<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-daa-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="DAA for RATS">Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-02"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="C." surname="Newton" fullname="Christopher Newton">
      <organization>University of Surrey</organization>
      <address>
        <email>cn0016@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Liqun Chen">
      <organization>University of Surrey</organization>
      <address>
        <email>liqun.chen@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="D." surname="Thaler" fullname="Dave Thaler">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dthaler@microsoft.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="07"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document maps the concept of Direct Anonymous Attestation (DAA) to the Remote Attestation Procedures (RATS) Architecture.
The role DAA Issuer is introduced and its interactions with existing RATS roles is specified.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-daa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-daa"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Remote ATtestation procedureS (RATS, <xref target="I-D.ietf-rats-architecture"/>) describe interactions between well-defined architectural constituents in support of Relying Parties that require an understanding about the trustworthiness of a remote peer.
The identity of an Attester and its corresponding Attesting Environments play a vital role in RATS.
A common way to refer to such an identity is the Authentication Secret ID as defined in the Reference Interaction Models for RATS <xref target="I-D.ietf-rats-reference-interaction-models"/>.
The fact that every Attesting Environment can be uniquely identified in the context of the RATS architecture is not suitable for every application of remote attestation.
Additional issues may arise when Personally identifiable information (PII) -- whether obfuscated or in clear text -- are included in attestation Evidence or even corresponding Attestation Results.
This document illustrates how Direct Anonymous Attestation (DAA) can mitigate the issue of uniquely (re-)identifiable Attesting Environments.
To accomplish that goal, a new RATS role -- the DAA Issuer -- is introduced and its duties as well as its interactions with other RATS roles are specified.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following set of terms, roles, and concepts as defined in <xref target="I-D.ietf-rats-architecture"/>:
Attester, Verifier, Relying Party, Conceptual Message, Evidence, Attestation Result, Attesting Environment. The role of Endorser, also defined in <xref target="I-D.ietf-rats-architecture"/>, needs to be adapted and details are given below.</t>
      <t>Additionally, this document uses and adapts, as necessary, the following concepts and information elements as defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>:
Attester Identity, Authentication Secret, Authentication Secret ID</t>
      <t>A PKIX Certificate is an X.509v3 format certificate as specified by <xref target="RFC5280"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="direct-anonymous-attestation">
      <name>Direct Anonymous Attestation</name>
      <t><xref target="dataflows"/> shows the data flows between the different RATS roles involved in DAA.</t>
      <!-- this would benefit from aasvg -->
<figure anchor="dataflows">
        <name>DAA data flows</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="560" viewBox="0 0 560 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,208 L 8,240" fill="none" stroke="black"/>
              <path d="M 26,32 L 26,64" fill="none" stroke="black"/>
              <path d="M 22,32 L 22,64" fill="none" stroke="black"/>
              <path d="M 24,248 L 24,496" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,200" fill="none" stroke="black"/>
              <path d="M 96,480 L 96,512" fill="none" stroke="black"/>
              <path d="M 114,32 L 114,64" fill="none" stroke="black"/>
              <path d="M 110,32 L 110,64" fill="none" stroke="black"/>
              <path d="M 112,240 L 112,472" fill="none" stroke="black"/>
              <path d="M 152,208 L 152,240" fill="none" stroke="black"/>
              <path d="M 178,32 L 178,96" fill="none" stroke="black"/>
              <path d="M 174,32 L 174,96" fill="none" stroke="black"/>
              <path d="M 192,336 L 192,472" fill="none" stroke="black"/>
              <path d="M 208,480 L 208,512" fill="none" stroke="black"/>
              <path d="M 224,320 L 224,352" fill="none" stroke="black"/>
              <path d="M 232,224 L 232,312" fill="none" stroke="black"/>
              <path d="M 256,96 L 256,312" fill="none" stroke="black"/>
              <path d="M 274,32 L 274,96" fill="none" stroke="black"/>
              <path d="M 270,32 L 270,96" fill="none" stroke="black"/>
              <path d="M 306,32 L 306,80" fill="none" stroke="black"/>
              <path d="M 302,32 L 302,80" fill="none" stroke="black"/>
              <path d="M 360,80 L 360,312" fill="none" stroke="black"/>
              <path d="M 384,480 L 384,512" fill="none" stroke="black"/>
              <path d="M 394,32 L 394,80" fill="none" stroke="black"/>
              <path d="M 390,32 L 390,80" fill="none" stroke="black"/>
              <path d="M 408,320 L 408,352" fill="none" stroke="black"/>
              <path d="M 426,32 L 426,80" fill="none" stroke="black"/>
