<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-meunier-privacypass-reverse-flow-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Privacy Pass Reverse Flow">Privacy Pass Reverse Flow</title>
    <seriesInfo name="Internet-Draft" value="draft-meunier-privacypass-reverse-flow-03"/>
    <author fullname="Thibault Meunier">
      <organization>Cloudflare Inc.</organization>
      <address>
        <email>ot-ietf@thibault.uk</email>
      </address>
    </author>
    <date year="2026" month="February" day="16"/>
    <area>Security</area>
    <workgroup>Privacy Pass</workgroup>
    <abstract>
      <?line 42?>

<t>This document specifies an instantiation of Privacy Pass Architecture <xref target="RFC9576"/>
that allows for a "reverse" flow from the Origin to the Client.
It describes a method for an Origin to issue a state update to the Client in response to a request in
which a token is redeemed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://thibmeu.github.io/draft-meunier-privacypass-reverse-flow-informational/draft-meunier-privacypass-reverse-flow.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-meunier-privacypass-reverse-flow/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Privacy Pass Working Group mailing list (<eref target="mailto:privacy-pass@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/privacy-pass/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/privacy-pass/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/thibmeu/draft-meunier-privacypass-reverse-flow-informational"/>.</t>
    </note>
  </front>
  <middle>
    <?line 49?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document specifies an instantiation of Privacy Pass Architecture <xref target="RFC9576"/>
that allows for a reverse flow from the Origin to the Client.</t>
      <t>In other words, it specifies a way for an Origin to act as an Attester + Issuer.</t>
    </section>
    <section anchor="motivation">
      <name>Motivation</name>
      <t>With Privacy Pass issuance as described in <xref target="RFC9576"/>, once a token is presented by a Client,
it is considered spent and cannot be reused in order to guarantee unlinkability. If a token
was to be presented twice, the two requests would be linkable by the Origin.</t>
      <t>However, requiring that all tokens are spent only once means that Clients need
to request more tokens to perform more requests. This is true even if the initial request
didn't need a token presentation, for instance due to a cost being insignificant to the Origin.</t>
      <t>This draft provides a mechanism for an Origin to provide a requesting Client with an updated
state, allowing them to present new tokens on future requests. Origin act as a new Attester/Issuer
entity.</t>
      <t>Below, we present different use cases.</t>
      <section anchor="refunding-tokens">
        <name>Refunding tokens</name>
        <t>Certain Origins use Privacy Pass tokens to rate-limit requests they receive over a certain
time window because of resource constraints. If a Client sends a request that can
be served without utilising that resource, the Origin would like to authorise them
to do a second request. This is the case for request requiring compute and the compute is low,
or when the request leads to a redirection instead of content generation for instance.</t>
        <t>With a reverse flow,
a Client that has already been authorised by an Origin can maintain that authorization,
without losing the unlinkability property provided by Privacy Pass.</t>
      </section>
      <section anchor="bootstrapping-issuer">
        <name>Bootstrapping Issuer</name>
        <t>An Origin wants to grant 30 access for Clients that solved a
CAPTCHA. To do so, it consumes a type 0x0002 public verifiable token from an initial Issuer that guarantees
a CAPTCHA has been solved,
and use it to issue 30 type 0x0001 private tokens.
Without a reverse flow, the Origin would have to require 30 0x0002 Issuer tokens, which
have lower performance and a higher number of requests going to the Issuer.</t>
      </section>
      <section anchor="attester-feedback-loop">
        <name>Attester feedback loop</name>
        <t>In <xref target="RFC9576"/>, a Client gets a token from an Issuer and redeems it at an Origin.
However, if the Client's request is deemed unwanted by the Origin at redemption
time, there is no mechanism that prevents the Client from going back to
the initial Issuer to get a new token and be authorized again.</t>
        <t>With a reverse flow, the initial Issuer may require Clients to present an
Origin-issued token before providing them with a second token.
