<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-daa-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="DAA for RATS">Direct Anonymous Attestation for the Remote Attestation Procedures Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-daa-01"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="C." surname="Newton" fullname="Christopher Newton">
      <organization>University of Surrey</organization>
      <address>
        <email>cn0016@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Liqun Chen">
      <organization>University of Surrey</organization>
      <address>
        <email>liqun.chen@surrey.ac.uk</email>
      </address>
    </author>
    <author initials="D." surname="Thaler" fullname="Dave Thaler">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>dthaler@microsoft.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="10"/>
    <area>Security</area>
    <workgroup>RATS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document maps the concept of Direct Anonymous Attestation (DAA) to the Remote Attestation Procedures (RATS) Architecture.
The role DAA Issuer is introduced and its interactions with existing RATS roles is specified.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-daa/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-ietf-rats-daa"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Remote ATtestation procedureS (RATS, <xref target="I-D.ietf-rats-architecture"/>) describe interactions between well-defined architectural constituents in support of Relying Parties that require an understanding about the trustworthiness of a remote peer.
The identity of an Attester and its corresponding Attesting Environments play a vital role in RATS.
A common way to refer to such an identity is the Authentication Secret ID as defined in the Reference Interaction Models for RATS <xref target="I-D.ietf-rats-reference-interaction-models"/>.
The fact that every Attesting Environment can be uniquely identified in the context of the RATS architecture is not suitable for every application of remote attestation.
Additional issues may arise when Personally identifiable information (PII) -- whether obfuscated or in clear text -- are included in attestation Evidence or even corresponding Attestation Results.
This document illustrates how Direct Anonymous Attestation (DAA) can mitigate the issue of uniquely (re-)identifiable Attesting Environments.
To accomplish that goal, a new RATS role -- the DAA Issuer -- is introduced and its duties as well as its interactions with other RATS roles are specified.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following set of terms, roles, and concepts as defined in <xref target="I-D.ietf-rats-architecture"/>:
Attester, Verifier, Relying Party, Conceptual Message, Evidence, Attestation Result, Attesting Environment. The role of Endorser, also defined in <xref target="I-D.ietf-rats-architecture"/>, needs to be adapted and details are given below.</t>
      <t>Additionally, this document uses and adapts, as necessary, the following concepts and information elements as defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>:
Attester Identity, Authentication Secret, Authentication Secret ID</t>
      <t>A PKIX Certificate is an X.509v3 format certificate as specified by <xref target="RFC5280"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="direct-anonymous-attestation">
      <name>Direct Anonymous Attestation</name>
      <t><xref target="dataflows"/> shows the data flows between the different RATS roles involved in DAA.</t>
      <!-- this would benefit from aasvg -->
<figure anchor="dataflows">
        <name>DAA data flows</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="528" width="560" viewBox="0 0 560 528" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,208 L 8,240" fill="none" stroke="black"/>
              <path d="M 26,32 L 26,64" fill="none" stroke="black"/>
              <path d="M 22,32 L 22,64" fill="none" stroke="black"/>
              <path d="M 24,248 L 24,496" fill="none" stroke="black"/>
              <path d="M 64,64 L 64,200" fill="none" stroke="black"/>
              <path d="M 96,480 L 96,512" fill="none" stroke="black"/>
              <path d="M 114,32 L 114,64" fill="none" stroke="black"/>
              <path d="M 110,32 L 110,64" fill="none" stroke="black"/>
              <path d="M 112,240 L 112,472" fill="none" stroke="black"/>
              <path d="M 152,208 L 152,240" fill="none" stroke="black"/>
              <path d="M 178,32 L 178,96" fill="none" stroke="black"/>
              <path d="M 174,32 L 174,96" fill="none" stroke="black"/>
              <path d="M 192,336 L 192,472" fill="none" stroke="black"/>
              <path d="M 208,480 L 208,512" fill="none" stroke="black"/>
