<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hillier-scitt-arp-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="ARP">Attestation Reconciliation Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hillier-scitt-arp-00"/>
    <author initials="J." surname="Hillier" fullname="Joel David Hillier">
      <organization>Certisyn, Inc.</organization>
      <address>
        <email>jhillier@certisyn.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="01"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>policy-version</keyword>
    <abstract>
      <?line 57?>

<t>This document specifies the Attestation Reconciliation Protocol (ARP), a
deterministic, bilateral, zero-knowledge-capable mechanism for reconciling
verification claims against a plurality of sovereign authoritative registers
without raw register records leaving their data-residency jurisdiction. ARP
extends the SCITT (Supply Chain Integrity, Transparency, and Trust)
architecture to cross-sovereign claim reconciliation. A reconciliation server
canonicalises a structured claim, projects it through register-specific
controlled projection functions producing the greatest-lower-bound predicate
supported by each addressed register, transmits register-specific ciphertexts,
receives partial attestations whose payload discloses only a verdict and an
optional divergence axis, aggregates the partial attestations through either
homomorphic or hash-linkage aggregation, and seals the resulting reconciliation
output against a policy-version hash. An append-only cross-jurisdictional
settlement-layer ledger records only hashes, with no content. The protocol
supports retroactive re-evaluation of historical reconciliations under updated
pattern libraries or policy versions without bilateral renegotiation, and a
cryptographic-primitive-upgrade path including post-quantum primitives.</t>
    </abstract>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Sovereign authoritative registers record facts that are treated as conclusive
within their jurisdiction. Examples include beneficial-ownership registers
(such as the United States FinCEN Beneficial Ownership Secure System, the
United Kingdom People with Significant Control register, and the European
Union beneficial-ownership registers under the Anti-Money-Laundering
Directives), corporate registries, consolidated sanctions lists, export-control
registers, foreign-ownership-and-control-or-influence registers, maritime
vessel registrations, flag-state registers, aviation registrations, land-title
registries, customs declarations, and multilateral biometric registers.</t>
      <t>Institutional decision-makers -- including export-control compliance officers,
anti-money-laundering review functions, foreign-investment screening review
functions, sanctions-screening operators, multilateral aid distribution
authorities, and platform-owned verification infrastructure -- routinely
require reliance on facts recorded across two or more sovereign registers
simultaneously.</t>
      <t>Existing computer-implemented approaches to such cross-sovereign reliance
suffer from three structural and technical deficiencies that this protocol is
specifically designed to overcome:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Raw-record disclosure.</strong> Existing approaches require the raw register
record either to leave its data-residency jurisdiction or to be re-disclosed
in plaintext to a relying party in another jurisdiction. Sovereign registers
under data-protection regimes are jurisdictionally constrained against such
re-disclosure.</t>
        </li>
        <li>
          <t><strong>Non-reconcilable register outputs.</strong> Each sovereign register exposes a
different schema, a different signing chain, a different verdict semantic,
and a different statutory access regime. A relying party that requires a
deterministic combined verdict over n sovereign registers therefore faces
n parallel verification problems.</t>
        </li>
        <li>
          <t><strong>Non-auditable settlement.</strong> Cross-sovereign reliance, where it occurs at
all, occurs without a settlement-layer audit trail consumable by sovereign
regulators.</t>
        </li>
      </ol>
      <t>This document specifies ARP, a protocol that addresses all three deficiencies
in combination, and is layered atop the SCITT architecture <xref target="I-D.ietf-scitt-architecture"/>
and the RATS architecture <xref target="RFC9334"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      <t>The following terms are defined for use throughout this document:</t>
      <dl>
        <dt>Sovereign Register:</dt>
        <dd>
          <t>An authoritative data store maintained by or on behalf of a sovereign and
treated as conclusive within that sovereign's jurisdiction for the
predicates the register is empowered to record.</t>
        </dd>
        <dt>Register Operator:</dt>
        <dd>
          <t>The entity that operates the Sovereign Register and is contractually
empowered to bind the register's attestations.</t>
        </dd>
        <dt>Bilateral Register Agreement:</dt>
        <dd>
          <t>A negotiated contractual instrument between the operator of the
reconciliation server and a Register Operator, declaring the
permitted-predicate set, supported cryptographic primitives, supported
aggregation capability, statutory-regulator-access scope, and
cryptographic-primitive-upgrade path. Each Bilateral Register Agreement
carries an Agreement Hash committing to its canonicalised content.</t>
        </dd>
        <dt>Canonical Claim:</dt>
        <dd>
          <t>A deterministic structured representation of a verification claim,
comprising at least a subject identifier, a predicate, an attested value,
an applicable-regimes set, and an evidentiary provenance manifest.
