<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lamps-one-signature-certs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="OSC">One Signature Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-lamps-one-signature-certs-00"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <street>Forskningsbyn Ideon</street>
          <city>Lund</city>
          <code>223 70</code>
          <country>SE</country>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="26"/>
    <workgroup>LAMPS</workgroup>
    <keyword>certificate</keyword>
    <keyword>signature</keyword>
    <keyword>X.509</keyword>
    <abstract>
      <?line 110?>

<t>This document defines a profile for certificates that are issued for validation of the digital signature produced by a single signing operation. Each certificate is created at the time of signing and bound to the signed content. The associated signing key is generated, used to produce a single digital signature, and then immediately destroyed. The certificate never expires and is never revoked, which simplifies long-term validation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lamps-one-signature-certs/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/draft-ietf-lamps-one-signature-certs"/>.</t>
    </note>
  </front>
  <middle>
    <?line 114?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The landscape of server-based signing services has changed over the decades. Recently, one type of signature service has gained favor, where the signing private key and the signing certificate are created for each digital signature, rather than re-using a static key and certificate over an extended time period.</t>
      <t>Some reasons why this type of signature services has been successful are:</t>
      <ul spacing="normal">
        <li>
          <t>The certificate will always have a predictable validity time from the time of signing;</t>
        </li>
        <li>
          <t>The time of signing is guaranteed by the certificate issue date;</t>
        </li>
        <li>
          <t>The identity information in the certificate can be adapted to the signing context;</t>
        </li>
        <li>
          <t>Revocation of signing certificates is practically non-existent despite many years of operation and millions of signatures; and</t>
        </li>
        <li>
          <t>The signature service holds no pre-stored user keys or certificates.</t>
        </li>
      </ul>
      <t>While this type of signature service solves many problems, it still suffers from the complexity caused by expiring signing certificates. One solution to this problem is the Signature Validation Token (SVT) <xref target="RFC9321"/>, where future validation can rely on a previous successful validation rather than validation based on aging data.</t>
      <t>This document takes this one step further and allows validation at any time in the future as long as trust in the CA certificate can be established.</t>
      <section anchor="basic-features">
        <name>Basic features</name>
        <t>One signature certificates have the following common characteristics:</t>
        <ul spacing="normal">
          <li>
            <t>They never expire;</t>
          </li>
          <li>
            <t>They are never revoked;</t>
          </li>
          <li>
            <t>They are bound to a specific document content; and</t>
          </li>
          <li>
            <t>They assert that the corresponding private key was destroyed immediately after signing.</t>
          </li>
        </ul>
        <section anchor="revocation">
          <name>Revocation</name>
          <t>Traditional certificates that are re-used over time have many legitimate reasons for revocation, such as if the private key is lost or compromised. This can lead to large volumes of revocation data.</t>
          <t>The fact that the same key is used many times exposes the key for the risks of loss, unauthorized usage, or theft. When many objects are signed with the same private key, the risk of exposure and the number of affected signed documents upon revocation increases, unless properly timestamped and properly verified.</t>