This allows for a feedback loop between the Origin and the initial Issuer,
without breaking Client unlinkability.</t>
      </section>
      <section anchor="anonymous-credential-composition">
        <name>Anonymous credential composition</name>
        <t>Privacy Pass Architecture as defined by <xref target="RFC9576"/> centers around tokens,
which issuance flows are defined in <xref target="RFC9578"/>.</t>
        <t>More recent explorations (<xref target="PRIVACYPASS-ARC"/>, <xref target="PRIVACYPASS-BBS"/>, <xref target="PRIVACYPASS-ACT"/>)
are providing credentials to clients, which presentation result in a scoped token.
These schemes are instantiation of a reverse flow, both because the Client holds a state
it can use to perform multiple token presentation, as well as because the Origin can
provides an updated state to requesting Client.</t>
        <t>In additions, these schemes are more costly, and usage specific.
With a reverse flow, the initial Issuer and the Origin issuer may use
different credentials, which are suited to their use case.
One use case is rate limiting and blocking. <xref target="PRIVACYPASS-ARC"/> provides
rate-limit per origin with a unique credentials, while <xref target="PRIVACYPASS-ACT"/>
allows to rate-limit a specific session once it's been established.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>We reuse terminology from <xref target="RFC9576"/>.</t>
      <t>The following terms are used throughout this document:</t>
      <dl>
        <dt><strong>Flow:</strong></dt>
        <dd>
          <t>Direction from PrivateToken issuance to its redemption. The entity starting
the flow acts as an Issuer, while the end of the flow acts as an Origin. The
Client is always included, as it finalises the CredentialResponse, and coordinate
interactions.</t>
        </dd>
        <dt><strong>Initial Flow:</strong></dt>
        <dd>
          <t>Issuer -&gt; Attester -&gt; Client -&gt; Origin. This flow produces a PrivateToken that
is used by the Origin to kickstart a Reverse Flow.</t>
        </dd>
        <dt><strong>Reverse Flow:</strong></dt>
        <dd>
          <t>Issuer &lt;- Attester &lt;- Client &lt;- Origin. This flow allows the Origin to issue
a PrivateToken. In the reverse flow, the Origin operates one or more Issuer, and
the Client <bcp14>MAY</bcp14> provide these tokens either to the Initial Attester/Issuer, or
use them against the Origin</t>
        </dd>
        <dt><strong>Initial Attester/Issuer:</strong></dt>
        <dd>
          <t>Attester/Issuer part of the Initial Flow</t>
        </dd>
        <dt><strong>Origin Issuer:</strong></dt>
        <dd>
          <t>Issuer operated by the Origin</t>
        </dd>
        <dt><strong>Origin PrivateToken:</strong></dt>
        <dd>
          <t>PrivateToken issued by the Origin</t>
        </dd>
        <dt><strong>Reverse Origin:</strong></dt>
        <dd>
          <t>An entity that consumes the Origin PrivateToken. It can be the Origin, or the
Initial Attester/Issuer</t>
        </dd>
      </dl>
    </section>
    <section anchor="architecture">
      <name>Architecture overview</name>
      <t>Along with sending their PrivateToken for authentication (as specified in <xref target="RFC9576"/>), Client
sends CredentialRequest</t>
      <figure anchor="fig-reverse-flow-architecture">
        <name>Architecture of Privacy Pass with a Reverse Flow</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="888" viewBox="0 0 888 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 32,64 L 32,320" fill="none" stroke="black"/>
              <path d="M 136,32 L 136,64" fill="none" stroke="black"/>
              <path d="M 208,32 L 208,64" fill="none" stroke="black"/>
              <path d="M 240,64 L 240,320" fill="none" stroke="black"/>
              <path d="M 280,32 L 280,64" fill="none" stroke="black"/>
              <path d="M 552,32 L 552,64" fill="none" stroke="black"/>
              <path d="M 584,64 L 584,176" fill="none" stroke="black"/>
              <path d="M 584,240 L 584,288" fill="none" stroke="black"/>
              <path d="M 624,32 L 624,64" fill="none" stroke="black"/>
              <path d="M 704,32 L 704,64" fill="none" stroke="black"/>
              <path d="M 744,64 L 744,144" fill="none" stroke="black"/>
              <path d="M 744,192 L 744,320" fill="none" stroke="black"/>
              <path d="M 792,32 L 792,64" fill="none" stroke="black"/>