              <path d="M 422,32 L 422,80" fill="none" stroke="black"/>
              <path d="M 432,336 L 432,472" fill="none" stroke="black"/>
              <path d="M 464,80 L 464,472" fill="none" stroke="black"/>
              <path d="M 512,480 L 512,512" fill="none" stroke="black"/>
              <path d="M 554,32 L 554,80" fill="none" stroke="black"/>
              <path d="M 550,32 L 550,80" fill="none" stroke="black"/>
              <path d="M 24,30 L 112,30" fill="none" stroke="black"/>
              <path d="M 24,34 L 112,34" fill="none" stroke="black"/>
              <path d="M 176,30 L 272,30" fill="none" stroke="black"/>
              <path d="M 176,34 L 272,34" fill="none" stroke="black"/>
              <path d="M 304,30 L 392,30" fill="none" stroke="black"/>
              <path d="M 304,34 L 392,34" fill="none" stroke="black"/>
              <path d="M 424,30 L 552,30" fill="none" stroke="black"/>
              <path d="M 424,34 L 552,34" fill="none" stroke="black"/>
              <path d="M 24,62 L 112,62" fill="none" stroke="black"/>
              <path d="M 24,66 L 112,66" fill="none" stroke="black"/>
              <path d="M 304,78 L 392,78" fill="none" stroke="black"/>
              <path d="M 304,82 L 392,82" fill="none" stroke="black"/>
              <path d="M 424,78 L 552,78" fill="none" stroke="black"/>
              <path d="M 424,82 L 552,82" fill="none" stroke="black"/>
              <path d="M 176,94 L 272,94" fill="none" stroke="black"/>
              <path d="M 176,98 L 272,98" fill="none" stroke="black"/>
              <path d="M 8,208 L 152,208" fill="none" stroke="black"/>
              <path d="M 152,224 L 232,224" fill="none" stroke="black"/>
              <path d="M 8,240 L 152,240" fill="none" stroke="black"/>
              <path d="M 224,320 L 408,320" fill="none" stroke="black"/>
              <path d="M 192,336 L 216,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 432,336" fill="none" stroke="black"/>
              <path d="M 224,352 L 408,352" fill="none" stroke="black"/>
              <path d="M 96,480 L 208,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,496 L 96,496" fill="none" stroke="black"/>
              <path d="M 96,512 L 208,512" fill="none" stroke="black"/>
              <path d="M 384,512 L 512,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="472,472 460,466.4 460,477.6 " fill="black" transform="rotate(90,464,472)"/>
              <polygon class="arrowhead" points="440,472 428,466.4 428,477.6 " fill="black" transform="rotate(90,432,472)"/>
              <polygon class="arrowhead" points="368,312 356,306.4 356,317.6 " fill="black" transform="rotate(90,360,312)"/>
              <polygon class="arrowhead" points="264,312 252,306.4 252,317.6 " fill="black" transform="rotate(90,256,312)"/>
              <polygon class="arrowhead" points="240,312 228,306.4 228,317.6 " fill="black" transform="rotate(90,232,312)"/>
              <polygon class="arrowhead" points="224,336 212,330.4 212,341.6 " fill="black" transform="rotate(0,216,336)"/>
              <polygon class="arrowhead" points="120,472 108,466.4 108,477.6 " fill="black" transform="rotate(90,112,472)"/>
              <polygon class="arrowhead" points="72,200 60,194.4 60,205.6 " fill="black" transform="rotate(90,64,200)"/>
              <polygon class="arrowhead" points="32,248 20,242.4 20,253.6 " fill="black" transform="rotate(270,24,248)"/>
              <g class="text">
                <text x="68" y="52">Endorser</text>
                <text x="224" y="52">Reference</text>
                <text x="348" y="52">Verifier</text>
                <text x="464" y="52">Relying</text>
                <text x="520" y="52">Party</text>
                <text x="208" y="68">Value</text>
                <text x="344" y="68">Owner</text>
                <text x="464" y="68">Owner</text>
                <text x="220" y="84">Provider</text>
                <text x="116" y="132">Endorsements</text>
                <text x="296" y="132">Reference</text>
                <text x="400" y="132">Appraisal</text>
                <text x="504" y="132">Appraisal</text>
                <text x="284" y="148">Values</text>
                <text x="388" y="148">Policy</text>
                <text x="492" y="148">Policy</text>
                <text x="536" y="148">for</text>
                <text x="376" y="164">for</text>
                <text x="512" y="164">Attestation</text>
                <text x="396" y="180">Evidence</text>
                <text x="496" y="180">Results</text>
                <text x="48" y="228">DAA</text>
                <text x="92" y="228">Issuer</text>
                <text x="208" y="260">Group</text>
                <text x="204" y="276">Public</text>
                <text x="68" y="292">Credential</text>
                <text x="216" y="292">Key</text>
                <text x="56" y="308">Request</text>
                <text x="308" y="340">Verifier</text>
                <text x="228" y="388">Evidence</text>
                <text x="384" y="388">Attestation</text>
                <text x="400" y="404">Results</text>
                <text x="92" y="436">Cred</text>
                <text x="140" y="436">ential</text>
                <text x="148" y="500">Attester</text>
                <text x="424" y="500">Relying</text>
                <text x="480" y="500">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
  .==========.       .===========.   .==========.   .===============.
