<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-cose-merkle-tree-proofs-12" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title>COSE Receipts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-12"/>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="06"/>
    <area>Security</area>
    <workgroup>COSE</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier.
Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation.
Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security.
This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE.
The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>COSE Receipts are signed proofs that include metadata about certain states of a verifiable data structure (VDS) that are true when the COSE Receipt was issued.
COSE Receipts can include proves that a document is in a database (proof of inclusion), that a database is append only (proof of consistency), that a smaller set of statements are contained in a large set of statements (proof of disclosure, a special case of proof of inclusion), or proof that certain data is not yet present in a database (proofs of non inclusion).
Different VDS can produce different verifiable data structure proofs (VDP).
The combination of representations of various VDS and VDP can significantly increase burden for implementers and create interoperability challenges for transparency services.
This document describes how to convey VDS and associated VDP types in unified COSE envelopes.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="param-list">
      <name>New COSE Header Parameters</name>
      <t>This section will be removed before publication.</t>
      <t>This document defines three new COSE header parameters, which are introduced up-front in this Section and elaborated on later in this document.</t>
      <dl>
        <dt>TBD_0 (requested assignment 394):</dt>
        <dd>
          <t>A COSE header parameter named <tt>receipts</tt> with a value type of array where the array contains one ore more COSE Receipts as specified in this document.</t>
        </dd>
        <dt>TBD_1 (requested assignment 395):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vds</tt> (Verifiable Data Structure), which conveys the algorithm identifier for a verifiable data structure.
Correspondingly, this document introduces a new <xref target="verifiable-data-structure-registry"/> that registers the integers used to identify verifiable data structures.</t>
        </dd>
        <dt>TBD_2 (requested assignment 396):</dt>
        <dd>
          <t>A COSE header parameter named <tt>vdp</tt> (short for "verifiable data structure proofs"), which conveys a map containing verifiable data structure proofs organized by proof type.
Correspondingly, this document introduces a new <xref target="verifiable-data-structure-proofs-registry"/> that registers the integers used to identify verifiable data structure proof types.</t>
        </dd>
      </dl>
      <t>The other codepoints in this document are assigned from the registries established in this draft, they are therefore not marked TBD.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>CDDL:</dt>
        <dd>
          <t>Concise Data Definition Language (CDDL) is defined in <xref target="RFC8610"/>.</t>
        </dd>
        <dt>EDN:</dt>
        <dd>
          <t>CBOR Extended Diagnostic Notation (EDN) is defined in <xref target="RFC8949"/>, where it is referred to as "diagnostic notation", and is revised in <xref target="I-D.draft-ietf-cbor-edn-literals"/>.</t>
        </dd>
        <dt>Verifiable Data Structure (VDS):</dt>
        <dd>
          <t>A data structure which supports one or more Verifiable Data Structure Proof Types.
This property describes an algorithm used to maintain a verifiable data structure, for example a binary merkle tree algorithm.</t>
        </dd>
        <dt>Verifiable Data Structure Proofs (VDP):</dt>
        <dd>
          <t>A data structure used to convey proof types for proving different properties, such as authentication, inclusion, consistency, and freshness.
Parameters can include multiple proofs of a given type, or multiple types of proof (inclusion and consistency).</t>
        </dd>
        <dt>Proof Type:</dt>
        <dd>
          <t>A verifiable process, that proves properties of a Verifiable Data Structure.
For example, a VDS, such as a binary merkle tree, can support multiple proofs of type "inclusion" where each proof confirms that a given entry is included in a merkle root.</t>
        </dd>
        <dt>Proof Value:</dt>
        <dd>
          <t>An encoding of a Proof Type in CBOR <xref target="RFC8949"/>.</t>
        </dd>
        <dt>Entry:</dt>
        <dd>
          <t>An entry in a verifiable data structure for which proofs can be derived.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>A COSE object, as defined in <xref target="RFC9052"/>, containing the header parameters necessary to convey VDP for an associated VDS.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-generic-verifiable-data-structures">
      <name>Verifiable Data Structures in CBOR</name>
      <t>This section describes representations of verifiable data structure proofs in <xref target="RFC8949"/>.
For example, construction of a merkle tree leaf, or an inclusion proof from a leaf to a merkle root, might have several different representations, depending on the verifiable data structure used.
Differences in representations are necessary to support efficient verification, unique security or privacy properties, and for compatibility with specific implementations.
This document defines two extension points for enabling verifiable data structures with COSE and provides concrete examples for the structures and proofs defined in <xref target="RFC9162"/>.
The design of these structures is influenced by the conventions established for COSE Keys.</t>
      <section anchor="sec-cose-verifiable-data-structures">
        <name>Structures</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">COSE Key Types</eref>, different verifiable data structures support different algorithms.
As EC2 keys (1: 2) support both digital signature and key agreement algorithms, RFC9162_SHA256 (TBD_1 : 1) supports both inclusion and consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structures">
          <name>COSE Verifiable Data Structures</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Reserved</td>
              <td align="left">0</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">RFC9162_SHA256</td>
              <td align="left">1</td>
              <td align="left">SHA256 Binary Merkle Tree</td>
              <td align="left">
                <xref target="RFC9162"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="sec-cose-verifiable-data-structure-proofs">
        <name>Proofs</name>
        <t>Similar to <eref target="https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters">COSE Key Type Parameters</eref>, as EC2 keys (1: 2) keys require and give meaning to specific parameters, such as -1 (crv), -2 (x), -3 (y), -4 (d), RFC9162_SHA256 (TBD_1 : 1) supports both (-1) inclusion and (-2) consistency proofs.</t>
        <t>This document establishes a registry of verifiable data structure algorithms, with the following initial contents:</t>
        <table align="left" anchor="cose-verifiable-data-structure-proofs">
          <name>COSE Verifiable Data Structure Proofs</name>
          <thead>
            <tr>
              <th align="left">Verifiable Data Structure</th>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">CBOR Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">inclusion proofs</td>
              <td align="left">-1</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of inclusion</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-inclusion-proof"/></td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">consistency proofs</td>
              <td align="left">-2</td>
              <td align="left">array (of bstr)</td>
              <td align="left">Proof of append only property</td>
              <td align="left">
                <xref target="sec-rfc9162-sha256-consistency-proof"/></td>
            </tr>
          </tbody>
        </table>
        <t>Proof types are specific to their associated "verifiable data structure", for example, different Merkle trees might support different representations of "inclusion proof" or "consistency proof".
Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types.
For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion.
Security analysis <bcp14>SHOULD</bcp14> be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case.</t>
      </section>
      <section anchor="receipt-spec">
        <name>Usage</name>
        <t>This document registered a new COSE Header Parameter <tt>receipts</tt> (394) to enable this Receipts to be conveyed in the protected and unprotected headers of COSE Objects.</t>
        <t>When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs <bcp14>MUST</bcp14> match entries present in the registries established in this specification.</t>
        <t>Receipts <bcp14>MUST</bcp14> be tagged as COSE_Sign1.</t>
        <t>The following CDDL definition CDDL is provided:</t>
        <figure anchor="fig-receipts-cddl">
          <name>CDDL for a COSE Sign1 with attached receipts</name>
          <sourcecode type="cddl">
Receipt = #6.18(COSE_Sign1)

cose-value = any

Protected_Header = {
  * cose-label =&gt; cose-value
}

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ bstr .cbor Receipt]
  * cose-label =&gt; cose-value
}