              <path d="M 808,32 L 808,64" fill="none" stroke="black"/>
              <path d="M 840,64 L 840,320" fill="none" stroke="black"/>
              <path d="M 880,32 L 880,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
              <path d="M 208,32 L 280,32" fill="none" stroke="black"/>
              <path d="M 552,32 L 624,32" fill="none" stroke="black"/>
              <path d="M 704,32 L 792,32" fill="none" stroke="black"/>
              <path d="M 808,32 L 880,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 208,64 L 280,64" fill="none" stroke="black"/>
              <path d="M 552,64 L 624,64" fill="none" stroke="black"/>
              <path d="M 704,64 L 792,64" fill="none" stroke="black"/>
              <path d="M 808,64 L 880,64" fill="none" stroke="black"/>
              <path d="M 248,96 L 376,96" fill="none" stroke="black"/>
              <path d="M 456,96 L 584,96" fill="none" stroke="black"/>
              <path d="M 240,112 L 304,112" fill="none" stroke="black"/>
              <path d="M 512,112 L 576,112" fill="none" stroke="black"/>
              <path d="M 592,142 L 608,142" fill="none" stroke="black"/>
              <path d="M 592,146 L 608,146" fill="none" stroke="black"/>
              <path d="M 720,142 L 736,142" fill="none" stroke="black"/>
              <path d="M 720,146 L 736,146" fill="none" stroke="black"/>
              <path d="M 584,160 L 632,160" fill="none" stroke="black"/>
              <path d="M 792,160 L 832,160" fill="none" stroke="black"/>
              <path d="M 592,176 L 632,176" fill="none" stroke="black"/>
              <path d="M 800,176 L 840,176" fill="none" stroke="black"/>
              <path d="M 248,240 L 344,240" fill="none" stroke="black"/>
              <path d="M 472,240 L 584,240" fill="none" stroke="black"/>
              <path d="M 40,256 L 56,256" fill="none" stroke="black"/>
              <path d="M 216,256 L 240,256" fill="none" stroke="black"/>
              <path d="M 32,272 L 56,272" fill="none" stroke="black"/>
              <path d="M 560,288 L 576,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="840,160 828,154.4 828,165.6" fill="black" transform="rotate(0,832,160)"/>
              <polygon class="arrowhead" points="744,144 732,138.4 732,149.6" fill="black" transform="rotate(0,736,144)"/>
              <polygon class="arrowhead" points="600,176 588,170.4 588,181.6" fill="black" transform="rotate(180,592,176)"/>
              <polygon class="arrowhead" points="600,144 588,138.4 588,149.6" fill="black" transform="rotate(180,592,144)"/>
              <polygon class="arrowhead" points="584,288 572,282.4 572,293.6" fill="black" transform="rotate(0,576,288)"/>
              <polygon class="arrowhead" points="584,112 572,106.4 572,117.6" fill="black" transform="rotate(0,576,112)"/>
              <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(180,248,240)"/>
              <polygon class="arrowhead" points="256,96 244,90.4 244,101.6" fill="black" transform="rotate(180,248,96)"/>
              <polygon class="arrowhead" points="48,256 36,250.4 36,261.6" fill="black" transform="rotate(180,40,256)"/>
              <g class="text">
                <text x="44" y="52">Origin</text>
                <text x="100" y="52">Issuer</text>
                <text x="244" y="52">Origin</text>
                <text x="588" y="52">Client</text>
                <text x="748" y="52">Attester</text>
                <text x="844" y="52">Issuer</text>
                <text x="416" y="100">Request</text>
                <text x="372" y="116">TokenChallenge</text>
                <text x="468" y="116">(Issuer)</text>
                <text x="664" y="148">Attestation</text>
                <text x="712" y="164">CredentialRequest</text>
                <text x="716" y="180">CredentialResponse</text>
                <text x="588" y="196">CredentialFinalization</text>
                <text x="584" y="212">|</text>
                <text x="588" y="228">CredentialPresentation</text>
                <text x="408" y="244">Request+Token</text>
                <text x="136" y="260">CredentialRequest</text>
                <text x="412" y="260">+CredentialRequest(Origin)</text>
                <text x="140" y="276">CredentialResponse</text>
                <text x="228" y="276">-&gt;</text>
                <text x="252" y="292">--</text>
                <text x="408" y="292">Response+CredentialResponse(Origin)</text>
