<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ssmith-ipex-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="IPEX">Issuance and Presentation Exchange Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-ssmith-ipex-00"/>
    <author fullname="Samuel M. Smith">
      <organization>ProSapien LLC</organization>
      <address>
        <email>sam@prosapien.com</email>
      </address>
    </author>
    <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
      <organization>GLEIF</organization>
      <address>
        <email>Philip.Feairheller@gleif.org</email>
      </address>
    </author>
    <date year="2023" month="July" day="28"/>
    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 183?>

<t>The Issuance and Presentation Exchange (IPEX) Protocol provides a uniform mechanism
for the issuance and presentation of ACDCs <xref target="ACDC-ID"/> in a securely attributable manner.
A single protocol is able to work for both types of exchanges by recognizing
that all exchanges (both issuance and presentation) may be modeled as the
disclosure of information by a Discloser to a Disclosee. The difference between
exchange types is the information disclosed not the mechanism for disclosure.
Furthermore, the chaining mechanism of ACDCs and support for both targeted and
untargeted ACDCs provide sufficient variability to accommodate the differences
in applications or use cases without requiring a difference in the exchange
protocol itself. This greatly simplifies the exchange protocol. This simplification
has two primary advantages. The first is enhanced security. A well-delimited
protocol can be designed and analyzed to minimize and mitigate attack mechanisms.
The second is convenience. A standard simple protocol is easier to implement,
support, update, understand, and adopt. The tooling is more consistent.</t>
      <t>This IPEX <xref target="IPEX-ID"/> protocol leverages important features of ACDCs and ancillary protocols such as CESR <xref target="CESR-ID"/>, SAIDs <xref target="SAID-ID"/>, and CESR-Proofs <xref target="Proof-ID"/> as well as Ricardian contracts <xref target="RC"/> and graduated disclosure (partial, selective, full) to enable contractually protected disclosure. Contractually protected disclosure includes both chain-link confidential <xref target="CLC"/> and contingent disclosure <xref target="ACDC-ID"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ssmith-ipex/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:WG@example.com"/>),
        which is archived at <eref target="https://example.com/WG"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/USER/REPO"/>.</t>
    </note>
  </front>
  <middle>
    <?line 205?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TODO Introduction</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Presentation Exchange</dt>
        <dd>
          <t>An exchange that provides disclosure of one or more ACDCs between a <em>Discloser</em> and a <em>Disclosee</em>.</t>
        </dd>
      </dl>
      <t>A presentation exchange is the process by which authenticatable information may be exchanged between two parties, namely, the <em>Discloser</em> and <em>Disclosee</em>.</t>
      <dl>
        <dt>ACDC</dt>
        <dd>
          <t>Type of data as issuance concretely defined by the ACDC specification <xref target="ACDC-ID"/>.</t>
        </dd>
        <dt>Discloser</dt>
        <dd>
          <t>An ACDC in a disclosure is <em>disclosed by</em> the <em>Discloser</em>.</t>
        </dd>
        <dt>Disclosee</dt>
        <dd>
          <t>An ACDC in a disclosure is <em>disclosed to</em> the <em>Disclosee</em>.</t>
        </dd>
        <dt>Issuer</dt>
        <dd>
          <t>An <em>ACDC</em> is <em>issued by</em> the <em>Issuer</em>. The <em>Issuer</em> identifier (AID) appears in the top level of the ACDC.</t>
        </dd>
        <dt>Issuee</dt>
        <dd>
          <t>An <em>ACDC</em> is optionally <em>issued to</em> the <em>Issuee</em>. When present, the <em>Issuee</em> identifier (AID)  appears at the top level of the attribute section or in the attribute list at the top level of the attribute aggregate section of the ACDC.</t>
        </dd>
      </dl>
      <t>Each <em>ACDC</em>  <bcp14>MUST</bcp14> have an <em>Issuer</em> and <bcp14>MAY</bcp14> have an <em>Issuee</em>.</t>
      <t>The set of <em>ACDCs</em> so disclosed in a <em>presentation exchange</em> <bcp14>MUST</bcp14> be chained. This set of chained <em>ACDCs</em> define a directed acyclic graph (DAG) that <bcp14>MUST</bcp14> have at least one vertex and <bcp14>MAY</bcp14> have zero or more edges pointing to other vertices.</t>