          <t>When a signing key is used only once, that risk of exposure is greatly reduced, and it has been shown that most usages of dedicated private keys and certificates no longer require revocation.</t>
          <t>The CA can readily attest that a certain procedure was followed when the certificate was issued. As a matter of policy, the certificate itself is an attestation that the CP and CPS <xref target="RFC3647"/> were followed successfully when the signature was created. Certificates issued according to this profile therefore only attest to the validity at the time of issuance and signing, rather than a retroactive state at the time of validation. This profile is intended for those applications where this declaration of validity is relevant and useful.</t>
          <t>Applications that require traditional revocation checking that provides the state at the time of validation <bcp14>MUST NOT</bcp14> use this profile.</t>
          <t>An example usage where this is useful is in services where the signed document is stored as an internal evidence record, such as when a Tax agency allows citizens to sign their tax declarations. This record is then pulled out and used only in case of a dispute where the identified signer challenges the signature. A revocation service is less likely to contribute to this process. If the challenge is successful, the signed document will be removed without affecting any other signed documents in the archive.</t>
        </section>
        <section anchor="ca-certificate-validity">
          <name>CA certificate validity</name>
          <t>Even if the end entity certificate has infinite validity, the capability to validate the certificate is limited to the capability to trust the CA. For initial validation, in a typical scenario, this is limited by the validity period of the CA certificate.</t>
          <t>However, a validation service may have several options available for how to handle CA trust, in particular when re-validating archived documents:</t>
          <ul spacing="normal">
            <li>
              <t>The verifier may list the CA key and identity as trusted and treat it as a trust anchor.</t>
            </li>
            <li>
              <t>The verifier may cross certify the CA and make it available for validation to a local trusted Trust Anchor.</t>
            </li>
          </ul>
          <t>In addition, when a certificate repository is available, renewal of the CA certificate can preserve the ability to validate the infinite validity end enitiy certificate.</t>
          <t>This profile assumes that initial validation of a signed document is performed within the validity period of the CA certificate. Realizing the full benefit of a non-expiring end entity certificate for later re-validation <bcp14>MAY</bcp14> require additional trust provisioning by the verifier.</t>
          <t>Mechanisms for establishing trust in a CA beyond their certificate validity period are outside the scope of this profile.</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="certificate-content">
      <name>Certificate content</name>
      <t>Conforming certificates <bcp14>SHALL</bcp14> meet all requirements of this section.</t>
      <t>Certificates <bcp14>MUST</bcp14> indicate that a certificate has no well-defined expiration date by setting the notAfter field to the GeneralizedTime value 99991231235959Z, as defined in <xref target="RFC5280"/>.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the id-ce-noRevAvail extension in compliance with <xref target="RFC9608"/>, indicating that this certificate is not supported by any revocation mechanism.</t>
      <t>Certificates <bcp14>MUST</bcp14> include the signedDocumentBinding extension, binding the certificate to a specific signed content.</t>
      <section anchor="the-signeddocumentbinding-extension">
        <name>The signedDocumentBinding extension</name>
        <t>The signedDocumentBinding extension binds a certificate to a specific signed content. When present, conforming CAs <bcp14>SHOULD</bcp14> mark this extension as non-critical.</t>
        <artwork><![CDATA[
name           id-pe-signedDocumentBinding
OID            { id-pe TBD }
syntax         SignedDocumentBinding
criticality    SHOULD be FALSE