Canonicalisation comprises lexicographic sorting of object keys,
preservation of declared array order, Unicode Normalization Form C of
string fields, canonical JSON <xref target="RFC8259"/> number rendering, and stripping
of undefined values.</t>
        </dd>
        <dt>Predicate Taxonomy:</dt>
        <dd>
          <t>A controlled hierarchical classification of predicates that may be the
subject of reconciliation, enabling taxonomic prefix match in projection.</t>
        </dd>
        <dt>Per-Register Claim Projection:</dt>
        <dd>
          <t>The narrowest structured query sufficient to elicit the required Partial
Attestation under a register's Bilateral Register Agreement, computed by
the controlled projection function as the greatest-lower-bound predicate
within the register's permitted-predicate set.</t>
        </dd>
        <dt>Partial Attestation:</dt>
        <dd>
          <t>A cryptographically signed output produced by a Sovereign Register in
response to a Per-Register Claim Projection. The Partial Attestation
payload SHALL disclose only a Reconciliation-Verdict field and an
OPTIONAL Divergence-Axis field; it SHALL NOT disclose any register
record.</t>
        </dd>
        <dt>Divergence Axis:</dt>
        <dd>
          <t>A controlled descriptor identifying the structural reason for a non-match
verdict, drawn from a controlled set including identity-mismatch,
jurisdictional-scope-mismatch, temporal-mismatch,
ownership-threshold-mismatch, sanctions-list-match, register-record-absent,
claim-predicate-unsupported, and claim-projection-narrowed-beyond-attestation-scope.</t>
        </dd>
        <dt>Reconciliation Output:</dt>
        <dd>
          <t>A data structure aggregating Partial Attestations from a single
reconciliation event, sealed against a Policy-Version Hash.</t>
        </dd>
        <dt>Verdict Arithmetic:</dt>
        <dd>
          <t>The operator governing how per-register verdicts combine into the Combined
Verdict, drawn from a controlled set including conjunction, disjunction,
threshold-count, and source-class-quorum.</t>
        </dd>
        <dt>Homomorphic Aggregation:</dt>
        <dd>
          <t>A cryptographic aggregation of Partial Attestations under a homomorphic
primitive permitting verdict combination without decommitment of
intermediate per-register outputs.</t>
        </dd>
        <dt>Hash-Linkage Aggregation:</dt>
        <dd>
          <t>An aggregation of Partial Attestations in which the per-register
attestations are canonical-hashed, ordered, committed to a Merkle tree,
and emitted with a Merkle root and a per-register verdict band.</t>
        </dd>
        <dt>Policy-Version Hash:</dt>
        <dd>
          <t>A cryptographic commitment to the canonical verification-policy state in
force at the moment of reconciliation, including reconciliation rules,
threshold parameters, pattern-library version, applicable-regimes
precedence, verdict-arithmetic selection, and the Bilateral-Register-
Agreement Hashes of the addressed registers.</t>
        </dd>
        <dt>Settlement-Layer Ledger:</dt>
        <dd>
          <t>An append-only cross-jurisdictional log retaining only hashes of
reconciliations, with no content-bearing fields. Each entry comprises a
sequence number, the reconciliation hash, the policy-version hash, the
addressed-registers identifier set, an aggregation-method descriptor, an
optional Merkle root, a timestamp, a prior-entry hash, and a self-entry
hash.</t>
        </dd>
      </dl>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>ARP comprises eleven subsystems arranged as a deterministic pipeline:</t>
      <ol spacing="normal" type="1"><li>
          <t>Canonical Claim Ingestion</t>
        </li>
        <li>
          <t>Adversarial Pre-Transmission Test</t>
        </li>
        <li>
          <t>Per-Register Projection Function</t>
        </li>
        <li>