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]
</sourcecode>
        </figure>
        <t>The following informative EDN is provided:</t>
        <figure anchor="fig-receipts-edn">
          <name>A COSE Signature with multiple receipts</name>
          <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / key / 4 : "vCl7UcS0ZZY99VpRthDc-0iUjLdfLtnmFqLJ2-Tt8N4",
    / algorithm / 1 : -7,  # ES256
  }&gt;&gt;,
  / unprotected / {
    / receipts / 394 : {
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "mxA4KiOkQFZ-dkLebSo3mLOEPR7rN8XtxkJe45xuyJk",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 9, / leaf / 8,
                / inclusion path /
                h'7558a95f...e02e35d6'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'02d227ed...ccd3774f'
      ])&gt;&gt;,
      &lt;&lt;/ cose-sign1 / 18([
        / protected   / &lt;&lt;{
          / key / 4 : "ajOkeBTJou_wPrlExLMw7L9OTCD5ZIOBYc-O6LESe9c",
          / algorithm / 1 : -7,  # ES256
          / vds       / 395 : 1, # RFC9162 SHA-256
        }&gt;&gt;,
        / unprotected / {
          / proofs / 396 : {
            / inclusion / -1 : [
              &lt;&lt;[
                / size / 6, / leaf / 5,
                / inclusion path /
                h'9352f974...4ffa7ce0',
                h'54806f32...f007ea06'
              ]&gt;&gt;
            ],
          },
        },
        / payload     / null,
        / signature   / h'36581f38...a5581960'
      ])&gt;&gt;
    },
  },
  / payload     / h'0167c57c...deeed6d4',
  / signature   / h'2544f2ed...5840893b'
])
</sourcecode>
        </figure>
        <t>The specific structure of COSE Receipts are dependent on the structure of the COSE_Sign1 payload and the verifiable data structure proofs contained in the COSE_Sign1 unprotected header.
The CDDL for specific verifiable data structure proofs is verifiable data structure specific.
This document describes proofs for RFC9162_SHA256 in the following sections.</t>
        <section anchor="registration-requirements">
          <name>Registration Requirements</name>
          <t>Each specification <bcp14>MUST</bcp14> define how to encode the verifiable data structure identifier and its proof types in CBOR.
Each specification <bcp14>MUST</bcp14> define how to produce and consume the supported proof types.
See <xref target="sec-rfc-9162-verifiable-data-structure-definition"/> as an example.</t>
          <t>Where a specification supports a choice of hash algorithm, an IANA registration must be made for each individually supported algorithm.
For example, to provide for both SHA256 and SHA3_256 with <xref target="RFC9162"/>,
both "RFC9162_SHA256" and "RFC9162_SHA3_256" require entries in the relevant IANA registries.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-rfc-9162-verifiable-data-structure-definition">
      <name>RFC9162_SHA256</name>
      <t>This section defines how the data structures described in <xref target="RFC9162"/> are mapped to the terminology defined in this document, using <xref target="RFC8949"/> and <xref target="RFC9053"/>.</t>
      <section anchor="verifiable-data-structure">
        <name>Verifiable Data Structure</name>
        <t>The integer identifier for this Verifiable Data Structure is 1.
The string identifier for this Verifiable Data Structure is "RFC9162_SHA256".
See <xref target="cose-verifiable-data-structures"/>.
See <xref target="RFC9162"/>, 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure.</t>
      </section>
      <section anchor="sec-rfc9162-sha256-inclusion-proof">
        <name>Inclusion Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.3.1. Generating an Inclusion Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The CBOR representation of an inclusion proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162-sha256-cbor-inclusion-proof">
          <name>CBOR Encoded RFC9162 Inclusion Proof</name>
          <sourcecode type="cddl">
inclusion-proof = bstr .cbor [

    ; tree size at current merkle root
    tree-size: uint

    ; index of leaf in tree
    leaf-index: uint

    ; path from leaf to current merkle root
    inclusion-path: [ + bstr ]
]
</sourcecode>
        </figure>
        <t>The term <tt>leaf-index</tt> is used for alignment with the use established in <xref target="RFC9162"/></t>
        <t>Note that <xref target="RFC9162"/> defines that verification <bcp14>MUST</bcp14> fail if leaf-index is &gt;= tree-size, and inclusion proofs are defined only for leaf nodes.
The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained.</t>
        <section anchor="receipt-of-inclusion">
          <name>Receipt of Inclusion</name>
          <t>In a signed inclusion proof, the payload is the merkle tree root which corresponds to the log at size <tt>tree-size</tt>.
Specifications are encouraged to make payloads detached when possible, forcing validation-time comparison.
Profiles of proof signatures are encouraged to make additional protected header parameters mandatory, to ensure that claims are processed with their intended semantics.
One way to include this information in the COSE structure is use of the typ (type) Header Parameter, see <xref target="RFC9596"/> and the similar guidance provided in <xref target="RFC9597"/>.
The protected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vds-in-inclusion-receipt-protected-header">
            <name>Protected Header for a Receipt of Inclusion</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: 395): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 inclusion proof signature is:</t>
          <figure anchor="vdp-in-unprotected-header">
            <name>A Verifiable Data Structure Proofs in an Unprotected Header</name>
            <sourcecode type="cddl">
inclusion-proofs = [ + inclusion-proof ]

verifiable-proofs = {
  &amp;(inclusion-proof: -1) =&gt; inclusion-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>inclusion-proof (label: -1): <bcp14>REQUIRED</bcp14>. Inclusion proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 inclusion proof signature is the Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the inclusion proof, this protects against implementation errors where the signature is verified but the merkle root does not match the inclusion proof.
The EDN for a Receipt containing an inclusion proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_inclusion_receipt">
            <name>Receipt of Inclusion</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / inclusion / -1 : [
        &lt;&lt;[
          / size / 20, / leaf / 17,
          / inclusion path /
          h'fc9f050f...221c92cb',
          h'bd0136ad...6b28cf21',
          h'd68af9d6...93b1632b'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'de24f0cc...9a5ade89'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the inclusion proof structure in the unprotected header.</t>
          <t>The inclusion proof and signature are verified in order.
First the verifiers applies the inclusion proof to a possible entry (set member) bytes.
If this process fails, the inclusion proof may have been tampered with.
If this process succeeds, the result is a merkle root, which in the attached as the COSE Sign1 payload.
Second the verifier checks the signature of the COSE Sign1.
If the resulting signature verifies, the Receipt has proved inclusion of the entry in the verifiable data structure.
If the resulting signature does not verify, the signature may have been tampered with.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof.</t>
        </section>
      </section>
      <section anchor="sec-rfc9162-sha256-consistency-proof">
        <name>Consistency Proof</name>
        <t>See <xref target="RFC9162"/>, 2.1.4.1. Generating a Consistency Proof, for a complete description of this verifiable data structure proof type.</t>
        <t>The cbor representation of a consistency proof for RFC9162_SHA256 is:</t>
        <figure anchor="rfc9162_sha256_consistency_proof">
          <name>CBOR Encoded RFC9162 Consistency Proof</name>
          <sourcecode type="cddl">
consistency-proof =  bstr .cbor [