      <t>Each <em>ACDC</em> itself defines a graph fragment consisting of one vertex and zero or more directed edges. Each directed edge contained in an <em>ACDC</em> points to a vertex contained in another <em>ACDC</em>. The ACDC that contains the origin vertex of the DAG is called the <em>origin</em> or <em>primary</em> ACDC of the <em>presentation exchange</em>.</t>
      <t>The disclosure performed by a presentation exchange <bcp14>MAY</bcp14> be <em>graduated</em> and <bcp14>MAY</bcp14> be <em>contractually protected</em>.</t>
      <dl>
        <dt>Issuance Exchange</dt>
        <dd>
          <t>A special case of a <em>presentation exchange</em> where the <em>Discloser</em> is the <em>Issuer</em> of the <em>origin</em> (Primary) <em>ACDC</em> of the DAG formed by the set of chained ACDCs so disclosed.</t>
        </dd>
      </dl>
      <t>In an <em>issuance exchange</em>, when the <em>origin</em> ACDC has an <em>Issuee</em>, the <em>Disclosee</em> <bcp14>MAY</bcp14> also be the <em>origin</em> ACDC's <em>Issuee</em>.</t>
      <section anchor="chain-link-confidentiality">
        <name>Chain-Link Confidentiality</name>
        <t>Disclosures via Presentations Exchanges may be contractually protected by Chain-Link Confidentiality (i.e a Chain-Link Confidential disclosure). The chaining in this case is different from the chaining described above between Issuances in a DAG of chained Issuances. Chain-link confidentiality, in contrast, chains together a sequence of Disclosees. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee. The terms-of-use of the original disclosure as applied to the original Disclosee <bcp14>MUST</bcp14> be applied by each subsequent Discloser to each subsequent Disclosee via each of the subsequent disclosures (presentation exchanges). These terms-of-use typically constrain disclosure to only approved parties, i.e. imbue the chain of disclosures with some degree of confidentiality. These terms-of-use are meant to contractually protect the data rights of the original Issuer or Issuee of the data being disclosed.</t>
      </section>
    </section>
    <section anchor="exchange-protocol">
      <name>Exchange Protocol</name>
      <table>
        <thead>
          <tr>
            <th align="center">Discloser</th>
            <th align="center">Disclosee</th>
            <th align="center">Initiate</th>
            <th align="left">Contents</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center"> </td>
            <td align="center">
              <tt>apply</tt></td>
            <td align="center">Y</td>
            <td align="left">schema or its SAID, attribute field label list, signature on <tt>apply</tt> or its SAID</td>
            <td align="left">schema SAID is type of ACDC, optional label list for selective disclosure, CESR-Proof signature</td>
          </tr>
          <tr>
            <td align="center">
              <tt>spurn</tt></td>
            <td align="center"> </td>
            <td align="center">N</td>
            <td align="left"> </td>
            <td align="left">rejects <tt>apply</tt></td>
          </tr>
          <tr>
            <td align="center">
              <tt>offer</tt></td>
            <td align="center"> </td>
            <td align="center">Y</td>
            <td align="left">metadata ACDC or its SAID, signature on <tt>offer</tt> or its SAID</td>
            <td align="left">includes schema or its SAID, other partial disclosures, selective disclosure label list, CESR-Proof signature</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">
              <tt>spurn</tt></td>
            <td align="center">N</td>
            <td align="left"> </td>
            <td align="left">rejects <tt>offer</tt></td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">
              <tt>agree</tt></td>
            <td align="center">N</td>
            <td align="left">signature on <tt>offer</tt> or its SAID</td>
            <td align="left">CESR-Proof signature</td>
          </tr>
          <tr>
            <td align="center">
              <tt>spurn</tt></td>
            <td align="center"> </td>
            <td align="center">N</td>
            <td align="left"> </td>
            <td align="left">rejects <tt>agree</tt></td>
          </tr>
          <tr>
            <td align="center">
              <tt>grant</tt></td>
            <td align="center"> </td>
            <td align="center">Y</td>
            <td align="left">full or selective disclosure ACDC, signature on <tt>grant</tt> or its SAID</td>
            <td align="left">includes attribute values, CESR-Proof signature</td>
          </tr>
          <tr>
            <td align="center"> </td>