          <t>Per-Register Encryption</t>
        </li>
        <li>
          <t>Partial-Attestation Reception</t>
        </li>
        <li>
          <t>Aggregation (Homomorphic or Hash-Linkage)</t>
        </li>
        <li>
          <t>Policy-Version-Hash Sealing</t>
        </li>
        <li>
          <t>Settlement-Layer Ledger Write</t>
        </li>
        <li>
          <t>Regulator Portal</t>
        </li>
        <li>
          <t>Retroactive Evaluation</t>
        </li>
        <li>
          <t>Cryptographic-Primitive-Upgrade Path</t>
        </li>
      </ol>
      <t>Given an identical Canonical Claim, an identical Addressed-Registers
Identifier Set, identical Bilateral-Register-Agreement Hashes for the
addressed registers, an identical Pattern-Library Version Identifier, and an
identical Policy-Version Identifier, the system MUST produce bit-for-bit
identical Reconciliation Outputs and Settlement-Layer Ledger entries.</t>
      <section anchor="canonical-claim-ingestion">
        <name>Canonical Claim Ingestion</name>
        <t>A Canonical Claim comprises:</t>
        <ul spacing="normal">
          <li>
            <t>Subject Identifier</t>
          </li>
          <li>
            <t>Predicate (drawn from the controlled Predicate Taxonomy)</t>
          </li>
          <li>
            <t>Attested Value (in the canonical type for the Predicate)</t>
          </li>
          <li>
            <t>Applicable-Regimes Set</t>
          </li>
          <li>
            <t>Evidentiary Provenance Manifest</t>
          </li>
          <li>
            <t>Claim Timestamp (RFC 3339 UTC)</t>
          </li>
          <li>
            <t>Claim Hash (computed over the canonical serialisation)</t>
          </li>
        </ul>
        <t>Two semantically-equivalent claims MUST produce the same canonical form
and the same Claim Hash. The Claim Hash is the index on the
Settlement-Layer Ledger and the key for retroactive re-evaluation.</t>
      </section>
      <section anchor="adversarial-pre-transmission-test">
        <name>Adversarial Pre-Transmission Test</name>
        <t>Before any Per-Register Claim Projection is produced, the Adversarial
Pre-Transmission Test Subsystem applies the current Pattern Library to the
Canonical Claim. The Pattern Library enumerates known nation-state evasion
patterns including projection-narrowing-evasion, predicate-substitution-
evasion, attested-value-bracketing-evasion, addressed-register-cherry-picking,
agreement-staleness-injection, and pattern-library-version-pinning.</t>
        <t>The Subsystem emits either a Pass result or a Remediation Advisory. The
Per-Register Encryption Subsystem MUST architecturally withhold external
transmission until a Pass result has been emitted or until an authorised
operator has explicitly overridden the outcome.</t>
      </section>
      <section anchor="per-register-projection-function">
        <name>Per-Register Projection Function</name>
        <t>For each addressed register, the controlled projection function MUST inspect
the Canonical Claim against the permitted-predicate set declared in the
Bilateral Register Agreement. Where the Canonical Claim's Predicate is
directly a member of the permitted-predicate set, the Projected Predicate
equals the Canonical Claim Predicate.</t>
        <t>Where it is not, the projection function resolves the Predicate through
taxonomic prefix match: walking the Predicate Taxonomy upward from the
Canonical Claim Predicate until reaching a Predicate that is a member of the
permitted-predicate set. The narrowing operation MUST be recorded in the
Narrowed-From field of the Per-Register Claim Projection.</t>
      </section>
      <section anchor="per-register-encryption">
        <name>Per-Register Encryption</name>
        <t>Each Per-Register Claim Projection MUST be encrypted under the addressed
register's public-key material declared in the Bilateral Register Agreement.