    ; older merkle root tree size
    tree-size-1: uint

    ; newer merkle root tree size
    tree-size-2: uint

    ; path from older merkle root to newer merkle root.
    consistency-path: [ + bstr ]

]
</sourcecode>
        </figure>
        <section anchor="receipt-of-consistency">
          <name>Receipt of Consistency</name>
          <t>In a signed consistency proof, the newer merkle tree root (proven to be consistent with an older merkle tree root) is an attached payload and corresponds to the log at size tree-size-2.</t>
          <t>The protected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <figure anchor="vds-in-consistency-receipt-protected-header">
            <name>Protected Header for a Receipt of Consistency</name>
            <sourcecode type="cddl">
protected-header-map = {
  &amp;(alg: 1) =&gt; int
  &amp;(vds: 395) =&gt; int
  * cose-label =&gt; cose-value
}
</sourcecode>
          </figure>
          <ul spacing="normal">
            <li>alg (label: 1): <bcp14>REQUIRED</bcp14>. Signature algorithm identifier. Value type: int.</li>
            <li>vds (label: TBD_1): <bcp14>REQUIRED</bcp14>. Verifiable data structure algorithm identifier. Value type: int.</li>
          </ul>
          <t>The unprotected header for an RFC9162_SHA256 consistency proof signature is:</t>
          <sourcecode type="cddl">
consistency-proofs = [ + consistency-proof ]

verifiable-proofs = {
  &amp;(consistency-proof: -2) =&gt; consistency-proofs
}

unprotected-header-map = {
  &amp;(vdp: 396) =&gt; verifiable-proofs
  * cose-label =&gt; cose-value
}
</sourcecode>
          <ul spacing="normal">
            <li>vdp (label: 396): <bcp14>REQUIRED</bcp14>. Verifiable data structure proofs. Value type: Map.</li>
            <li>consistency-proof (label: -2): <bcp14>REQUIRED</bcp14>. Consistency proofs. Value type: Array of bstr.</li>
          </ul>
          <t>The payload of an RFC9162_SHA256 consistency proof signature is:
The newer Merkle tree hash as defined in <xref target="RFC9162"/>.
The payload <bcp14>SHOULD</bcp14> be detached.
Detaching the payload forces verifiers to recompute the root from the consistency proof, this protects against implementation errors where the signature is verified but the merkle root does not match the proof.</t>
          <t>The EDN for a Receipt containing a consistency proof for RFC9162_SHA256 is:</t>
          <figure anchor="rfc9162_sha256_consistency_receipt">
            <name>Example consistency receipt</name>
            <sourcecode type="cbor-diag">
/ cose-sign1 / 18([
  / protected   / &lt;&lt;{
    / algorithm / 1 : -7,  # ES256
    / vds       / 395 : 1, # RFC9162 SHA-256
  }&gt;&gt;,
  / unprotected / {
    / proofs / 396 : {
      / consistency / -2 : [
        &lt;&lt;[
          / old / 20, / new / 104,
          / consistency path /
          h'e5b3e764...c4a813bc',
          h'87e8a084...4f529f69',
          h'f712f76d...92a0ff36',
          h'd68af9d6...93b1632b',
          h'249efab6...b7614ccd',
          h'85dd6293...38914dc1'
        ]&gt;&gt;
      ],
    },
  },
  / payload     / null,
  / signature   / h'94469f73...52de67a1'
])
</sourcecode>
          </figure>
          <t>The VDS in the protected header is necessary to understand the consistency proof structure in the unprotected header.</t>
          <t>The signature and consistency proof are verified in order.</t>
          <t>First the verifier checks the signature on the COSE Sign1.
If the verification fails, the consistency proof is not checked.
Second the consistency proof is checked by applying a previous inclusion proof, to the consistency proof.
If the verification fails, the append only property of the verifiable data structure is not assured.
This approach is specific to RFC9162_SHA256, different verifiable data structures may not support consistency proofs.
It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid consistency proof.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>See the privacy considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="log-length">
        <name>Log Length</name>
        <t>Some structures and proofs leak the size of the log at the time of inclusion.
In the case that a log only stores certain kinds of information, this can reveal details that could impact reputation.
For example, if a transparency log only stored breach notices, a receipt for a breach notice would reveal the number of previous breaches at the time the notice was made transparent.</t>
      </section>
      <section anchor="header-parameters">
        <name>Header Parameters</name>
        <t>Additional header parameters can reveal information about the transparency service or its log entries.
A privacy analysis <bcp14>MUST</bcp14> be performed for all mandatory fields in profiles based on this specification.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See the security considerations section of:</t>
      <ul spacing="normal">
        <li>
          <xref target="RFC9162"/></li>
        <li>
          <xref target="RFC9053"/></li>
      </ul>
      <section anchor="choice-of-signature-algorithms">
        <name>Choice of Signature Algorithms</name>
        <t>A security analysis <bcp14>MUST</bcp14> be performed to ensure that the digital signature algorithm <tt>alg</tt> has the appropriate strength to secure receipts.</t>
        <t>It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, for example:
Both RFC9162_SHA256 and ES256 depend on the sha-256 hash function.</t>
      </section>
      <section anchor="validity-period">
        <name>Validity Period</name>
        <t>In some cases, receipts <bcp14>MAY</bcp14> include strict validity periods, for example, activation not too far in the future, or expiration, not too far in the past.
See the <tt>iat</tt>, <tt>nbf</tt>, and <tt>exp</tt> claims in <xref target="RFC8392"/>, for one way to accomplish this.
The details of expressing validity periods are out of scope for this document.</t>
      </section>
      <section anchor="status-updates">
        <name>Status Updates</name>
        <t>In some cases, receipts should be "revocable" or "suspendible", after being issued, regardless of their validity period.
The details of expressing statuses are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="cose-header-parameter">
        <name>COSE Header Parameter</name>