                <text x="588" y="308">CredentialFinalization</text>
                <text x="584" y="324">|</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+---------------+        +--------+                                 +--------+         +----------+ +--------+
| Origin Issuer |        | Origin |                                 | Client |         | Attester | | Issuer |
+--+------------+        +---+----+                                 +---+----+         +----+-----+ +---+----+
   |                         |                                          |                   |           |
   |                         |<---------------- Request ----------------+                   |           |
   |                         +-------- TokenChallenge (Issuer) -------->|                   |           |
   |                         |                                          |                   |           |
   |                         |                                          |<== Attestation ==>|           |
   |                         |                                          +------ CredentialRequest ----->|
   |                         |                                          |<----- CredentialResponse -----+
   |                         |                                CredentialFinalization        |           |
   |                         |                                          |                   |           |
   |                         |                                CredentialPresentation        |           |
   |                         |<------------ Request+Token --------------+                   |           |
   |<-- CredentialRequest ---+        +CredentialRequest(Origin)        |                   |           |
   +--- CredentialResponse ->|                                          |                   |           |
   |                         |-- Response+CredentialResponse(Origin) -->|                   |           |
   |                         |                                CredentialFinalization        |           |
   |                         |                                          |                   |           |
]]></artwork>
        </artset>
      </figure>
      <t>The initial flow matches the one defined by <xref target="RFC9576"/>. A Client gets challenged when
accessing a resource on an Origin. The Client goes to the Attester to get issued a Token.</t>
      <t>Through configuration mechanism not defined in this document, the Client is aware the Origin
acts as a Reverse Flow Issuer.</t>
      <t>This is an extension of <xref target="RFC9576"/>. The redemption flow of a Privacy Pass token is defined in
<xref section="3.6.4" sectionFormat="of" target="RFC9576"/>. Reverse flow extends this so that redemption flow is interleaved with
the issuance flow described in <xref section="3.6.3" sectionFormat="of" target="RFC9576"/>.
This is denoted in the diagram above by the Client sending <tt>Request</tt>+<tt>Token</tt>+<tt>CredentialRequest(Origin)</tt>.
The Origin runs the issuance protocol, and returns <tt>Response</tt>+<tt>CredentialResponse(Origin)</tt>.</t>
      <t>Such flow can be performed through various means. This document introduces one to serve as example and
first basis.</t>
    </section>
    <section anchor="credentialrequest-credentialresponse-and-credentialfinalization">
      <name>CredentialRequest, CredentialResponse, and CredentialFinalization</name>
      <t>In <xref target="fig-reverse-flow-architecture"/>, the Client sends an <tt>CredentialRequest</tt> and receives an <tt>CredentialResponse</tt>.
These are meant to abstract request from different protocol to the Issuer.</t>
      <t>As specified in <xref section="3.5" sectionFormat="of" target="RFC9576"/>,</t>
      <ul empty="true">
        <li>
          <t>The structure and semantics of the TokenRequest and TokenResponse messages depend on the issuance protocol and token type being used.</t>
        </li>
      </ul>
      <t>The introduction of Privacy Pass issuance protocol based on Anonymous Credentials, such as <xref target="PRIVACYPASS-ARC"/> or <xref target="PRIVACYPASS-ACT"/>,
modifies <tt>TokenRequest</tt> (resp. <tt>TokenResponse</tt>) to use <tt>CredentialRequest</tt> instead (resp. <tt>CredentialResponse</tt>).</t>
      <t>Upon receiving an <tt>CredentialResponse</tt>, the Client has to finalise the <tt>Token</tt> so it can be
presented to an Origin.
