<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.19 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ajitomi-cose-cose-key-jwk-hpke-kem-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="COSE Key and JWK Representation for HPKE KEM">COSE Key and JSON Web Key Representation for Key Encapsulation Mechanism (KEM) of Hybrid Public Key Encryption (HPKE)</title>
    <seriesInfo name="Internet-Draft" value="draft-ajitomi-cose-cose-key-jwk-hpke-kem-00"/>
    <author fullname="Daisuke Ajitomi">
      <organization>Independent</organization>
      <address>
        <email>dajiaji@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="28"/>
    <area>Security</area>
    <workgroup>CBOR Object Signing and Encryption</workgroup>
    <abstract>
      <t>This document defines an additional key parameter and a new key type for CBOR Object Signing and Encryption (COSE) Key and JSON Web Key (JWK) to represent a Key Encapsulated Mechanism (KEM) key configuration of Hybrid Public Key Encryption (HPKE).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dajiaji.github.io/i-d-cose-key-jwk-hpke/draft-ajitomi-cose-cose-key-jwk-hpke-kem.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ajitomi-cose-cose-key-jwk-hpke-kem/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        CBOR Object Signing and Encryption Working Group mailing list (<eref target="mailto:cose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/cose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/cose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dajiaji/i-d-cose-key-jwk-hpke"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Standardized by the Internet Research Task Force (IRTF), Hybrid Public Key Encryption (HPKE) has already been adopted in several communication protocol specifications such as TLS Encrypted Client Hello (ECH), Oblivious DNS over HTTPS (ODoH) and Oblivious HTTP (OHTTP).
HPKE itself is communication protocol independent and can be widely used as a standard scheme for public key based end-to-end encryption in various applications, not only in communication protocols.</t>
      <t>In HPKE, the sender of a ciphertext needs to know in advance not only the recipient public key, but also the HPKE mode, the KEM associated with the key, and the set of supported KDF and AEAD algorithms.
The data structure of this information (hereafter referred to as HPKE key configuration information) is defined in each communication protocol specification that uses HPKE.
For example, the ECH defines it as a structure called HpkeKeyConfig.
When using HPKE in an application, it is necessary to define the data structure corresponding to the HpkeKeyConfig and how the information is transferred from the recipient to the sender.</t>
      <t>This document defines how to represent the HPKE KEM key configuration information in COSE_Key and JWK.
Specifically, this document defines (1) a common key parameter for defining the HPKE KEM configuration information in existing key types that can be used for key derivation and (2) a generic key type for HPKE that can also be used to represent a post-quantum KEM to be specified in the future.</t>
      <t>The ability to include HPKE-related information in JWK, which is widely used not only as the public key representation but also as the key publication method (via the JWK Set endpoint) at the application layer, and its binary representation, COSE_Key, will facilitate the use of HPKE in a wide variety of web applications and communication systems for constrained devices.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="common-key-parameter-for-hpke-key-configuration">
      <name>Common Key Parameter for HPKE Key Configuration</name>
      <t>The HPKE key configuration information is defined as a common key parameter of JWK and COSE_Key.
The parameter can be specified in the key that can be used for key derivation. In addition, the handling of existing key parameters is also defined.</t>
      <section anchor="jwk-parameter">
        <name>JWK Parameter</name>
        <section anchor="hkc-hpke-key-configuration-parameter">
          <name>"hkc" (HPKE Key Configuration) Parameter</name>
          <t>The "hkc" (KPKE key configuration) parameter identifies the KEM for the recipient key and the set of KDF and AEAD algorithms supported by the recipient.
It <bcp14>MUST</bcp14> contain the object consisting of the following three attributes.
A JWK used for HPKE KEM <bcp14>MUST</bcp14> have this parameter.</t>
          <ul spacing="normal">
            <li>"kem": The HPKE KEM identifier, which is a two-byte value registered in the IANA HPKE registry.</li>
            <li>"kdfs": The array of the HPKE KDF identifiers supported by the recipient. The KDF identifier is also a two-byte value registered in the IANA HPKE registry.</li>
            <li>"aeads": The array of the HPKE AEAD identifiers supported by the recipient. The AEAD identifier is also a two-byte value registered in the IANA HPKE registry.</li>
          </ul>
        </section>
        <section anchor="restrictions-on-the-use-of-existing-key-parameters">
          <name>Restrictions on the Use of Existing Key Parameters</name>
          <t>The restrictions on the use of existing common key parameters in a JWK for HPKE KEM are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>"alg": The parameter <bcp14>MUST</bcp14> be one of the following values if specified. If omitted, it <bcp14>MUST</bcp14> be treated as "HPKE-v1-Base".