SignedDocumentBinding ::= SEQUENCE {
dataTbsHash     OCTET STRING,
hashAlg         DigestAlgorithmIdentifier,
bindingType     UTF8String OPTIONAL }
]]></artwork>
        <t>The dataTbsHash field <bcp14>MUST</bcp14> contain a hash of the data to be signed.</t>
        <t>The hashAlg field <bcp14>MUST</bcp14> contain the AlgorithmIdentifier of the hash algorithm used to generate the dataTbsHash value.</t>
        <t>The bindingType field <bcp14>MAY</bcp14> contain an identifier that specifies how the data to be signed is derived from the digital object to be signed.</t>
        <t>Adding this extension to a certificate is a statement by the CA that the signing key is generated exclusively for the purpose of signing the document bound by this extension, and that the signing key is destroyed after signing. The details for this procedure and how the destruction of the signing key is assured <bcp14>SHOULD</bcp14> be outlined in the certificate policy <xref target="RFC3647"/> of the issued certificate.</t>
      </section>
      <section anchor="defined-bindingtype-identifiers">
        <name>Defined bindingType identifiers</name>
        <t>The bindingType field defines how the data to be signed (dataTbsHash) is derived from the signed document.
This field identifies a deterministic procedure for selecting the portion of the signed content that is included in the hash computation.
When the field is omitted, the rules for the default binding type apply.</t>
        <t>The purpose of the dataTbsHash value is to bind the certificate to the document being signed in order to prevent re-use of the signing key for multiple signed documents. This enforces the contract that the signing key is used only once for creation of one signature only. Validators <bcp14>SHOULD</bcp14> verify that the signed document matches the certificate’s binding information.
This verification is not required for the signature to validate successfully but provides an additional safeguard against misuse or substitution of certificates.</t>
        <t>This document defines a set of bindingType identifiers. Additional bindingType identifiers <bcp14>MAY</bcp14> be defined by future specifications.</t>
        <section anchor="default-binding">
          <name>Default Binding</name>
          <t>When the bindingType is absent, the default binding applies.
In this case, the dataTbsHash value is the hash of the exact data that is signed by the signature format in use.</t>
          <t>Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>For XML Signatures <xref target="XMLDSIG11"/>, the hash of the SignedInfo element.</t>
            </li>
            <li>
              <t>For CMS Signatures <xref target="RFC5652"/>, the DER-encoded SignedAttributes structure.</t>
            </li>
            <li>
              <t>For other formats, the data structure input directly to the signature algorithm.</t>
            </li>
          </ul>
          <t>This bindingType <bcp14>MUST NOT</bcp14> be used when the data to be signed includes either the signer certificate itself or a hash of the signer certificate. This includes JWS and COSE signed documents that can include signer certificates in the protected header. JWS signatures <xref target="RFC7515"/> <bcp14>MUST</bcp14> use the "jws" bindingType and COSE signatures <xref target="RFC8152"/> <bcp14>MUST</bcp14> use the "cose" binding type.</t>
        </section>
        <section anchor="cades-binding">
          <name>CAdES Binding</name>
          <t>Identifier: "cades"</t>
          <t>For CMS <xref target="RFC5652"/> or ETSI CAdES <xref target="CADES"/> signatures incorporating SigningCertificate or SigningCertificateV2 attributes <xref target="RFC5035"/> in signedAttrs,
the dataTbsHash value is computed over the DER encoding of SignerInfo excluding any instances of SigningCertificate or SigningCertificateV2 attributes from the SignedAttributes set.</t>
          <t>This bindingType also applies to PDF <xref target="ISOPDF2"/> and ETSI PAdES <xref target="PADES"/> signed documents when applicable due to its use of CMS for signing.</t>
        </section>
        <section anchor="xades-binding">
          <name>XAdES Binding</name>
          <t>Identifier: "xades"</t>
          <t>For ETSI XML Advanced Electronic Signatures <xref target="XADES"/>, the dataTbsHash value is computed over the canonicalized SignedInfo element,
with any Reference elements whose Type attribute equals "http://uri.etsi.org/01903#SignedProperties" removed prior to hashing.
This ensures that the SignedProperties element, which may contain references to the signing certificate, does not create a circular dependency. Extraction of the Reference element <bcp14>MUST</bcp14> be done by removing only the characters from the leading &lt;Reference&gt; tag up to and including the ending &lt;/Reference&gt; tag, preserving all other bytes of SignedInfo unchanged, including any white space or line feeds.</t>
          <t>Note: This operation is purely textual and does not require XML parsing beyond locating the tag boundaries.</t>
        </section>
        <section anchor="jws-binding">
          <name>JWS Binding</name>
          <t>Identifier: "jws"</t>
          <t>For JSON Web Signatures (JWS) <xref target="RFC7515"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
        <section anchor="cose-binding">
          <name>COSE Binding</name>
          <t>Identifier: "cose"</t>
          <t>For COSE signatures <xref target="RFC8152"/>, the dataTbsHash value is computed over the payload only.
The protected header and any unprotected header parameters <bcp14>MUST NOT</bcp14> be included in the hash calculation.</t>
          <t>This exclusion avoids circular dependencies where certificate data may appear in the protected header.</t>
        </section>
      </section>
    </section>
    <section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <sourcecode markers="true"><![CDATA[
   SignedDocumentBindingExtn
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-signedDocumentBinding(TBD) }