This may be a <tt>Finalization</tt> for type 0x0002 as defined in <xref section="7" sectionFormat="of" target="RFC9578"/>,
a presentation for <xref section="7.3" sectionFormat="of" target="PRIVACYPASS-ARC"/>,
or even a <tt>TokenRefund</tt> for <xref target="PRIVACYPASS-ACT"/>.</t>
      <t>All three examples ensure that an Issuer provides the Client with a state update that it needs to finalize, and present.</t>
    </section>
    <section anchor="reverse-flow-with-an-http-header">
      <name>Reverse flow with an HTTP header</name>
      <t>This section defines a Reverse Flow, as presented in <xref target="architecture"/>, leveraging <tt>PrivacyPass-Reverse</tt> HTTP header.</t>
      <t><tt>CredentialRequest(Origin)</tt> and <tt>CredentialResponse(Origin)</tt> are transmitted through HTTP Header <tt>PrivacyPass-Reverse</tt>.
<tt>PrivacyPass-Reverse</tt> is a base64url (<xref target="RFC4648"/>) encoded <tt>GenericBatchTokenRequest</tt> (resp. <tt>GenericBatchTokenResponse</tt>)
as defined in <xref section="6.1" sectionFormat="of" target="BATCHED-TOKENS"/> (resp. <xref section="6.1" sectionFormat="of" target="BATCHED-TOKENS"/>).</t>
      <t>Below is an example request that uses <xref target="RFC9577"/> to pass the request Token, as well as <tt>PrivacyPass-Request</tt> for its reverse flow.</t>
      <artwork><![CDATA[
GET /foo HTTP/1.1
Host: example.com
Authorization: PrivateToken token="abc..."
PrivacyPass-Reverse: "def..."

HTTP/1.1 200 OK
PrivacyPass-Reverse: "001..."

[BODY]
]]></artwork>
      <section anchor="client-behaviour">
        <name>Client behaviour</name>
        <t>Along with sending a finalised token from the Initial Issuer to the Origin that it sends through an authorization response as defined in
<xref target="RFC9577"/>, the Client may send a <tt>TokenRequest</tt> as defined in <xref target="RFC9578"/>,
<xref target="BATCHED-TOKENS"/>, or <xref target="PRIVACYPASS-ARC"/>. In all these definitions, <tt>CredentialRequest</tt> <bcp14>MUST</bcp14>
prepended by a <tt>uint16_t</tt> representing the token type.</t>
        <t>The same security and privacy guarantees applies as to the initial issuance flow.
The Client is responsible to coordinate between the different entities.
Specifically, if the Reverse Origin is the Initial Attester/Issuer, the Client
<bcp14>SHOULD</bcp14> account for possible privacy leakage.</t>
      </section>
      <section anchor="originissuerattester-deployment">
        <name>Origin/Issuer/Attester deployment</name>
        <t>In this model, the Origin, Attester, and Issuer are all operated by the same
entity, as shown in <xref target="fig-deploy-shared"/>. The Reverse Flow is the same as
the Initial Flow, except for the request/response encapsulation.
The Origin is the Reverse Origin.</t>
        <figure anchor="fig-deploy-shared">
          <name>Shared Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="552" viewBox="0 0 552 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 88,80 L 88,192" fill="none" stroke="black"/>
                <path d="M 88,256 L 88,288" fill="none" stroke="black"/>
                <path d="M 128,48 L 128,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 232,80" fill="none" stroke="black"/>
                <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
                <path d="M 304,80 L 304,96" fill="none" stroke="black"/>
                <path d="M 304,144 L 304,160" fill="none" stroke="black"/>
                <path d="M 344,48 L 344,80" fill="none" stroke="black"/>
                <path d="M 360,48 L 360,80" fill="none" stroke="black"/>
                <path d="M 400,80 L 400,104" fill="none" stroke="black"/>
                <path d="M 400,136 L 400,208" fill="none" stroke="black"/>
                <path d="M 432,48 L 432,80" fill="none" stroke="black"/>
                <path d="M 448,48 L 448,80" fill="none" stroke="black"/>
                <path d="M 480,80 L 480,288" fill="none" stroke="black"/>
                <path d="M 520,48 L 520,80" fill="none" stroke="black"/>
                <path d="M 544,48 L 544,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 528,32" fill="none" stroke="black"/>
                <path d="M 56,48 L 128,48" fill="none" stroke="black"/>
                <path d="M 256,48 L 344,48" fill="none" stroke="black"/>
