<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title type="text">I-D list for Javascript Object Signing and Encryption RSS Feed</title>
    <subtitle type="text">Document changes</subtitle>
    <id>urn:uuid:43a6d937-971d-5fe3-afe9-324e1769d3c2</id>
    <updated>2026-03-11T07:33:56.844331+00:00</updated>
    <link rel="alternate" type="text/html" hreflang="en" href="https://datatracker.ietf.org/"/>
    <link rel="self" type="application/atom+xml" href="https://datatracker.ietf.org/group/jose/documents/feed/"/>

    
    <entry>
        
        <title>JOSE HPKE PQ &amp; PQ/T Algorithm Registrations</title>
        

        <link href="/doc/draft-skokan-jose-hpke-pq-pqt/"/>

        <id>urn:datatracker-ietf-org:event:1128084</id>
        
        <updated>2026-03-06T07:48:20.444553+00:00</updated>
        
        <published>2026-03-06T07:48:20.444553+00:00</published>
        
        <author>
            <name>Filip Skokan</name>
        </author>

        <content type="html">Changed document external resources from: None to:&lt;br&gt;&lt;br&gt;github_repo https://github.com/panva/draft-jose-hpke-pq-pqt</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_document</type>
          
          <group>none</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1127453</id>
        
        <updated>2026-03-03T08:45:29.641728+00:00</updated>
        
        <published>2026-03-03T08:45:29.641728+00:00</published>
        
        <author>
            <name>Michael P</name>
        </author>

        <content type="html"># Document Shepherd Write-Up for Group Documents&lt;br&gt;&lt;br&gt;*This version is dated 4 July 2022.*&lt;br&gt;&lt;br&gt;Thank you for your service as a document shepherd. Among the responsibilities is&lt;br&gt;answering the questions in this write-up to give helpful context to Last Call&lt;br&gt;and Internet Engineering Steering Group ([IESG][1]) reviewers, and your&lt;br&gt;diligence in completing it is appreciated. The full role of the shepherd is&lt;br&gt;further described in [RFC 4858][2]. You will need the cooperation of the authors&lt;br&gt;and editors to complete these checks.&lt;br&gt;&lt;br&gt;Note that some numbered items contain multiple related questions; please be sure&lt;br&gt;to answer all of them.&lt;br&gt;&lt;br&gt;## Document History&lt;br&gt;&lt;br&gt;1. Does the working group (WG) consensus represent the strong concurrence of a&lt;br&gt;   few individuals, with others being silent, or did it reach broad agreement?&lt;br&gt;&lt;br&gt;The document has received reviews on mailing lists and GitHub from a range of individuals. Thorough review was prompted by a first WGLC in June 2025, which did not pass but led to a number of issues being raised and rectified. Broad agreement was reached during the second WGLC in February 2026. There has been suggestion to include PQC algorithms in this draft, but broad agreement to do that in a separate draft.   &lt;br&gt;&lt;br&gt;2. Was there controversy about particular points, or were there decisions where&lt;br&gt;   the consensus was particularly rough?&lt;br&gt;&lt;br&gt;Some points involved deep discussion, including the formation of a design team. These were settled and agreed upon without controversy. &lt;br&gt;&lt;br&gt;3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If&lt;br&gt;   so, please summarize the areas of conflict in separate email messages to the&lt;br&gt;   responsible Area Director. (It should be in a separate email because this&lt;br&gt;   questionnaire is publicly available.)&lt;br&gt;&lt;br&gt;No threats of appeal &lt;br&gt;&lt;br&gt;4. For protocol documents, are there existing implementations of the contents of&lt;br&gt;   the document? Have a significant number of potential implementers indicated&lt;br&gt;   plans to implement? Are any existing implementations reported somewhere,&lt;br&gt;   either in the document itself (as [RFC 7942][3] recommends) or elsewhere&lt;br&gt;   (where)?&lt;br&gt;&lt;br&gt;Yes, mailing list discussion highlights multiple interoperable implementations. &lt;br&gt;&lt;br&gt;## Additional Reviews&lt;br&gt;&lt;br&gt;5. Do the contents of this document closely interact with technologies in other&lt;br&gt;   IETF working groups or external organizations, and would it therefore benefit&lt;br&gt;   from their review? Have those reviews occurred? If yes, describe which&lt;br&gt;   reviews took place.