              </t>
              <ul spacing="normal">
                <li>"HPKE-v1-Base"</li>
                <li>"HPKE-v1-PSK"</li>
                <li>"HPKE-v1-Auth"</li>
                <li>"HPKE-v1-AuthPSK"</li>
              </ul>
            </li>
            <li>"use": The parameter <bcp14>SHOULD NOT</bcp14> be specified. If specified, it <bcp14>MUST</bcp14> be "enc".</li>
            <li>"key_ops": The parameter <bcp14>SHOULD NOT</bcp14> be specified. If specified, it <bcp14>MUST</bcp14> include "deriveKey" and/or "deriveBits".</li>
            <li>etc.</li>
          </ul>
        </section>
      </section>
      <section anchor="cose-key-common-parameter">
        <name>COSE Key Common Parameter</name>
        <section anchor="hkc-hpke-key-configuration-parameter-1">
          <name>hkc (HPKE Key Configuration) Parameter</name>
          <t>The HPKE key configuration parameter for COSE_Key is defined as follows:</t>
          <ul spacing="normal">
            <li>hkc (HPKE Key Configuration): The parameter <bcp14>MUST</bcp14> contain an array structure named HPKE_Key_Configuration, which contains the same information as "hkc" in JWK above. The CDDL grammar describing the HPKE_Key_Configuration structure is:</li>
          </ul>
          <artwork><![CDATA[
HPKE_Key_Configuration = [
    kem: uint,              ; KEM identifier
    kdfs: uint / [+uint],   ; KDF identifiers
    aeads: uint / [+uint],  ; AEAD identifiers
]
]]></artwork>
          <artwork><![CDATA[
   +---------+----------------+-------------+----------------------+
   | Name    | CBOR Type      | Value       | Description          |
   |         |                | Registry    |                      |
   +---------+----------------+-------------+----------------------+
   | kem     | uint           | HPKE KEM    | The KEM identifier   |
   |         |                | Identifiers | bound to the key     |
   |         |                |             |                      |
   | kdfs    | uint / [+uint] | HPKE KDF    | The KDF identifiers  |
   |         |                | Identifiers | supported by the     |
   |         |                |             | recipient            |
   |         |                |             |                      |
   | aeads   | uint / [+uint] | HPKE AEAD   | The AEAD identifiers |
   |         |                | Identifiers | supported by the     |
   |         |                |             | recipient            |
   |         |                |             |                      |
   +---------+----------------+-------------+----------------------+
]]></artwork>
        </section>
        <section anchor="restrictions-on-the-use-of-existing-key-parameters-1">
          <name>Restrictions on the Use of Existing Key Parameters</name>
          <t>The restrictions on the use of existing common key parameters in a COSE_Key for the HPKE KEM are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>alg(3): The parameter <bcp14>MUST</bcp14> be one of the following values if specified. If omitted, it <bcp14>MUST</bcp14> be treated as HPKE-v1-Base(T.B.D.).
              </t>
              <ul spacing="normal">
                <li>HPKE-v1-Base (T.B.D.)</li>
                <li>HPKE-v1-PSK (T.B.D.)</li>
                <li>HPKE-v1-Auth (T.B.D.)</li>
                <li>HPKE-v1-AuthPSK (T.B.D.)</li>
              </ul>
            </li>
            <li>key_ops(4): The parameter <bcp14>SHOULD NOT</bcp14> be specified. If specified, it <bcp14>MUST</bcp14> include "derive key"(7) and/or "derive bits"(8).</li>
            <li>etc.</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="generic-key-type-for-hpke-kem">
      <name>Generic Key Type for HPKE KEM</name>
      <t>A generic key type for the HPKE KEM keys including a post-quantum KEM defined in the future is defined.
Even KEM keys that can be represented by existing key types can use the generic key type defined here.</t>
      <section anchor="key-type-for-jwk">
        <name>Key Type for JWK</name>
        <t>A new generic key type (kty) value "HPKE-KEM" is defined to represent the private and public key used for the HPKE KEM.
