Internet-Draft | Key Transparency Protocol | February 2025 |
McMillion & Linker | Expires 1 September 2025 | [Page] |
While there are several established protocols for end-to-end encryption, relatively little attention has been given to securely distributing the end-user public keys for such encryption. As a result, these protocols are often still vulnerable to eavesdropping by active attackers. Key Transparency is a protocol for distributing sensitive cryptographic information, such as public keys, in a way that reliably either prevents interference or detects that it occurred in a timely manner.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://ietf-wg-keytrans.github.io/draft-protocol/draft-ietf-keytrans-protocol.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-ietf-keytrans-protocol/.¶
Discussion of this document takes place on the Key Transparency Working Group mailing list (mailto:keytrans@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/keytrans/. Subscribe at https://www.ietf.org/mailman/listinfo/keytrans/.¶
Source for this draft and an issue tracker can be found at https://github.com/ietf-wg-keytrans/draft-protocol.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 1 September 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
End-to-end encrypted communication services rely on the secure exchange of public keys to ensure that messages remain confidential. It is typically assumed that service providers correctly manage the public keys associated with each user's account. However, this is not always true. A service provider that is compromised or malicious can change the public keys associated with a user's account without their knowledge, thereby allowing the provider to eavesdrop on and impersonate that user.¶
This document describes a protocol that enables a group of users to ensure that they all have the same view of the public keys associated with each other's accounts. Ensuring a consistent view allows users to detect when unauthorized public keys have been associated with their account, indicating a potential compromise.¶
More detailed information about the protocol participants and the ways the protocol can be deployed can be found in [I-D.ietf-keytrans-architecture].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document uses the TLS presentation language [RFC8446] to describe the structure of protocol messages, but does not require the use of a specific transport protocol. As such, implementations do not necessarily need to transmit messages according to the TLS format and can chose whichever encoding method best suits their application. However, cryptographic computations MUST be done with the TLS presentation language format to ensure the protocol's security properties are maintained.¶
A Transparency Log is a verifiable data structure that maps label-version pairs to cryptographic keys or other structured data. Labels correspond to user identifiers, and a new version of a label is created each time the label's associated value changes. Transparency Logs have an epoch counter which is incremented every time a new set of label-version pairs are added.¶
KT uses a prefix tree to establish a mapping between each label-version pair and a commitment to the label's value at that version. Every time the prefix tree changes, its new root hash and the current timestamp are stored in a log tree. The benefit of the prefix tree is that it is easily searchable, and the benefit of the log tree is that it can easily be verified to be append-only. The data structure powering KT combines a log tree and a prefix tree, and is called the combined tree.¶
This section describes the operation of both prefix and log trees at a high level and the way that they're combined. More precise algorithms for computing the intermediate and root values of the trees are given in Section 9.¶
Trees consist of nodes, which have a byte string as their hash value. A node is either a leaf if it has no children, or a parent if it has either a left child or a right child. A node is the root of a tree if it has no parents, and an intermediate if it has both children and parents. Nodes are siblings if they share the same parent.¶
The descendants of a node are that node, its children, and the descendants of its children. A subtree of a tree is the tree given by the descendants of a particular node, called the head of the subtree.¶
The direct path of a root node is the empty list, and of any other node is the concatenation of that node's parent along with the parent's direct path. The copath of a node is the node's sibling concatenated with the list of siblings of all the nodes in its direct path, excluding the root.¶
The size of a tree or subtree is defined as the number of leaf nodes it contains.¶
Log trees are used for storing information in the chronological order that it was added and are constructed as left-balanced binary trees.¶
A binary tree is balanced if its size is a power of two and for any parent
node in the tree, its left and right subtrees have the same size. A binary tree
is left-balanced if for every parent, either the parent is balanced, or the
left subtree of that parent is the largest balanced subtree that could be
constructed from the leaves present in the parent's own subtree. Given a list of
n
items, there is a unique left-balanced binary tree structure with these
elements as leaves. Note also that every parent always has both a left and right
child.¶
Log trees initially consist of a single leaf node. New leaves are
added to the right-most edge of the tree along with a single parent node to
construct the left-balanced binary tree with n+1
leaves.¶
While leaves contain arbitrary data, the value of a parent node is always the hash of the combined values of its left and right children.¶
Log trees are powerful in that they can provide both inclusion proofs, which demonstrate that a leaf is included in a log, and consistency proofs, which demonstrate that a new version of a log is an extension of a past version of the log.¶
An inclusion proof is given by providing the copath values of a leaf. The proof is verified by hashing together the leaf with the copath values and checking that the result equals the root hash value of the log. Consistency proofs are a more general version of the same idea. With a consistency proof, the prover provides the minimum set of intermediate node values from the current tree that allows the verifier to compute both the old root value and the current root value.¶
However, the protocol described in this document generally doesn't provide pure inclusion or consistency proofs to verifiers. Instead, it relies on the more general idea of providing the smallest number of intermediate node values that are necessary to allow a verifier to compute the tree's root hash from intermediate and leaf values that they already have. The verifier may already have intermediate and leaf values because they were provided by the Transparency Log as part of its response to the current query, or because they were retained from responses to previous queries. This pattern of providing proofs ensures that there is minimal on-the-wire redundancy.¶
Prefix trees store a mapping between search keys and their corresponding values, with the ability to efficiently prove that a search key's value was looked up correctly.¶
Each leaf node in a prefix tree represents a specific mapping from search key to value, while each parent node represents some prefix which all search keys in the subtree headed by that node have in common. The subtree headed by a parent's left child contains all search keys that share its prefix followed by an additional 0 bit, while the subtree headed by a parent's right child contains all search keys that share its prefix followed by an additional 1 bit.¶
The root node, in particular, represents the empty string as a prefix. The root's left child contains all search keys that begin with a 0 bit, while the right child contains all search keys that begin with a 1 bit.¶