The encryption operation MUST bind the Bilateral-Register-Agreement Hash and
the Pattern-Library Version Identifier into the ciphertext as authenticated
additional data, such that a register attempting to decrypt under a stale
Bilateral-Register-Agreement Hash or Pattern-Library Version Identifier
fails at the authenticated-additional-data verification step.</t>
      </section>
      <section anchor="partial-attestation-reception">
        <name>Partial Attestation Reception</name>
        <t>A Partial Attestation comprises:</t>
        <ul spacing="normal">
          <li>
            <t>Register Identifier</t>
          </li>
          <li>
            <t>Reconciliation-Verdict Field (<tt>match</tt>, <tt>no-match</tt>, <tt>partial-match</tt>, or <tt>indeterminate</tt>)</t>
          </li>
          <li>
            <t>OPTIONAL Divergence-Axis Field</t>
          </li>
          <li>
            <t>Bilateral-Register-Agreement Hash</t>
          </li>
          <li>
            <t>Policy-Version Hash</t>
          </li>
          <li>
            <t>Cryptographic Signature over the canonical payload of the foregoing</t>
          </li>
          <li>
            <t>Freshness Timestamp</t>
          </li>
        </ul>
        <t>The Partial Attestation payload SHALL NOT contain any register-record field,
any pre-image of the register record, or any field beyond those enumerated.
The architectural absence of register-record content is the specific
technical mechanism by which ARP avoids raw-record disclosure.</t>
      </section>
      <section anchor="aggregation">
        <name>Aggregation</name>
        <t>Where every addressed register declares Homomorphic capability, the
aggregation subsystem operates in Homomorphic Aggregation Mode. Per-register
encrypted verdict contributions are aggregated through a homomorphic
operator sequenced according to the Verdict Arithmetic declared in the
Applicable-Regimes Set. Intermediate values remain cryptographically
committed.</t>
        <t>Where any addressed register does not declare Homomorphic capability, the
aggregation subsystem MUST operate in Hash-Linkage Aggregation Mode. Each
Partial Attestation is canonical-hashed, ordered by sorted-leaf
construction, committed to a Merkle tree, and emitted with a Merkle root
and a per-register verdict band signed by the reconciliation-server sealing
key. The per-register verdict band MUST commit each register's verdict
individually without disclosure of any other register's payload.</t>
      </section>
      <section anchor="policy-version-hash-sealing">
        <name>Policy-Version-Hash Sealing</name>
        <t>The Policy-Version Hash MUST commit to:</t>
        <ol spacing="normal" type="1"><li>
            <t>Reconciliation rules</t>
          </li>
          <li>
            <t>Threshold parameters</t>
          </li>
          <li>
            <t>Pattern-Library Version Identifier</t>
          </li>
          <li>
            <t>Applicable-Regimes precedence</t>
          </li>
          <li>
            <t>Verdict-Arithmetic selection</t>
          </li>
          <li>
            <t>Bilateral-Register-Agreement Hashes of the addressed registers</t>
          </li>
        </ol>
        <t>The Policy-Version Hash MUST be reconstructible under audit from a
canonical policy state persisted in a policy-epoch store.</t>
      </section>
      <section anchor="settlement-layer-ledger">
        <name>Settlement-Layer Ledger</name>
        <t>Each Settlement-Layer Ledger entry comprises only:</t>
        <ul spacing="normal">
          <li>
            <t>Entry Sequence Number (monotonically increasing)</t>
          </li>
          <li>
            <t>Reconciliation Hash</t>
          </li>
          <li>
            <t>Policy-Version Hash</t>
          </li>
          <li>
            <t>Addressed-Registers Identifier Set (sorted in canonical lexicographic order)</t>
          </li>
          <li>
            <t>Aggregation-Method Descriptor</t>
          </li>
          <li>
            <t>OPTIONAL Merkle Root</t>
          </li>
          <li>
            <t>Reconciliation Timestamp</t>
          </li>
          <li>
            <t>Prior-Entry Hash</t>
          </li>
          <li>
            <t>Self-Entry Hash</t>
          </li>
        </ul>
        <t>The Ledger MUST NOT store Canonical-Claim content, register records, or
Partial-Attestation payloads. The append-only constraint MUST be enforced
at the storage interface layer; the Ledger interface MUST expose only an
APPEND operation, with no UPDATE or DELETE operation exposed or implemented.</t>
        <t>The Ledger MAY be distributed across a plurality of per-jurisdiction
secondary stores under synchronous replication, each operated under the
