">
          <name>Transparent Statement URN</name>
          <figure anchor="example-transparent-statement-urn">
            <name>Example Transparent Statement URN</name>
            <artwork align="left"><![CDATA[
urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-url">
          <name>Transparent Statement URL</name>
          <figure anchor="example-transparent-statement-url">
            <name>Example Transparent Statement URL</name>
            <artwork align="left"><![CDATA[
https://transparency.example/api/identifiers\
/urn:ietf:params:scitt:\
transparent-statement:sha-256:base64url:5i6UeR...qnGmr1o
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-transparent-statement-data-url">
          <name>Transparent Statement Data URL</name>
          <figure anchor="example-transparent-statement-data-url">
            <name>Example Transparent Statement Data URL</name>
            <artwork align="left"><![CDATA[
data:application/cose;base64,SGVsb...xkIQ==
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-signing-statements-remotely">
      <name>Signing Statements Remotely</name>
      <t>Statements about digital Artifacts, containing digital Artifacts, or structured data regarding any type of Artifacts, can be too large or too sensitive to be send to a remote Transparency Services over the Internet.
In these cases a Statement can also be hash, which becomes the payload included in COSE to-be-signed bytes.
A Signed Statement (cose-sign1) <bcp14>MUST</bcp14> be produced from the to-be-signed bytes according to <xref section="4.4" sectionFormat="of" target="RFC9052"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
            <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
            <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
            <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
            <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
            <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
            <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
            <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
            <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
            <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
            <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
            <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
            <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
            <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
            <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
            <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
            <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
            <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
            <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
            <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
            <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
            <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
            <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
            <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
            <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
            <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
            <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
            <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
            <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
            <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
            <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
            <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
            <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
            <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
            <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
            <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
            <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
            <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
            <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
            <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
            <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
            <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
            <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
            <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
            <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
            <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
            <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
            <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
            <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
            <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
            <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
            <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
            <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
            <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
            <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
            <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
            <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
            <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
            <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
            <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
            <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
            <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
            <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
            <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
            <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
            <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
            <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
            <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
            <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
            <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
            <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
            <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
            <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
            <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
            <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
            <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
            <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
            <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="336,584 324,578.4 324,589.6" fill="black" transform="rotate(90,328,584)"/>
            <polygon class="arrowhead" points="280,584 268,578.4 268,589.6" fill="black" transform="rotate(90,272,584)"/>
            <polygon class="arrowhead" points="280,520 268,514.4 268,525.6" fill="black" transform="rotate(90,272,520)"/>
            <polygon class="arrowhead" points="248,176 236,170.4 236,181.6" fill="black" transform="rotate(0,240,176)"/>
            <polygon class="arrowhead" points="176,176 164,170.4 164,181.6" fill="black" transform="rotate(0,168,176)"/>
            <polygon class="arrowhead" points="152,624 140,618.4 140,629.6" fill="black" transform="rotate(180,144,624)"/>
            <polygon class="arrowhead" points="64,680 52,674.4 52,685.6" fill="black" transform="rotate(90,56,680)"/>
            <polygon class="arrowhead" points="64,584 52,578.4 52,589.6" fill="black" transform="rotate(90,56,584)"/>
            <polygon class="arrowhead" points="64,456 52,450.4 52,461.6" fill="black" transform="rotate(270,56,456)"/>
            <polygon class="arrowhead" points="64,104 52,98.4 52,109.6" fill="black" transform="rotate(90,56,104)"/>
            <polygon class="arrowhead" points="48,200 36,194.4 36,205.6" fill="black" transform="rotate(90,40,200)"/>
            <g class="text">
              <text x="76" y="52">Artifact</text>
              <text x="60" y="132">Hash</text>
              <text x="196" y="180">OR</text>
              <text x="296" y="180">Payload</text>
              <text x="72" y="228">Statement</text>
              <text x="104" y="292">...</text>
              <text x="164" y="292">Producer</text>
              <text x="232" y="292">Network</text>
              <text x="280" y="292">...</text>
              <text x="192" y="324">...</text>
              <text x="104" y="356">...</text>
              <text x="164" y="356">Issuer</text>
              <text x="224" y="356">Network</text>
              <text x="272" y="356">...</text>
              <text x="52" y="420">Identity</text>
              <text x="168" y="420">(iss,</text>
              <text x="212" y="420">x5t)</text>
              <text x="52" y="436">Document</text>
              <text x="48" y="500">Private</text>
              <text x="96" y="500">Key</text>
              <text x="268" y="548">Header</text>
              <text x="76" y="628">Sign</text>
              <text x="220" y="628">To</text>
              <text x="244" y="628">Be</text>
              <text x="284" y="628">Signed</text>
              <text x="336" y="628">Bytes</text>
              <text x="36" y="708">COSE</text>
              <text x="76" y="708">Sign</text>
              <text x="104" y="708">1</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
      </artset>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Transmute</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@transmute.industries</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