A prefix tree can be searched by starting at the root node and moving to the left child if the first bit of a search key is 0, or the right child if the first bit is 1. This is then repeated for the second bit, third bit, and so on until the search either terminates at a leaf node (which may or may not be for the desired value), or a parent node that lacks the desired child.¶
New key-value pairs are added to the tree by searching it according to the same process. If the search terminates at a parent without a left or right child, a new leaf is simply added as the parent's missing child. If the search terminates at a leaf for the wrong search key, one or more intermediate nodes are added until the new leaf and the existing leaf would no longer reside in the same place. That is, until we reach the first bit that differs between the new search key and the existing search key.¶
The value of a leaf node is the encoded key-value pair, while the value of a parent node is the hash of the combined values of its left and right children (or a stand-in value when one of the children doesn't exist).¶
A proof of membership is given by providing the leaf hash value, along with the hash value of each copath entry along the search path. A proof of non-membership is given by providing an abridged proof of membership that follows the path for the intended search key, but ends either at a stand-in node or a leaf for a different search key. In either case, the proof is verified by hashing together the leaf with the copath hash values and checking that the result equals the root hash value of the tree.¶
Log trees are desirable because they can provide efficient consistency proofs to convince verifiers that nothing has been removed from a log that was present in a previous version. However, log trees can't be efficiently searched without downloading the entire log. Prefix trees are efficient to search and can provide inclusion proofs to convince verifiers that the returned search results are correct. However, it's not possible to efficiently prove that a new version of a prefix tree contains the same data as a previous version with only new values added.¶
In the combined tree structure, based on [Merkle2], a prefix tree contains a mapping where each label-version pair has a search key, and the search key maps to a cryptographic commitment to the label's new contents. A log tree contains a record of each version of the prefix tree and the timestamp that it was created in milliseconds since the Unix epoch. With some caveats, this combined structure supports both efficient consistency proofs and can be efficiently searched.¶
Note that, although the Transparency Log maintains a single logical prefix tree, each modification of this tree results in a new root hash which is then stored in the log tree. As part of the protocol, the Transparency Log is often required to perform lookups in different versions of the prefix tree. Therefore, when instructions refer to "looking up a label-version pair in the prefix tree at a given log entry," this means performing the search in the specific version of the prefix tree whose root hash is stored at that log entry (where a "log entry" refers to a leaf of the log tree).¶
As users interact with the Transparency Log over time, they will see many different root hashes as the contents of the log changes. It's necessary for users to guarantee that the root hashes they observe are consistent with respect to a few important properties:¶
If root hash B is shown after root hash A, then root hash B contains all the same log entries as A (with some new ones potentially added).¶
If the rightmost log entry of the tree with root hash A has timestamp T_a, and the rightmost log entry of the tree with root hash B has timestamp T_b, then T_b is greater than or equal to T_a.¶
Furthermore, all log entries between the rightmost log entry of A and the rightmost log entry of B have monotonically increasing timestamps.¶
The first property is necessary to ensure that the Transparency Log never removes a log entry after showing it to a user, as this would allow the Transparency Log to remove evidence of its own misbehavior. The second two properties ensure that all users have a consistent view of when each portion of the tree was created. Disagreement on when portions of the tree were created is functionally a fork and it introduces the same security issues. This is because, as will be discussed in later sections, users rely on log entry timestamps to decide whether to continue monitoring certain labels, or which portions of the tree to skip when searching.¶
Proving the first property, that the log tree is append-only, can be done with a typical consistency proof. Proving the latter two properties, that newly added log entries have monotonically increasing timestamps, requires establishing some additional structure on the log's contents.¶
Intuitively, the leaves of the log tree can be considered a flat array representation of a binary tree. This structure is similar to the log tree, but distinguished by the fact that not all parent nodes have two children. In this representation, "leaf" log entries are stored in even-numbered indices, while "intermediate" log entries are stored in odd-numbered indices:¶
The index of the root log entry is the greatest power of two, minus one, that is less than the size of the log. The index of a log entry's left child is the log entry's index minus the greatest power of two that doesn't take the result of the computation out of bounds. Similarly, the index of a log entry's right child is the entry's index plus the greatest power of two that doesn't take the result of the computation out of bounds.¶
Users ensure that log entry timestamps are monotonic by enforcing that the
structure of this search tree holds. That is, users check that any timestamp
they observe in the root's left subtree is less than or equal to the root's
timestamp, and that any timestamp they observe in the root's right subtree is
greater than or equal to the root's timestamp (and so on recursively). Following
this tree structure ensures that users can quickly detect misbehavior while
minimizing the number of log entries that need to be checked. For example, in a
log with 50 entries, instead of having the root be the typical "middle" entry of
50/2 = 25
, it would be entry 31
. The next entry to check to the root's right
would be 31 + 16 = 47
. As more entries are added to the log, users will
consistently revisit entries 31 and 47, while they may never revisit entry 25
after even a single new entry is added to the log.¶
Because we are often looking at the rightmost log entry, it is frequently useful to refer to the frontier of the log. The frontier consists of the root log entry, followed by the entries produced by repeatedly moving right until reaching the last entry of the log. Using the same example of a log with 50 entries, the frontier would be entries: 31, 47, 49.¶
Example code for efficiently navigating the implicit binary search tree is provided in Appendix A.¶
Users retain the following information about the last tree head they've observed:¶
The "size" of the log tree, defined as the number of log entries (leaves) it contains.¶
The root hashes of the "full subtrees" of the log tree. The full subtrees are the balanced subtrees which are as large as possible. That is, they do not have another balanced subtree as their parent. This allows the Transparency Log to provide more space-efficient consistency and inclusion proofs than if just the root hash was retained.¶
The timestamps of the log entries along the frontier. This will be used to ensure that subsequent log entry timestamps are correct.¶
When users make queries to the Transparency Log, they advertise the size of the last tree head they've observed. If the Transparency Log responds with an updated tree head, it first provides a consistency proof to show that the new tree head is an extension of the previous one. It then also provides the following:¶