            <td align="center">
              <tt>admit</tt></td>
            <td align="center">N</td>
            <td align="left">signature on <tt>grant</tt> or its SAID</td>
            <td align="left">CESR-Proof signature</td>
          </tr>
        </tbody>
      </table>
      <section anchor="discussion">
        <name>Discussion</name>
        <t>All the variants of an ACDC are various degrees of expansion of the compact variant. Therefore, an Issuer commitment via a signature to any variant of ACDC (compact, full, etc)  makes a cryptographic commitment to the top-level section fields shared by all variants of that ACDC because the value of a top level section field is either the SAD or the SAID of the SAD of the associated section. Both a SAD and its SAID, when signed, each provide a verifiable commitment to the SAD. In the former the signature verification is directly agains the SAD itself. In the latter, the SAID as digest must first be verified against its SAD and then the signature on the SAID may be verified. This indirect verifiablity assumes that the cryptographic strength of the SAID digest is equivalent to the cryptographic strength of the signature used to sign it. To clarify, because all variants share the same top level structure as the compact variant, then a signature on any variant  may be used to verify the Issuer's committment to any other variant either directly or indirectly, in whole or in part on a top-level section by top-level section basis. This cross-variant Issuer commitment verifiability is an essential property that supports graduated disclosure by the Disclosee of any or all variants wether it be full, compact, metadata, partial, selective, bulk issued, or contractually protected.</t>
        <t>To elaborate, the SAID of a given variant is useful even when it is not the SAID of the variant the Issuer signed because during graduated disclosure the Discloser <bcp14>MAY</bcp14> choose to sign that given variant to fullfill a given step in an IPEX graduated disclosure transaction. The Discloser thereby can make a verifiable disclosure in a given step of the SAD of a given variant that fulfills a commitment made in a prior step via its signature on merely the SAID of the SAD of the variant so disclosed.</t>
        <t>For example, the Metadata variant of an ACDC will have a different SAID than the Compact variant because some of the top-level field values may be empty in the Metadata variant. One can think of the The metadata variant as a partial manifest that only includes those top level sections that the Discloser is committing to disclose in order to induce the Disclosee to agree to the contractual terms of use when disclosed. The IPEX transaction is between the Discloser and Disclosee, who both may make non-repudiable commitments via signing to each other. Typically this means that the Discloser will eventually need to fulfull its commitment with a proof of disclosure to the Disclosee. This proof may be satisfied with either directly against the Discloser's signature on the the actual disclosed SAD or indirectly agaisnt the Discloser's signature on the SAID of the actual disclosed SAD. In addition, the Disclosee will typically require a proof of issuance via a non-repudiable signature by the Issuer on a variant of the disclosed SAD that is verifiable (directly or indirectly) against the variant that is the disclosed SAD.</t>
        <t>To summarize, when the Issuer commits to the composed schema of an ACDC it is committing to all the variants so composed. As described above, the top level field values in the compact variant enable verification against a disclosure of any of the other Issuer committed variants because they all share the same top level structure. This applies even to the metadata variant in spite of it only providing values for some top level sections and not others. The verifiablity of a top level section is separable.</t>
        <t>Consequently, the IPEX protocol must specify how a validator does validation of any variant in a graduated disclosure. To restate there are two proofs that a Discloser must provide. The first is proof of issuance and the second is proof of disclosure. In the former, the Discloser provide the variant via its SAD that was actually signed (as SAD or SAID of SAD) by the Issuer in order for the Disclosee to verify authentic issuance via the signature on that variant.  In the latter, the Discloser must disclose any other Issuer enabled (via schema composition) variants that the Discloser offered to disclose as part of the graduated disclosure process.</t>
      </section>