&lt;br&gt;&lt;br&gt;Yes, the document is closely aligned with a corresponding draft in the COSE WG. The WGLC&#x27;s were run concurrently to ensure consistent review from both WGs. The HPKE WG also provided review earlier in the development of the document. &lt;br&gt;&lt;br&gt;6. Describe how the document meets any required formal expert review criteria,&lt;br&gt;   such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.&lt;br&gt;&lt;br&gt;Not required. &lt;br&gt;&lt;br&gt;7. If the document contains a YANG module, has the final version of the module&lt;br&gt;   been checked with any of the [recommended validation tools][4] for syntax and&lt;br&gt;   formatting validation? If there are any resulting errors or warnings, what is&lt;br&gt;   the justification for not fixing them at this time? Does the YANG module&lt;br&gt;   comply with the Network Management Datastore Architecture (NMDA) as specified&lt;br&gt;   in [RFC 8342][5]?&lt;br&gt;&lt;br&gt;N/A&lt;br&gt;&lt;br&gt;8. Describe reviews and automated checks performed to validate sections of the&lt;br&gt;   final version of the document written in a formal language, such as XML code,&lt;br&gt;   BNF rules, MIB definitions, CBOR&#x27;s CDDL, etc.&lt;br&gt;&lt;br&gt;N/A&lt;br&gt;&lt;br&gt;## Document Shepherd Checks&lt;br&gt;&lt;br&gt;9. Based on the shepherd&#x27;s review of the document, is it their opinion that this&lt;br&gt;   document is needed, clearly written, complete, correctly designed, and ready&lt;br&gt;   to be handed off to the responsible Area Director?&lt;br&gt;&lt;br&gt;Yes, the document is clearly written (including a glossary of terms), complete, correct, and ready to be handed to the responsible AD. &lt;br&gt;&lt;br&gt;10. Several IETF Areas have assembled [lists of common issues that their&lt;br&gt;    reviewers encounter][6]. For which areas have such issues been identified&lt;br&gt;    and addressed? For which does this still need to happen in subsequent&lt;br&gt;    reviews?&lt;br&gt;&lt;br&gt;This draft focuses on considerations highlighted by the Security Area and includes this discussion in the Security Considerations section. No further reviews are required.  &lt;br&gt;&lt;br&gt;11. What type of RFC publication is being requested on the IETF stream ([Best&lt;br&gt;    Current Practice][12], [Proposed Standard, Internet Standard][13],&lt;br&gt;    [Informational, Experimental or Historic][14])? Why is this the proper type&lt;br&gt;    of RFC? Do all Datatracker state attributes correctly reflect this intent?&lt;br&gt;&lt;br&gt;This document is requesting Proposed Standard publication. This consistent with the other JOSE specifications and is accurate in Datatracker.   &lt;br&gt;&lt;br&gt;12. Have reasonable efforts been made to remind all authors of the intellectual&lt;br&gt;    property rights (IPR) disclosure obligations described in [BCP 79][7]? To&lt;br&gt;    the best of your knowledge, have all required disclosures been filed? If&lt;br&gt;    not, explain why. If yes, summarize any relevant discussion, including links&lt;br&gt;    to publicly-available messages when applicable.&lt;br&gt;&lt;br&gt;Post sent to mailing list. So far one response confirming no known IPR https://mailarchive.ietf.org/arch/msg/jose/LhVj_YvFYBAWBDOV4z4RL7qtx80/&lt;br&gt;&lt;br&gt;13. Has each author, editor, and contributor shown their willingness to be&lt;br&gt;    listed as such? If the total number of authors and editors on the front page&lt;br&gt;    is greater than five, please provide a justification.&lt;br&gt;&lt;br&gt;Yes, they have. There are 5 authors at time of writing. &lt;br&gt;&lt;br&gt;14. Document any remaining I-D nits in this document. Simply running the [idnits&lt;br&gt;    tool][8] is not enough; please review the [&quot;Content Guidelines&quot; on&lt;br&gt;    authors.ietf.org][15]. (Also note that the current idnits tool generates&lt;br&gt;    some incorrect warnings; a rewrite is underway.)&lt;br&gt;&lt;br&gt;One nit with a reference as a later version (-22) exists of draft-ietf-cose-hpke-21. These drafts are proceeding through WGLC concurrently, so this can be rectified. &lt;br&gt;&lt;br&gt;15. Should any informative references be normative or vice-versa? See the [IESG&lt;br&gt;    Statement on Normative and Informative References][16].