Starting with the rightmost log entry from the tree that was advertised by the user, compute its direct path in the new implicit binary search tree. Provide the log entry timestamp for each element of the direct path that's to the right of the advertised log entry.¶
Exactly one of these log entries will lie on the new tree's frontier. From this log entry, compute the remainder of the frontier. That is, compute the log entry's right child, the right child's right child, and so on. Provide the timestamps for these log entries as well.¶
Users verify that each timestamp is greater than or equal to the last. While this only requires users to verify a logarithmic number of the newly added log entries' timestamps, it guarantees that two users with overlapping views of the tree will detect any violations. Note that retaining only the rightmost log entry's timestamp would be sufficient for this purpose, but users retain the timestamps of all log entries along the frontier. The additional timestamps are retained to make later parts of the protocol more efficient.¶
Additionally, the Transparency Log defines two durations: how far ahead and how far behind the current time the rightmost log entry's timestamp may be. Users verify this against their local clock.¶
For users which have never interacted with the Transparency Log before and don't have a previous tree head to advertise, the Transparency Log simply provides the timestamps of the log entries on the frontier. The user verifies each timestamp is greater than or equal to the last, as above.¶
When searching the combined tree structure described in Section 3.4, users perform a binary search for the first log entry where the prefix tree at that entry contains the desired label-version pair. Users reuse the implicit binary search tree from Section 4.1 for this purpose to ensure that all users will check the same or similar entries when searching for the same label. This allows for efficient client-side monitoring of the Transparency Log.¶
To perform a binary search, at each log entry the search needs to determine whether it should move left or right. That is, it needs to determine, out of the set of label-version pairs stored in the prefix tree, whether the highest version of a label that's present at a given log entry is greater than, equal to, or less than the target version.¶
A binary ladder is a series of lookups in a single log entry's prefix tree that determines the highest version of a label that exists, and it proceeds as follows:¶
First, version x
of the label is looked up, where x
is a consecutively
higher power of two minus one (0, 1, 3, 7, ...). This is repeated until the
first proof of non-inclusion is produced.¶
Once the first proof of non-inclusion is produced, a binary search is conducted between the highest version that was proved to be included, and the version that was proved to not be included. Each step of the binary search produces either a proof of inclusion or non-inclusion, which guides the search left or right, until it terminates.¶
However, for the purpose of searching for a specific version of a label, this is optimized in the two ways discussed below:¶
First, the series of lookups ends after the first proof of inclusion for a version greater than or equal to the target version, or the first proof of non-inclusion for a version less than the target version. This is because users are only interested in whether the highest version of a label that exists, as of a particular log entry, is greater than or less than their target version -- not its exact value.¶
Second, the Transparency Log omits proofs of inclusion for any versions of the label where another proof of inclusion for the same version was already provided in the same query response for a log entry to the left. Similarly, the Transparency Log also omits proofs of non-inclusion for any versions of the label where another proof of non-inclusion for the same version was already provided in the same query response for a log entry to the right. These proofs are unnecessary to conduct the user's search and omitting them does not affect the protocol's security.¶
As an example, if the highest version of a label is 6, a binary ladder would proceed as follows: proofs of inclusion for versions 0, 1, 3, terminated by a proof of non-inclusion for version 7. It would then conclude with proofs of inclusion for versions 5 and 6, as this uniquely identifies 6 as the highest version available. However, any of these proofs may be omitted in a particular query response due to the two rules just stated.¶
A Transparency Log operator MAY define a maximum lifetime for log entries. If defined, it MUST be greater than zero seconds. Whether a log entry has surpassed its maximum lifetime is determined by subtracting the timestamp of the rightmost log entry from the timestamp of the log entry in question and checking if the result is greater than or equal to the defined duration.¶
A user executing a search may arrive at a log entry which is past its maximum lifetime by either of two ways. The user may have inspected a log entry which is not expired and decided to recurse to the log entry's left child, which is expired. Alternatively, the root log entry may be expired, in which case the user would've started their search at an expired root log entry.¶
When a user's search proceeds from a log entry which is not expired to a log entry which is expired, the user is provided with a binary ladder from the expired log entry as usual. If the user's search would recurse further into the expired portion of the tree (to the log entry's left child), the search is aborted. If the user's search would recurse away from the expired portion of the tree (to the log entry's right child), the user continues as normal.¶
When the root and potentially multiple frontier log entries are expired, the user skips to the furthest-right expired frontier log entry without receiving binary ladders from any of its parents. Similar to the previous case, the user is provided with a binary ladder from this log entry. If the user determines that its search would recurse to the left (further into the expired portion of the tree), it aborts; to the right (into the unexpired portion of the tree), it continues.¶
This allows the Transparency Log to prune data which is sufficiently old, as only a small amount of the log tree and prefix tree outside of the maximum lifetime need to be retained. Specifically, only a logarithmic number of log entries that have passed their maximum lifetime will still be needed by users; the rest can be discarded. Pruning is explained in more detail in TODO.¶
The algorithm for performing a fixed-version search (a search for a specific version of a label) is described below as a recursive algorithm. It starts with the root log entry, as defined by the implicit binary search tree, and then recurses to left or right children, each time starting back at step 1.¶
Verify that the log entry's timestamp is consistent with the timestamps of all ancestor log entries. That is, if the log entry is in the ancestor's left subtree, then its timestamp is less than or equal to the ancestor's. If the log entry is in the ancestor's right subtree, then its timestamp is greater than or equal to the ancestor's.¶
If the log entry has surpassed its maximum lifetime and is on the frontier, determine whether its right child has also surpassed its maximum lifetime. If so, recurse to the right child; otherwise, continue to step 3. Note that a right child always exists, as the rightmost log entry cannot exceed its maximum lifetime by definition.¶
Obtain a binary ladder from the current log entry for the target version. Accounting for any proofs of inclusion or non-inclusion which were omitted, verify that the binary ladder terminates in a way that is consistent with previously-inspected log entries. Specifically, verify that it indicates a maximum version greater than or equal to any log entries to the left, and less than or equal to any log entries to the right.¶