        <t>IANA is requested to add the COSE header parameters defined in <xref target="param-list"/>, as listed in <xref target="iana-header-params"/>, to the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> in the 'Integer values from 256 to 65535' range ('Specification Required' Registration Procedure).
The Value Registry for "vds" is the Verifiable Data Structure registry.
The map labels in the "vdp" are assigned from the Verifiable Data Structure Proofs registry.</t>
        <table anchor="iana-header-params">
          <name>Newly registered COSE Header Parameters</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Label</th>
              <th align="left">Value Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>receipts</tt></td>
              <td align="left">TBD_0 (requested assignment: 394)</td>
              <td align="left">array</td>
              <td align="left">Priority ordered sequence of CBOR encoded Receipts</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vds</tt></td>
              <td align="left">TBD_1 (requested assignment: 395)</td>
              <td align="left">int</td>
              <td align="left">Algorithm identifier for COSE Verifiable Data Structures, used to produce COSE Verifiable Data Structure Proofs</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>vdp</tt></td>
              <td align="left">TBD_2 (requested assignment: 396)</td>
              <td align="left">map</td>
              <td align="left">Map key for COSE Verifiable Data Structure Proofs in COSE Header Parameters</td>
              <td align="left">RFCthis, <xref target="param-list"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="verifiable-data-structure-registries">
        <name>Verifiable Data Structure Registries</name>
        <t>IANA established the COSE Verifiable Data Structures and COSE Verifiable Data Structure Proofs registries under a Specification Required policy as described in <xref target="RFC8126"/>.</t>
        <section anchor="expert-review">
          <name>Expert Review</name>
          <t>Expert reviewers should take into consideration the following points:</t>
          <ul spacing="normal">
            <li>Experts are advised to assign the next available positive integer for verifiable data structures.</li>
            <li>Point squatting should be discouraged.
Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered, and that the point is likely to be used in deployments.</li>
            <li>Specifications are required for all point assignments.
Early Allocation is permissible, see Section 2 of <xref target="RFC7120"/>.</li>
            <li>It is not permissible to assign points in COSE Verifiable Data Structures, for which no corresponding COSE Verifiable Data Structure Proofs entry exists, and vice versa.</li>
            <li>The Change Controller for related registrations of structures and proofs should be the same.</li>
          </ul>
        </section>
        <section anchor="verifiable-data-structure-registry">
          <name>COSE Verifiable Data Structures</name>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>Name:
This is a descriptive name for the verifiable data structure that enables easier reference to the item.</li>
            <li>Value:
This is the value used to identify the verifiable data structure.</li>
            <li>Description:
This field contains a brief description of the verifiable data structure.</li>
            <li>Reference:
This contains a pointer to the public specification for the verifiable data structure.</li>
            <li>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structures"/></t>
        </section>
        <section anchor="verifiable-data-structure-proofs-registry">
          <name>COSE Verifiable Data Structure Proofs</name>
          <t>Registration Template:</t>
          <ul spacing="normal">
            <li>Verifiable Data Structure:
This value used identifies the related verifiable data structure.</li>
            <li>Name:
This is a descriptive name for the proof type that enables easier reference to the item.</li>
            <li>Label:
This is the value used to identify the verifiable data structure proof type.</li>
            <li>CBOR Type:
This contains the CBOR type for the value portion of the label.</li>
            <li>Description:
This field contains a brief description of the proof type.</li>
            <li>Reference:
This contains a pointer to the public specification for the proof type.</li>
            <li>Change Controller:
For Standards Track RFCs, list the "IETF".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</li>
          </ul>
          <t>Initial contents: Provided in <xref target="cose-verifiable-data-structure-proofs"/></t>
        </section>
      </section>
    </section>
    <section anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>We would like to thank
Maik Riechert,
Jon Geater,
Michael B. Jones,
Mike Prorock,
Ilari Liusvaara,
Amaury Chamayou,
for their contributions (some of which substantial) to this draft and to the initial set of implementations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <seriesInfo name="DOI" value="10.17487/RFC9053"/>
            <seriesInfo name="RFC" value="9053"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9597"/>
            <seriesInfo name="RFC" value="9597"/>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <seriesInfo name="DOI" value="10.17487/RFC9596"/>
            <seriesInfo name="RFC" value="9596"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <seriesInfo name="DOI" value="10.17487/RFC7120"/>
            <seriesInfo name="RFC" value="7120"/>
            <seriesInfo name="BCP" value="100"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <seriesInfo name="DOI" value="10.17487/RFC8126"/>
            <seriesInfo name="RFC" value="8126"/>
            <seriesInfo name="BCP" value="26"/>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="BCP205">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <seriesInfo name="DOI" value="10.17487/RFC7942"/>
            <seriesInfo name="RFC" value="7942"/>
            <seriesInfo name="BCP" value="205"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-16"/>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present
   // revision (-16) addresses the first half of the WGLC comments,
   // except for the issues around the specific way how to best achieve
   // pluggable ABNF grammars for application-extensions.  It is
   // intended for use as a reference document for the mid-WGLC CBOR WG
   // interim meeting on 2025-01-08.