data-residency constraints of its host jurisdiction. The append-only
derivation-chain invariant -- that every entry's Prior-Entry Hash equals the
Self-Entry Hash of the immediately preceding entry -- MUST be preserved
across all secondary stores.</t>
      </section>
      <section anchor="regulator-portal">
        <name>Regulator Portal</name>
        <t>The Regulator Portal Subsystem authenticates a sovereign regulator's
jurisdictional credentials against a regulator-identity-provider trust
anchor declared in at least one Bilateral Register Agreement. It restricts
returned fields to those within the regulator's statutory scope as declared
in the statutory-regulator-access scope of the Bilateral Register
Agreements of the addressed registers. The scope restriction is computed
as the union of per-agreement permitted-read-predicates entries scoped to
the regulator's jurisdiction, intersected with the regulator's requested
field set. Each access MUST be recorded in an append-only subpoena-grade
audit trail.</t>
      </section>
      <section anchor="retroactive-evaluation">
        <name>Retroactive Evaluation</name>
        <t>Upon publication of an updated Pattern Library or an updated Policy
Version, the Retroactive Evaluation Subsystem MUST execute a deterministic
re-application of the updated policy state to retained reconciliation
metadata of historical Reconciliation Outputs sealed against a superseded
Policy-Version Hash. Where permissible under the applicable Bilateral
Register Agreements, partial attestations MAY be re-invoked.</t>
        <t>The retroactive evaluation MUST be executable without re-negotiation of any
Bilateral Register Agreement. A material change in a historical Combined
Verdict -- defined as any transition into or out of a decisive verdict
value (the decisive values being <tt>match</tt> and <tt>no-match</tt>) -- MUST trigger a
Sovereign Re-Notification through the Regulator Portal.</t>
      </section>
      <section anchor="cryptographic-primitive-upgrade-path">
        <name>Cryptographic-Primitive-Upgrade Path</name>
        <t>Each Bilateral Register Agreement MUST declare a Cryptographic-Primitive-
Upgrade Path comprising an ordered equivalence list for each of three
primitive classes: claim-encryption, partial-attestation-signature, and
sealing-signature. The equivalence list MUST include at least one
post-quantum primitive for each class, drawn from a set including ML-KEM
<xref target="FIPS203"/> for key encapsulation and ML-DSA <xref target="FIPS204"/> for signature
operations.</t>
        <t>A primitive rotation MAY be executed simultaneously across the three
layers without bilateral renegotiation. The Settlement-Layer Ledger
remains continuous across the rotation because Ledger entries commit to
hashes of canonicalised content rather than to cryptographic identities.</t>
      </section>
    </section>
    <section anchor="encoding">
      <name>Encoding</name>
      <section anchor="cbor-cose-encoding">
        <name>CBOR-COSE Encoding</name>
        <t>The recommended encoding for ARP messages on the wire is CBOR with COSE
<xref target="RFC9052"/> <xref target="RFC9053"/> envelopes. COSE_Sign1 is used for both Partial
Attestations and the Sealing Signature. The protected header MUST include
the Bilateral-Register-Agreement Hash and Policy-Version Hash as
unregistered labels in the range 0x800 .. 0x8FF (Certisyn private use).</t>
      </section>
      <section anchor="verifiable-credentials-interop">
        <name>Verifiable Credentials Interop</name>
        <t>A Reconciliation Output MAY be additionally serialised as a JSON-LD
document conforming to the W3C Verifiable Credentials Data Model
<xref target="W3C-VC-DM-2.0"/>, with the Reconciliation Hash, Addressed-Registers
Identifier Set, Bilateral-Register-Agreement Hash Set, and Policy-Version
Hash included as credential subject fields. The COSE_Sign1 envelope is the
normative form; the Verifiable Credential serialisation is an interop
convenience for relying parties operating in W3C VC ecosystems.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="service-operator-containment">
        <name>Service-Operator Containment</name>
        <t>The reconciliation server operates under a service-operator entity
standing in bilateral contractual relationship with each Register
Operator. The service-operator entity MUST be architecturally prohibited
from observing any register record or any Partial-Attestation payload
beyond the verdict and divergence-axis fields. The service-operator entity
MUST be structurally incapable of disclosing any register record
irrespective of internal operator action.</t>
      </section>
      <section anchor="pattern-library-integrity">
        <name>Pattern-Library Integrity</name>