If the binary ladder was terminated early due to a proof of non-inclusion for a version less than the target version, recurse to the log entry's right child. Otherwise, check if the log entry has surpassed its maximum lifetime. If so, abort the search with an error indicating that the desired version of the label has expired and is no longer available. If not, recurse to the log entry's left child. If, in either case, recursion isn't possible because the search is at a leaf node:¶
This largely concludes the search. However, there are some additional technicalities to address. First, it's possible for the binary search to conclude successfully even if the label-version pair that the user is interested in has expired. Out of the log entries touched by the binary search, identify which log entry was first to contain the desired label-version pair. If it is a log entry that is past its maximum lifetime, abort the search and return an error to the user.¶
It's also possible at this point that a commitment to the contents of the desired label-version pair has not been provided by the Transparency Log. This can happen, for example, if multiple versions of a label were inserted in a single epoch and the binary ladder was terminated early due to a proof of inclusion for a version greater than the target version. If this has happened, obtain a search proof for the target label-version pair from the prefix tree in the first log entry to contain it (identified in step 5).¶
Finally, if the binary search failed to find a log entry containing the desired label-version pair, or if the search proof in step 6 returned a proof of non-inclusion, return an error to the user indicating that the version of the label does not exist. Otherwise, terminate the search successfully.¶
The most important goal of this algorithm is correctly identifying the first log entry that contains the target label-version pair. The purpose of doing this is to make monitoring more efficient for the label owner. If a label has a large number of versions, it can become prohibitively expensive for its owner to repeatedly check that every single version is represented correctly in multiple log entries. Instead, the label owner can check that the version was created correctly in the one epoch where it was first added and then enforce that binary searches for that version will always converge back to that same log entry.¶
Once users successfully complete the search and the specified verification, they move on to opening the target label-version pair's commitment.¶
As new entries are added to the log tree, the search path that's traversed to find a specific version of a label may change. New intermediate nodes may be established between the search root and the log entry, or a new search root may be created. The goal of monitoring a label is to efficiently ensure that, when these new parent nodes are created, they're created correctly such that searches for the same versions continue converging to the same entries in the log.¶
Monitoring is performed both by the users that own a label (meaning they are the authoritative source for the label's content) and the users that lookup a label. Owners monitor their labels to ensure that past (expected) versions of a label are still correctly stored in the log and that no new (unexpected) versions have been added. Users that looked up a label may sometimes need to monitor it afterwards to ensure that the version they observed isn't later concealed by the Transparency Log.¶
Label owners MUST monitor their labels regularly, ensuring that past versions of the label are still correctly represented in the log and that any new versions of the label are permissible (alerting the user if not). Service Providers define a duration, referred to as the Reasonable Monitoring Window (RMW), which is the frequency with which the Transparency Log generally expects label owners to perform monitoring. The log entry maximum lifetime, if defined, MUST be greater than the RMW.¶
Distinguished log entries are chosen (according to the algorithm below) such that there is roughly one per every interval of the RMW. If a user looks up a label, either through a fixed-version or greatest-version search, and finds that the first log entry containing their desired label-version pair is to the right of the rightmost distinguished log entry, they MUST regularly monitor the label-version pair until its monitoring path intersects a distinguished log entry. That is, until a new distinguished log entry is established to its right and the two log entries are verified to be consistent. The purpose of this monitoring is to ensure that the label-version pair is not removed or obscured by the Transparency Log before the label owner has had an opportunity to detect it.¶
However, if a user looks up a label and finds that the first log entry containing the label-version pair is either a distinguished log entry or to the left of any distinguished log entry, they are not required to monitor it afterwards. The only state that would be retained from the query would be the tree head, as discussed in Section 4.¶
"Regular" monitoring SHOULD be performed at least as frequently as the RMW and MUST (if at all possible) happen more frequently than the log entry maximum lifetime.¶
Distinguished log entries are chosen according to the following recursive algorithm:¶
Take as input: a log entry, the timestamp of a log entry to its left, and the timestamp of a log entry to its right.¶
If the right timestamp minus the left timestamp is less than the Reasonable Monitoring Window, terminate the algorithm. Otherwise, declare that the given log entry is distinguished.¶
If the given log entry has a left child in the implicit binary search tree, then recurse to its subtree by executing this algorithm with: the given log entry's left child, the given left timestamp, and the timestamp of the given log entry.¶
If the given log entry has a right child, then recurse to its right subtree by executing this algorithm with: the given log entry's right child, the timestamp of the given log entry, and the given right timestamp.¶
While the algorithm is recursive, it is initially called with these parameters: the root node in the implicit binary search tree, the timestamp 0, and the timestamp of the rightmost log entry. Note that step 2 is specifically "less than" and not "less than or equal to"; this ensures correct behavior when the RMW is zero.¶
This process for choosing distinguished log entries ensures that they are regularly spaced. Having irregularly-spaced distinguished log entries risks either overwhelming label owners with a large number of them, or delaying consensus between users by having arbitrarily few. Distinguished log entries must reliably occur at roughly the same interval as the Reasonable Monitoring Window regardless of variations in the tree's growth rate or other factors.¶
This process also ensures that distinguished log entries are stable. Once a log entry is chosen to be distinguished, it will never stop being distinguished. This is important because it means that, if a user looks up a label and checks consistency with some distinguished log entry, this log entry can't later avoid inspection by the label owner by losing its distinguished status.¶
Similar to the algorithm for searching the tree, the algorithm for monitoring the tree requires a way to prove that the highest version of a label stored in a particular log entry is greater than or equal to a target version. Since we already know that the target version exists, we only need to prove that there has not been an unexpected downgrade. As such, the steps of the binary ladder for monitoring, called a lower-bound binary ladder, are slightly different than for search:¶
First, version x
of the label is looked up, where x
is consecutively higher
powers of two minus one (0, 1, 3, 7, ...). This is repeated until x
is the
largest such value less than or equal to the target version.¶
Second, the largest x
that was looked up is retained, and consecutively
smaller powers of two are added to it until it equals the target version.