              <path d="M 224,320 L 224,352" fill="none" stroke="black"/>
              <path d="M 232,224 L 232,312" fill="none" stroke="black"/>
              <path d="M 256,96 L 256,312" fill="none" stroke="black"/>
              <path d="M 274,32 L 274,96" fill="none" stroke="black"/>
              <path d="M 270,32 L 270,96" fill="none" stroke="black"/>
              <path d="M 306,32 L 306,80" fill="none" stroke="black"/>
              <path d="M 302,32 L 302,80" fill="none" stroke="black"/>
              <path d="M 360,80 L 360,312" fill="none" stroke="black"/>
              <path d="M 384,480 L 384,512" fill="none" stroke="black"/>
              <path d="M 394,32 L 394,80" fill="none" stroke="black"/>
              <path d="M 390,32 L 390,80" fill="none" stroke="black"/>
              <path d="M 408,320 L 408,352" fill="none" stroke="black"/>
              <path d="M 426,32 L 426,80" fill="none" stroke="black"/>
              <path d="M 422,32 L 422,80" fill="none" stroke="black"/>
              <path d="M 432,336 L 432,472" fill="none" stroke="black"/>
              <path d="M 464,80 L 464,472" fill="none" stroke="black"/>
              <path d="M 512,480 L 512,512" fill="none" stroke="black"/>
              <path d="M 554,32 L 554,80" fill="none" stroke="black"/>
              <path d="M 550,32 L 550,80" fill="none" stroke="black"/>
              <path d="M 24,30 L 112,30" fill="none" stroke="black"/>
              <path d="M 24,34 L 112,34" fill="none" stroke="black"/>
              <path d="M 176,30 L 272,30" fill="none" stroke="black"/>
              <path d="M 176,34 L 272,34" fill="none" stroke="black"/>
              <path d="M 304,30 L 392,30" fill="none" stroke="black"/>
              <path d="M 304,34 L 392,34" fill="none" stroke="black"/>
              <path d="M 424,30 L 552,30" fill="none" stroke="black"/>
              <path d="M 424,34 L 552,34" fill="none" stroke="black"/>
              <path d="M 24,62 L 112,62" fill="none" stroke="black"/>
              <path d="M 24,66 L 112,66" fill="none" stroke="black"/>
              <path d="M 304,78 L 392,78" fill="none" stroke="black"/>
              <path d="M 304,82 L 392,82" fill="none" stroke="black"/>
              <path d="M 424,78 L 552,78" fill="none" stroke="black"/>
              <path d="M 424,82 L 552,82" fill="none" stroke="black"/>
              <path d="M 176,94 L 272,94" fill="none" stroke="black"/>
              <path d="M 176,98 L 272,98" fill="none" stroke="black"/>
              <path d="M 8,208 L 152,208" fill="none" stroke="black"/>
              <path d="M 152,224 L 232,224" fill="none" stroke="black"/>
              <path d="M 8,240 L 152,240" fill="none" stroke="black"/>
              <path d="M 224,320 L 408,320" fill="none" stroke="black"/>
              <path d="M 192,336 L 216,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 432,336" fill="none" stroke="black"/>
              <path d="M 224,352 L 408,352" fill="none" stroke="black"/>
              <path d="M 96,480 L 208,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,496 L 96,496" fill="none" stroke="black"/>
              <path d="M 96,512 L 208,512" fill="none" stroke="black"/>
              <path d="M 384,512 L 512,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="472,472 460,466.4 460,477.6 " fill="black" transform="rotate(90,464,472)"/>
              <polygon class="arrowhead" points="440,472 428,466.4 428,477.6 " fill="black" transform="rotate(90,432,472)"/>
              <polygon class="arrowhead" points="368,312 356,306.4 356,317.6 " fill="black" transform="rotate(90,360,312)"/>
              <polygon class="arrowhead" points="264,312 252,306.4 252,317.6 " fill="black" transform="rotate(90,256,312)"/>
              <polygon class="arrowhead" points="240,312 228,306.4 228,317.6 " fill="black" transform="rotate(90,232,312)"/>
              <polygon class="arrowhead" points="224,336 212,330.4 212,341.6 " fill="black" transform="rotate(0,216,336)"/>
              <polygon class="arrowhead" points="120,472 108,466.4 108,477.6 " fill="black" transform="rotate(90,112,472)"/>
              <polygon class="arrowhead" points="72,200 60,194.4 60,205.6 " fill="black" transform="rotate(90,64,200)"/>
              <polygon class="arrowhead" points="32,248 20,242.4 20,253.6 " fill="black" transform="rotate(270,24,248)"/>
              <g class="text">
                <text x="68" y="52">Endorser</text>
                <text x="224" y="52">Reference</text>
                <text x="348" y="52">Verifier</text>
                <text x="464" y="52">Relying</text>
                <text x="520" y="52">Party</text>
                <text x="208" y="68">Value</text>
                <text x="344" y="68">Owner</text>
                <text x="464" y="68">Owner</text>
                <text x="220" y="84">Provider</text>