        <t>The Adversarial Pre-Transmission Test gates onward transmission. The
Pattern Library MUST be bound to a Pattern-Library Commitment Hash. Any
modification to the Pattern Library MUST produce a new Pattern-Library
Version Identifier, and the Adversarial Pre-Transmission Test MUST be
re-executed against the new library before the change takes effect.</t>
      </section>
      <section anchor="bilateral-register-agreement-drift">
        <name>Bilateral-Register-Agreement Drift</name>
        <t>Each Bilateral Register Agreement carries an Agreement Hash. Each Partial
Attestation includes a reference to the Agreement Hash under which it was
issued. Agreement drift is detectable by comparison of agreement-hash
references across Partial-Attestation batches. Reconciliation MUST be
suspended for an addressed register whose Agreement Hash deviates from the
hash committed at the start of a reconciliation event.</t>
      </section>
      <section anchor="replay-defence">
        <name>Replay Defence</name>
        <t>Each Partial Attestation MUST carry a Freshness Timestamp. The
reconciliation server MUST verify the Freshness Timestamp against a
freshness window declared in the Bilateral Register Agreement. Stale
Partial Attestations MUST be rejected with a <tt>freshness-stale</tt> divergence
axis.</t>
      </section>
      <section anchor="post-quantum-migration">
        <name>Post-Quantum Migration</name>
        <t>The Cryptographic-Primitive-Upgrade Path is the mechanism by which ARP
deployments migrate to post-quantum primitives. ML-KEM-1024 <xref target="FIPS203"/>
is RECOMMENDED for the claim-encryption primitive class. ML-DSA-65
<xref target="FIPS204"/> is RECOMMENDED for the partial-attestation-signature and
sealing-signature primitive classes. Implementations MUST declare their
chosen post-quantum primitives in the Bilateral Register Agreement.</t>
      </section>
      <section anchor="side-channel-considerations">
        <name>Side-Channel Considerations</name>
        <t>Per-register projection narrowing is observable to the addressed register
through the Projected Predicate. Implementations MUST NOT use narrowing
patterns to fingerprint individual subjects. The Predicate Taxonomy SHOULD
be designed such that the set of permitted narrowings is small enough that
narrowing observation does not materially weaken subject privacy.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to register the following:</t>
      <ul spacing="normal">
        <li>
          <t>A namespace for ARP-specific COSE protected-header labels in the range
0x800 .. 0x8FF, containing at least:
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>arp-bilateral-agreement-hash</tt> (label 0x801)</t>
            </li>
            <li>
              <t><tt>arp-policy-version-hash</tt> (label 0x802)</t>
            </li>
            <li>
              <t><tt>arp-pattern-library-hash</tt> (label 0x803)</t>
            </li>
            <li>
              <t><tt>arp-divergence-axis</tt> (label 0x804)</t>
            </li>
          </ul>
        </li>
        <li>
          <t>A media type <tt>application/arp-reconciliation-output+cbor</tt> for the
CBOR-encoded Reconciliation Output.</t>
        </li>
        <li>
          <t>A media type <tt>application/arp-reconciliation-output+json</tt> for the
Verifiable Credentials JSON-LD form.</t>
        </li>
      </ul>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document benefits from the SCITT Architecture
<xref target="I-D.ietf-scitt-architecture"/>, the SCITT Receipts specification
<xref target="I-D.ietf-scitt-receipts"/>, and the RATS Architecture <xref target="RFC9334"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
        </reference>
        <reference anchor="I-D.ietf-scitt-receipts">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="FIPS203" target="https://csrc.nist.gov/publications/detail/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM)</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 203"/>
        </reference>
        <reference anchor="FIPS204" target="https://csrc.nist.gov/publications/detail/fips/204/final">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard (ML-DSA)</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="NIST" value="FIPS 204"/>
        </reference>
        <reference anchor="W3C-VC-DM-2.0" target="https://www.w3.org/TR/vc-data-model-2.0/">
          <front>
            <title>Verifiable Credentials Data Model 2.0</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 505?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="example-three-register-sanctions-reconciliation">
        <name>Example: Three-register Sanctions Reconciliation</name>
        <t>A relying party requests reconciliation of the predicate