&lt;br&gt;&lt;br&gt;References are correct. &lt;br&gt;&lt;br&gt;&lt;br&gt;16. List any normative references that are not freely available to anyone. Did&lt;br&gt;    the community have sufficient access to review any such normative&lt;br&gt;    references?&lt;br&gt;&lt;br&gt;All normative references are freely available. &lt;br&gt;&lt;br&gt;&lt;br&gt;17. Are there any normative downward references (see [RFC 3967][9] and [BCP&lt;br&gt;    97][10]) that are not already listed in the [DOWNREF registry][17]? If so,&lt;br&gt;    list them.&lt;br&gt;&lt;br&gt;None&lt;br&gt;&lt;br&gt;18. Are there normative references to documents that are not ready to be&lt;br&gt;    submitted to the IESG for publication or are otherwise in an unclear state?&lt;br&gt;    If so, what is the plan for their completion?&lt;br&gt;&lt;br&gt;Normative reference to https://datatracker.ietf.org/doc/html/draft-ietf-hpke-hpke-02. This draft has been through WGLC but is being held to publish with https://datatracker.ietf.org/doc/draft-ietf-hpke-pq/, which itself is waiting on drafts from CFRG. &lt;br&gt;&lt;br&gt;Discussion of timelines are on HPKE mailing list  https://mailarchive.ietf.org/arch/msg/hpke/5bCbbTB5wkgtB9wjCaufBsdAMpk/&lt;br&gt;&lt;br&gt;19. Will publication of this document change the status of any existing RFCs? If&lt;br&gt;    so, does the Datatracker metadata correctly reflect this and are those RFCs&lt;br&gt;    listed on the title page, in the abstract, and discussed in the&lt;br&gt;    introduction? If not, explain why and point to the part of the document&lt;br&gt;    where the relationship of this document to these other RFCs is discussed.&lt;br&gt;&lt;br&gt;This specification updates RFC 7516. This is highlighted in the title, abstract, introduction, and a standalone section to state the changes.  &lt;br&gt;&lt;br&gt;20. Describe the document shepherd&#x27;s review of theANA considerations section,&lt;br&gt;    especially with regard to its consistency with the body of the document.&lt;br&gt;    Confirm that all aspects of the document requiring IANA assignments are&lt;br&gt;    associated with the appropriate reservations in IANA registries. Confirm&lt;br&gt;    that any referenced IANA registries have been clearly identified. Confirm&lt;br&gt;    that each newly created IANA registry specifies its initial contents,&lt;br&gt;    allocations procedures, and a reasonable name (see [RFC 8126][11]).&lt;br&gt;&lt;br&gt;The IANA Considerations section is consistent with the rest of the document and complete. IANA registries have been identified. Contents, procedures and reasonable name are included and agreed upon by WG.  &lt;br&gt;&lt;br&gt;21. List any new IANA registries that require Designated Expert Review for&lt;br&gt;    future allocations. Are the instructions to the Designated Expert clear?&lt;br&gt;    Please include suggestions of designated experts, if appropriate.&lt;br&gt;&lt;br&gt;Not required. &lt;br&gt;&lt;br&gt;[1]: https://www.ietf.org/about/groups/iesg/&lt;br&gt;[2]: https://www.rfc-editor.org/rfc/rfc4858.html&lt;br&gt;[3]: https://www.rfc-editor.org/rfc/rfc7942.html&lt;br&gt;[4]: https://wiki.ietf.org/group/ops/yang-review-tools&lt;br&gt;[5]: https://www.rfc-editor.org/rfc/rfc8342.html&lt;br&gt;[6]: https://wiki.ietf.org/group/iesg/ExpertTopics&lt;br&gt;[7]: https://www.rfc-editor.org/info/bcp79&lt;br&gt;[8]: https://www.ietf.org/tools/idnits/&lt;br&gt;[9]: https://www.rfc-editor.org/rfc/rfc3967.html&lt;br&gt;[10]: https://www.rfc-editor.org/info/bcp97&lt;br&gt;[11]: https://www.rfc-editor.org/rfc/rfc8126.html&lt;br&gt;[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5&lt;br&gt;[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1&lt;br&gt;[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2&lt;br&gt;[15]: https://authors.ietf.org/en/content-guidelines-overview&lt;br&gt;[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/&lt;br&gt;[17]: https://datatracker.ietf.org/doc/downref/&lt;br&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_protocol_writeup</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Algorithms</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-algorithms/"/>