                <text x="116" y="132">Endorsements</text>
                <text x="296" y="132">Reference</text>
                <text x="400" y="132">Appraisal</text>
                <text x="504" y="132">Appraisal</text>
                <text x="284" y="148">Values</text>
                <text x="388" y="148">Policy</text>
                <text x="492" y="148">Policy</text>
                <text x="536" y="148">for</text>
                <text x="376" y="164">for</text>
                <text x="512" y="164">Attestation</text>
                <text x="396" y="180">Evidence</text>
                <text x="496" y="180">Results</text>
                <text x="48" y="228">DAA</text>
                <text x="92" y="228">Issuer</text>
                <text x="208" y="260">Group</text>
                <text x="204" y="276">Public</text>
                <text x="68" y="292">Credential</text>
                <text x="216" y="292">Key</text>
                <text x="56" y="308">Request</text>
                <text x="308" y="340">Verifier</text>
                <text x="228" y="388">Evidence</text>
                <text x="384" y="388">Attestation</text>
                <text x="400" y="404">Results</text>
                <text x="92" y="436">Cred</text>
                <text x="140" y="436">ential</text>
                <text x="148" y="500">Attester</text>
                <text x="424" y="500">Relying</text>
                <text x="480" y="500">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
  .==========.       .===========.   .==========.   .===============.
  ║ Endorser ║       ║ Reference ║   ║ Verifier ║   ║ Relying Party ║
  '====+====='       ║ Value     ║   ║  Owner   ║   ║  Owner        ║
       |             ║ Provider  ║   '======+==='   '====+=========='
       |             '=========+='          |            |
       |                       |            |            |
       |Endorsements           |Reference   |Appraisal   |Appraisal
       |                       |Values      |Policy      |Policy for
       |                       |            |for         |Attestation
       |                       |            |Evidence    |Results
       V                       |            |            |
.-----------------.            |            |            |
|   DAA Issuer    +---------.  |            |            |
'------------+----'         |  |            |            |
  ^          |         Group|  |            |            |
  |          |        Public|  |            |            |
  |Credential|           Key|  |            |            |
  |Request   |              v  v            v            |
  |          |             .----------------------.      |
  |          |         .-->+      Verifier        +--.   |
  |          |         |   '----------------------'  |   |
  |          |         |                             |   |
  |          |         |Evidence          Attestation|   |
  |          |         |                      Results|   |
  |          |         |                             |   |
  |      Cred|ential   |                             |   |
  |          |         |                             |   |
  |          v         |                             v   v
  |        .-------------.                     .---------------.
  '--------+  Attester   |                     | Relying Party |
           '-------------'                     '---------------'
]]></artwork>
        </artset>
      </figure>
      <t>DAA <xref target="DAA"/> is a signature scheme that allows the privacy of users that are associated with an Attester (e.g. its owner) to be maintained.
Essentially, DAA can be seen as a group signature scheme with the feature that given a DAA signature no-one can find out who the signer is, i.e., the anonymity is not revocable.
To be able to sign anonymously, an Attester has to obtain a credential from a DAA Issuer.
The DAA Issuer uses a private/public key pair to generate credentials for a group of Attesters <!-- this could be phrased a bit confusing as below it is stated that the key-pair is used for a group of Attesters --> and makes the public key (in the form of a public key certificate) available to the verifier in order to enable them to validate the Evidence received.</t>
      <t>In order to support these DAA signatures, the DAA Issuer <bcp14>MUST</bcp14> associate a single key pair with a group of Attesters <!-- is it clear enough what exactly "a group of Attesters" means? --> and use the same key pair when creating the credentials for all of the Attesters in this group.
The DAA Issuer's group public key certificate replaces the individual Attester Identity documents during authenticity validation as a part of the appraisal of Evidence conducted by a verifier.