              </t>
            </abstract>
          </front>
        </reference>
      </references>
    </references>
    <?line 664?>

<section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>Note to RFC Editor: Please remove this section as well as references to <xref target="BCP205"/> before AUTH48.</t>
      <t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="BCP205"/>.
The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="BCP205"/>, "this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="transmute-prototype">
        <name>Transmute Prototype</name>
        <t>An open-source implementation was initiated and is maintained by the Transmute Industries Inc. - Transmute.
An application demonstrating the concepts is available at <eref target="https://github.com/transmute-industries/cose?tab=readme-ov-file#transparent-statement">COSE SCITT Receipts</eref></t>
        <t>Implementation URL: https://github.com/transmute-industries/cose
Maturity: The code's level of maturity is considered to be "prototype".
Coverage and Version Compatibility: The current version ('main') implements the verifiable data structure algorithm, inclusion proof and consistency proof concepts of this draft.
License: The project and all corresponding code and data maintained on GitHub are provided under the Apache License, version 2.
Contact: Orie Steele (orie@transmute.industries)</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAHOGWgAA+09a3fbynHf8Ss21DmR1BKUSD3Jxk5kSc7VjWy5lpz05h4f
ewksSUQgwGAByoyu8lv6W/rLOjP7wALgQ8512uS0bk+uCOxz3jM7O/B935sP
2IHn5VEeiwE7v7m9ZO9FIKJZLr0wDRI+hcdhxke5H4l85AepFP5UZPex8PNM
CH+WpelI+t2eJ3OehJ94nCbQJc8K4UWzjP6SeW9/v7/f83gm+IDdiqDIonzh
PYzVlN79w4BdJbnIEpH7FzibF/B8wGQeerIYTiMpozTJFzMY+ery7rU3iwYe
Y3kaDNhCSPhTphksZyTt78W0/OnxIp+k2cDzWZTAs5sOu82FiAU0VDu8ySJR
PkuzMU+iv/AcJh2wu4wnclrk+EZMeRQPoEEkfpOb550oCWGP8AxnDtIiybPF
gH1IolyEMCrP4YWe+rsOexVl95M0/oud/DuR3LtPYfoBe53xIpmkI5Gx26s7
eMqHw0zMl7zQa5rAKJ2hHuU3iKxOADDjQY7gQFwBQN9PBCwDVi6lYCdHtNwQ
lrB9fNjrH23jb0DMgF3wbAr4DHN3Q78V2ZQnC7OVsw67EHE0TnjuX/M5L0K7
o7MkT6NELHlfBe2bKMhSmY7ychs8ycP4N1PzAvYwrQD1d2b68w57nRZIMXba
cxFmUeA83jjbSDVdO5+XpLDvPJoLpLn3r89P+4d9mOzVzXv1u79/dKAJWf3u
HvcGLBBZHo0ioGPkFCCVGVB/Eiz8eU83O+qfQLOH3J8IHorMD2IeTaV9eQwv
kduA7D0vSka1VZx0e/sDu4CeWdtx1zw97fZgiIgnHLg2kRFMQYCQ/riAH9Do
1fm73v7RgEbrH+plnR70YfXnf0DSuvIvOi7zD9PMF2Hix0DZGY8BC41HnueJ
JEcigv63l9evB6wFo+aTSLY8z/d9IGQkQCBLj8TNDgKS3Qz/JIKc3QK5RMkY
qCBkl0mQLWa44l0rkxiIm7nA/50heIVk6YhxNhcZgJoPY8FCnnMk9yLIi0yA
iLCvRdbxfr+qoaQpgS3SIOLItiTXGIocyURCPaSWW870bSaLYAL92DRKoimP
WRjJIE4lDNlmLtpp/CRNfPHnIpqnAaGi4925TSYinsFIPAK2jRIlORnsN2N5
NIXxcIgJzDUUImF8NosjWCjs0CE1WJFI6CH+RygQQqupkJKPEbRyIXMxlWo0
WcAoCxZMcD6zP1gVYIvJmQjUqLBSDQMJJJkEEQiPyt5QHiY4jR18uGDDIopD
nBF6E453znXfV1HCs4XB+XsxA/hDf65wjetCysBlCCa+5AKIdxjFCHlECTyE
vWcpB8DDMkMxTUmk4fxDQs48onlpUlhfir8k8HpmuLOjKHEahSEIfG8LlU+W
hkAKsAJNl5bkYI9MAl0aopCwBJ6DEAriIhQAWZCTSEt8mBY54YKASWJ/E3nu
/P7idleNh9Og1mQPIMlpl+4y2APgHdRgIcJObX0BT+xiiD30AjkDBV5MAbAI
JlgSp9mHHDCwo8gb/p96onbdbdtuphV0A0gjIaUJUEnZieQJYBpwX3aTQP4x
0KoUObYhAODsCoKkiyIEIq0k5tlYLGlazuEyElfECOwV4Lrg7dL1A4I12+KK
DCYI5LCVJM3BGsiZpralECGEAZc6w3a8i2gE2ha7ALYI3DMiFsCmfbMaxXpc
wPS7XUXSoGKGwAHEVjBdVqF/WsGcZ1FaSJoP2QH60rxIhsSSSQ74gDWCPQVr
HxZZCDSDBB5NZzGBUmRKpGGTHFCJT1Bqcc1JwPKArWQsFGNU2FmKbB4FQmpB
YMkoFDLIoiF0maQPJHjSZC4WdpmO+MQVK+EJYC5w0UJxNTDkXMSwEhjd29oC
MgZ5mGnsv00VEDyC0z0M/ZBmoWStNx9u71pt9V/29ob+fn/57x+u3l9e4N+3