                <path d="M 360,48 L 432,48" fill="none" stroke="black"/>
                <path d="M 448,48 L 520,48" fill="none" stroke="black"/>
                <path d="M 56,80 L 128,80" fill="none" stroke="black"/>
                <path d="M 256,80 L 344,80" fill="none" stroke="black"/>
                <path d="M 360,80 L 432,80" fill="none" stroke="black"/>
                <path d="M 448,80 L 520,80" fill="none" stroke="black"/>
                <path d="M 248,96 L 296,96" fill="none" stroke="black"/>
                <path d="M 312,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 408,96 L 472,96" fill="none" stroke="black"/>
                <path d="M 488,96 L 528,96" fill="none" stroke="black"/>
                <path d="M 88,112 L 240,112" fill="none" stroke="black"/>
                <path d="M 320,112 L 472,112" fill="none" stroke="black"/>
                <path d="M 96,128 L 216,128" fill="none" stroke="black"/>
                <path d="M 352,128 L 480,128" fill="none" stroke="black"/>
                <path d="M 96,158 L 144,158" fill="none" stroke="black"/>
                <path d="M 96,162 L 144,162" fill="none" stroke="black"/>
                <path d="M 256,158 L 296,158" fill="none" stroke="black"/>
                <path d="M 256,162 L 296,162" fill="none" stroke="black"/>
                <path d="M 88,176 L 160,176" fill="none" stroke="black"/>
                <path d="M 320,176 L 392,176" fill="none" stroke="black"/>
                <path d="M 96,192 L 160,192" fill="none" stroke="black"/>
                <path d="M 328,192 L 400,192" fill="none" stroke="black"/>
                <path d="M 88,256 L 112,256" fill="none" stroke="black"/>
                <path d="M 448,256 L 472,256" fill="none" stroke="black"/>
                <path d="M 96,272 L 136,272" fill="none" stroke="black"/>
                <path d="M 440,272 L 480,272" fill="none" stroke="black"/>
                <path d="M 528,32 C 536.83064,32 544,39.16936 544,48" fill="none" stroke="black"/>
                <path d="M 248,96 C 239.16936,96 232,88.83064 232,80" fill="none" stroke="black"/>
                <path d="M 528,96 C 536.83064,96 544,88.83064 544,80" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="480,256 468,250.4 468,261.6" fill="black" transform="rotate(0,472,256)"/>
                <polygon class="arrowhead" points="480,112 468,106.4 468,117.6" fill="black" transform="rotate(0,472,112)"/>
                <polygon class="arrowhead" points="400,176 388,170.4 388,181.6" fill="black" transform="rotate(0,392,176)"/>
                <polygon class="arrowhead" points="304,160 292,154.4 292,165.6" fill="black" transform="rotate(0,296,160)"/>
                <polygon class="arrowhead" points="104,272 92,266.4 92,277.6" fill="black" transform="rotate(180,96,272)"/>
                <polygon class="arrowhead" points="104,192 92,186.4 92,197.6" fill="black" transform="rotate(180,96,192)"/>
                <polygon class="arrowhead" points="104,160 92,154.4 92,165.6" fill="black" transform="rotate(180,96,160)"/>
                <polygon class="arrowhead" points="104,128 92,122.4 92,133.6" fill="black" transform="rotate(180,96,128)"/>
                <g class="text">
                  <text x="92" y="68">Client</text>
                  <text x="300" y="68">Attester</text>
                  <text x="396" y="68">Issuer</text>
                  <text x="484" y="68">Origin</text>
                  <text x="280" y="116">Request</text>
                  <text x="284" y="132">TokenChallenge</text>
                  <text x="200" y="164">Attestation</text>
                  <text x="240" y="180">CredentialRequest</text>
                  <text x="244" y="196">CredentialResponse</text>
                  <text x="92" y="212">CredentialFinalization</text>
                  <text x="304" y="212">|</text>
                  <text x="88" y="228">|</text>
                  <text x="92" y="244">CredentialPresentation</text>
                  <text x="280" y="260">Request+Token+CredentialRequest(Origin)</text>
                  <text x="288" y="276">Response+CredentialResponse(Origin)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
                            +-------------------------------------.