        <id>urn:datatracker-ietf-org:event:1127195</id>
        
        <updated>2026-03-02T22:44:15.121370+00:00</updated>
        
        <published>2026-03-02T22:44:15.121370+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-jose-json-proof-algorithms-13.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
	  <abstract>   The JSON Proof Algorithms (JPA) specification registers cryptographic
   algorithms and identifiers to be used with the JSON Web Proof, JSON
   Web Key (JWK), and COSE specifications.  It defines IANA registries
   for these identifiers.
</abstract>
	  <version>13</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Algorithms</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-algorithms/"/>

        <id>urn:datatracker-ietf-org:event:1127194</id>
        
        <updated>2026-03-02T22:44:15.118156+00:00</updated>
        
        <published>2026-03-02T22:44:15.118156+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Web Proof</title>
        

        <link href="/doc/draft-ietf-jose-json-web-proof/"/>

        <id>urn:datatracker-ietf-org:event:1127191</id>
        
        <updated>2026-03-02T22:44:00.940033+00:00</updated>
        
        <published>2026-03-02T22:44:00.940033+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-jose-json-web-proof-13.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
	  <abstract>   The JOSE set of standards established JSON-based container formats
   for Keys, Signatures, and Encryption.  They also established IANA
   registries to enable the algorithms and representations used for them
   to be extended.  Since those were created, newer cryptographic
   algorithms that support selective disclosure and unlinkability have
   matured and started seeing early market adoption.  The COSE set of
   standards likewise does this for CBOR-based containers, focusing on
   the needs of environments which are better served using CBOR, such as
   constrained devices and networks.

   This document defines a new container format similar in purpose and
   design to JSON Web Signature (JWS) and COSE Signed Messages called a
   _JSON Web Proof (JWP)_.  Unlike JWS, which integrity-protects only a
   single payload, JWP can integrity-protect multiple payloads in one
   message.  It also specifies a new presentation form that supports
   selective disclosure of individual payloads, enables additional proof
   computation, and adds a Presentation Header to prevent replay.
</abstract>
	  <version>13</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Web Proof</title>
        

        <link href="/doc/draft-ietf-jose-json-web-proof/"/>

        <id>urn:datatracker-ietf-org:event:1127190</id>
        
        <updated>2026-03-02T22:44:00.936383+00:00</updated>
        
        <published>2026-03-02T22:44:00.936383+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Token and CBOR Proof Token</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-token/"/>