351dX9s/PN3i9rubD9cX5V9lz/ObN28u316ozvCUVR55rTdnP7SUhGzdvLu7
unl7dt3CneQVeHClYIYavIBG3DoHy1kDiogdtOx//Wf3kD0+/gLET6/b7T89
6R+n3ZND+IEcr2YjPlM/QQIsPGQ/nhGpxkj8sygHHdtGhSMBBwmojEwAIP/l
R4TMxwH71TCYdQ9f6ge44cpDA7PKQ4JZ80mjswLikkdLprHQrDyvQbq63rMf
Kr8N3J2Hv/p1jFal3z399UsPxfZb8aCI6juyoNg7noEhSLT/uDXDH2CXyPzJ
0xpNkIBnDxEAE7AGZAfiErSGABYATi2GcWQUc4P0RzA1SlYwpFli5lWWG5vZ
eduAvQgtgoyIQsmJkBUzf5SlSugQDd3qpSDSRQyqQ+kveBLDH1mD1nBBry4+
7bOdDBhGSEVoKA9oeQf9w92B54HlvXxdZCCH7HOmlcZngEE+QdXEY1A5yKmk
qrKME/0hYaOepd9adINkAuAjoKb4PzUlae0FRfTLFt9dufijZy1+HsK6dxwT
7gIl7a2RtLsG9koqSbWDeAzGST6ZMjB5k5zMQBJ4a7RyByzX8zQDoTxLE7Qd
4kW7xvkWtbBzoobHx3I4H4fz7XB+JsZAhNkCOJ0Uk/qNRIorRNExxh+FVNac
Xuhi9QKlBmhvJUCPnwnQGQAUBEmWE0xam7RYqwFjDubqzFAIGl0bFaH2yayx
pq3sbw10HZf45rB3HYOO0lMpDJWRIz0DrzeXyxWFwg9MA4JgSrPrtaEXAyiE
uSI5cbkHHS+lB5SmQbYkQYWWzJRn99AYyAD1KLsD3zxK0jgdL8B+vbi4HgD6
jb1NfHKBEiwioXPNk3HBwf7awZa7yooeGePs8VH7kU9PMPTlxVsaCm3pS7TF
Q2h1EfFxksocnG2jstkOtFw+FLjLT09tLVYiskZhIwJwTTAH0dEKywETPaDW
v9R4HkkzYNMJpWWulArKxNbcUEOlImX0gYADjHhT0m31eO8I/3cK/4yRmtAO
4cKxkHjiyB5DXta1WyN92sSK4gtHSw4aDpWzpGJuDOM45cBrN/7OMTyX798s
S5txrss7Urb0HFm6tHKXOb4YW0OmUYqzXVrObddNUMgcAXtPQI0S5Bxl7bow
0yLOI9x6aZBzNo7m6BTB0sjKt23UYq0/sGMnV7av46YAqErMaXA4OID+IFek
dma0G1UPM6yENW7ndYk1dFiA6hwYLcFiW1n0iviW7ZqUcsvuqKUZSKDfq7YL
+xtF2dT6ewpKAiNXyuUjiGqPS08NHXMLi9+j9lfASKynrPZaAgu7E/sD8+F/
lVig8JjtSTOuJWuiKMVweou4fTDCQDPBssGr9bQx4WqulEIEZO/WxQoGvVCs
OLoHhWrDIgNNgZhF6LseyztlBSRVp+WWhOlKPMsSFltgTPpjkUDTwF+phmTd
9CwFxDK3b5PuVBLQIKFCcQEFQVQEQ2HQlRix4CPiHO64tpqKSB9xaqLCZQ6l
tNk0Gk9yNuFz9NbnKHAdeVDbQxu2h+ECHfRBdKzeEgqf0rcOFGzrQEG9V8Gf
4RcxAjc4Kj1vI33A1QSDqAzVkRiL5jyoRu1IGKWotKcz6Kl9YrKJTdirdKXV
WprOsPYIHlITpEKQKguARDhGzNaaRFLNSJSOK1KhKx1kQ2fSoFf76ADPWsBS
00WFN/w1kWckGzRZYBIwRnQ4TVaGJcExArmQBMpGyylkAWyTKJy4tgoui5b/
OzAGlUPvMItiEgpir+WQ22gaxeDmAn5/NKMpDftxZ5LnMznY23t4eOhgLLsD
9uNeaevKPRye/qfzZZJP4617scCQOboDzwjPSEtRZWOrXmFHZ5JdnvcwFAGa
tDtgvV3bYQh2H/Qao0tOkRlOdI1owcgFHwPjTavjtU0A8hN42L2jY7aj/KIB
6+6WdggNvFKTaZw3PNQSLahvjN27Xqy4KyNSRFyP0jhOH5BwyV7EoBuIWIQ1
SOaf2FuQq8z595PSIvDfC5JtFLFnS//9BP6i5nbvJ9/3PXyAwSagJNtk3zat
vlk6mmqC41ThCi+7upF+omPOb5Rsu0OhaMfZxDPe44BtbSBjgCWQwItWLEZ5
i9F56osWEfNqbdJ6Io7RhtpzuEW7Net4xrGrfgb3+KUC3SX1W+cC+jtTwTsi
UTQ+QHVwpYnTUo66wRFjEPldthNkcxjaByf2C/73gO1gMNk/ZDvh7lcwyo4P
j6rcsuPDAv+BWGa1jd5kJyLIaz4UMfyXTA1Cqn21nsmWcFh3DQPVTAFJD/2u
eqmCPzsADTyw28VH7xpR9+p4j49IwtkoQNT5csIBdb5tq4gX2Gn9opqIw0X1
Ni/KPauwHtmKRTmT2GVt5nLNfn8Dr2smR45/57hZdLZkGAWYBogpylyTdHVI
plVxFF1l96Y0/KS235pKbon52aqRQwutp1YDHa2Od+WeMshJWsQhBSXElxme
6DUOGzierss1m5Gwm2GRq2CHHlAPhraQmOUFjwGtUks9xzPTYyMburtTYZ7q
QW7NZO45HVxjGc+DwnUmg4IpSR8D2NJts0DseCbRBYQSjxcSw74qXj4kiwrP
G2mBUUpyHIbFE3olPjG+5UxJB7qy0HFZelkOHlobFyinmM5K25kHCDvahLEg
we6mUzRlrX2QGAd63NKBYR+J8akuJx1o8jL2XY+5u9HlHQxIq0XT5BTQssFi
dWaiXDET8CIfJxcEEdxRkZS/lU9H0KWZ1cExyvM/mLNSM3Uz1knhGaL0tooI
l8y1Rson695qZNMJy5TnoNLQA46EnclsaUOEr3LCXjrAemQAUc7HYwrt0r4/
YXZEVwcdS5WDMTzlAajoHv1WQSn0JkJQQX/9619ZEIaxmYG9YFvHne7pTjns
rucp2UfG3AuGiT4oqhQKPmlkv2CPHmP/ohJTYtJSL16ysqMHtPOhxFy12y93
DJYGdGDBsO+P/0qSnHUwrmdI5OPGScqFw+A/QvOSWhhYCc6Q9T20obFLXJio
VV8wtpnxRZxyZX7qAfdYEsX4rrT2zTvvIwKZVMgoGvtmoz5C3WoIRIw6eyAy
VstXBzF5zgMkDdOx9VRHs5MBxC4v3i7DMEZGMZLq7SloSZpgjwGiEUR7FSDt
sV/9CrGCf6G/sscOYS+t+Xl88iG43f/jH3/o938/e59PLgJ/P/rwp+twdJ0n
09d/vv6+59/lp28PW23dvQx0wlwwiH/SZmyLXd6CpoUmTy9ftml6F+x7zExu
WXcPqQK6qxcM1rd8H+rfqt2Yt86epl/ODn8X3dz/++s/+uH9tRjepgfT65vL
d+9Psren/5F/uf9eHB59KRbf3+s9mUE27KxsOA+l/fugf4SGahsaaisWnRDf