Each time a power of two is added, this version of the label is looked up.¶
This could be equivalently computed as a search binary ladder, excluding lookups for any versions greater than the target.¶
To monitor a given label, users maintain a small amount of state: a map from a position in the log to a version counter. The version counter is the highest version of the label that's been proven to exist at that log position. Users initially populate this map by setting the position of the first log entry to contain the label-version pair they've looked up to map to that version. A map may track several different versions of a label simultaneously if a user has been shown different versions of the same label.¶
To update this map, users receive the most recent tree head from the server and follow these steps for each entry in the map, from rightmost to leftmost log entry:¶
Determine if the log entry is distinguished. If so, leave the position-version pair in the map and move on to the next map entry.¶
Compute the ordered list of log entries to inspect:¶
Initiate the list by setting it to be the log entry's direct path in the implicit binary search tree based on the current tree size.¶
Remove all entries that are to the left of the log entry.¶
If any of the remaining log entries are distinguished, terminate the list just after the first distinguished log entry.¶
If the computed list is empty, leave the position-version pair in the map and move on to the next map entry.¶
For each log entry in the computed list, from left to right:¶
Check if this log entry already has an entry in the map with a greater version. If so, this version of the label no longer needs to be monitored. Remove the current position-version pair (the one with the lesser version) from the map and move on to the next map entry.¶
Receive and verify a lower-bound binary ladder from this log entry for the version currently in the map. This proves that, at the indicated log entry, the highest version present is greater than or equal to the previously-observed version.¶
If the above check fails, return an error to the user. Otherwise, remove the current position-version pair from the map and replace it with a new one, with the position of the log entry the binary ladder came from.¶
Once the map entries are updated according to this process, the final step of monitoring is to remove all mappings where the position corresponds to a distinguished log entry. All remaining entries will be non-distinguished log entries lying on the log's frontier.¶
In summary, monitoring works by progressively moving up the tree as new intermediate/root nodes are established and verifying that they're constructed correctly. Once a distinguished log entry is reached and successfully verified, monitoring is no longer necessary and the relevant entry is removed from the map. Note that users can often execute this process with the output of Search or Update operations for a label without waiting to make explicit Monitor queries. It is also worth noting that the work required to monitor several versions of the same label scales sublinearly due to the fact that the direct paths of the different versions will often intersect. Intersections reduce the total number of entries in the map and therefore the amount of work that will be needed to monitor the label from then on.¶
If the user owns the label being monitored, they will additionally need to retain the rightmost distinguished log entry where they've verified that the most recent version of the label is correct. Users advertise this log entry's position in their Monitor request. For a number of subsequent distinguished log entries, the Transparency Log states the greatest version of the label that the log entry's prefix tree contains and provides a search-style binary ladder, as described in Section 5.1, to prove it. No lookups are omitted from the binary ladder according to the rules described in Section 5.1. However, lookups for any versions of the label that were already provided in a lower-bound binary ladder from the same log entry are omitted.¶
Users verify that the version has not unexpectedly increased or decreased, and that the binary ladder terminates in way that's consistent with the provided version being the greatest that exists. Importantly, users also verify that they receive a binary ladder for the distinguished log entry immediately following the one they've advertised, the distinguished log entry immediately following that one, and so on. The Transparency Log provides whichever intermediate timestamps are necessary to demonstrate that this is the case. To avoid overloading itself, the Transparency Log has the option to limit the number of distinguished log entries it provides binary ladders for in a single response.¶
If the user is monitoring the label for the first time since it was created, they advertise the first distinguished log entry to the left of the first log entry to contain the label. The Transparency Log provides binary ladders for subsequent distinguised log entries.¶
Users often wish to search for the "most recent" version, or the greatest version, of a label. Unlike searches for a specific version, label owners regularly verify that their most recent version is correctly represented in the log. This enables a simpler, more efficient approach to searching.¶
Section 6.1 and Section 6.2 define the concept of a distinguished log entry, which is any log entry that label owners are required to check for correctness. As a result, users can start their search at the rightmost distinguished log entry and only consider new versions which have been created since then. The rightmost distinguished log entry will always be on the frontier of the log and will never be past its maximum lifetime.¶
To perform a greatest-version search, the Transparency Log provides the greatest version of the label that exists. It then provides a binary ladder, with the greatest version as the target, from the rightmost distinguished log entry. If there is no distinguished log entry yet, the binary ladder is provided from the root instead. From this log entry, the Transparency Log then proceeds down the remainder of the frontier: the starting log entry's right child, the right child's right child, and so on until reaching the last log entry. From each of these log entries, a binary ladder targeting the label's greatest version is provided.¶
As in Section 5, users verify that the log entry timestamps and the binary ladders from each log entry each represent a monotonically-increasing series. Users additionally verify that the binary ladder from the rightmost log entry terminates in a way that is consistent with the target version being the greatest that exists. If this verification is successful, users move on to opening the commitment for whichever label-version pair was identified as the greatest.¶
If the starting log entry was not distinguished or if the starting log entry did not contain the greatest version of the label, the user may be obligated to monitor the label in the future, per Section 6.1.¶
Each Transparency Log uses a single fixed ciphersuite, chosen when the log is initially created, that specifies the following primitives and parameters to be used for cryptographic computations:¶
A hash algorithm¶
A signature algorithm¶
A Verifiable Random Function (VRF) algorithm¶
Nc
: The size in bytes of commitment openings¶
Kc
: A fixed string of bytes used in the computation of commitments¶
The hash algorithm is used for computing the intermediate and root values of hash trees. The signature algorithm is used for signatures from both the service operator and the third party, if one is present. The VRF is used for preserving the privacy of labels. One of the VRF algorithms from [RFC9381] must be used.¶
Ciphersuites are represented with the CipherSuite type. The ciphersuites are defined in Section 13.1.¶
The head of a Transparency Log, which represents the log's most recent state, is represented as:¶
struct { uint64 tree_size; opaque signature<0..2^16-1>; } TreeHead;¶
where tree_size
counts the number of leaves of the log tree. If the
Transparency Log is deployed with Third-party Management, then the public key
used to verify the signature belongs to the third-party manager; otherwise the
public key used belongs to the service operator.¶
The signature itself is computed over a TreeHeadTBS
structure which
incorporates the log's current state as well as long-term log configuration:¶
enum { reserved(0), contactMonitoring(1), thirdPartyManagement(2), thirdPartyAuditing(3), (255) } DeploymentMode; struct { CipherSuite ciphersuite; DeploymentMode mode; opaque signature_public_key<0..2^16-1>; opaque vrf_public_key<0..2^16-1>; select (Configuration.mode) { case contactMonitoring: case thirdPartyManagement: opaque leaf_public_key<0..2^16-1>; case thirdPartyAuditing: opaque auditor_public_key<0..2^16-1>; }; uint64 max_ahead; unit64 max_behind; uint64 reasonable_monitoring_window; optional<uint64> maximum_lifetime; } Configuration; struct { Configuration config; uint64 tree_size; opaque root[Hash.Nh]; } TreeHeadTBS;¶
The max_ahead
and max_behind
fields contain the maximum amount of time in
milliseconds that a tree head may be ahead of or behind the user's local clock
without being rejected. The reasonable_monitoring_window
contains the
Reasonable Monitoring Window, defined in Section 6.1, in
milliseconds. If the Transparency Log has chosen to define a maximum lifetime
for log entries, per Section 5.2, this duration in milliseconds is
stored in the maximum_lifetime
field.¶
Finally, Hash.Nh
is the output size of the ciphersuite hash function in bytes.¶
The updates committed to by the prefix tree contain the new value of a label, along with additional information depending on the deployment mode of the Transparency Log. They are serialized as follows:¶
struct { select (Configuration.mode) { case thirdPartyManagement: opaque signature<0..2^16-1>; }; } UpdatePrefix; struct { UpdatePrefix prefix; opaque value<0..2^32-1>; } UpdateValue;¶
The value
field contains the new value associated with the label.¶
In the event that third-party management is used, the prefix
field contains a
signature from the service operator, using the public key from
Configuration.leaf_public_key
, over the following structure:¶
struct { opaque label<0..2^8-1>; uint32 version; opaque value<0..2^32-1>; } UpdateTBS;¶
The label
field contains the label being updated, version
contains the new
version, and value
contains the same contents as UpdateValue.value
. Clients
MUST successfully verify this signature before consuming UpdateValue.value
.¶
As discussed in Section 3.4, commitments are stored in the leaves of the
prefix tree rather than raw UpdateValue
structures. Commitments are computed
with HMAC [RFC2104], using the hash function specified by the ciphersuite. To
produce a new commitment, the application generates a random Nc
-byte value
called opening
and computes:¶
commitment = HMAC(Kc, CommitmentValue)¶
where Kc
is a string of bytes defined by the ciphersuite and CommitmentValue
is specified as:¶
struct { opaque opening[Nc]; opaque label<0..2^8-1>; UpdateValue update; } CommitmentValue;¶
The label
field of CommitmentValue contains the label being updated and the
update
field contains the new value for the label. The output value
commitment
may be published, while opening
should only be revealed to users
that are authorized to receive the label's contents.¶
The Transparency Log MAY generate opening
in a programmatic way. However, it
SHOULD ensure that opening
can later be deleted and not feasibly recovered.