This is in contrast to intuition that there has to be a unique Attester Identity per device.</t>
      <t>For DAA, the role of the Endorser is essentially the same, but they now provide Attester endorsement documents to the DAA Issuer rather than directly to the verifier. These Attester endorsement documents enable the Attester to obtain a credential from the DAA Issuer.</t>
    </section>
    <section anchor="daa-changes-to-the-rats-architecture">
      <name>DAA changes to the RATS Architecture</name>
      <t>In order to enable the use of DAA, a new conceptual message, the Credential Request, is defined and a new role, the DAA Issuer role, is added to the roles defined in the RATS Architecture.</t>
      <dl>
        <dt>Credential Request:</dt>
        <dd>
          <t>An Attester sends a Credential Request to the DAA Issuer to obtain a credential. This request contains information about the DAA key that the Attester will use to create evidence and, together with Attester endorsement information that is provided by the Endorser, to confirm that the request came from a valid Attester.</t>
        </dd>
        <dt>DAA Issuer:</dt>
        <dd>
          <t>A RATS role that offers zero-knowledge proofs based on public-key certificates used for a group of Attesters (Group Public Keys) <xref target="DAA"/>. How this group of Attesters is defined is not specified here, but the group must be large enough for the necessary anonymity to be assured.</t>
        </dd>
      </dl>
      <t>Effectively, these certificates share the semantics of Endorsements, with the following exceptions:</t>
      <ul spacing="normal">
        <li>Upon receiving a Credential Request from an Attester, the associated group private key is used by the DAA Issuer to provide the Attester with a credential that it can use to convince the Verifier that its Evidence is valid.
To keep their anonymity, the Attester randomises this credential each time that it is used. Although the DAA Issuer knows the Attester Identity and can associate this with the credential issued, randomisation ensures that the Attester's identity cannot be revealed to anyone, including the DAA Issuer.</li>
        <li>The Verifier can use the DAA Issuer's group public key certificate, together with the randomised credential from the Attester, to confirm that the Evidence comes from a valid Attester without revealing the Attester's identity.</li>
        <li>A credential is conveyed from a DAA Issuer to an Attester in combination with the conveyance of the group public key certificate from DAA Issuer to Verifier.</li>
      </ul>
    </section>
    <section anchor="additions-to-remote-attestation-principles">
      <name>Additions to Remote Attestation principles</name>
      <t>In order to ensure an appropriate conveyance of Evidence via interaction models in general, the following prerequisite considering Attester Identity <bcp14>MUST</bcp14> be in place to support the implementation of interaction models.
<!-- This is a weird MUST: It is not clear who MUST do what here. -->
      </t>
      <dl>
        <dt>Attestation Evidence Authenticity:</dt>
        <dd>
          <t>Attestation Evidence <bcp14>MUST</bcp14> be correct and authentic.</t>
        </dd>
        <dt/>
        <dd>
          <t>In order to provide proofs of authenticity, Attestation Evidence <bcp14>SHOULD</bcp14> be cryptographically associated with an identity document that is a randomised DAA credential.</t>
        </dd>
      </dl>
      <t>The following information elements define extensions for corresponding information elements defined in <xref target="I-D.ietf-rats-reference-interaction-models"/>, which are vital to all types of reference interaction models.
Varying from solution to solution, generic information elements can be either included in the scope of protocol messages (instantiating Conceptual Messages defined by the RATS architecture) or can be included in additional protocol parameters of protocols that facilitate the conveyance of RATS Conceptual Messages.
Ultimately, the following information elements are required by any kind of scalable remote attestation procedure using DAA with one of RATS's reference interaction models.</t>
      <dl>
        <dt>Attester Identity ('attesterIdentity'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, the Attester's identity is not revealed to the verifier. The Attester is issued with a credential by the DAA Issuer that is randomised and then used to anonymously confirm the validity of their evidence.
The evidence is verified using the DAA Issuer's group public key.</t>
        </dd>
        <dt>Authentication Secret IDs ('authSecID'):</dt>
        <dd>
          <t><em>mandatory</em></t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, Authentication Secret IDs are represented by the DAA Issuer's group public key that <bcp14>MUST</bcp14> be used to create DAA credentials for the corresponding Authentication Secrets used to protect Evidence.</t>
        </dd>
        <dt/>
        <dd>
          <t>In DAA, an Authentication Secret ID does not identify a unique Attesting Environment but is associated with a group of Attesting Environments.