      <section anchor="ipex-validation">
        <name>IPEX Validation</name>
        <t>The goal is to define a validation process (set of rules) that works for all variants of an ACDC and for all types of graduated disclosure of that ACDC.</t>
        <t>For example, in the bulk issuance of an ACDC, the Issuer only signs the blinded SAID of the SAD that is the Compact variant of the ACDC not the SAD itself. This enable a Discloser to make a proof of inclusion of the ACDC in a bulk issuance set by unblinding the signature on the blinded SAID without leaking correlation to anything but the blinded SAID itself. To clarify, the Disclosee can verify the signature on the SAID without to prove set inclusion with needing the disclosure of any other information about the ACDC. Issuer signing of the SAID not the SAD also has the side benefit of minimizing the computation of large numbers of bulk issued signatures.</t>
        <section anchor="issuer-signing-rules">
          <name>Issuer Signing Rules</name>
          <t>The Issuer <bcp14>MUST</bcp14> provide a signature on the SAID of the most compact variant defined by the schema of the ACDC. When more than one variant is defined by the schema via the oneOf composition operator for any top-level field, the most compact variant <bcp14>MUST</bcp14> appear as the first entry in the oneOf list. When only one variant of each top-level field is defined by the schema, that variant is therefore by defintion the most compact variant.</t>
          <t>The different variants of an ACDC form a hash tree (using SAIDs) that is analogous to a Merkle Tree.
Signing the top-level SAID of the compact version of the ACDC is equivalent to signing the Merkle Root of a Merkle Tree.
Different variants of an ACDC (SADs with SAIDs) correspond to different paths through a Merkle tree.
The process of verifying that  a SAD via its SAID of a section is included in a schema authorized variant down from the  top-level SAID is equivalent to a Merkle Tree proof of inclusion along a path in the Merkel Tree down from its Root.
This allows a single signature to provide proof of Issuance of the presentation of any schema authorized variants of the ACDC.</t>
          <t>An Issuer <bcp14>MAY</bcp14> provide signatures of the SAIDS of other variants, as well as signatures of the SADs of other variants.</t>
          <t>Proof of issuance is provided by disclosing the SAID of the most compact variant and the signature by the Issuer on that SAID.</t>
          <t>Proof of disclosure is provided by disclosing the SAD of the most compact variant and then recursively disclosing the nested SADs of each of the top level sections of the most compact variant as needed for the promised disclosure.</t>
          <t>Thus for any disclosed variant of an ACDC, the Disclosee need only verify only one proof of issuance as defined above and may need to verify a different proof of disclosure for each disclosed variant as defined above.</t>
        </section>
      </section>
    </section>
    <section anchor="example-most-compact-variant">
      <name>Example Most Compact Variant</name>
      <t>The following schema supports a compact variant</t>
      <sourcecode type="json"><![CDATA[
{
  "$id": "E46jrVPTzlSkUPqGGeIZ8a8FWS7a6s4reAXRZOkogZ2A",
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "title": "Public ACDC",
  "description": "Example JSON Schema Public ACDC.",
  "credentialType": "PublicACDCExample",
  "type": "object",
   "required":
  [
    "v",
    "d",
    "i",
    "ri",
    "s",
    "a",
    "e",
    "r"
  ],
  "properties":
  {
    "v":
    {
      "description": "ACDC version string",
      "type": "string"
    },
    "d":
    {
     "description": "ACDC SAID",
      "type": "string"
    },
    "i":
    {
      "description": "Issuer AID",
      "type": "string"
    },
    "ri":
    {
      "description": "credential status registry AID",
      "type": "string"
    },
    "s":
    {
      "description": "schema section",
      "oneOf":
      [
        {
          "description": "schema section SAID",
          "type": "string"
        },
        {
          "description": "schema detail",
          "type": "object"
        },
      ]
    },
    "a":
    {
      "description": "attribute section",
      "oneOf":
      [
        {
          "description": "attribute section SAID",
          "type": "string"
        },
        {
          "description": "attribute detail",
          "type": "object",
          "required":
          [
            "d",
            "i",
            "score",
            "name"
          ],
          "properties":
          {
            "d":
            {