7aJBYnosA4yzSxQ2OOyxAxzzutTZe2i5DdiPlQYIxfoT7Cajvwj4T78N/0OR
nz122l7SzjEJONDpXqPJZPvk6OiU949GnU5H7PfEwVF4vF1r9vHly8qTj+5U
T+WPJxcoLgMC5xVx7L51WXAPVrHfC3u9ExHCKoIgPDg5ORyZVXzcLaH9zWiK
/+nmXry6+z4tPj28y+LLL9dvHk6u+zd35xdHf7y6efVD4N8cX1/ein7wf4ym
jh2aOvobaap/cNQb9U8OAZuHoxE/CcT+dnOoyfbR4en+8eigB+1G+/sngu//
b9DewfHRaXd0cAqr4MAM3f7xvkt7nh3+ScnB6uhAu93jk+DoJID+oRAiPA4P
t1XL+ky9o8PDUY+o/Oj0cP+0fzDc9j7uLtc9IkyM6jkrNY4ajrSOPXSoax3r
kpQ2j7G9KmlxKtyLBo8O91bamxw2rafNrtG2Wh8aNgcEbspYbbCmeagCm1bH
2i1sDqrLNW3MMKtTofQoTnahiVnoVZcqXB8CqEAppj6RdaiOT908KM+7xEOe
agIm2YQq0GvSr+jERmwAppP3QOepuawc9OkDjc4zpzSZbyYoCdBQiFd+UN3f
ugV3yvrfPjngq53r0oZ9eqJTs8T4asrSR7u8tkIbCuIsmKRRQHQ34XJSSlkM
9rOrs7dnxhpXPaeYWwsm9hRoRznSlE+ahBGYVNrZtHtyDlwrHqQCCNpgNAR5
hBr5CCD48+AT/iBuU6dWAIInEAPUtFUlmJZKOHMeUu+WDbMZL8N6F7GYcyBG
d3eRSqyr06IKLn4dEhpHV+rAgyhh0vSKK0lvm0KqJD6mGLEJddyD5WUKg3ug
UcmkaIP7ipxkT8EIZPgLRAMdTG6tOb5Twk0nfdQTgmie1fEbeNlVIgaBjPb4
13avY9twx6bzkSfTcD1E26zX6cL/uYkeWgg7Qe+2dkDw4CvGE6bQiSdS83Xi
UMH3yupvFcqytLUu6ud9xSYOcBu/xbNVFQ5BBq7O+fO2UUk7UmoDA63VkBhF
FJecli6R81I5YNrHru0c/FPHG/3RI2vg31SkiSwmTFUuMjcKhSev1IxuWGGj
ASuAbE1fkFLiC66PrCy6KSAEvcMHPr2u9iBDiw56zTHvqimd1UMfMP2YdtA/
KhdX2Rn1aCp6nvV9Lw2SUhoRqa3QGrI13BojBOUB+1zu6DMyEaWsEO5jk+1m
o/AY2aqFWRyZ63lvwWBQqRLOYyezk1cPk5X6G/EoZtHIgSwu4+WLEjc6T6ke
Slf2kRJjFJLGVRP0E9i9VLLE5JspB19jlZfNVPpTrLx+PJyPY9Xd6ICSjMr8
Ch1Mg5Hw0kA6VEaUNTpUBAjeWrh73hXmbuj8tNpOVNTMGG+RirS64VIkHZsV
aBL4pJHqIM6RwmmJny3MPoNMcxW5AhfaM0XGxyZZ6t7Oi9pFR0joesQslTIa
xkqcBXTIDgQR0lg+XpZRJ/tZJDGwBmQ1imI3Ucja1Ssn5mFIMpTHrG5puskl
U8A9z9Ns0a6EaJGn6TYXDa+Ti3DxmlajjNQQJdNJAYPkUQAkcQOG1gOnRAeT
DkWSzMZ+6GZCeTlEuvqlkNbqBsnGdugQvBGlbcN8Sg7ru2Vah5IRp6PreD+M
J4GwASaj0et31Uw6QQNCOremYRBXZWnp3dREqB3PTIdJpiaICMYYHQO+eIkw
pEfgKQ8ojbh8uDZ8aOUYdASmdkSXiYPXV7BUmtnQooGyUkrLWAyFmo92JNuh
JeEOBsyk43ccz2xZxnJHn7GrG7ARZlT7FB4wg1EKtTPcyntuzx2e0Np0sn4u
YuvKUWL0FjRMXXd89DzHIrJNFQHUGg+Yb6ihOjbGiZ0tLKOleTgbULo09m/M
+BVkNEMyak62lGzONh4TUi5d4gamNYUpMoLpHMwfPxPz+hC8gus3fNahC7VV
8JvB/SqRXtV0XHWsMzqa1SezmoKM2lC21FdQjWu3kpZRTt3fkOpkllAevRlV
0vEu6C+TOmhaokoR0t4aJVUGcgEUSpErb5dUns3jXqIwVXAeUQcaYIyXJ/Ja
PhkTWZbC2OVli8r29eShORV17TTwhoTUSeC51ve1Nait4zFBVSQ5yZJfbdv+
zacLGwOeXxHq3HCWsCKwuTakWQ1m2jBmb9+JY3ZPqjHcNSHMyTbYxqP9o30M
iPd63aDfC4aV4OVkexjudw+OOYbxjoe902DU69ZahMenfNQPj6FF/2DYPT7o
DcvAZhnS1MHM1cFFE7pshhJD0Tsc7QcYdOzzIxAup30TSqzY+J+Ujf/JbvmT
1pFLZdsq3YfkiNcEG2e9Wk5GtTzdIsET39xYJg1RURo+asBl8UDt7Vd70q3n
UtlmomQ1GCrNqOfrCOZ24mp0mZLuW8uly6G0WWOT6nToHbzcOhXToch22XCR
o8l/NbKyAfdKzoVsLx1yCrKUsm7psnfOpzM6f0cDsjmOLIJAiFAPBVZtEdM1
i1ourzLSNcTskSOXpUFZidRSAkNaidbiPZeJCO5lTWI50V6mT6mvRs5iKPpp
W+ux9HINyeDNdkq8d10QPbDNMF8b61w7qRWa1H3Rru1gPbz1pRXQAVNltKsr
4NUMYWgAQylPKhnD6oZpCvIjMQgZlQfcVUeTUmV0BjXpGgqxUt7thOxwpFvK
5CDBrXwdF/pzoTO71ZuGMsCozbmTx7MmbtNMjPqayM1hPXLTnPZbh24orLIk
dNPMI3tG7Kaxe7AUl4Zv0hillquUrSdejdz43WokJhEPz+zYWxXCWTJ32hy3
Q/0qG6oHdJZEdIy0d/p9+spwTgPjKs21Enpw2lSDDw2ktU3CU7m7MuqwQ/Ii
KROKVF8dEwKOqIDK9qNranj1w4hA92hqQwzDwY+xcZ/nIzXJ8R/G/XWJ5Bs7
wA6i/84uMCUI/286wV+B4KacMY5wUwCtdYUbzcG67u0qhNdn+J9xh/8e7mkT
KNZB7VVGP2/mfP88F3UTTu+sbPon8VWXytf/cW/VmCWbndSv1uL/1F6qu9k9
zHlf56eCbrNuKiblwrL3D6tuagV4TUdVHA0PxMkxZtkEh/y0ezAMam7o6Yk4
5funKg/nqNcfHfdrLUYn3d7o5Bhd2X6P749GB8fPcGWrLXqHfTHiQ2wxPDnu
HgZBWF/HURge9/oH0OLgtN89DIPuN3aH+4eHx/3RCc5w1AvF8QnvrnWHXQNp
nUN8qS9yu6jQ7b+BX7xEPj3bM65eWWuOtMI3XuIcr/AJk1U+YcX5cXzg5hp0
2SYaX1Qd0qWNdUO8toj++kLJkBlWEMB6Ss1IXbp8rI1LXXrXJB2t90/NdjBL
P8PtUH6FW8zMvQtSlXHPvM2IbixOYe4lLLsF9U/mzS5BjoeX5tSNh/NKaUPl
qypOUu+rpQ9tMgtYSmiqbLz555fJJeRFX4MrcC2ScT6BqdLpqgu5AKh7zQ5/