  ║ Endorser ║       ║ Reference ║   ║ Verifier ║   ║ Relying Party ║
  '====+====='       ║ Value     ║   ║  Owner   ║   ║  Owner        ║
       |             ║ Provider  ║   '======+==='   '====+=========='
       |             '=========+='          |            |
       |                       |            |            |
       |Endorsements           |Reference   |Appraisal   |Appraisal
       |                       |Values      |Policy      |Policy for
       |                       |            |for         |Attestation
       |                       |            |Evidence    |Results
       V                       |            |            |
.-----------------.            |            |            |
|   DAA Issuer    +---------.  |            |            |
'------------+----'         |  |            |            |
  ^          |         Group|  |            |            |
  |          |        Public|  |            |            |
  |Credential|           Key|  |            |            |
  |Request   |              v  v            v            |
  |          |             .----------------------.      |
  |          |         .-->+      Verifier        +--.   |
  |          |         |   '----------------------'  |   |
  |          |         |                             |   |
  |          |         |Evidence          Attestation|   |
  |          |         |                      Results|   |
  |          |         |                             |   |
  |      Cred|ential   |                             |   |
  |          |         |                             |   |
  |          v         |                             v   v
  |        .-------------.                     .---------------.
  '--------+  Attester   |                     | Relying Party |
           '-------------'                     '---------------'
]]></artwork>
        </artset>
      </figure>
      <t>DAA <xref target="DAA"/> is a signature scheme that allows the privacy of users that are associated with an Attester (e.g. its owner) to be maintained.
Essentially, DAA can be seen as a group signature scheme with the feature that given a DAA signature no-one can find out who the signer is, i.e., the anonymity is not revocable.
To be able to sign anonymously, an Attester has to obtain a credential from a DAA Issuer.
The DAA Issuer uses a private/public key pair to generate credentials for a group of Attesters <!-- this could be phrased a bit confusing as below it is stated that the key-pair is used for a group of Attesters --> and makes the public key (in the form of a public key certificate) available to the verifier in order to enable them to validate the Evidence received.</t>
      <t>In order to support these DAA signatures, the DAA Issuer <bcp14>MUST</bcp14> associate a single key pair with a group of Attesters <!-- is it clear enough what exactly "a group of Attesters" means? --> and use the same key pair when creating the credentials for all of the Attesters in this group.
The DAA Issuer's group public key certificate replaces the individual Attester Identity documents during authenticity validation as a part of the appraisal of Evidence conducted by a verifier.
