Re: [jose] Consensus call on charter for JSON Web Proofs work

"Zundel, Brent" <brent.zundel@avast.com> Tue, 18 October 2022 16:59 UTC

Return-Path: <brent.zundel@avast.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46D0DC152594 for <jose@ietfa.amsl.com>; Tue, 18 Oct 2022 09:59:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.678
X-Spam-Level:
X-Spam-Status: No, score=-7.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.571, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=avast.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KDtvzdsCeSXA for <jose@ietfa.amsl.com>; Tue, 18 Oct 2022 09:59:52 -0700 (PDT)
Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2355C1524C2 for <jose@ietf.org>; Tue, 18 Oct 2022 09:59:52 -0700 (PDT)
Received: by mail-pf1-x42a.google.com with SMTP id y191so14698857pfb.2 for <jose@ietf.org>; Tue, 18 Oct 2022 09:59:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=avast.com; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=jlDW1Q5+1vMS+EUrcTLpRuescKK8n5YKoZK0r00rYIk=; b=dkP0BpvnS229dDOSEZ+6KrM6RUbImxtLiWGRu0JEwHWPEKbhOempmnG6REkfjITsun 62wvyZjjw+qk1oefhS4ZkQnwfbrK/t0pg6R6+9CJTemynVMbKrDNHL/gHJxKNFSJnFT7 gu2i3j4h6XIjPqmpD4boRs9GOHALUp6BAq8dI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=jlDW1Q5+1vMS+EUrcTLpRuescKK8n5YKoZK0r00rYIk=; b=tsSuFs3w4Pjlf0LbFu9m3/7erwGvzqLS9zOWHiX/XYwSenBfwEvtZQ8fDCK9zIRlC4 VVcbrzfw1fTCpjoabXATozIpxmwbQEbpNNSW0NUKfX5Dqh/Wpx6yyyk1oXVctrLJxQtW QVdR6YO7E/eC8b4VqIIMCtEuDcLakNDO0lpJmoYefDx+USYDlSaasgIll8qWGV1co23X cBSiVpN8sR5pD6+jpcvU/3JQ2zdS+XShMueBqzD4fc+5s5idrUC+foGeNhJ+pEWpQoMe 1QEalPNyv2cX7hu9itzFWnnZGbOK9VPQWEmAdVu41+GXisoKQIiIKnjmcOhsXMhzGF4U oKPg==
X-Gm-Message-State: ACrzQf20jIGDeWTCsfpM1pL+W7SeJZsegRwWd+G9Yyc7gGZKCuX0TCdm fxwTS4jsh2/KgFRfmj97qWp/aXq2K+RY+PpgQAWZlKA5vHhslQ==
X-Google-Smtp-Source: AMsMyM7ll/wFc3OW410M1s1OsW9JwIUDgvyJ80qEFSQhOPEGCrPaT8fiBX6kDSZVR6S0YSXiC/eWjmyya0KQhY+EkX0=
X-Received: by 2002:a05:6a00:1a44:b0:52a:ecd5:bbef with SMTP id h4-20020a056a001a4400b0052aecd5bbefmr4130886pfv.28.1666112392049; Tue, 18 Oct 2022 09:59:52 -0700 (PDT)
MIME-Version: 1.0
References: <PH0PR06MB7061B875E484777060C5F06EC2289@PH0PR06MB7061.namprd06.prod.outlook.com> <PH0PR21MB195997D042F3CCFC82CBFDDAB0289@PH0PR21MB1959.namprd21.prod.outlook.com> <PH0PR21MB1959BB321C4A5958D896364BB0289@PH0PR21MB1959.namprd21.prod.outlook.com>
In-Reply-To: <PH0PR21MB1959BB321C4A5958D896364BB0289@PH0PR21MB1959.namprd21.prod.outlook.com>
From: "Zundel, Brent" <brent.zundel@avast.com>
Date: Tue, 18 Oct 2022 11:00:58 -0600
Message-ID: <CAGi82uO0=CJZyJNEP+uHsWT8L1zOSqNqF77KyYWvsLnuQL=H0A@mail.gmail.com>
To: Christian Paquin <cpaquin=40microsoft.com@dmarc.ietf.org>
Cc: "jose@ietf.org" <jose@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000049603305eb520565"
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/wq6IDd8vwDqY4jTtw_NzfrIQoSE>
Subject: Re: [jose] Consensus call on charter for JSON Web Proofs work
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2022 17:00:00 -0000

(1) Do you support the charter text?
yes

(2) Are you willing to author or participate in the developed of the WG
drafts?
yes