This preserves the Transparency Log's ability to delete certain information in
compliance with privacy laws.¶
Each label-version pair created will have a unique representation in the prefix tree. This is computed by providing the combined label and version as inputs to the VRF:¶
struct { opaque label<0..2^8-1>; uint32 version; } VrfInput;¶
The VRF's output evaluated on VrfInput
is the concrete value inserted into the
prefix tree.¶
The leaf and parent nodes of a log tree are serialized as:¶
struct { uint64 timestamp; opaque prefix_tree[Hash.Nh]; } LogLeaf; struct { opaque value[Hash.Nh]; } LogParent;¶
The timestamp
field contains the timestamp that the leaf was created in
milliseconds since the Unix epoch. The prefix_tree
field contains the new root
hash of the prefix tree after inserting any new desired entries.¶
The value of a parent node is computed by hashing together the values of its left and right children:¶
parent.value = Hash(hashContent(parent.leftChild) || hashContent(parent.rightChild)) hashContent(node): if node.type == leafNode: return 0x00 || nodeValue(node) else if node.type == parentNode: return 0x01 || nodeValue(node) nodeValue(node): if node.type == leafNode: return Hash(node.timestamp || node.prefix_tree) else if node.type == parentNode: return node.value¶
where Hash
denotes the ciphersuite hash function.¶
The leaf nodes of a prefix tree are serialized as:¶
struct { opaque vrf_output[VRF.Nh]; opaque commitment[Hash.Nh]; } PrefixLeaf;¶
where vrf_output
is the VRF output for the label-version pair, VRF.Nh
is the
output size of the ciphersuite VRF in bytes, and commitment
is the commitment
to the corresponding UpdateValue
structure.¶
The parent nodes of a prefix tree are serialized as:¶
struct { opaque value[Hash.Nh]; } PrefixParent;¶
The value of a parent node is computed by hashing together the values of its left and right children:¶
parent.value = Hash(0x01 || nodeValue(parent.leftChild) || nodeValue(parent.rightChild)) nodeValue(node): if node.type == emptyNode: return 0 // all-zero vector of length Hash.Nh else if node.type == leafNode: return Hash(0x00 || node.vrf_output || node.commitment) else if node.type == parentNode: return node.value¶
The inclusion of some leaf in a tree head, or consistency between two tree heads, is proven by providing the smallest set of intermediate nodes from the log tree that allows the user to compute the tree's root hash from the leaf or other intermediate node values they already have. Such a proof is encoded as:¶
opaque NodeValue[Hash.Nh]; struct { NodeValue elements<0..2^16-1>; } InclusionProof;¶
Each NodeValue
is a uniform size, computed by passing the relevant LogLeaf
or LogParent
structures through the nodeValue
function in
Section 9.5. The contents of the elements
array is kept in
left-to-right order: if a node is present in the root's left subtree, its value
must be listed before any values provided from nodes that are in the root's
right subtree, and so on recursively.¶
Additionally, each NodeValue
corresponds to a balanced subtree of the log tree. If
an intermediate node's value needs to be provided to satisfy the verifier, but
the node is a non-balanced subtree, the values of the node's descendant full
subtrees are provided instead.¶
A proof from a prefix tree authenticates that a search was done correctly for a given search key. Such a proof is encoded as:¶
enum { reserved(0), inclusion(1), nonInclusionLeaf(2), nonInclusionParent(3), } PrefixSearchResultType; struct { PrefixSearchResultType result_type; select (PrefixSearchResult.result_type) { case nonInclusionLeaf: PrefixLeaf leaf; }; uint8 depth; } PrefixSearchResult; struct { PrefixSearchResult results<0..2^8-1>; NodeValue elements<0..2^16-1>; } PrefixProof;¶
The results
field contains the search result for each individual value. It is
sorted lexicographically by search key (which is always a VRF output in this
protocol). The result_type
field of each PrefixSearchResult
struct indicates
what the terminal node of the search for that value was:¶
inclusion
for a leaf node matching the requested value.¶
nonInclusionLeaf
for a leaf node not matching the requested value. In this
case, the terminal node's value is provided since it can not be inferred.¶
nonInclusionParent
for a parent node that lacks the desired child.¶
The depth
field indicates the depth of the terminal node of the search, and is
provided to assist proof verification.¶
The elements
array consists of the fewest node values that can be hashed
together with the provided leaves to produce the root. The contents of the
elements
array is kept in left-to-right order: if a node is present in the
root's left subtree, its value must be listed before any values provided from
nodes that are in the root's right subtree, and so on recursively. In the event
that a node is not present, an all-zero byte string of length Hash.Nh
is
listed instead.¶
The proof is verified by hashing together the provided elements, in the left/right arrangement dictated by the bits of the search keys, and checking that the result equals the root value of the prefix tree.¶
As users execute the algorithms for searching, monitoring, or updating their
view of the tree, they inspect a series of leaves in the log tree. For some of
these leaves, only the timestamp of the log entry is needed. For other leaves,
both the timestamp and a PrefixProof
from the log entry's prefix tree are
needed.¶
This subsection defines a general structure, called a CombinedTreeProof
, that
contains the minimum set of timestamps and PrefixProof
structures that a user
needs for their execution of these algorithms. For the purpose of this protocol,
the user always executes the algorithm to update their view of the tree,
described in Section 4, followed immediately by one of the
algorithms to search or monitor the current tree.¶
Proofs are encoded as follows:¶
struct { uint64 timestamps<0..2^8-1>; PrefixProof prefix_proofs<0..2^8-1>; NodeValue prefix_roots<0..2^8-1>; } CombinedTreeProof;¶
The elements of the timestamps
field are the timestamps of log entries, and
the elements of the prefix_proofs
field are search proofs from the prefix
trees at particular log entries. There is no explicit indication as to which log
entry the elements correspond to, as they are provided in the order that the
algorithm the user is executing would request them. The elements of the
prefix_roots
field are, in left-to-right order, the prefix tree root
hashes for any log entries whose timestamp was provided in timestamps
but a
search proof was not provided in prefix_proofs
.¶
If a log entry's timestamp is referenced multiple times, it is only added to
timestamps
the first time. Additionally, when a user advertises a
previously-observed tree size in their request, log entry timestamps that the