      +--------+            |  +----------+ +--------+ +--------+  |
      | Client |            |  | Attester | | Issuer | | Origin |  |
      +---+----+            |  +-----+----+ +----+---+ +---+----+  |
          |                  `-------|-----------|---------|------'
          +------------------- Request ------------------->|
          |<--------------- TokenChallenge ----------------+
          |                          |           |         |
          |<====== Attestation =====>|           |         |
          +--------- CredentialRequest --------->|         |
          |<-------- CredentialResponse ---------+         |
CredentialFinalization               |           |         |
          |                                                |
CredentialPresentation                                     |
          +--- Request+Token+CredentialRequest(Origin) --->|
          |<----- Response+CredentialResponse(Origin) -----+
          |                                                |
]]></artwork>
          </artset>
        </figure>
        <t>Similar to the original Shared Deployment Model (<xref section="4.1" sectionFormat="of" target="RFC9576"/>), the Attester,
Issuer, and Origin share the attestation, issuance, and redemption
contexts. Even if this context changes between the Initial and
Reverse Flow, attestation mechanism that can uniquely identify
a Client are not appropriate as they could lead to unlinkability violations.</t>
      </section>
      <section anchor="split-origin-attester-deployment">
        <name>Split Origin-Attester deployment</name>
        <t>In this model, the Attester and Issuer are operated by the same entity
that is separate from the Origin. The Origin trusts the joint Attester
and Issuer to perform attestation and issue Tokens.
Origin Tokens can then be sent by Client on new requests, as long as the
Reverse Origin trusts the Origin to perform attestation and issue Tokens.</t>
        <figure anchor="fig-deploy-joint-issuer">
          <name>Joint Attester and Issuer Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="944" viewBox="0 0 944 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
                <path d="M 40,80 L 40,304" fill="none" stroke="black"/>
                <path d="M 136,48 L 136,80" fill="none" stroke="black"/>
                <path d="M 216,48 L 216,80" fill="none" stroke="black"/>
                <path d="M 248,80 L 248,304" fill="none" stroke="black"/>
                <path d="M 288,48 L 288,80" fill="none" stroke="black"/>
                <path d="M 592,48 L 592,80" fill="none" stroke="black"/>
                <path d="M 624,80 L 624,176" fill="none" stroke="black"/>
                <path d="M 624,240 L 624,304" fill="none" stroke="black"/>
                <path d="M 664,48 L 664,80" fill="none" stroke="black"/>
                <path d="M 712,32 L 712,80" fill="none" stroke="black"/>
                <path d="M 736,48 L 736,80" fill="none" stroke="black"/>
                <path d="M 784,80 L 784,144" fill="none" stroke="black"/>
                <path d="M 784,192 L 784,304" fill="none" stroke="black"/>
                <path d="M 824,48 L 824,80" fill="none" stroke="black"/>
                <path d="M 840,48 L 840,80" fill="none" stroke="black"/>
                <path d="M 880,80 L 880,304" fill="none" stroke="black"/>
                <path d="M 912,48 L 912,80" fill="none" stroke="black"/>
                <path d="M 936,48 L 936,80" fill="none" stroke="black"/>
                <path d="M 712,32 L 920,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 136,48" fill="none" stroke="black"/>
                <path d="M 216,48 L 288,48" fill="none" stroke="black"/>
                <path d="M 592,48 L 664,48" fill="none" stroke="black"/>
                <path d="M 736,48 L 824,48" fill="none" stroke="black"/>
                <path d="M 840,48 L 912,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 136,80" fill="none" stroke="black"/>
                <path d="M 216,80 L 288,80" fill="none" stroke="black"/>
                <path d="M 592,80 L 664,80" fill="none" stroke="black"/>
                <path d="M 736,80 L 824,80" fill="none" stroke="black"/>
                <path d="M 840,80 L 912,80" fill="none" stroke="black"/>
                <path d="M 728,96 L 776,96" fill="none" stroke="black"/>
                <path d="M 792,96 L 872,96" fill="none" stroke="black"/>
                <path d="M 888,96 L 920,96" fill="none" stroke="black"/>