This is in contrast to intuition that there has to be a unique Attester Identity per device.</t>
      <t>For DAA, the role of the Endorser is essentially the same, but they now provide Attester endorsement documents to the DAA Issuer rather than directly to the verifier. These Attester endorsement documents enable the Attester to obtain a credential from the DAA Issuer.</t>
    </section>
    <section anchor="daa-changes-to-the-rats-architecture">
      <name>DAA changes to the RATS Architecture</name>
      <t>In order to enable the use of DAA, a new conceptual message, the Credential Request, is defined and a new role, the DAA Issuer role, is added to the roles defined in the RATS Architecture.</t>
      <dl>
        <dt>Credential Request:</dt>
        <dd>
          <t>An Attester sends a Credential Request to the DAA Issuer to obtain a credential. This request contains information about the DAA key that the Attester will use to create evidence and, together with Attester endorsement information that is provided by the Endorser, to confirm that the request came from a valid Attester.</t>
        </dd>
        <dt>DAA Issuer:</dt>
        <dd>
          <t>A RATS role that offers zero-knowledge proofs based on public-key certificates used for a group of Attesters (Group Public Keys) <xref target="DAA"/>. How this group of Attesters is defined is not specified here, but the group must be large enough for the necessary anonymity to be assured.</t>
        </dd>
      </dl>
      <t>Effectively, these certificates share the semantics of Endorsements, with the following exceptions:</t>
      <ul spacing="normal">
        <li>Upon receiving a Credential Request from an Attester, the associated group private key is used by the DAA Issuer to provide the Attester with a credential that it can use to convince the Verifier that its Evidence is valid.
To keep their anonymity, the Attester randomises this credential each time that it is used. Although the DAA Issuer knows the Attester Identity and can associate this with the credential issued, randomisation ensures that the Attester's identity cannot be revealed to anyone, including the DAA Issuer.</li>
        <li>The Verifier can use the DAA Issuer's group public key certificate, together with the randomised credential from the Attester, to confirm that the Evidence comes from a valid Attester without revealing the Attester's identity.</li>
        <li>A credential is conveyed from a DAA Issuer to an Attester in combination with the conveyance of the group public key certificate from DAA Issuer to Verifier.</li>
      </ul>
    </section>
    <section anchor="additions-to-remote-attestation-principles">
      <name>Additions to Remote Attestation principles</name>
      <t>In order to ensure an appropriate conveyance of Evidence via interaction models in general, the following prerequisite considering Attester Identity <bcp14>MUST</bcp14> be in place to support the implementation of interaction models.
<!-- This is a weird MUST: It is not clear who MUST do what here. -->
      </t>
      <dl>
        <dt>Attestation Evidence Authenticity:</dt>
        <dd>
          <t>Attestation Evidence <bcp14>MUST</bcp14> be correct and authentic.</t>
        </dd>
        <dt/>
        <dd>
          <t>In order to provide proofs of authenticity, Attestation Evidence <bcp14>SHOULD</bcp14> be cryptographically associated with an identity document that is a randomised DAA credential.</t>
        </dd>
      </dl>
      <t>The following information elements define extensions for corresponding information elements defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>, which are vital to all types of reference interaction models.
Varying from solution to solution, generic information elements can be either included in the scope of protocol messages (instantiating Conceptual Messages defined by the RATS architecture) or can be included in additional protocol parameters of protocols that facilitate the conveyance of RATS Conceptual Messages.
Ultimately, the following information elements are required by any kind of scalable remote attestation procedure using DAA with one of RATS's reference interaction models.</t>
      <dl>
        <dt>Attester Identity ('attesterIdentity'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, the Attester's identity is not revealed to the verifier. The Attester is issued with a credential by the DAA Issuer that is randomised and then used to anonymously confirm the validity of their evidence.
The evidence is verified using the DAA Issuer's group public key.</t>
        </dd>
        <dt>Authentication Secret IDs ('authSecID'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, Authentication Secret IDs are represented by the DAA Issuer's group public key that <bcp14>MUST</bcp14> be used to create DAA credentials for the corresponding Authentication Secrets used to protect Evidence.</t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, an Authentication Secret ID does not identify a unique Attesting Environment but is associated with a group of Attesting Environments.