        <id>urn:datatracker-ietf-org:event:1127189</id>
        
        <updated>2026-03-02T22:43:44.266452+00:00</updated>
        
        <published>2026-03-02T22:43:44.266452+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-jose-json-proof-token-13.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
	  <abstract>   JSON Proof Token (JPT) is a compact, URL-safe, privacy-preserving
   representation of claims to be transferred between three parties.
   The claims in a JPT are encoded as base64url-encoded JSON objects
   that are used as the payloads of a JSON Web Proof (JWP) structure,
   enabling them to be digitally signed and selectively disclosed.  JPTs
   also support reusability and unlinkability when using Zero-Knowledge
   Proofs (ZKPs).

   A CBOR-based representation of JPTs is also defined, called a CBOR
   Proof Token (CPT).  It has the same properties as JPTs, but uses the
   JSON Web Proof (JWP) CBOR Serialization, rather than the JSON-based
   JWP Compact Serialization.
</abstract>
	  <version>13</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Token and CBOR Proof Token</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-token/"/>

        <id>urn:datatracker-ietf-org:event:1127188</id>
        
        <updated>2026-03-02T22:43:44.262607+00:00</updated>
        
        <published>2026-03-02T22:43:44.262607+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Algorithms</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-algorithms/"/>

        <id>urn:datatracker-ietf-org:event:1127173</id>
        
        <updated>2026-03-02T22:38:47.895834+00:00</updated>
        
        <published>2026-03-02T22:38:47.895834+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: David Waite &lt;dwaite+jwp@pingidentity.com&gt;, Jeremie Miller &lt;jmiller@pingidentity.com&gt;, Michael Jones &lt;michael_b_jones@hotmail.com&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Algorithms</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-algorithms/"/>

        <id>urn:datatracker-ietf-org:event:1127172</id>
        
        <updated>2026-03-02T22:38:47.620977+00:00</updated>
        
        <published>2026-03-02T22:38:47.620977+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Web Proof</title>
        

        <link href="/doc/draft-ietf-jose-json-web-proof/"/>

        <id>urn:datatracker-ietf-org:event:1127171</id>
        
        <updated>2026-03-02T22:38:40.323855+00:00</updated>
        
        <published>2026-03-02T22:38:40.323855+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: David Waite &lt;dwaite+jwp@pingidentity.com&gt;, Jeremie Miller &lt;jmiller@pingidentity.com&gt;, Michael Jones &lt;michael_b_jones@hotmail.com&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Web Proof</title>
        

        <link href="/doc/draft-ietf-jose-json-web-proof/"/>

        <id>urn:datatracker-ietf-org:event:1127170</id>
        
        <updated>2026-03-02T22:38:40.055374+00:00</updated>
        
        <published>2026-03-02T22:38:40.055374+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Token and CBOR Proof Token</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-token/"/>

        <id>urn:datatracker-ietf-org:event:1127169</id>
        
        <updated>2026-03-02T22:38:39.391143+00:00</updated>
        
        <published>2026-03-02T22:38:39.391143+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: David Waite &lt;dwaite+jwp@pingidentity.com&gt;, Jeremie Miller &lt;jmiller@pingidentity.com&gt;, Michael Jones &lt;michael_b_jones@hotmail.com&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JSON Proof Token and CBOR Proof Token</title>
        

        <link href="/doc/draft-ietf-jose-json-proof-token/"/>

        <id>urn:datatracker-ietf-org:event:1127168</id>
        
        <updated>2026-03-02T22:38:39.142492+00:00</updated>
        
        <published>2026-03-02T22:38:39.142492+00:00</published>
        
        <author>
            <name>David Waite</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JOSE: Deprecate &#x27;none&#x27; and &#x27;RSA1_5&#x27;</title>
        