   DEFINITIONS IMPLICIT TAGS ::=
   BEGIN

   IMPORTS
     EXTENSION, id-pkix, id-pe
     FROM PKIX-CommonTypes-2009  -- RFC 5912
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) id-mod(0)
         id-mod-pkixCommon-02(57) }

     DigestAlgorithmIdentifier
     FROM CryptographicMessageSyntax-2010 -- RFC 6268
       { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } ;

   -- signedDocumentBinding Certificate Extension

   ext-SignedDocumentBinding EXTENSION ::= {
     SYNTAX SignedDocumentBinding
     IDENTIFIED BY id-pe-signedDocumentBinding }

   SignedDocumentBinding ::= SEQUENCE {
     dataTbsHash     OCTET STRING,
     hashAlg         DigestAlgorithmIdentifier,
     bindingType     UTF8String OPTIONAL }

   -- signedDocumentBinding Certificate Extension OID

   id-pe-signedDocumentBinding OBJECT IDENTIFIER ::= { id-pe TBD }

   END
 ]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="certificates-without-revocation">
        <name>Certificates Without Revocation</name>
        <t>Certificates conforming to this profile include the id-ce-noRevAvail extension and therefore do not provide any revocation mechanism. Such certificates attest only to the state of trust and correctness of procedures at the time of issuance.</t>
        <t>The Security considerations in <xref target="RFC9608"/> also applies to this document.</t>
      </section>
      <section anchor="signed-document-binding">
        <name>Signed Document Binding</name>
        <t>The signedDocumentBinding extension binds the certificate to specific signed content by including a hash of the data to be signed. Verification of this binding is not required for successful cryptographic validation of the signature. A signature can therefore validate correctly even if the binding is not checked.</t>
        <t>However, a relying party <bcp14>SHOULD</bcp14> verify that the signed content matches the dataTbsHash value in the signedDocumentBinding extension. Performing this check ensures that the certificate is used only with the content for which it was issued and enforces the intended scope of the certificate.</t>
        <t>The security model of this profile states that the associated private key is generated for, and used in, exactly one signing operation and is then destroyed. This property holds independently of whether the binding is verified by the relying party. Nevertheless, failure to verify the binding weakens the protections provided by this profile and increases the risk of certificate substitution or unintended certificate reuse.</t>
        <t>When verified, the signedDocumentBinding extension provides an additional safeguard against the use of the certificate for any signature other than the one for which it was issued.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="registry-for-signeddocumentbinding-bindingtype-identifiers">
        <name>Registry for signedDocumentBinding bindingType Identifiers</name>
        <t>IANA is requested to create a new registry entitled: “Signed Document Binding Type Identifiers”</t>
        <t>This registry shall contain identifiers used in the bindingType field of the signedDocumentBinding certificate extension defined in this document.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <t>Each registry entry shall contain the following fields:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: A UTF-8 string identifying the binding type.</t>
            </li>
            <li>
              <t>Description: A brief description of how the dataTbsHash value is computed.</t>
            </li>
            <li>
              <t>Reference: A reference to the document that defines the binding type.</t>
            </li>
          </ul>
        </section>
        <section anchor="registration-policy">
          <name>Registration Policy</name>
          <t>The registration policy for this registry is Specification Required as defined in <xref target="RFC8174"/>.</t>
          <t>The designated expert(s) <bcp14>SHALL</bcp14> ensure that:</t>
          <ul spacing="normal">
            <li>
              <t>The binding type definition clearly specifies a deterministic and unambiguous procedure for computing the dataTbsHash value.</t>
            </li>
            <li>
              <t>The specification explains how circular dependencies with certificate inclusion are avoided, where applicable.</t>
            </li>
            <li>
              <t>The identifier is unique within the registry.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <t>IANA is requested to populate the registry with the following initial values:</t>
          <ul spacing="normal">
            <li>
              <t>Identifier: (absent)</t>
            </li>
            <li>
              <t>Description: Default binding as defined in this document</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cades</t>
            </li>
            <li>
              <t>Description: CMS/CAdES binding excluding SigningCertificate attributes</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: xades</t>
            </li>
            <li>
              <t>Description: XAdES binding excluding SignedProperties reference</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: jws</t>
            </li>
            <li>
              <t>Description: JWS payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Identifier: cose</t>
            </li>
            <li>
              <t>Description: COSE payload-only binding</t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3647">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework</title>
