<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft-hallambaker-mesh-notarization-01" indexInclude="false" ipr="trust200902" prepTime="2023-06-28T17:01:34Z" scripts="Common,Latin" sortRefs="true" submissionType="independent" symRefs="true" tocDepth="3" tocInclude="true" version="3" xml:lang="en"><front>
<title abbrev="Mesh Notarized Signatures">Mathematical Mesh 3.0 Part IX: Mesh Notarized Signatures</title>
<seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-notarization" stream="independent"/>
<author fullname="Phillip Hallam-Baker" initials="P. M." surname="Hallam-Baker"><organization>Venture Cryptography.</organization>
<address>
<email>phill@hallambaker.com</email>
</address>
</author>
<date day="28" month="June" year="2023"/>
<area/>
<workgroup/>
<keyword>Threshold Cryptography</keyword>
<keyword>Elliptic Curve</keyword>
<keyword>Threshold Encryption</keyword>
<keyword>Threshold Key Generation</keyword>
<keyword>Notary</keyword>
<abstract>
<t>Creation and verification of Mesh Notarized Signatures is described . A notarized signature is a signature whose time of creation is attested by one or more parties in addition to the signer. In the case of Mesh Notarized Signatures, the attesting parties is the set of all parties participating in a Notarization Mesh. This ideally includes the relying parties.</t>
<t>Each participant in a Notarization Mesh maintains their own notary log in the form of a DARE sequence authenticated by a Merkle tree. Participants periodically cross notarize their personal notary log with those maintained by other parties. A Mesh Notarized Signature is bound in time as having being created after time T1 by including one or more sequence apex values as signed attributes. A Mesh Notarized Signature is bound in time as having being created before time T2 by enrolling it in the signer's personal notarization log and engaging in cross-notarization with a sufficient number of Notarization Mesh participants to establish the desired proof.</t>
<t>Defection is controlled through an accountability model. If a trusted notary produces multiple inconsistent signed cross Notarization tokens, this provides non-repudiable evidence of a default.</t>
<t><eref target="http://whatever">https://mailarchive.ietf.org/arch/browse/mathmesh/</eref>Discussion of this draft should take place on the MathMesh mailing list (mathmesh@ietf.org), which is archived at .</t>
</abstract>
</front>
<middle>
<section title="Introduction" anchor="n-introduction"><t>This draft specifies the creation and verification of Mesh Notarized Signatures. A notarized signature is a signature whose time of creation is attested by one or more parties in addition to the signer. In the case of Mesh Notarized Signatures, the attesting parties is the set of all parties participating in a Notarization Mesh. This ideally includes the relying parties.</t>
<t></t>
<t></t>
</section>
<section title="Definitions" anchor="n-definitions"><t>This section presents the related specifications and standard, the terms that are used as terms of art within the documents and the terms used as requirements language.</t>
<section title="Requirements Language" anchor="n-requirements-language"><t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in <xref target="RFC2119"></xref>.</t>
</section>
<section title="Defined Terms" anchor="n-defined-terms"></section>
<section title="Related Specifications" anchor="n-related-specifications"></section>
<section title="Implementation Status" anchor="n-implementation-status"><t>The implementation status of the reference code base is described in the companion document <xref target="draft-hallambaker-mesh-developer"></xref>.</t>
</section>
</section>
<section title="Architecture" anchor="n-architecture"><section title="Sequence Apex Value" anchor="n-sequence-apex-value"></section>
<section title="Proof of Inclusion" anchor="n-proof-of-inclusion"></section>
<section title="Notarized Signature" anchor="n-notarized-signature"><section title="Before MNT" anchor="n-before-mnt"><t>Proof of inclusion presented in a protected header, i.e. within the signature scope</t>
</section>
<section title="After MNT" anchor="n-after-mnt"><t>Proof of inclusion presented in the signature header or an external assertion.</t>
</section>
</section>
<section title="Cross Notarization" anchor="n-cross-notarization"><t>A notarized signature over</t>
</section>
<section title="Proof of default" anchor="n-proof-of-default"></section>
</section>
<section title="Notarized Signature Verification" anchor="n-notarized-signature-verification"><section title="Proof that a signature was created after a time" anchor="n-proof-that-a-signature-was-created-after-a-time"></section>
<section title="Proof that a signature was created before a time" anchor="n-proof-that-a-signature-was-created-before-a-time"></section>
</section>
<section title="Notarization Architectures" anchor="n-notarization-architectures"><section title="Bridge Architecture" anchor="n-bridge-architecture"></section>
<section title="Redundant Bridge Architecture" anchor="n-redundant-bridge-architecture"></section>
<section title="Full Mesh" anchor="n-full-mesh"></section>
</section>
<section title="Notary Default" anchor="n-notary-default"></section>
<section title="Security Considerations" anchor="n-security-considerations"><section title="Notary Default" anchor="n-notary-default-0"></section>
<section title="Quantum Cryptanalysis" anchor="n-quantum-cryptanalysis"></section>
</section>
<section title="IANA Considerations" anchor="n-iana-considerations"><t>This document requires no IANA actions.</t>
</section>
<section title="Acknowledgements" anchor="n-acknowledgements"><t></t>
</section>
</middle>
<back>
<references title="Normative References"><reference anchor="RFC2119"><front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname="S. Bradner" initials="S." surname="Bradner"><address>
</address>
</author>
<date month="March" year="1997"/>
</front>
<seriesInfo name="BCP" value="14"/>
<seriesInfo name="RFC" value="2119"/>
<seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
</references>
<references title="Informative References"><reference anchor="draft-hallambaker-mesh-developer"><front>
<title>Mathematical Mesh: Reference Implementation</title>
<author fullname="Phillip Hallam-Baker" initials="P." surname="Hallam-Baker"><address>
</address>
</author>
<date day="27" month="July" year="2020"/>
</front>
<seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-developer-10"/>
</reference>
</references>
</back>
</rfc>