This is because an Attesting Environment should not be distinguishable and the DAA credential which represents the Attesting Environment is randomised each time it used.</t>
        </dd>
      </dl>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>As outlined above, for DAA to provide privacy for the Attester, the DAA group must be large enough to stop the Verifier identifying the Attester.</t>
      <t>Randomisation of the DAA credential by the Attester means that collusion between the DAA Issuer and Verifier, will not give them any advantage when trying to identify the Attester.</t>
      <t>For DAA, the Attestation Evidence conveyed to the Verifier <bcp14>MUST</bcp14> not uniquely identify the Attester. If the Attestation Evidence is unique to an Attester other cryptographic techniques can be used, for example, property based attestation <xref target="PBA"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The anonymity property of DAA makes revocation difficult. Well known solutions include:</t>
      <ol spacing="normal" type="1">
        <li>Rogue Attester revocation -- if an Attester's private key is compromised and known by the Verifier then any DAA signature from that Attester can be revoked.</li>
        <li>EPID - Intel's Enhanced Privacy ID -- this requires the Attester to prove (as part of their Attestation) that their credential was not used to generate any signature in a signature revocation list.</li>
      </ol>
      <t>There are no other special security considerations for DAA over and above those specified in the RATS architecture document <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>The new DAA Issuer role can be implemented in a number of ways, for example:</t>
      <ol spacing="normal" type="1">
        <li>As a stand-alone service like a Certificate Authority, a Privacy CA.</li>
        <li>As a part of the Attester's manufacture. The Endorser and the DAA Issuer could be the same entity and the manufacturer would then provide a certificate for the group public key to the Verifier.</li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>We don't yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <seriesInfo name="DOI" value="10.17487/RFC5280"/>
            <seriesInfo name="RFC" value="5280"/>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="DAA">
          <front>
            <title>Direct anonymous attestation</title>
            <seriesInfo name="DOI" value="10.1145/1030083.1030103"/>
            <seriesInfo name="Proceedings of the 11th ACM conference on Computer and communications security - CCS" value="'04"/>
