Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding Usage Scenarios #25

Merged
merged 17 commits into from
Sep 10, 2024
Merged

Adding Usage Scenarios #25

merged 17 commits into from
Sep 10, 2024

Conversation

henkbirkholz
Copy link
Member

@henkbirkholz henkbirkholz commented Aug 28, 2024

Fix #17

@henkbirkholz henkbirkholz requested a review from letmaik as a code owner August 28, 2024 12:31
@@ -54,14 +57,35 @@ This document defines a CBOR Signing And Encrypted (COSE) header parameter for i
RFC 3161 {{-TSA}} provides a method to timestamp a message digest to prove that it was created before a given time.

This document defines a new CBOR Object Signing and Encryption (COSE) {{-COSE}} header parameter that carries the TimestampToken (TST) output of RFC 3161, thus allowing existing and widely deployed trust infrastructure to be used with COSE structures used for signing (COSE_Sign and COSE_Sign1).
To motivate the two different modes of use that are specified in this documents, two usage scenarios are illustrated in {{use-one}} and {{use-two}} below.
{{sec-timestamp-then-cose}} and {{sec-cose-then-timestamp}} then define the corresponding modes of use.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd split this into two and add the respective bits to the last line of the use case sections.

draft-birkholz-cose-tsa-tst-header-parameter.md Outdated Show resolved Hide resolved
To motivate the two different modes of use that are specified in this documents, two usage scenarios are illustrated in {{use-one}} and {{use-two}} below.
{{sec-timestamp-then-cose}} and {{sec-cose-then-timestamp}} then define the corresponding modes of use.

## Usage Scenario 1: A TST Included in Signed PDF Documents {#use-one}
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ETITLETOOLONG :-D

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sarcasm aside, I will propose text.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❤️


## Usage Scenario 1: A TST Included in Signed PDF Documents {#use-one}

In support of legal assurances, the quality of a signed PDF document can be improved by including a trustworthy signed timestamp.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"quality" doesn't sound like the right word

## Usage Scenario 1: A TST Included in Signed PDF Documents {#use-one}

In support of legal assurances, the quality of a signed PDF document can be improved by including a trustworthy signed timestamp.
In essence, a PDF signer wants to strengthen the assertion that a PDF was not signed before a certain point in time ("the signature cannot be older than").
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I find this a bit hard to digest.

You want to prove that "a certain document existed at a certain date" in a way that can't be disputed by a relying party.


This usage scenario motivates the "Timestamp then COSE" mode below.

## Usage Scenario 2: Registering a Signed Statement at a Transparency Service {#use-two}
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ditto

Signed-off-by: Thomas Fossati <[email protected]>
Copy link
Collaborator

@thomas-fossati thomas-fossati left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

given enough guidance you can pass as an artist ;)

@thomas-fossati thomas-fossati merged commit 591f55d into main Sep 10, 2024
0 of 2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

add use cases
3 participants