user is expected to have retained are excluded from timestamps
.¶
The prefix_proofs
array differs from the timestamps
array in two important
ways. First, it is possible for multiple PrefixProof
structures from the same log entry to appear in the
prefix_proofs
array if the same log entry is referenced multiple times. Users MUST verify that all
PrefixProof
structures corresponding to the same log entry compute the same
prefix tree root hash. Second, while every log entry with a timestamp in
timestamps
will also be referenced in either prefix_proofs
or
prefix_roots
, the inverse is not true. There may be elements of
prefix_proofs
or prefix_roots
that correspond to log entries that are not in
timestamps
if the user is expected to have retained the log entry's timestamp.¶
Users processing a CombinedTreeProof
MUST verify that each field contains
exactly the expected number of entries -- no more and no less.¶
For a user to update their view of the tree, the following is provided:¶
If the user has not previously observed a tree head, the timestamp of each log entry along the frontier.¶
If the user has previously observed a tree head, the timestamps of each log entry from the list computed in Section 4.2.¶
Users verify that the timestamps represent a monotonic series, and that the
rightmost timestamp is within the bounds defined by max_ahead
and
max_behind
.¶
For a user to search the combined tree for a specific version of a label, the following is provided:¶
For each log entry touched by the algorithm in Section 5.3:¶
The log entry's timestamp.¶
If the log entry has surpassed its maximum lifetime and is on the frontier, the right child's timestamp.¶
If it is not the case that the log entry has surpassed its maximum lifetime,
is on the frontier, and the log entry's right child has also surpassed its
maximum lifetime, then a PrefixProof
corresponding to a binary ladder in
the log entry's prefix tree is provided.¶
If the PrefixProof
from the first log entry containing the target label-version
pair didn't include a lookup for the target version, provide a second PrefixProof
from this
log entry specifically looking up the target version.¶
Users verify the output as specified in Section 5.3.¶
For a user to monitor a label in the combined tree, the following is provided:¶
For each entry in the user's monitoring map:¶
The timestamps needed by the algorithm in Section 6.2 to determine where the monitoring algorithm would first reach a distinguished log entry. This may either be the log entry in the user's monitoring map, or some other log entry from the list computed in step 2 of Section 6.4.¶
Where necessary for the algorithm in Section 6.4, a lower-bound binary ladder targeting the version in the user's monitoring map.¶
If the user owns the label:¶
The timestamps needed by the algorithm in Section 6.2 to conduct a depth-first search for each subsequent distinguished log entry.¶
For each distinguished log entry, a binary ladder targeting the greatest version of the label that the log entry contains.¶
For a user to search the combined tree for the greatest version of a label, the following is provided:¶
For each log entry along the frontier, starting from the log entry identified
in Section 7: a PrefixProof
corresponding to a binary
ladder.¶
Note that the log entry timestamps are already provided as part of updating the user's view of the tree, and that no additional timestamps are necessary to identify the starting log entry. Users verify the proof as described in Section 7.¶
The basic user operations are organized as a request-response protocol between a user and the Transparency Log operator.¶
Users MUST retain the most recent TreeHead
they've successfully
verified as part of any query response, and populate the last
field of any
query request with the tree_size
from this TreeHead
. This ensures that all
operations performed by the user return consistent results.¶
struct { TreeHead tree_head; select (Configuration.mode) { case thirdPartyAuditing: AuditorTreeHead auditor_tree_head; }; } FullTreeHead;¶
Modifications to a user's state MUST only be persisted once the query response has been fully verified. Queries that fail full verification MUST NOT modify the user's protocol state in any way.¶
Users initiate a Search operation by submitting a SearchRequest to the Transparency Log containing the label that they're interested in. Users can optionally specify a version of the label that they'd like to receive, if not the most recent one.¶
struct { optional<uint32> last; opaque label<0..2^8-1>; optional<uint32> version; } SearchRequest;¶
In turn, the Transparency Log responds with a SearchResponse structure:¶
struct { opaque proof[VRF.Np]; opaque commitment[Hash.Nh]; } BinaryLadderStep; struct { FullTreeHead full_tree_head; optional<uint32> version; BinaryLadderStep binary_ladder<0..2^8-1>; CombinedTreeProof search; InclusionProof inclusion; opaque opening[Nc]; UpdateValue value; } SearchResponse;¶
Each BinaryLadderStep
structure contains information related to one version of
the label that's in the binary ladder. The proof
field contains the VRF
proof, and commitment
contains the commitment to the label's value at that
version. The binary_ladder
field contains these structures in the same order
that the versions are output by the algorithm in Section 5.1.¶
The search
field contains the output of updating the user's view of the tree
to match FullTreeHead.tree_head.size
followed by either a fixed-version or
greatest-version search for the requested label, depending on whether version
was provided in SearchRequest
or not. If searching for the greatest version of
the label, this version is provided in SearchResponse.version
; otherwise, the
field is empty.¶
The inclusion
field contains a proof of inclusion for all of the log tree
leaves where either a search proof was provided in
search.prefix_proofs
or the prefix tree root hash was provided
directly in search.prefix_roots
. If the user advertised a
previously-observed tree size in last
, the proof in inclusion
also functions
as a proof of consistency.¶
Users verify a search response by following these steps:¶
Compute the VRF output for each version of the label from the proofs in
binary_ladder
.¶
Verify the proof in search
as described in Section 10.3.¶
Compute a candidate root value for the tree from the proof in inclusion
,
the hashes of log entries used in search
, and any previously-retained full
subtrees of the log tree.¶
With the candidate root value for the tree, verify FullTreeHead
.¶
Verify that the commitment to the target version of the label opens to
SearchResponse.value
with opening SearchResponse.opening
.¶
Depending on the deployment mode of the Transparency Log, the value
field may