              "description": "attribute section SAID",
              "type": "string"
            },
            "i":
            {
              "description": "Issuee AID",
              "type": "string"
            },
            "score":
            {
              "description": "test score",
              "type": "integer"
            },
            "name":
            {
              "description": "test taker full name",
              "type": "string"
            }
          },
          "additionalProperties": false,
        }
      ]
    },
    "e":
    {
      "description": "edge section",
      "oneOf":
      [
        {
          "description": "edge section SAID",
          "type": "string"
        },
        {
          "description": "edge detail",
          "type": "object",
          "required":
          [
            "d",
            "boss"
          ],
          "properties":
          {
            "d":
            {
              "description": "edge section SAID",
              "type": "string"
            },
            "boss":
            {
              "description": "boss edge",
              "type": "object",
              "required":
              [
                "d",
                "n",
                's',
                "w"
              ],
              "properties":
              {
                "d":
                {
                  "description": "edge SAID",
                  "type": "string"
                },
                "n":
                {
                  "description": "far node SAID",
                  "type": "string"
                },
                "s":
                {
                  "description": "far node schema SAID",
                  "type": "string",
                  "const": ""EiheqcywJcnjtJtQIYPvAu6DZAIl3MORH3dCdoFOLe71"
                },
                "w":
                {
                  "description": "edge weight",
                  "type": "string"
              },
              "additionalProperties": false
            },
          },
          "additionalProperties": false
        }
      ]
    },
    "r":
    {
      "description": "rule section",
      "oneOf":
      [
        {
          "description": "rule section SAID",
          "type": "string"
        },
        {
          "description": "rule detail",
          "type": "object",
          "required":
          [
            "d",
            "warrantyDisclaimer",
            "liabilityDisclaimer"
          ],
          "properties":
          {
            "d":
            {
              "description": "edge section SAID",
              "type": "string"
            },
            "warrantyDisclaimer":
            {
              "description": "warranty disclaimer clause",
              "type": "object",
              "required":
              [
                "d",
                "l"
              ],
              "properties":
              {
                "d":
                {
                  "description": "clause SAID",
                  "type": "string"
                },
                "l":
                {
                  "description": "legal language",
                  "type": "string"
                }
              },
              "additionalProperties": false
            },
            "liabilityDisclaimer":
            {
              "description": "liability disclaimer clause",
              "type": "object",
              "required":
              [
                "d",
                "l"
              ],
              "properties":
              {
                "d":
                {
                  "description": "clause SAID",
                  "type": "string"
                },
                "l":
                {
                  "description": "legal language",
                  "type": "string"
                }
              },
              "additionalProperties": false
            }
          },
          "additionalProperties": false
        }
      ]
    }
  },
  "additionalProperties": false
}
]]></sourcecode>
      <t>The following JSON field map serialization satisfies the rules for most compact variant of the schema above.</t>
      <sourcecode type="json"><![CDATA[
{
  "v":  "ACDC10JSON00011c_",
  "d":  "EBdXt3gIXOf2BBWNHdSXCJnFJL5OuQPyM5K0neuniccM",
  "i":  "did:keri:EmkPreYpZfFk66jpf3uFv7vklXKhzBrAqjsKAn2EDIPM",
  "ri": "did:keri:EymRy7xMwsxUelUauaXtMxTfPAMPAI6FkekwlOjkggt",
  "s":  "E46jrVPTzlSkUPqGGeIZ8a8FWS7a6s4reAXRZOkogZ2A",
  "a":  "EgveY4-9XgOcLxUderzwLIr9Bf7V_NHwY1lkFrn9y2PY",
  "e":  "ERH3dCdoFOLe71iheqcywJcnjtJtQIYPvAu6DZIl3MOA",