<tt>sanctions:any-list-match</tt> for subject identifier <tt>corp:DUNS:0123456789</tt>
against the OFAC SDN list, the EU consolidated list, and the UK OFSI list.</t>
        <t>Each Bilateral Register Agreement permits the predicate. The projection
function emits identical Per-Register Claim Projections to all three
registers. All three return Partial Attestations with verdict <tt>no-match</tt>.</t>
        <t>The Aggregation Subsystem operates in Homomorphic Aggregation Mode (all
three registers declare homomorphic capability). The Verdict Arithmetic is
disjunction. The Combined Verdict is <tt>no-match</tt>.</t>
        <t>The Reconciliation Output is sealed against the current Policy-Version
Hash. The Settlement-Layer Ledger entry comprises:</t>
        <ul spacing="normal">
          <li>
            <t>Entry Sequence Number: 4,217,981</t>
          </li>
          <li>
            <t>Reconciliation Hash: &lt;32 bytes&gt;</t>
          </li>
          <li>
            <t>Policy-Version Hash: &lt;32 bytes&gt;</t>
          </li>
          <li>
            <t>Addressed-Registers Identifier Set: ["EU-CONSOLIDATED-2026-Q2", "UK-OFSI-2026-Q2", "US-OFAC-SDN-2026-Q2"]</t>
          </li>
          <li>
            <t>Aggregation-Method Descriptor: "homomorphic-disjunction"</t>
          </li>
          <li>
            <t>Reconciliation Timestamp: 2026-04-27T19:47:14Z</t>
          </li>
          <li>
            <t>Prior-Entry Hash: &lt;32 bytes&gt;</t>
          </li>
          <li>
            <t>Self-Entry Hash: &lt;32 bytes&gt;</t>
          </li>
        </ul>
        <t>No register record content is stored on the Ledger.</t>
      </section>
      <section anchor="example-retroactive-re-evaluation">
        <name>Example: Retroactive Re-evaluation</name>
        <t>Six weeks after the above reconciliation, OFAC adds the subject to the SDN
list as part of a new tranche. The OFAC register's Partial-Attestation
endpoint, on next invocation, would return verdict <tt>match</tt> with
divergence-axis <tt>sanctions-list-match</tt>.</t>
        <t>The Retroactive Evaluation Subsystem detects the new Pattern-Library and
Policy-Version transition, re-invokes Partial Attestations on all
historical reconciliations addressing OFAC under the superseded
Policy-Version Hash, identifies the material verdict change, and emits a
Sovereign Re-Notification through the Regulator Portal to the regulators
whose statutory-regulator-access scope intersects the changed
reconciliation. A new Reconciliation Output is appended to the Ledger
referencing the superseded one in its Source-Reconciliation-Output
Identifier field.</t>
      </section>
    </section>
    <section anchor="composition-with-the-scitt-architecture">
      <name>Composition with the SCITT Architecture</name>
      <t>The SCITT Architecture <xref target="I-D.ietf-scitt-architecture"/> provides notarisation
of supply-chain artefacts, including transparency receipts, transparent
statements, and registries. ARP composes with SCITT in three ways:</t>
      <ol spacing="normal" type="1"><li>
          <t>SCITT receipts MAY be the input claim to ARP. A claim referencing a
SCITT-anchored artefact (its hash and its registration receipt) is
reconciled across registers without disclosing the underlying artefact.</t>
        </li>
        <li>
          <t>ARP Reconciliation Outputs MAY be notarised into SCITT registries as
transparent statements, enabling SCITT-aware relying parties to verify
the cross-sovereign reconciliation event in the same way they verify
any other supply-chain claim.</t>
        </li>
        <li>
          <t>The SCITT Architecture's Identity Manager and Issuer roles map cleanly
to the Bilateral Register Agreement structure: each Sovereign Register
acts as a SCITT Issuer for a constrained predicate set, and the
reconciliation server acts as a SCITT Aggregator across multiple
Issuers.</t>
        </li>
      </ol>
    </section>
    <section anchor="composition-with-the-rats-architecture">
      <name>Composition with the RATS Architecture</name>
      <t>The RATS Architecture <xref target="RFC9334"/> provides remote-attestation procedures
for compute-substrate trust. ARP composes with RATS in two ways:</t>
      <ol spacing="normal" type="1"><li>
          <t>The Adversarial Pre-Transmission Test runs inside a confidential
computing boundary attested under RATS. The reconciliation server's
integrity MAY be verified by relying parties through standard RATS
verification flows.</t>
        </li>
        <li>
          <t>Compute-attestation reconciliation across heterogeneous TEE / CC
providers is the natural specialisation of ARP to the RATS evidence
class. A separate document specifies that specialisation.</t>
        </li>
      </ol>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