            <author fullname="S. Chokhani" initials="S." surname="Chokhani"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="R. Sabett" initials="R." surname="Sabett"/>
            <author fullname="C. Merrill" initials="C." surname="Merrill"/>
            <author fullname="S. Wu" initials="S." surname="Wu"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document supersedes RFC 2527.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3647"/>
          <seriesInfo name="DOI" value="10.17487/RFC3647"/>
        </reference>
        <reference anchor="RFC5035">
          <front>
            <title>Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>In the original Enhanced Security Services for S/MIME document (RFC 2634), a structure for cryptographically linking the certificate to be used in validation with the signature was introduced; this structure was hardwired to use SHA-1. This document allows for the structure to have algorithm agility and defines a new attribute for this purpose. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5035"/>
          <seriesInfo name="DOI" value="10.17487/RFC5035"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9608">
          <front>
            <title>No Revocation Available for X.509 Public Key Certificates</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="J. Mandel" initials="J." surname="Mandel"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>X.509v3 public key certificates are profiled in RFC 5280. Short-lived certificates are seeing greater use in the Internet. The Certification Authority (CA) that issues these short-lived certificates do not publish revocation information because the certificate lifespan that is shorter than the time needed to detect, report, and distribute revocation information. Some long-lived X.509v3 public key certificates never expire, and they are never revoked. This specification defines the noRevAvail certificate extension so that a relying party can readily determine that the CA does not publish revocation information for the certificate, and it updates the certification path validation algorithm defined in RFC 5280 so that revocation checking is skipped when the noRevAvail certificate extension is present.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9608"/>
          <seriesInfo name="DOI" value="10.17487/RFC9608"/>
        </reference>
        <reference anchor="XMLDSIG11">
          <front>
            <title>XML Signature Syntax and Processing Version 1.1</title>
            <author initials="D." surname="Eastlake" fullname="Donald Eastlake">
              <organization/>
            </author>
            <author initials="J." surname="Reagle" fullname="Joseph Reagle">
              <organization/>
            </author>
            <author initials="D." surname="Solo" fullname="David Solo">
              <organization/>
            </author>
            <author initials="F." surname="Hirsch" fullname="Frederick Hirsch">
              <organization/>
            </author>
            <author initials="M." surname="Nystrom" fullname="Magnus Nystrom">
              <organization/>
            </author>
            <author initials="T." surname="Roessler" fullname="Thomas Roessler">
              <organization/>
            </author>
            <author initials="K." surname="Yiu" fullname="Kelvin Yiu">
              <organization/>
            </author>
            <date year="2013" month="April" day="11"/>
          </front>
          <seriesInfo name="W3C" value="Proposed Recommendation"/>
        </reference>
        <reference anchor="ISOPDF2">
          <front>
            <title>Document management -- Portable document format -- Part 2: PDF 2.0</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2017" month="July"/>
          </front>
          <seriesInfo name="ISO" value="32000-2"/>
        </reference>
        <reference anchor="XADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 132-1 v1.3.1"/>
        </reference>
        <reference anchor="PADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 142-1 v1.2.1"/>
        </reference>
        <reference anchor="CADES">
          <front>
            <title>Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures</title>
            <author>
              <organization>ETSI</organization>
            </author>
            <date year="2021" month="October"/>
          </front>
          <seriesInfo name="ETSI" value="EN 319 122-1 v1.2.1"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9321">
          <front>
            <title>Signature Validation Token</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>Electronic signatures have a limited lifespan with respect to the time period that they can be validated and determined to be authentic. The Signature Validation Token (SVT) defined in this specification provides evidence that asserts the validity of an electronic signature. The SVT is provided by a trusted authority, which asserts that a particular signature was successfully validated according to defined procedures at a certain time. Any future validation of that electronic signature can be satisfied by validating the SVT without any need to also validate the original electronic signature or the associated digital certificates. The SVT supports electronic signatures in Cryptographic Message Syntax (CMS), XML, PDF, and JSON documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9321"/>
          <seriesInfo name="DOI" value="10.17487/RFC9321"/>
        </reference>
      </references>
    </references>
    <?line 397?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