  "r":  "Ee71iheqcywJcnjtJtQIYPvAu6DZIl3MORH3dCdoFOLB"
}
]]></sourcecode>
      <t>The Issuer signs the SAID, <tt>d</tt> field value of the field map above.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="IPEX-ID" target="https://github.com/WebOfTrust/ietf-oobi">
          <front>
            <title>IETF IPEX (Issuance and Presentation EXchange) Prototocol Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization>GLEIF</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="ACDC-ID" target="https://github.com/trustoverip/tswg-acdc-specification">
          <front>
            <title>IETF ACDC (Authentic Chained Data Containers) Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="OOBI-ID" target="https://github.com/WebOfTrust/ietf-oobi">
          <front>
            <title>IETF OOBI (Out-Of-Band-Introduction) Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="KERI-ID" target="https://github.com/WebOfTrust/ietf-keri">
          <front>
            <title>IETF KERI (Key Event Receipt Infrastructure) Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="SAID-ID" target="https://github.com/WebOfTrust/ietf-said">
          <front>
            <title>IETF SAID (Self-Addressing IDentifier) Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="CESR-ID" target="https://github.com/WebOfTrust/ietf-cesr">
          <front>
            <title>IETF CESR (Composable Event Streaming Representation) Internet Draft</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="PTEL-ID" target="https://github.com/WebOfTrust/ietf-ptel">
          <front>
            <title>IETF PTEL (Public Transaction Event Log) Internet Draft</title>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization>GLEIF</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="Proof-ID" target="https://github.com/WebOfTrust/ietf-cesr-proof">
          <front>
            <title>IETF CESR-Proof Internet Draft</title>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization>GLEIF</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="DIDK-ID" target="https://github.com/WebOfTrust/ietf-did-keri">
          <front>
            <title>IETF DID-KERI Internet Draft</title>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization>GLEIF</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="JSON" target="https://www.json.org/json-en.html">
          <front>
            <title>JavaScript Object Notation Delimeters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8259" target="https://datatracker.ietf.org/doc/html/rfc8259">
          <front>
            <title>JSON (JavaScript Object Notation)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4627" target="https://datatracker.ietf.org/doc/rfc4627/">
          <front>
            <title>The application/json Media Type for JavaScript Object Notation (JSON)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CBOR" target="https://en.wikipedia.org/wiki/CBOR">
          <front>
            <title>CBOR Mapping Object Codes</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8949" target="https://datatracker.ietf.org/doc/rfc8949/">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="Carsten Bormann">
              <organization/>
            </author>
            <author initials="P." surname="Hoffman" fullname="Paul Hoffman">
              <organization/>
            </author>
            <date year="2020" month="December" day="04"/>
          </front>
        </reference>
        <reference anchor="MGPK" target="https://github.com/msgpack/msgpack/blob/master/spec.md">
          <front>
            <title>Msgpack Mapping Object Codes</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JSch" target="https://json-schema.org">
          <front>
            <title>JSON Schema</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="JSch_202012" target="https://json-schema.org/draft/2020-12/release-notes.html">
          <front>
            <title>JSON Schema 2020-12</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="KERI" target="https://arxiv.org/abs/1907.02143">
          <front>
            <title>Key Event Receipt Infrastructure (KERI)</title>
            <author initials="S." surname="Smith" fullname="Samuel M. Smith">
              <organization>ProSapien LLC</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="IDSys" target="https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/Identity-System-Essentials.pdf">
          <front>
            <title>Identity System Essentials</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RC" target="https://en.wikipedia.org/wiki/Ricardian_contract">
          <front>