        <link href="/doc/draft-ietf-jose-deprecate-none-rsa15/"/>

        <id>urn:datatracker-ietf-org:event:1126182</id>
        
        <updated>2026-03-02T11:03:10.525635+00:00</updated>
        
        <published>2026-03-02T11:03:10.525635+00:00</published>
        
        <author>
            <name>Neil Madden</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-jose-deprecate-none-rsa15-04.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
	  <abstract>   This document updates [RFC7518] to deprecate the JWS algorithm &quot;none&quot;
   and the JWE algorithm &quot;RSA1_5&quot;.  These algorithms have known security
   weaknesses.  It also updates the Review Instructions for Designated
   Experts to establish baseline security requirements that future
   algorithm registrations should meet.
</abstract>
	  <version>04</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JOSE: Deprecate &#x27;none&#x27; and &#x27;RSA1_5&#x27;</title>
        

        <link href="/doc/draft-ietf-jose-deprecate-none-rsa15/"/>

        <id>urn:datatracker-ietf-org:event:1126181</id>
        
        <updated>2026-03-02T11:03:10.521691+00:00</updated>
        
        <published>2026-03-02T11:03:10.521691+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JOSE: Deprecate &#x27;none&#x27; and &#x27;RSA1_5&#x27;</title>
        

        <link href="/doc/draft-ietf-jose-deprecate-none-rsa15/"/>

        <id>urn:datatracker-ietf-org:event:1126178</id>
        
        <updated>2026-03-02T11:02:20.324669+00:00</updated>
        
        <published>2026-03-02T11:02:20.324669+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: Neil Madden &lt;neil.e.madden@gmail.com&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>JOSE: Deprecate &#x27;none&#x27; and &#x27;RSA1_5&#x27;</title>
        

        <link href="/doc/draft-ietf-jose-deprecate-none-rsa15/"/>

        <id>urn:datatracker-ietf-org:event:1126177</id>
        
        <updated>2026-03-02T11:02:20.103783+00:00</updated>
        
        <published>2026-03-02T11:02:20.103783+00:00</published>
        
        <author>
            <name>Neil Madden</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125867</id>
        
        <updated>2026-03-02T03:14:52.456876+00:00</updated>
        
        <published>2026-03-02T03:14:52.456876+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">IETF WG state changed to &lt;b&gt;Submitted to IESG for Publication&lt;/b&gt; from In WG Last Call</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125866</id>
        
        <updated>2026-03-02T03:14:52.395016+00:00</updated>
        
        <published>2026-03-02T03:14:52.395016+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">IESG state changed to &lt;b&gt;Publication Requested&lt;/b&gt; from I-D Exists</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_state</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125865</id>
        
        <updated>2026-03-02T03:14:52.386668+00:00</updated>
        
        <published>2026-03-02T03:14:52.386668+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Changed action holders to Deb Cooley (IESG state changed)</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_action_holders</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125864</id>
        
        <updated>2026-03-02T03:14:52.314315+00:00</updated>
        
        <published>2026-03-02T03:14:52.314315+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Responsible AD changed to Deb Cooley</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_document</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125863</id>
        
        <updated>2026-03-02T03:14:52.304918+00:00</updated>
        
        <published>2026-03-02T03:14:52.304918+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Document is now in IESG state &lt;b&gt;Publication Requested&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>started_iesg_process</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125862</id>
        
        <updated>2026-03-02T03:13:51.725136+00:00</updated>
        
        <published>2026-03-02T03:13:51.725136+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Notification list changed to michael.p1@ncsc.gov.uk, jose-chairs@ietf.org from michael.p1@ncsc.gov.uk</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125861</id>
        
        <updated>2026-03-02T03:13:02.752066+00:00</updated>
        
        <published>2026-03-02T03:13:02.752066+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Notification list changed to michael.p1@ncsc.gov.uk because the document shepherd was set</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125860</id>
        
        <updated>2026-03-02T03:13:02.752066+00:00</updated>
        
        <published>2026-03-02T03:13:02.752066+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Document shepherd changed to Michael P</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>added_comment</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125859</id>
        