(3) Are you willing to review the WG drafts?
yes

(4) Are you interested in implementing the WG drafts?
very yes

On Tue, Oct 18, 2022 at 8:38 AM Christian Paquin <cpaquin=
40microsoft.com@dmarc.ietf.org> wrote:

>
>
>    1. Yes, I support the charter text
>    2. Yes
>    3. Yes
>    4. I’m planning to use this WG’s specification to implement various
>    privacy-preserving cryptographic technologies (including U-Prove and BBS+)
>
>
>
> Christian Paquin, Microsoft Research
>
>
>
> *From:* jose <jose-bounces@ietf.org> *On Behalf Of *Karen O'Donoghue
> *Sent:* Monday, October 17, 2022 9:45 PM
> *To:* jose@ietf.org
> *Subject:* [EXTERNAL] [jose] Consensus call on charter for JSON Web
> Proofs work
>
>
>
> You don't often get email from odonoghue=40isoc.org@dmarc.ietf.org. Learn
> why this is important <https://aka.ms/LearnAboutSenderIdentification>
>
>
>
> (1) Do you support the charter text? Or do you have objections or blocking
> concerns (please describe what they might be)?
>
>
>
> If you do support the charter text:
>
> (2) Are you willing to author or participate in the developed of the WG
> drafts?
>
> (3) Are you willing to review the WG drafts?
>
> (4) Are you interested in implementing the WG drafts?
>
>
>
> If you previously spoke of at the BoF, you are welcome to repeat yourself
> here.
>
>
>
> If you have been following along on the mailing list, the charter text
> below is the one that was being polished in GitHub (
> https://github.com/json-web-proofs/json-web-proofs/blob/main/charter-ietf-jose-03.md
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fjson-web-proofs%2Fjson-web-proofs%2Fblob%2Fmain%2Fcharter-ietf-jose-03.md&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111180393%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=raVlxGvhb1M7QfLiRm39Ji8FfbETZ33eldt402GKUEU%3D&reserved=0>).
>
>
>
>
> This call for feedback will end on Monday, 24 October 2022.
>
>
>
> Thanks,
>
> Karen and John
>
>
>
> [1]
> https://datatracker.ietf.org/meeting/interim-2022-jwp-01/materials/minutes-interim-2022-jwp-01-202210121300-00
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fmeeting%2Finterim-2022-jwp-01%2Fmaterials%2Fminutes-interim-2022-jwp-01-202210121300-00&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111180393%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTXmT6Ms95kF8sv7KrgT0j1rOB%2BEuemahkQB5jRh148%3D&reserved=0>
>
> [2] https://notes.ietf.org/notes-ietf-114-jwp#
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnotes.ietf.org%2Fnotes-ietf-114-jwp%23&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111180393%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Q4gwTZyGq%2FUnJgEmidyGO2srIlOgGFGLzYbqZcnikJE%3D&reserved=0>
>
> [3]
> https://github.com/json-web-proofs/json-web-proofs/blob/main/charter-ietf-jose-03.md
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fjson-web-proofs%2Fjson-web-proofs%2Fblob%2Fmain%2Fcharter-ietf-jose-03.md&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=HU0akQK%2BDuL%2FvZiY5%2BVQUzjn8Re5yjFjrQhI0BGNrKY%3D&reserved=0>
>
>
>
> *Draft Charter:*
>
> The original JSON Object Signing and Encryption (JOSE) working group
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fcharter-ietf-jose%2F02%2F&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=icbIokAMjJw3HUAeVpTtYRmGGkyKSoi3nPzeuzo5usM%3D&reserved=0>
> standardized JSON-based representations for:
>
>    - Integrity-protected objects – JSON Web Signatures (JWS) [RFC 7515
>    <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7515.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3MgZuHpwosSVuBAGdYps5Ot0rPJ0BGU%2FB%2B%2BauWBaNBI%3D&reserved=0>
>    ]
>    - Encrypted objects – JSON Web Encryption (JWE) [RFC 7516
>    <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7516.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=TTGJay8uLgEv08zhRX18qr9SdE%2BWgj46fcEO%2FSFCJ8A%3D&reserved=0>
>    ]
>    - Key representations – JSON Web Key (JWK) [RFC 7517
>    <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7517.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ZPICzPhva2nV5KRNouZtpQetfryufhLDGc%2Bniwach2w%3D&reserved=0>
>    ]
>    - Algorithm definitions – JSON Web Algorithms (JWA) [RFC 7518
>    <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7518.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=PCT5kmE%2FVeEGm5mspp%2F7N8FDyayvnEuvjF7%2FsoSJyMY%3D&reserved=0>
>    ]
>    - Test vectors for the above – Examples of Protecting Content Using
>    JSON Object Signing and Encryption [RFC 7520
>    <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7520.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=K8YqvDaJnSjcr3mAQgNl7J67KHQNv8AmaPwPgxMcY1w%3D&reserved=0>
>    ]
>
> These were used to define the JSON Web Token (JWT) [RFC 7519