            <title>Ricardian Contract</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CLC" target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2045818">
          <front>
            <title>Chain-Link Confidentiality</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 613?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+08a3PTyJbf9St6zVZNkrKdBwyP1L13xnlBIMGZJMzATE0N
balti8iSUUsxJjC/ZX/L/rI95/RD3bKchAw77FZdqihsqfu8392m0+kERVwk
Ypu1DqUseRoKxtOIneRCirTgRZylbP9DOObpSMDTrMjCLGkFfDDIxSXuOtl/
3QpCXohRls+3WZwOsyCIsjDlE4Aa5XxYdKScxMW4E0/Fh87GRgD77gc8F3yb
9U73e8Esyy9GeVZOt9kvT9kv8C1OR+wpPgkuxBxeR9vsMC1Enoqis4cgg0uR
lmI7YMxuhM/FfAo4fQCMTXic4IIfxQc+mSaiG2YTeMzzcLzNxkUxldvr6867
dYI1AorLwTZ7dbZ/un66f9KHZwmwKYvmTUe98/2z8yDgZTHOcqCsAxsYG5ZJ
okRxxielSNhxl52hNOhtlo94Gn8kMW+jeM/4NBYpOzrapfdC0d6SfPLjNM8k
vUV0LQNfwT4Zxwk7EDzOxyJJRN4A/OnR/uGBCxT3xNOus+vHUSLiYRf2BUGQ
ZvkEtl6CkGEXqrlzuLdNAAqej4QjBiUqJTox6A/P81IW67Eohp0sG8Rqj7Ky
w/3zAwLGVq6xt9fK3laVwZHJWf0zpX+EaUVNfzr6XwY2KEHcrpwrSTVpQQur
SQEu2GtEfZ24bytyXBeBgW2zrY2tLRR6b3dv9zZCL1De2aXI4+l6IWejDg+j
sCOnIoyHcUgELegAYbOVHkgQxB6HbHfM41REbI8XnO1moAr4msvVm+XeJO3r
ZL1E0j7r/f7O4VezNwTGVvpl0ekPOztgbh1gKs+iMkTRfCsWX+yf3onFC9Dz
AosIjK28EHO2D5GxYKciFPG0ANaGOZdgIGFR5uJbsXrWO9y7C6uSx9ECqwiM
rZyJZNjpRRHEDYnB/nAP7XgYi/xbMbm7f3Z6FyZDIfMFJhEYW9nNJlMI+oNE
aLWeFZA1J8jvqZg6IfNb8Xxyvn90F56nhUgWeEZgbOWkHCQQj85znkoeqnxA
vB9lo9uyedJtiNDXhm/itorZNS7zLBveVbWdKe5uVHCHAH8bnvYO917chaUo
jpojEADsUBT6Juw8P+u/bOZlNpt138ksxRy7jh86UEGNi4lnf8/5JT8Lc4yY
/cE7ERbsZaaLkT2RxBMBLEnEc3qw+3jr+yfNqIAkXuQ8BPl0UViEEkrhdUS3
ng9D3OqhBarZynLkqxrlg4dbj74QJWDDXesuuvMxFFvTaaJrApIGOxZRzNk5
VM5smOXXSWIFySWSdnf6p830gGxn8QUU+gCUaMFv67jeJQS/s2MgBSOZRrOb
RcKK+MmDLxUxShd2efxCGRPGUrCdOOX53CDyIycEWSBm9eZ6crfLdrAkTtNa
QbjLc1lAhPTf1naDuT/LhkNYUC8neZl4r6xdb3Q2tzobD1Akx09PXtzoqRM5
moJg7L+DJBusTyD5i3wda8HuxMulx2rZUjU8P4P2qBEnOZEMx1DU2sLVNegz
emVg/IGsbG7dCtQ6tYvrmvn1XCSCS9FJM2i7Fny25SAz8mpB44IdqNu6YFBq
xs7zD/El4eUDub75ZONRd2Nr88F9F8tNJRUUXQC/yX6+dsLdpD5s72wubzQF
AquwHK+f8CkEL88cZuO4EFP1/DDCwqmYdwBwISadfYm+EfNEdqeRn7f0SqZW
smolue3ul0SEU4hBOTxJ/wih1wCHLlxM9i11IvQWo87REhSKk66UOfXG6zJL
7puH4XDyA2iXgPwRR//c2njw/ePNx54hUe/TOYrTC8Q3jCPFFrCK9tTpdJiB
EAQYQ28xKVnBHnfVDkwYFAGXAFcyzso0RgNlE4FrYzkJMO5CH8ZiF64XpKBK
wIZNsqsr3RR+/gwGBtCkCMEKkznjRZHHg7KgahEDEUTIoMewOIYHU0NIDCTg
iiJjOHahmD/IijHNTiQiEpoHyQZzloswG0FXC1CCYswLxpPEWbFCW5fSvQqE
zNkA6IGokkB3ySUyGkSxDJNMovsAQuuwwCig5GxPvRY5Ull9FV3KYFE8HIpc
IL6BKGZCpIEhSDMRSyVOB67GCCRAMKG3VvwkgoqibnBQ5rAgn2S5aNPSEO0D
Y2S1xyoEWZbldJrlhSNLMlDkN42CMrVf1RZtC7BtCO15jLHlkucxH8RocsRz
CGYMMgPXJwIqlmWAWq9yOGgsZyXkuBACpWQz8PusLEBt78s4R5K5Ky/Yi+CM
uILKKgoJ/RTKF2Q3gh6jAIuS8QTwQEslvV3WlvRys0wPGsao41kGq+IJZl0e
XXKQAFiLUt8whnSJKhLpGI0mUiYMnHdZj82g4utEWHJBhIoqAkOIBWBH4EHx
KFWChb88mX+ELyAx6Ilgy0dlgrA3HqHswCcwxVm1yS75LyDMYBnQAP9CbI9R
OIhdFrAdIo/iyfcayESxskh6NwG1tQOt+TYrp6gs+DeNIOogmLaiMcqmhWK8
yLIENQKw0LQQt4yxcii6GFbgMc3Frq70rA083OJPxKXIUYaIHBCCRNkQtAT2
Kn1bBJHGSYKCN5tBQ2U4RtejpvLqSjeqnz+3qZfGoKIbdHyEQKrmBF+a9gcI
AiCoIfy3itEmguPa011cBSBGOY9KjkbvOPvKlOcYWdugggSqDUjRbZqQrqJc
RUqRyYArIdQoLmClB6dr08LyNWDrYVJixCWPJBfuJBjiQyfEozSODMmIGBSE
/ujAcSIu6Enng0kcRYkIgnvMnSSBGvt7/dqje+wcYkmcZkk2mgdBY7oItlkv
rRyMAq3NGH6wzFKBLk8WpLSugyB4+poNnGvKFqonYg2I7/lJxeLT8RIwQoCh
sA8FApqMmQ5ylVXcgKoDu4ERWTLI91HNQrap3knmKorWqavRBryAGKgPATax
zkcrs6kFlBPmEERB3ZEY0qgS6ES4NMn0hp01nVm8Ssy0nnKnay2SrVU5YjBf
q5PswBG3hlNkNTjEKpYPhpg1hLJG25BVF7datqaCh/nGlOXinIutgNOuYjIQ
0IGY2F5kU4oWCUrRiMcgFXWkEJxAXuREBr+lWe0A/L+AERjLaXvvFqmx5PCi
mRxTplAUVrVNbmiv3iUQGG8Bgo8gV1Gkt8A8pvc5WLHmlh2/OjtnY36JOaKS
J1rice9N7QXpSaWKAmESDLnGZOZUEqT7tUaXWlPYBrp2EJHJlQqcfmjBKosm
S8pVIOPhPMQxGITR6Zit7PWerqqw4HBRMGyPCgoJkB4K8cHn5qPIMxsrRITZ
Y5rFFOMw3GZY5NDGGNy+Ji1VEGjCsGpVhEDnM8LMZ5IXgtJByaHAQ2xZIgq6
jLB4DynwKoGgSK19ErFS1YAaem2lYkEtV35CTkmC0ktVaMvyeAQ7NBRtJCBU
qgHA/NHu0a7VujUkfk0XMGsKpt6zRN3aWpxAAM0HBksVpviSwIuqAhtZs8my
skd8vCQTmhhCcdFNISoK8oSKQaR4uXnOQHBiISzrRGCdwzBtxLJyomSyalTk
SLLitqj8xhi6ylSu9yAPStk2xFvq2khe6qMmJWBt6fhoux5cSXLQj2YovoXt
30nXu4N799jyxs9Ge6qwLmPu9XnSil2aRLisagF5LMfCVuIuuv2SFY49rSrz
tp0IRUwyXklJxxT5UBbm2cTvWqCICCFgYlQZZJe2a7JtrFSRDJXoqMy+7Wry
FoonYKCNWxXrEnID7UWPhXYHPRPb0/cltR4A2erJRAH7wCQAuxq/l3lqDNJr
CPFBKj4U9b6wgDJLdqBSLZXxV37vSRKrCmqgVOPgraoIMuHbrAQ1CiRZlgNF
ZOETteylINuht5okZ1HkmNhKo6NKpXdZ4w7a3DgkQ8M4DMKPU5dDDO4pjgSm
WEQC9bYeA3PrQgsxKEVlIlRuOZRgDwmuOsFuC9IrybKm9kaieI5NNXYmgL/R
HVQvi5UdCHxcyAUtqbiD0Vf5qVlAewaCjNkJIFhcL9xNCYJPjmo+OZr4BJU5
dIZYLnyiDkJgevnE2B45CJVC7FPwabuz7fzt0F8A+om9RWuYv/3E3sAXNbWk
6gWgYAPVdioTKImSiCV8AGULFjPQ8UDjSg0b6MZAcndXIOkbWr6uhTF2tW2p
5gClgYPtpBwltt3jJYsYmHgrp+BWwAFgewl/P+UCp77SEoRrMgwlag0yOhEF
JwWoPOjy6/Ok9nk8wXbbhzUJTCVw3RW6Vthu5MsTaBOLTCtKsbnApKbQaBOt
+61acyMnn5biu0amhIDWQIZPi0qm2POyJcrT+vYpUvuXyrYyvEuelCi+ZdQi
39EkLoxwboNmCSyVQ9G/Simp1+0BV+ivNM5KlYNz3SlheMDnWSl1YNHTxilP