or may not require additional verification, specified in Section 9.2,
before its contents may be consumed.¶
Users initiate an Update operation by submitting an UpdateRequest to the Transparency Log containing the new label and value to store.¶
struct { optional<uint32> last; opaque label<0..2^8-1>; opaque value<0..2^32-1>; } UpdateRequest;¶
If the request passes application-layer policy checks, the Transparency Log adds a new label-version pair to the prefix tree, followed by adding a new entry to the log tree with an updated timestamp and prefix tree root. It returns an UpdateResponse structure:¶
struct { FullTreeHead full_tree_head; BinaryLadderStep binary_ladder<0..2^8-1>; CombinedTreeProof search; InclusionProof inclusion; opaque opening[Nc]; UpdatePrefix prefix; } UpdateResponse;¶
Users verify the UpdateResponse as if it were a SearchResponse for the most
recent version of label
. To aid verification, the update response
provides the UpdatePrefix
structure necessary to reconstruct the
UpdateValue
.¶
Users initiate a Monitor operation by submitting a MonitorRequest to the Transparency Log containing information about the labels they wish to monitor.¶
struct { uint64 position; uint32 version; } MonitorMapEntry; struct { opaque label<0..2^8-1>; MonitorMapEntry entries<0..2^8-1>; optional<uint64> rightmost; } MonitorLabel; struct { optional<uint32> last; MonitorLabel labels<0..2^8-1>; } MonitorRequest;¶
Each MonitorLabel structure in labels
contains the label to monitor in
label
, and a list in the entries
field corresponding to the map described in
Section 6.4. If the user owns the label, they additionally indicate in
rightmost
the position of the rightmost distinguished log entry where they
have verified that the greatest version of the label is correctly represented.¶
The Transparency Log verifies the MonitorRequest by following these steps, for
each MonitorLabel
structure:¶
Verify that the label
field of every MonitorLabel is unique. For all
MonitorLabel structures with rightmost
provided, verify that the user owns
the label (according to application-layer policy). For all other MonitorLabel
structures, verify that the user is currently, or was previously, allowed to
lookup all versions of the label contained in a MonitorMapEntry.¶
Verify that each MonitorMapEntry in the same MonitorLabel structure is sorted
in ascending order by position
. Additionally, verify that each version
field is unique and that position
lies on the direct path of the first log
entry to contain version version
of the label.¶
Verify that rightmost
is a distinguished log entry to the right of
the first version of the label, or that it was the rightmost distinguished
log entry immediately after the label was first inserted.¶
While access control decisions generally belong solely to the application, users must be able to monitor versions of a label they previously looked up, even if they would no longer be allowed to make the same query. One simple way for a user to prove that they were previously allowed to lookup a particular version of a label would be for them to provide the commitment opening for the version. However, there is no provision for this in the protocol; it would need to be done in the application layer.¶
If the request is valid and passes access control, the Transparency Log responds with a MonitorResponse structure:¶
struct { uint32 versions<0..2^8-1>; } MonitorLabelVersions; struct { FullTreeHead full_tree_head; MonitorLabelVersions label_versions<0..2^8-1>; CombinedTreeProof monitor; InclusionProof inclusion; } MonitorResponse;¶
The monitor
field contains the output of updating the user's view of the tree
to match FullTreeHead.tree_head.size
followed by monitoring each label in
labels
, in the order provided. Each MonitorLabel structure where rightmost
was present has a corresponding entry in label_versions
containing the
greatest version of the label present in a number of subsequent distinguished
log entries.¶
The inclusion
field contains a proof of inclusion for all of the log tree
leaves where either a search proof was provided in
CombinedTreeProof.prefix_proofs
or the prefix tree root hash was provided
directly in CombinedTreeProof.prefix_roots
. If the user advertised a
previously-observed tree size in last
, the proof in inclusion
also functions
as a proof of consistency.¶
Users verify a MonitorResponse by following these steps:¶
Verify that the number of entries in label_versions
is equal to the number
of MonitorLabel structures in labels
with rightmost
present. If a
MonitorLabel has a rightmost
field that is not the rightmost distinguished
log entry, verify that the corresponding MonitorLabelVersion's versions
field is not empty.¶
Verify the proof in monitor
as described in Section 10.3.¶
Compute a candidate root value for the tree from the proof in inclusion
,
the hashes of log entries used in search
, and any previously-retained full
subtrees of the log tree.¶
With the candidate root value for the tree, verify FullTreeHead
.¶
Some information is omitted from MonitorResponse in the interest of efficiency, due to the fact that the user would have already seen and verified it as part of conducting other queries. In particular, VRF proofs for different versions of each label are not provided, given that these can be cached from the original Search or Update query.¶
This document requests the creation of the following new IANA registries:¶
KT Ciphersuites (Section 13.1)¶
All of these registries should be under a heading of "Key Transparency", and assignments are made via the Specification Required policy [RFC8126]. See Section 13.2 for additional information about the KT Designated Experts (DEs).¶
RFC EDITOR: Please replace XXXX throughout with the RFC number assigned to this document¶
uint16 CipherSuite;¶
The following Python code demonstrates efficient algorithms for navigating the implicit binary search tree:¶
# The exponent of the largest power of 2 less than x. Equivalent to: # int(math.floor(math.log(x, 2))) def log2(x): if x == 0: return 0 k = 0 while (x >> k) > 0: k += 1 return k-1 # The level of a node in the tree. Leaves are level 0, their parents # are level 1, etc. If a node's children are at different levels, # then its level is the max level of its children plus one. def level(x): if x & 0x01 == 0: return 0 k = 0 while ((x >> k) & 0x01) == 1: k += 1 return k # The root index of a search if the log has `n` entries. def root(n): return (1 << log2(n)) - 1 # The left child of an intermediate node. def left(x): k = level(x) if k == 0: raise Exception('leaf node has no children') return x ^ (0x01 << (k - 1)) # The right child of an intermediate node. def right(x, n): k = level(x) if k == 0: raise Exception('leaf node has no children') x = x ^ (0x03 << (k - 1)) while x >= n: x = left(x) return x¶