sdER7UbQAR0eUVYvi1wpdqECZ/o+P3YgCpN5ihOYimb3ETon1N2eC2o9HhCC
5gKvaYPBAPSqTyPpSg2gmAd096fI9aWDSj5ThH5zpRRYdQnAWBnlSQGJYYGw
Nl2bUzSgdHjlPXugWfV6yI8rMB6mzmE1T6oeCD4HNNRWj4HFFTFJq1xXriIa
jaJPnndWnto2z2od2LgHqqpunzpMbxZBwztQmDOHgND5Vx3vrLxwY272mCsb
QPw4tM1SiMsjYgayMg7pcGdmTqTVXaN0xYWQLVsrdyWd22tA35jQz206XemX
ndm7jwBp9wLSShjUzsTVJa3GjWlreX2GPz9TIDA3VR4B0Fi/DtiMuI5uluLE
ZdIqwGmJRMNmMd4fWzKP5gnQ5FiYECtkpuOMzyYgd9FyThMqRmfzStbXMKhc
wxt4rzCxr2aeUjVTtCN1wqzNlp1wNBiVvzAqksCgfQu9lihE4L6DydOQgiQS
5Q3KB+A7e2nizdkPNlcAM9Ngx3PTd0Z9Ze2iIEgAoF0ijoRiRykotsxmqxaq
CA31mEWZFi5LWs64zDuWDj8Dmj632edkOPqsMmI+Q//PJg1CV674wx1GCnE5
aZnqAMoAY4GRnBAXmAoFSnoBAcI4IP2kzfJwtkZGCrIvWj4BaJ4yF88pPkZV
CYAGJPswC6ka80pw6ruHQMQtEBVpgFhX9yBlIam2BT6ADY7wbtlQUOIOleXE
QcY8C2MMyCuJH2X1Ba/bm6QliufuSWV91sUCcu6yy3mwY2weqTvbqmIYgj4M
SyOtKTErDqxTT++JroTjn+YllRnWEQVqKLGRNq9ay2v0tcor14+Pv8D1ddBl
++QOQw2fngzNbV/p5E2KOUjl1yILwUzHR0cHR9sMJBtWttqu5BeZ9Opwu5p1
/Q4PUEIsHqcwo4IF782yVFG0EFaqT6RXH9ybrahxMKhCIQqbqAXDzForCoFt
TAcoB68WYDA3xdf9M/UZ6Br5M4o0fON/zo305ju6o27/VX6s+PfVHb7tv3Uz
wm7cK7A/sTUFG/UFSHOfXUPqHd4EVlVrQjp9kthVm8xlNWOMtRt59TNx8/j4
S6zRjbxaZXBGu6GKi7rpmgqOOviM9QTycuyzVaUXN1TFaNu6ZOaywbOu1j9n
N7PKblaUT9QR0J+Iie1u3sAPvP61eQNODs+K2qQ/HzcYkGiKXBNzeCse4oV7
a3uF/H1any5v5GBEChPVh5tda9XGmmpZppT3syUcHrBTiANcieUCnM3SOKKb
7vULB7rkvb4FsMUuv6BXDh3nkXjw9K+MfjllC3JM9gS6TasGdO3mjirrRJa0
Gkhfrw9VZUKqYkgVldRh1Rfw3uag4lVpuVRGlL9rLh4gCa2t7emzdzgfk38u
eK6Osa1ZgmWxda5qx3tvd9PMYh0LjALYMlmuxzOiE1NHDWo2kMvs9YIqBOjI
xTjV5QnCYka1cgUZcip+gHUxwJkLXdJr6+RSPRjBEVvG0b2IF/rgrtDVHcE6
jtMFXYEiKCxJEc4MGRjvSo3olLTBm0wZDH0GuNO0g/FtvFxicoYxA9YU4O2h
bCXiwQ8qEPH4TPkTuGGnn4Plss7nRllWpmUnqXO2SBf3n8UZKvVBfAGA6sJl
5JYCAUlOi6X7CxOyesAazLOUqrArHMdU58DFtWRukLAStCiJjJwTkBKakzax
+ePWM4rfYnkDh+TuBJj8sDriKTRpBqaYJuWt2KQA4BusVmvLV6z51AMSmflM
geAS1U1mbQ9tika5mBLUdOnDck4anCylRjHYDUknMJpjVdkxydsviydjbCQS
o2a6w6axrf1kR3bGJEoUmdmeKmFduyS3EXQ0TYOEBrqo5S1GmzmWYb/LeHCP
zi0QIqoiZdjiB3laHdWWSuHCWyoGRbKQT238S5G+4iVQWPkCOt1gB+sQ7YjO
uNNGiYkRAnBOMqrJSR9rKX9O0HGboVT68P5ql0KePJa6DrsqeYkxgXolJmQo
J5t947Wr59B+Wbvr+ZWI1zHCyoks7h0StWaV1OCN11c16Xwlq5WpNl/JW+SU
fAveqmb7+GU9rCYr5OYWF63XkjxNipFwh93IMfsGbFtb3Dfj0/qm/58xl1TA
Q/ZkZ8F9kj7EIhzrD0g8btUfQbs/mEA0Gh0KAzy5997wCGAWiQA2mre97wED
v8VvZWRt7w3oaw5+9asOg8egxuHJPTF7lgb3be8q5lnErqNCzjmY023vbMoL
0NKAKth0WrQ9jcsoo22ClVoo5btDUSe8mqVrTw/xMA/hsatWZgp/K7tJM5aG
mP5cSqMwKX3MZggkQGGh6sG9CnyZy290qsQuwyhPM4B7TJ8PUZ9B0BFo810C
yR4EmFdclnxO5uHjo/pqFLgh+rMJZx/uvjs87dRuC2MwFkmTTAkVfIOlI26S
xklTyU95GqSxDTtR8dHGl4hqRyhIk7pqMTWufkfOFhG3gXZO53WppBOSigNh
NmZLpLoMX1+zreGk90u3tHIbfEZDUfMhsiE2x1OEEDZizh/pSpg5DRibKCAh
X2pMAW41jhJ7d5EkWGT3zJOFc2u9nrZB6Ro2AQNfLvDDUGkmVWlSXd4Vl9jx
XhcZMj3WP8eAL9bYxSNE+8UpjH9SrqHKoNWkWboVOgWTzpmNPYanN/SRqUjh
k4BhWQLWoQ9BtbltQci1rUvX9PGNzu/DLySFym3AwycgCU5HVCPH4WqQl2HF
keDaxXqvK4rVnLgSyqqmf30klGhkiQO1nwVI4NodKomnzVpEF/SNEY7+o+Nz
4o4e0uwee42ztJhJx6kIC1H3QVMb8dVHFpShjHAfigSYhMRBViSUK4ORIZPj
jQul2qjIwAKFq44ioUIkIGF1vSwqKYUqIgsRohhx5lInbxMHqKrEAzGqVLXy
p1wnX5PXVMxKsWXJsrnpQi6526gOfhbkoMHuWip2bz/ASLW8UlSMAH46aE58
CS5vUMe5+loWSU1TTy4qP6xWljUuR76yn3DEewsd5pfvOjgXZf9rAVR+ccxk
Y+kahcqgsnQIMFSlWW/Pr+7ubMyurMo6jvJJMcRPDu7Zj0n65cckqS7rr3M+
fIFe9VT46dzHU8Mt5yTUt9/O2vW8muj/8P56wL5mLlCJOR3pDcipRILaxrPs
OahCupKg3jJl2hChGmZkrZnBDWDtHM/w0Q6gj1cB5VNdOrfWtp5BX0Kf6yY7
24ij7d0SnXKDgeiU+Vh206OZJGJRZfQFCdyOdw1OdSKFWhc0pU/T0Uet8MNL
Fb+diq7gK1qLQ1VoQUT5d8XQ3PpVVo0KaOE+zmZ41M30XG277x6CjL7VWfkU
KdtZ+aHRXe+/ARvS2KG9dQAA

-->

</rfc>