            <author fullname="Ernie Brickell" initials="E." surname="Brickell">
              <organization/>
            </author>
            <author fullname="Jan Camenisch" initials="J." surname="Camenisch">
              <organization/>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date year="2004"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-21.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-21"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models" target="https://www.ietf.org/archive/id/draft-ietf-rats-reference-interaction-models-05.txt">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-05"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="26" month="January" year="2022"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="PBA">
          <front>
            <title>Property-Based Attestation without a Trusted Third Party</title>
            <seriesInfo name="DOI" value="10.1007/978-3-540-85886-7_3"/>
            <seriesInfo name="Lecture Notes in Computer Science" value="pp. 31-46"/>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Hans Löhr" initials="H." surname="Löhr">
              <organization/>
            </author>
            <author fullname="Mark Manulis" initials="M." surname="Manulis">
              <organization/>
            </author>
            <author fullname="Ahmad-Reza Sadeghi" initials="A." surname="Sadeghi">
              <organization/>
            </author>
            <date month="September" year="2008"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIABz1GGMAA61b23bbRpZ9x1dUKw+UbBKRfIkdre50GEtOuNq2NJLspCcr
7VUEiiSWQACNAigztvsf5mHe51vmU+ZLZp9ThUIBhKSku7kSGyjU5dS57HOp
8mQyCTbH4nEQVEmVqmNxkpQqqsQ0y7PtOq+1mFaV0pWskjwTi7wU1UqJC7XO
K9X5dF7mkYrrUmFEGa2SCrPgLZDzeamwwsl0ysMvpleXQZxHmVxjtbiUi2qS
qGoxKWWlJ7GUk8NHwc3ymDuKH/PyOsmW4vsyr4tAlkoei0sV1WVSbQNd4X19
LGanVy+D6xs8ZJUqM1VNTmjaIJLVsUiyRR4EX4goT/O6FJlKlqs5PZUyi/N1
ohU+/nz208uzi5P3l+enr17N3nz//j/fvzm7en/5Cwio01hs81qkybUSVS5q
rZgHZx+wnVjoQqUpkbhnJ/xV7f1ZXKGD+zJyS41EooVMdQ5ySuJzKCbfiH03
8iAINiqr1XEgxJK2fOxYfTXA6ksaWukD9F7LJD0W9PYtcTPMyyXNkVSreg4m
OAbfLL8c4HkQBLKuVnl5HEyEkcwPKrsW3yXl9SpPf8VUmPBYvCxlna3yhSrF
5ewKrY10dz4oQ9AKs4RzO8u3OqnChesZxgodSYgKcrpYqSTDi9Tg77On+BLl
MegYffXk0ddPR/QOmUOPZLkGI+KKe9RZVaLxe1WuZbZ1xL9YlYmu8mIFet6o
myrPmh28zZKNKkHIVuQLcVlDCtuW3Cg7PDz66lvNzaGMwvrazfkq+XudYWb1
G+dKqX8Yof/wfCdyo6AnMlVlM+HrJCpznS+qdpa44h7frptPYZSv/a2/vZwG
QZZj/xWoIcW5ePni6aPnh/QIo8NCZ7Pw6DA8Onry9Mujw8eHh88fh/Q3/g8C
Mg9v7GxyEraaIT1DNga506VUkKTKIjVJyPhkRBo6WUN0qT4W5m8MOv/OI+Tw
8NmXXz97Pnk8efrkcPL86fPnX02evQcxk8kEGkVKEFVBcLWCsQAp6rXKKih4