        <updated>2026-03-02T03:12:09.141295+00:00</updated>
        
        <published>2026-03-02T03:12:09.141295+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Changed consensus to &lt;b&gt;Yes&lt;/b&gt; from Unknown</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_consensus</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>Use of Hybrid Public Key Encryption (HPKE) with JSON Web Encryption (JWE)</title>
        

        <link href="/doc/draft-ietf-jose-hpke-encrypt/"/>

        <id>urn:datatracker-ietf-org:event:1125858</id>
        
        <updated>2026-03-02T03:12:09.128600+00:00</updated>
        
        <published>2026-03-02T03:12:09.128600+00:00</published>
        
        <author>
            <name>Karen O&#x27;Donoghue</name>
        </author>

        <content type="html">Intended Status changed to &lt;b&gt;Proposed Standard&lt;/b&gt; from None</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>changed_document</type>
          <stream>ietf</stream>
          <group>jose</group>
          <shepherd>Michael P</shepherd>
          <ad>Deb Cooley</ad>
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">pub-req</state>
          
          <state type="draft-stream-ietf">sub-pub</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
        

        <link href="/doc/draft-ietf-jose-pq-composite-sigs/"/>

        <id>urn:datatracker-ietf-org:event:1125052</id>
        
        <updated>2026-02-27T15:05:37.257607+00:00</updated>
        
        <published>2026-02-27T15:05:37.257607+00:00</published>
        
        <author>
            <name>Lucas Prabel</name>
        </author>

        <content type="html">New version available: &lt;b&gt;draft-ietf-jose-pq-composite-sigs-01.txt&lt;/b&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_revision</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
	  <abstract>   This document describes JSON Object Signing and Encryption (JOSE) and
   CBOR Object Signing and Encryption (COSE) serializations for PQ/T
   hybrid composite signatures.  The composite algorithms described
   combine ML-DSA as the post-quantum component and either ECDSA or
   EdDSA as the traditional component.
</abstract>
	  <version>01</version>
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
        

        <link href="/doc/draft-ietf-jose-pq-composite-sigs/"/>

        <id>urn:datatracker-ietf-org:event:1125051</id>
        
        <updated>2026-02-27T15:05:37.254150+00:00</updated>
        
        <published>2026-02-27T15:05:37.254150+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">New version approved</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
        

        <link href="/doc/draft-ietf-jose-pq-composite-sigs/"/>

        <id>urn:datatracker-ietf-org:event:1125048</id>
        
        <updated>2026-02-27T15:04:05.874750+00:00</updated>
        
        <published>2026-02-27T15:04:05.874750+00:00</published>
        
        <author>
            <name>(System)</name>
        </author>

        <content type="html">Request for posting confirmation emailed to previous authors: &quot;Tirumaleswar Reddy.K&quot; &lt;kondtir@gmail.com&gt;, John Gray &lt;john.gray@entrust.com&gt;, Lucas Prabel &lt;lucas.prabel@huawei.com&gt;, Sun Shuzhou &lt;sunshuzhou@huawei.com&gt;</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    <entry>
        
        <title>PQ/T Hybrid Composite Signatures for JOSE and COSE</title>
        

        <link href="/doc/draft-ietf-jose-pq-composite-sigs/"/>

        <id>urn:datatracker-ietf-org:event:1125047</id>
        
        <updated>2026-02-27T15:04:05.578124+00:00</updated>
        
        <published>2026-02-27T15:04:05.578124+00:00</published>
        
        <author>
            <name>Lucas Prabel</name>
        </author>

        <content type="html">Uploaded new revision</content>

        <ietf xmlns="http://ietf.org/atom/datatracker/community">
          <type>new_submission</type>
          <stream>ietf</stream>
          <group>jose</group>
          
          
          
          <state type="draft">active</state>
          
          <state type="draft-iesg">idexists</state>
          
          <state type="draft-stream-ietf">wg-doc</state>
          
          
	  
        </ietf>
    </entry>
    
    
</feed>