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc7519.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=DroHCfBEoflrPxHVoAfHPm%2B%2Bzdyarn2lknXL1gxitPo%3D&reserved=0>],
> which in turn, has seen widespread deployment in areas as diverse as digital
> identity
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenid.net%2Fconnect%2F&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=YV3P8pxBDmP2y1s%2BQk0x%2FQkNaWWkyLXVRIIO8Rz%2F%2B4M%3D&reserved=0>
> and secure telephony
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fblog%2Fstir-action%2F&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Srv%2BEjEhK4YvCxA5rSPwr1lnmLlWkQjhaPIwFbVGed4%3D&reserved=0>
> .
>
> Concurrent to the growth of adoption of these standards to express and
> communicate sensitive data has been an increasing societal focus on
> privacy. Common privacy themes in identity solutions are user consent,
> minimal disclosure, and unlinkability.
>
> A multi-decade research activity for a sizeable academic and applied
> cryptography community, often referred to as anonymous credentials, targets
> privacy and knowledge protection. Some of the cryptographic techniques
> developed in this space involve pairing-friendly curves and zero-knowledge
> proofs (ZKPs) (to name just a few). Some of the benefits of zero-knowledge
> proof algorithms include unlinkability, selective disclosure, and the
> ability to use predicate proofs.
>
> The current container formats defined by JOSE and JWT are not able to
> represent data using zero-knowledge proof algorithms. Among the reasons are
> that most require an additional transform or finalize step, many are
> designed to operate on sets and not single messages, and the interface to
> ZKP algorithms has more inputs than conventional signing algorithms. The
> reconstituted JSON Object Signing and Encryption (JOSE) working group will
> address these new needs, while reusing aspects of JOSE and JWT, where
> applicable.
>
> This group is chartered to work on the following deliverables:
>
>    - An Informational document detailing Use Cases and Requirements for
>    new specifications enabling JSON-based selective disclosure and
>    zero-knowledge proofs.
>    - Standards Track document(s) specifying representation(s) of
>    independently-disclosable integrity-protected sets of data and/or proofs
>    using JSON-based data structures, which also aims to prevent the ability to
>    correlate by different verifiers.
>    - Standards Track document(s) specifying representation(s) of
>    JSON-based claims and/or proofs enabling selective disclosure of these
>    claims and/or proofs, and that also aims to prevent the ability to
>    correlate by different verifiers.
>    - Standards Track document(s) specifying how to use existing
>    cryptographic algorithms and defining their algorithm identifiers. The
>    working group will not invent new cryptographic algorithms.
>    - Standards Track document(s) specifying how to represent keys for
>    these new algorithms as JSON Web Keys (JWKs).
>    - An Informational document defining test vectors for these new
>    specifications.
>    - Standards Track document(s) defining CBOR-based representations
>    corresponding to all the above, building upon the COSE and CWT
>    specifications in the same way that the above build on JOSE and JWT.
>
> One or more of these goals may be combined into a single document, in
> which case the concrete milestones for these goals will be satisfied by the
> consolidated document(s).
>
> An informal goal of the working group is close coordination with the rechartered
> W3C Verifiable Credentials WG
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.w3.org%2F2022%2F05%2Fproposed-vc-wg-charter.html&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=2%2Bo1HD7snONBbcS9B2xgswtyOB8BZV%2FPaL3%2BraDzL5Q%3D&reserved=0>,
> which has taken a dependency on this work for the second version of its
> Verifiable Credentials specification. The working group will also
> coordinate with the Selective Disclosure JWT
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-oauth-selective-disclosure-jwt%2F&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=db%2BxLwQcR8Fpdxsl7eqia%2BKFmM5YRdFPVz0XXKO0qj0%3D&reserved=0>
> work in the OAuth working group, the Privacy Pass
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fcharter-ietf-privacypass%2F&data=05%7C01%7Ccpaquin%40microsoft.com%7C7831ac7266e844051e6608dab0aa62c4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638016543111336611%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NzI6ld3J%2Bs5Kw4INn%2B%2FAINOAxPo4DF0WYReiKUu8%2BRs%3D&reserved=0>
> working group, and the CFRG.
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose
>


-- 
Brent Zundel
Principle Crypto Engineer - Avast