odnuohyrFRWx/E6s2sfmD8hg7wesfdraQQe3woBMuMxTxcg107qGLoEgbLPM
4xpDBaxWJBU3NTvX4gYmJ9QHqB+ZPoMYzaJpLBAhShaJikOz13USx6kidJrZ
WWmOIBiw+cKzeZp0LD5+nNDD588HIlY6KpO56lIyV9WNUpm4AQxNYrVIMqK5
3aNMiZegs6rBYNqG0HVR5CXz9kKlW9rBuSyrRBHrZSVK9fcaPMfORZ3F0P0K
PKBeEpBaMaerstbVDSZZYT2taSqJcbyhQsHqmbFJjCWt4WAyIxcwuGEpw6Mu
cjO7+UxPp9kmKfNszQQXqdxi8k1SYSssKmyBeBIGU8ywXoNvN+gCHWA1pQdd
Ryta0RGQGK2aAv6oJTLsho8pVSVmJ0JCBy3vMLvRJavyxt8YdovXrOrOxZF4
jPZ//my2vEBHw0UF1NgOb0pEoA2CrDOgByRg6SSdaZaHzCr1gWXE1NBivqHS
jrK8wk7BlzmYQiSZJWVRpM0OMdxKRbZGAcbFcUJP4GhCOq9heBgIOFXiBhwS
55A6ffZo41UckJDpnc9mBwIKjhEVYXA+X9QaC2MXIAYbiVIlIQ/aB9k8UZ1F
aR2bbXoUidMNLQNmm11kg6phul4oXaeVDnvIkaRpTZiCjmKV3/wW1CAprMGH
JQYxl5kXxDMnmP1STQ46HBjWUlCTCxlBHcF7vTIasMxlOobqZuqmhQjiBK3l
4Q1ahiEnrtkooZxk3fT3MBDlzH4PhYjVPgx9Ia7gO5MM0dFy28dchDrGOhZ5
muY3tDWtjOZhkB6bOcdMlYVl3TMYh1LHQWPkY/FOlbQ+nnyU2Y7FCzNJDe17
DfCQSzV2CjAekPV4mOmhcOANWk8RXJWaVuPIa4i4MSShYk0AAeOTsSwqy+xY
VfDDhm/LhPRvrsAKcK61lBSUV7uMo+E8FXEINqki2lLJnX2Wtpwj4XpmpFJl
gG6HpQ2ytEwVMwto42Eou6UZCIediPO/zH4SL1RJukxmymFqJn4Knx5+vXks
DEki8jpIz5uJ+RZE2bCD4I7x7lptBfwAuLr3+u3l1d7Y/C0QWNPzxel/vJ1d
nJ7Q8+UP01ev3ENge1z+cPb21Un71I58cfb69embEzMYraLTFOy9nv51z2jl
3tn51ezszfTVnoFPX0gkUiNwtpsC7CCh66Bxp8zt716c/+//HD3BBv+AHT46
Ovr682f78vzo2RO8ECya1fIMwGBewettALwlmCNEg5FGsiBPZbRBA4kyhMcU
aQQPfibO/HIs/jiPiqMn39gG2nCnseFZp5F5ttuyM9gwcaBpYBnHzU57j9Nd
eqd/7bw3fPcaCWzuwt4g+PgxlpVcwC6g28wiAz/UKrjZBTXcnCzYE1edMCvb
5OnGyA5ICu7+8Q8MrBD9DSdzc5XBmCqxKPO1kFJvlsDZb4J/4GdeEa+Gf3K/
UJif18Rt4a2vpg2z/N9//5dDH34xP3pqgwjTTn82sOg1dfCRWjDriKZ/yIuM
vBnfyRQuqnmzf57dZJhvsKnpGtjHT8L/UVdEyIS9ZTN8ZHb20C7s0WGIGZ5p
5Do8dPT2O30aHnpb7+GhltMGMr0OLavxMi2KUiYaDsZ/uXd5Zq6d9dN5jihq
230BRP6+PVBU5l58K/hds7joyGyU459mhne/aYbOSxBO+r/wtw6lVy90we+h
P8ldQ0f+gjxq5He9W/h/G/rG9aJ7h34a+HZezyHQ+4e+KBV7XJn63/6itvcP
vUAWBXH3vwmx4f867/cTzL9dufnCu3Uohn3z0Dw68LG/h2b0rUPpaTS86sh8
vXPo7b+7h/oKb36e7fwzq1qj+fcRTIrxyWjG7x36L6xKv03n4+0/6rfxh4ZD
StP79TWM/JuT/0PRpvC3rf6p58wccNOvq0mjwQn62jZilx18PBZfuLBBcBX7
T3sERG3UsPc5CKjl40f8iciColuhk2UmOWHW0Qpew2RmMk2bqKMok42MuESB
eL60JRCKGqXWeZRwOstZll/B2FfhMuRsLCdHe2BDzLVEkCkphA+DU62NflDi
QHTZpF9TYCOJNq797lLIi3HyoEy7SSY5LZE8Uzskyyd5pnhqZA6ITesKoamp
hlEvrmaNRRKq0CQkkmMyWxKhAkKpNnlEmS2nsJQXUZZLNRQMt90RwtEmfAas
JOdR+Zy2C7IiB5Q24vK8hKmMeF7DJE6G9ZX6smAw5lSikAkXcJaI3iiX9+Y1
VZeGaxBXQ4sWbewX2dhPFKtSagr0xRxBIJKvRa25hKVNagfZca2uYvkyhyuT
zkyYBnyrafytawJTORtYy2ubPnvb2LdVHEqpTG3M++glWAdCbpB4NiynIZsG
oTEF8ipTz1KZ6QL9oNeNTJO4KVo4rETMraAklO/PvLFNtQ99teqqjx73SxGc
kDjFZ/vJlqlqZWMs4VYhUB2jsnUfleX1cgV1pGLYBxlVSJv2hobuibWSmf6z
42lz+KLl2l+aClPQB8mFAC6S9ZUD+ZctmLV0NRkhr9tXxZFtv0U+4GmRysgK