This is because an Attesting Environment should not be distinguishable and the DAA credential which represents the Attesting Environment is randomised each time it used.</t>
        </dd>
      </dl>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>As outlined above, for DAA to provide privacy for the Attester, the DAA group must be large enough to stop the Verifier identifying the Attester.</t>
      <t>Randomisation of the DAA credential by the Attester means that collusion between the DAA Issuer and Verifier, will not give them any advantage when trying to identify the Attester.</t>
      <t>For DAA, the Attestation Evidence conveyed to the Verifier <bcp14>MUST</bcp14> not uniquely identify the Attester. If the Attestation Evidence is unique to an Attester other cryptographic techniques can be used, for example, property based attestation <xref target="PBA"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The anonymity property of DAA makes revocation difficult. Well known solutions include:</t>
      <ol spacing="normal" type="1">
        <li>Rogue Attester revocation -- if an Attester's private key is compromised and known by the Verifier then any DAA signature from that Attester can be revoked.</li>
        <li>EPID - Intel's Enhanced Privacy ID -- this requires the Attester to prove (as part of their Attestation) that their credential was not used to generate any signature in a signature revocation list.</li>
      </ol>
      <t>There are no other special security considerations for DAA over and above those specified in the RATS architecture document <xref target="I-D.ietf-rats-architecture"/>.</t>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>The new DAA Issuer role can be implemented in a number of ways, for example:</t>
      <ol spacing="normal" type="1">
        <li>As a stand-alone service like a Certificate Authority, a Privacy CA.</li>
        <li>As a part of the Attester's manufacture. The Endorser and the DAA Issuer could be the same entity and the manufacturer would then provide a certificate for the group public key to the Verifier.</li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>We don't yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <seriesInfo name="DOI" value="10.17487/RFC5280"/>
            <seriesInfo name="RFC" value="5280"/>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="DAA">
          <front>
            <title>Direct anonymous attestation</title>
            <seriesInfo name="DOI" value="10.1145/1030083.1030103"/>
            <seriesInfo name="Proceedings of the 11th ACM conference on Computer and communications security - CCS" value="'04"/>
            <author fullname="Ernie Brickell" initials="E." surname="Brickell">
              <organization/>
            </author>
            <author fullname="Jan Camenisch" initials="J." surname="Camenisch">
              <organization/>
            </author>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <date year="2004"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-architecture" target="https://www.ietf.org/archive/id/draft-ietf-rats-architecture-18.txt">
          <front>
            <title>Remote Attestation Procedures Architecture</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-architecture-18"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Dave Thaler">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Ned Smith">
              <organization>Intel Corporation</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="14" month="June" year="2022"/>
            <abstract>
              <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-rats-reference-interaction-models" target="https://www.ietf.org/archive/id/draft-ietf-rats-reference-interaction-models-05.txt">
          <front>
            <title>Reference Interaction Models for Remote Attestation Procedures</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-rats-reference-interaction-models-05"/>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Michael Eckel">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eric Voit">
              <organization>Cisco Systems</organization>
            </author>
            <date day="26" month="January" year="2022"/>
            <abstract>
              <t>   This document describes interaction models for remote attestation
   procedures (RATS).  Three conveying mechanisms -- Challenge/Response,
   Uni-Directional, and Streaming Remote Attestation -- are illustrated
   and defined.  Analogously, a general overview about the information
   elements typically used by corresponding conveyance protocols are
   highlighted.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="PBA">
          <front>
            <title>Property-Based Attestation without a Trusted Third Party</title>
            <seriesInfo name="DOI" value="10.1007/978-3-540-85886-7_3"/>
            <seriesInfo name="Lecture Notes in Computer Science" value="pp. 31-46"/>
            <author fullname="Liqun Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Hans Löhr" initials="H." surname="Löhr">
              <organization/>
            </author>
            <author fullname="Mark Manulis" initials="M." surname="Manulis">
              <organization/>
            </author>
            <author fullname="Ahmad-Reza Sadeghi" initials="A." surname="Sadeghi">
              <organization/>
            </author>
            <date month="September" year="2008"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