pVO6h9lkCoHDwKBQk4shDeN4akIEzsfigkpRDLDcIQzrxXRu9hsHYisasBo4
tJkowlW8G3ZB5W2Yz6eQtrDIharbga5TBDQhHdWEmE6DPBysegyMqSIPmHcZ
pyqUUA9EyClsj7V+VG1WNTYeTBo2xeQYuOGst8cy8xH0ocVEj3U/JGUWxjRr
0YDwqAqCOKdVWFFWHkeVlRqitVVeMuNIKrKhl9NDmLoEAFQXAih9plpP0VTJ
Xe3WHTiVJFjjYxoa2Toc6TGzRg0rAdsVebtikONWSH0Fm5QY42heODDwsYoh
eIVmSjFYmILRs2cLUxdpBoTuxuJU0VgxjjUZiLOc0MxTN6C+bUC6FemoGFeK
APiaYNTc+zIGHTuCu357RW+pJgb0BHgDGiGNJmBQQyizjAl5Rka2p6Dwidso
V6dTauBed6q2khf3peV6jZGYIYokpEp75YHfSW0j1khwu+4pNRBtxdYQqNM3
36h0nI2zROgJAGYBIqPB2bCrWHzIoQXVqgzzTMqOQdwQJLSG1Yg9pjZCmPMr
dAHo13D2jjrXQ13ZPMPUDU5VVlCMI+Y85cxUCRyT7aqQYyOQSalt1jQQHZTJ
BVPTmDaCXdJaYM8JhSekxCyn2bMbIqBhB1ipVQVwDKoEMpjAxxQFYnpszkPc
4GJ2VerWIcPaYVTS6UKjhPyKHVuycJxlUljjJin79MErlNEwxuGyficLMdUT
AZqMNyOr7gmpNsApyzFxgLrw7ADjvB/hvFGxj9MPsXVREvVALNJKqaOysgmP
NLQpJLpcQcP8hKHK8zUInzjKvCaqG3S1pvkAwOprx0rjx6Y8cxKeybkzFKca
FjkdIiEELlR83PVDg9UwdQCalsr3VIZSRYadAU+m6FNpIzld1k8FqQD6VWgg
NcRzOoGrUY6dmS0GJzyNhxhUSd7Uz9hypxgrc6rlTydmV1YQ20Cl515Gmkhx
lkf6TCeNylDUPBuDGnVAJpJXjqhaH+QGZUXuVGmJuCOTdawTCbEzco9CzF8W
KWboTJ1ZoHjJbtMs7eRiWkb13KwmE2hYmjfVaKLhd3GUrptEmhRga9YoIDIS
jAo6wKRChXw0cSxT0XYdG6f2EA0cy0GvdTRi8vryWOql2lgk1AeS0jgBqqcI
k9s9Er+Ti2mdCh+limoiq2ulKskQPJneAp7rhU1wqV7hURSjLts1QyERVk25
On0VrpTskEtVqzWNVtQM3ByrsqHj10U1Y9Tckj5Bxk5gW2nOt6uebL1gpqcs
Pr+UXaASmsDKj8IZyXnJVVa+gVdVsQTVbV4VhVSe8Z2Q1zsFmVkQXdaT9aFV
u3YU4MUhHXpqRY45T/TqUiMD79DGZHA9jSCL9LjEnGMpdap5VfTfXIZpR1DD
JKlSsJbbQhAEZuQ0LtTNCB34VImOotMcU+OfTRpjIIYTTOrEhz509wrcJc0H
HU9A9EWhgfZ3AZaaU5kDPIpo9kiainN17DZn42xGlprEwAtep8hwaqq+6t7O
rS5Vwm1I51T0Qvtf6JsPuRorqfsEdBytLqE44Yvo0D1M7YbBovfpVsG5AdAQ
x2ptTrsWL02/5LqRyfHWJWeYy0zJpmunFS5NhDLRBr6u1nzeZiVzK8jLR7oO
tyezfmBpaIC400k3tVw1QdrkWFXzmi7lTcAFpRzl5MpjY3XVxzpIQ46hgYpK
KxUGqUt+5XaN1Z0+ku7SpIHs72drVOrIZZRxup6BkM0pmmN45kx7RR9I5GUi
pD5Kw/tPypXqrbudWYCNmPf2flQjoW6/X6/SdHiyZT3X83CNpe1HfG0vKiSD
w6YRBWS/RnTDdr2Ac45AneJ+z7/jo2Nj7a6VrpIrv8GCS9bOVZX3+tygdMGM
y5QIphjf1It77Ji7Song9HO9MMuhJlZqU+0kVowjwFQsbrbMOD2y7yxYcjpd
a3PCNzQUFF8uFSMV11SiYD1kOGpIGqrLc25GQL7SFJMxuA2UPi616F310LHV
WPfrEgPMQKRg0aRQfb3JkIF+V1ZXAxO8X8bScjKAgI8PnA6yYlx50T1Dz5mm
5xQ9orrXiB0bnn1UU6FrS6VJJouFxFu7oFFVBJVQ6E4BnQ9TI0IHyFWr2gzA
RDhY3B+6sYdh9055h5w1ndcblvZyWolZdWnBDEtU/oDwmtuuRqHEubMmnfzU
pRpHmVh811ulZdy0vdisfVnNOXEh7VGusIRye+Rs2rqmAEYXTTmaFVCGncxK
Sb+WontfqzaM4E26bISTWTpsPxb5BQSHc9jQDYyd+H2gawOWMLC+hVhRn4hJ
B5zGc5plqmv1Ee9dy9kK+Iw+q9LMUPyQU8zrlGbM7ikvxijdPCtH4wpJQUhQ
hCZHAHQVMBR9IBo9Qa2yuxmuODWTbkr1dRBtquomePyxqhuhJJql1eFsXZQL
cvKE0RSRQWN0vRPZq5rv/AIg0pYKH5KOMu6qW4aQzLKZJMemq8He5Ny4vUV4
6CSsgoTlX0tGb1vKtPScHg8MenaCj3MhexPWxig3PJ7R1RJ3oijb7g3Epl17
cnFTF2/d1SvB2N7DJcfUgd1Y5o0hzhaSyzs3siAE5OL3r4pdS8GtCEjxhnYJ
fndJN+N8GCkU0qqbkzY+VROdet9wLTZJaVBEtioF0iex9It3jEiltEG46icX
R1P1bE1DBwqqOmfbANtQxFchVV1ooDu/vJpcmCLZDQINCkA6hbqNVCe0jqKr
z5qpomPHKCJTdv2stqhoPMzQuVD+2ifsLJnXZRoEf/75J/7+JbgKGGv9Zxy1
tllr/8HDd/nPJ+cfk7OLVyfvnz4Vh78+5o8Pfjl7xB/KB7novT79tX+RjX7d
6rXatFFhws23+1WNXk+b6RcQuFX/6hJVo95E1Zk40aVZd39z4+zpqk0h1Phq
pI73OCu4uERD0Hj164x+dETPWEuPTUAO8PU3+oVG61K9A3rMh9h8yO0naT5w
80HYRS3493fCqYf80IATgiuDQP2m5Er/CqfOOCUbk9mgoQfdatgOG/o5Pf5s
CfYAN8LF6HA7aPENZOqwc2t4+U0AK1XirfgC3DoXI6h/oCa6NRJ5Aw7jIyoC
VTCp2mqZ31H9Zn8xd2U/3QTLl+xSQh1ibwk/EgWPk2bI2pgXIf/uSYXfIJWF
G7J/TTCLF26/umwqFLcQj/fOc3nz5zfns+P59kFcfyCh9BP1h3j1vOU8+t1D
XAsGTVw6Ptz8+k6y9kRSlzf++bzA7ZfRoG9O/WW8Sqhfhhv/dxzWpA0HN7Q1
YiTy65GT8u6Au+AXODnDYwsC8WUScL55BLXM3J8nJ47dsCH07KJaaPb77i5u
cHe6Af1VPN2F9PWdnKD/Lf49yKT8uz33etl5fN7GeYiFL6MAt9B1+OWYGyRM
7xuljH9+q31vkDY9TBsefie/a1g5a9We/b5AzRIF4Z+6DBoU1bxsicIaFUWr
r1MW/vncKIW7kTLkOUuz6GuTsyi+LyTHuU56K6oa19AFY1zU2o/H4n04nz0P
03fF8+Knwzcnl73y4d6vvcPk/nH/9Nn9aDfKDvpH4tHm7Tic/RXdzwTeIb6L
uBdIuTa+L/fz2+eIG1JEfkOKwEOLr5MiXEhfP0UQ9L8lRcx4jjdV5zRA4PEE
6onaisRc9nKW/P/OKQ08fxk9BoCadxAEPDwp5bdIOcn/lUSiJPCVY3dyR2IS
MaIb/umo5A2VwO3o+V8Kd0uc6sts0EL4txH+2whvaYRfNeUGGsj1mz/jcLY+
0qXZpzrVm/ApRPYcfw2l/sNPe69NHSHSNQMaMDeO083db31uoifM3jz4EmhR
U8LNDUS8sbGxuRn+oYez9HJ/J3pd3B8dvu4Pt3Z2fnn5LDp7vfs8PXh+9H2/
/Olkfvz9i41UlGkchsdqX0z7ojjaxv/CbXt/cnGSizfTX4cHFw8fvpsO75cH
l48uL5LXL8Yfd/Le+3fyRS/d2t87PNEAcGzoAphPTuePPhzP5IdXInnFS/66
OP5wPjzpHZ/0Dh8eXIiLWdJ/dzEaKe/FmpbdZcjN1b7RpXjzoPPk9agfHn14
FYn84+zoMH+yM3z08x8vn83ebCYXB3n6ZL518kbtE2qfV5suK2OpitX4crXv
ptUV3J2WazPOkb+050lt9jZ6615cM2ZQmZQ9awju4Q/U8E6mvdK1h+cRZLH6
tP5CzPEKSyRZCw+xW231L3vZp8+n+z+9Ojzd38PPZ896R0f2Q6BXnD3rvzra
qz5VO3f7x8f7L/fUZnjKvEdB67gH8iWqWv2T88P+y95Ry/4kNcrCkm6KcnWk
OMCbtoXIp7n6L3FkUN3tgz07uyf//V+bD9jV1X+cHuxubW4++fxZf3m8+egB
fMGbhwobHQqpr3j7LtDn9njymuCvnqdxAe5Lh4RyjOefeKQO8lz7DSXz+zb7
xyCcbj74l36ADHsPjcy8hySzxScLm5UQGx41oLHS9J7XJO3T23vjfTdydx7+
44cE7z91Nh//8C9lQ2f6f9ZBY8IrJTk39oP/T4l5S0sPey97i8s8feLllDRT
K9WdZjxapf8PZcDDC4TSCy/SbJZA5UvXk4OrbXUrRUT/bFFkbX3WyLldCQr6
H6CISoiHXAAA

-->

</rfc>