GAaWgNlUt9hJyF3CSVWbkjWtycTpq5UYpeRs+oUsXW1PumCVyhiNNKGyVCk2
ebd0amHLXlwv4iIh1LwiMQN4aq5UOGUGPFgrJau2Na0Bygu8xGqTRJSkvgQb
wR6jGE1thdWsyXCwtGqhzclpLOamNrwFrNxQJZt20i6n2rjd45VVek8DYfVU
zMImMqR+lEem275tcOVH3zt5azVtz7swq0sJl80Yt0HKUjlaOQvtHH52zM1b
lNSYzi+InaYKGLWVr3VT+aKebZgpbNg4Jj67cj7VmHgCksiO0ZpGcncxlVYt
nSZR7le1+8Rjl7uLHwfBMbL3lmsQd0xqu9t1QILDLCaZgcTSDiPVRRfdKYW1
5ws0HdmiA2ZHyk0CI2eAyA0YKKEamwGfwJx8acrRDFWDKuKvySuAMKuwbG6+
vo95IfiPpFy35LhtEEJZh8c27hYMTTBieGIY6hWBeaKcChta/KrKfHINo0lV
vKSAJM8X8FLsvuhMiJFp0kOm+9zTPudGNs+hhEUfNIFRKH6AgbaY2B3oqV1z
xOAqgIQpzs7t4HUNNgBgUlmCeIv5zQ0CVw314g6LR+BLyb7qFFyI6GTSFFjJ
rjv71Csu4RHMqLUkQNVevZctfezFTK7gqj6QqVGRHNx/IN4W4KVxkYzOQ7ps
BNnqvQ2Z2jjQ+goTt7CCNnGC1ZquGTQg2FNg9qAe+BgVNKdCjWbnGciMzFCX
tNmOuvUSWJ7VjoO3a6UKGpCULbvH3cXdHQVt46WWCiUjsDBpQmQTH9HeQjFN
qxXLtbdFUlrdXcB5FT4tkJkXTJjiXCMob2U+doHlNsTZunim+dh2BwLgs925
HlYgFZ2TRW6UTA38yWyLqHhsT5uaaMGH9gd8duAY6zj/e4KDPtQwLjT8jQe9
i6dYA6Di+X54h2FY4aUIJc1+m70N8IY2Oe2ymdVKbQk3+jG6YVu7DEcX63mS
GWG0YuMZJB/VLTwYuCV+4nW6q7xzkQz8a3O8wt514PgeppZFSQFP1veypBxE
MUVPObpxstAhzrFzk0j/0MzeV6AtmjQj7Z/VFKXiM3CdmEk11Ufbc0hfzTlg
5sMFwZFiL+IWybow5zvuPHaXktAUr5vAToobmHDMUx+LWdXgsImqKbvjRePc
hNZ8usC17cDnnNv91ItDjR8a6tXsw95YMiFHMzKkYT77G2CzvooyHG+V8fAS
9hyCFim3BWynlMUKakJR5ECunfQja+eqpW9mHKG1UYY5lWpFOXjSZhwcPEQF
PWLtI4fVPXK+Y2D/fA7uB/tYcdHAXFMgY0KYUm0Lpc0ZfFOcHpL+OzhIWpKN
RedpbQKT3D2PjaLCvgapsoUFlTAW+Ufs7DWjvGB7gLCqPMpd6KkpTaW7HWAc
p1S757Ltjq1/27mHcEAn9paAzuF+e8PArYukB+ESRxkeORbhFzJK0qRqstqu
KfOyA+SFwdsULguD0p0D1+Ez1lI111tMYpVtxTUXThZglDSZ+O6NifZijjBl
BNI6c/SeOQJH+h457x7jiv2RtG1N0+iAjfQBQh0kjHm5fWCNz2VlQ36wLeY4
J7iTMHngrq3PHQhGBgIZa3ae0RE6kL2b2Iddh6sTeX5NGedlbwCZyKQJ1k0m
rvxAxhAbWxbf64uJobecdmtiLL6hYXZyN0dvn8LoCnwBJbtDId5QfMDMasC0
4Y7NU7pQpV2U3LvrMkSQdnOR2RBAnzo+epshD37bFac4V0ZJ7HWWbb8m0L+k
RHE+oW0fmvtZw8BdGOvJ5iqSFFa5wKK/hF5xvc6GcLG5Tge/u2I7tFrW45sF
WycZPwDtz9/V2jbCTSoT2VIIcm4LwC+sn2e+IdyYaqqmpiYBn+cbxHsLUxzp
ekAzupFlN3WgznekSQTxVV50g/xGPP3QDsRedAJkG3/1uGO11Nk6l9aMWgJs
05r8Xed83bN0Ynh7a4czbRINlZ5N7ZHgUsYbuAygrynIVcZ3UQWq0ase1Z2S
0mBk4MJSC1uOF2xIREL/plxvETFb3D47pTFGz3sxrrk21QlGBGxrxZ2dWyVF
MaJXHyRFc2MSfqHodMMk6b6j+Pn8u+kvrFfNBfYdxbrqlOHdXKZSZOvJpirP
M9L9hySq0yoUP9ItMEq6Mhca6MbrAuOOQnGRL/0anzcNFWc7tzBHup/I0u21
0kN4s5JVKC8JpXMIKEL3JMLmOFAzt7plIBFxTcb2KBSn50CiCV+pTEHAabYi
Fx87I6SvtpRv3XQvv7Smp8S+1H4VFZ7FE/6BS6qSsgMd0kBgA6bumIH20+6F
S1ftq8fFFBBlYkzKPvgAxqoRV0mwhG7EHnXE7rADtBtDY0wBibn27up16nSd
+54uCnbX2VjLZt38YkjXqG7Yqxa6iK0ZbYM2kdXrOVnGgq7U6o7aGwWb8qEa
XQieyJSCH61KKh2bfzghO9fLpvyPDTghkC3MTlkRpv0quKeWcNQ13aOl8iQH
Lq727HsEux134uMODLwCBLV5s5X2bhCrcIPgspuwWhzfdexdaAr5otNs+ma6
w/MfSVjZqBJbVdkr4HMZXQf/Dzt6Xw2FMwAA

-->

</rfc>