A key with this kty has the following parameters:</t>
        <ul spacing="normal">
          <li>The parameter "kty" <bcp14>MUST</bcp14> be "HPKE-KEM".</li>
          <li>The parameter "hkc" <bcp14>MUST</bcp14> be present and contains the HPKE Key Configuration defined in Section X.X.</li>
          <li>The parameter "pub" <bcp14>MUST</bcp14> be present and contains the public key encoded using the base64url [RFC4648] encoding.</li>
          <li>The parameter "priv" <bcp14>MUST</bcp14> be present if the key is private key and contains the private key encoded using the base64url [RFC4648] encoding.</li>
        </ul>
      </section>
      <section anchor="key-type-for-cosekey">
        <name>Key Type for COSE_Key</name>
        <t>A new generic kty(1) value HPKE-KEM(T.B.D.) is defined to represent the private and public key used for the HPKE KEM.
A key with this kty has the following parameters:</t>
        <ul spacing="normal">
          <li>The parameter kty(1) <bcp14>MUST</bcp14> be HPKE-KEM(T.B.D).</li>
          <li>The parameter hkc(T.B.D.) <bcp14>MUST</bcp14> be present and contains the HPKE Key Configuration defined in Section X.X.</li>
          <li>The parameter pub(-1) <bcp14>MUST</bcp14> be present and contains the public key encoded using the base64url [RFC4648] encoding.</li>
          <li>The parameter priv(-2) <bcp14>MUST</bcp14> be present if the key is private key and contains the private key encoded using the base64url [RFC4648] encoding.</li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TODO</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="jwk-for-dhkemx25519-kdf-sha-256-public-key-with-key-type-okp">
        <name>JWK for DHKEM(X25519, KDF-SHA-256) Public Key with Key Type "OKP"</name>
        <artwork><![CDATA[
{
    "kty": "OKP",
    "kid": "01",
    "crv": "X25519",
    "alg": "HPKE-v1-Base",
    "hkc": {
        "kem": 0x020,
        "kdfs": [0x001, 0x002, 0x003],
        "kems": [0x001, 0x002]
    },
    "x": "y3wJq3uXPHeoCO4FubvTc7VcBuqpvUrSvU6ZMbHDTCI"
}
]]></artwork>
      </section>
      <section anchor="jwk-for-dhkemx448-kdf-sha-512-private-key-with-key-type-hpke-kem">
        <name>JWK for DHKEM(X448, KDF-SHA-512) Private Key with Key Type "HPKE-KEM"</name>
        <artwork><![CDATA[
{
    "kty": "HPKE-KEM",
    "kid": "01",
    "alg": "HPKE-v1-Base",
    "hkc": {
        "kem": 0x021,
        "kdfs": [0x001, 0x002, 0x003],
        "kems": [0x001, 0x002]
    },
    "pub": "IkLmc0klvEMXYneHMKAB6ePohryAwAPVe2pRSffIDY6NrjeYNWVX5J-fG4NV2OoU77C88A0mvxI",
    "priv": "rJJRG3nshyCtd9CgXld8aNaB9YXKR0UOi7zj7hApg9YH4XdBO0G8NcAFNz_uPH2GnCZVcSDgV5c"
}
]]></artwork>
      </section>
      <section anchor="cosekey-for-dhkemx25519-kdf-sha-256-public-key-with-key-type-okp1">
        <name>COSE_Key for DHKEM(X25519, KDF-SHA-256) Public Key with Key Type OKP(1)</name>
        <artwork><![CDATA[
  {
    1:1,          // OKP
    2:'01',
    3:-1(T.B.D),  // HPKE-v1-Base
    -1:4,         // X25519
    6(T.B.D): [   // hkc (HPKE Key Configuration)
        0x0020,
        [0x0001, 0x0002, 0x0003],
        [0x0001, 0x0002]
    ],
    -2:h'd75a980182b10ab7d54bfed3c964073a0ee172f3daa62325af021a68f707511a'
  }
]]></artwork>
      </section>
      <section anchor="cosekey-for-dhkemx448-kdf-sha-512-private-key-with-key-type-hpke-kemtbd">
        <name>COSE_Key for DHKEM(X448, KDF-SHA-512) Private Key with Key Type HPKE-KEM(T.B.D)</name>
        <artwork><![CDATA[
  {
    1:-1(T.B.D.),  // HPKE-KEM
    2:'01',
    3:-1(T.B.D),   // HPKE-v1-Base
    6(T.B.D): [    // hkc (HPKE Key Configuration)
        0x0021,                    // KEM id
        [0x0001, 0x0002, 0x0003],  // supported KDF ids
        [0x0001, 0x0002]           // supported AEAD ids
    ],
    -1:h'5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180',
    -2:h'6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b'
  }
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
