| Internet-Draft | PoP Protocol | February 2026 |
| Condrey | Expires 18 August 2026 | [Page] |
This document specifies the Proof of Process (PoP) protocol, a specialized profile of Remote Attestation Procedures (RATS) designed to validate digital authorship through a "provenance of effort." It defines the core architecture, the RATS role mappings, the normative CBOR-encoded Evidence Format (including EAT integration), and the Verifiable Delay Function (VDF) mechanisms used to prove temporal and physical creation constraints.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 18 August 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The rapid proliferation of generative artificial intelligence has created an authenticity crisis in digital discourse. While traditional provenance tracks the "custody of pixels," it fails to attest to the human-driven process of creation. This document specifies the Proof of Process (PoP) protocol, which extends the RATS architecture [RFC9334] to validate the "provenance of effort."¶
Unlike traditional attestation which captures static system state, PoP attests to a continuous physical process. It introduces Proof of Biological Space-Time (PoBST) to enforce temporal monotonicity and Cross-Domain Constraint Entanglement (CDCE) to bind behavioral entropy (human jitter) and physical state (thermodynamics) to the document's evolution.¶
PoP operates on five primary constraints:¶
The AE MUST implement the following formal state machine:¶
Attestation Assurance Levels (T1-T4) define the strength of hardware binding, mapping to NIST SP 800-63B Authenticator Assurance Levels (AAL) and EAT security levels [RFC9711].¶
Evidence Packets are CBOR-encoded and identified by semantic tag 1347571280.¶
evidence-packet = {
1 => uint, ; version
2 => tstr, ; profile-uri
3 => uuid, ; packet-id
4 => pop-timestamp, ; created
5 => document-ref, ; document
6 => [+ checkpoint], ; checkpoints
? 7 => attestation-tier, ; T1-T4 assurance level
? 10 => [+ presence-challenge], ; QR/OOB proofs
? 18 => physical-liveness-section, ; CDCE markers
}
checkpoint = {
1 => uint, ; sequence (strictly monotonic)
2 => uuid, ; checkpoint-id
3 => pop-timestamp, ; timestamp (local)
4 => hash-value, ; content-hash
5 => uint, ; char-count
6 => edit-delta, ; delta
7 => hash-value, ; prev-hash
8 => hash-value, ; checkpoint-hash
9 => process-proof, ; VDF (PoBST)
10 => jitter-binding, ; behavioral-entropy
11 => physical-state, ; CDCE Weave
12 => bstr .size 32, ; entangled-mac (HMAC-SHA256)
}
document-ref = {
1 => hash-value, ; content-hash
3 => uint, ; byte-length
4 => uint, ; char-count
? 5 => hash-salt-mode, ; 0=unsalted, 1=author-salted
? 6 => bstr, ; salt-commitment
}
edit-delta = {
1 => int, ; chars-added
2 => int, ; chars-deleted
3 => uint, ; edit-operations-count
}
physical-state = {
1 => [+ float16], ; thermal-trajectory-delta
2 => uint, ; entropy-pool-delta
}
¶
Implementations MUST support Argon2id [RFC9106] as the MTI memory-hard function. Default parameters: Time Cost (t)=1, Memory Cost (m)=2^16 (64 MiB), Parallelism (p)=1.¶
In T3/T4 tiers, the VDF seed MUST be bound to the TPM Monotonic Counter.¶
hat-seed = H(tpm-monotonic-counter || physical-freshness || document-hash)¶
The VDF seed MUST incorporate Non-deterministic Physical Freshness derived from physical events (e.g., thermal noise) sampled within the AE at the start of the session to prevent replay attacks.¶
This document requests registration of CBOR tags 1347571280 ("PPP ") and 1463894560 ("WAR "), and the EAT profile urn:ietf:params:rats:eat:profile:pop:1.0 in their respective registries.¶
Evidence packets are self-contained and bound to document content, making them independently verifiable. No session binding is required between Attester and Verifier, eliminating connection-based vulnerabilities.¶
Defeated through Physical Freshness. Replaying a session requires replaying the immutable hardware physics of the AE at the exact microsecond of the original capture.¶