                <path d="M 248,112 L 264,112" fill="none" stroke="black"/>
                <path d="M 472,112 L 616,112" fill="none" stroke="black"/>
                <path d="M 632,142 L 648,142" fill="none" stroke="black"/>
                <path d="M 632,146 L 648,146" fill="none" stroke="black"/>
                <path d="M 760,142 L 776,142" fill="none" stroke="black"/>
                <path d="M 760,146 L 776,146" fill="none" stroke="black"/>
                <path d="M 624,160 L 672,160" fill="none" stroke="black"/>
                <path d="M 832,160 L 872,160" fill="none" stroke="black"/>
                <path d="M 632,176 L 672,176" fill="none" stroke="black"/>
                <path d="M 840,176 L 880,176" fill="none" stroke="black"/>
                <path d="M 256,240 L 272,240" fill="none" stroke="black"/>
                <path d="M 608,240 L 624,240" fill="none" stroke="black"/>
                <path d="M 48,256 L 64,256" fill="none" stroke="black"/>
                <path d="M 224,256 L 248,256" fill="none" stroke="black"/>
                <path d="M 40,272 L 56,272" fill="none" stroke="black"/>
                <path d="M 224,272 L 240,272" fill="none" stroke="black"/>
                <path d="M 248,288 L 272,288" fill="none" stroke="black"/>
                <path d="M 576,288 L 616,288" fill="none" stroke="black"/>
                <path d="M 920,32 C 928.83064,32 936,39.16936 936,48" fill="none" stroke="black"/>
                <path d="M 728,96 C 719.16936,96 712,88.83064 712,80" fill="none" stroke="black"/>
                <path d="M 920,96 C 928.83064,96 936,88.83064 936,80" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="880,160 868,154.4 868,165.6" fill="black" transform="rotate(0,872,160)"/>
                <polygon class="arrowhead" points="784,144 772,138.4 772,149.6" fill="black" transform="rotate(0,776,144)"/>
                <polygon class="arrowhead" points="640,176 628,170.4 628,181.6" fill="black" transform="rotate(180,632,176)"/>
                <polygon class="arrowhead" points="640,144 628,138.4 628,149.6" fill="black" transform="rotate(180,632,144)"/>
                <polygon class="arrowhead" points="624,288 612,282.4 612,293.6" fill="black" transform="rotate(0,616,288)"/>
                <polygon class="arrowhead" points="624,112 612,106.4 612,117.6" fill="black" transform="rotate(0,616,112)"/>
                <polygon class="arrowhead" points="264,240 252,234.4 252,245.6" fill="black" transform="rotate(180,256,240)"/>
                <polygon class="arrowhead" points="248,272 236,266.4 236,277.6" fill="black" transform="rotate(0,240,272)"/>
                <polygon class="arrowhead" points="56,256 44,250.4 44,261.6" fill="black" transform="rotate(180,48,256)"/>
                <g class="text">
                  <text x="44" y="68">Origin</text>
                  <text x="100" y="68">Issuer</text>
                  <text x="252" y="68">Origin</text>
                  <text x="628" y="68">Client</text>
                  <text x="780" y="68">Attester</text>
                  <text x="876" y="68">Issuer</text>
                  <text x="332" y="116">TokenChallenge</text>
                  <text x="428" y="116">(Issuer)</text>
                  <text x="704" y="148">Attestation</text>
                  <text x="752" y="164">CredentialRequest</text>
                  <text x="756" y="180">CredentialResponse</text>
                  <text x="628" y="196">CredentialFinalization</text>
                  <text x="624" y="212">|</text>
                  <text x="628" y="228">CredentialPresentation</text>
                  <text x="440" y="244">Request+Token+CredentialRequest(Origin)</text>
                  <text x="144" y="260">CredentialRequest</text>
                  <text x="140" y="276">CredentialResponse</text>
                  <text x="424" y="292">Response+CredentialResponse(Origin)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
                                                                                        +--------------------------.
+---------------+         +--------+                                     +--------+     |  +----------+ +--------+  |
| Origin Issuer |         | Origin |                                     | Client |     |  | Attester | | Issuer |  |
+---+-----------+         +---+----+                                     +---+----+     |  +-----+----+ +----+---+  |
    |                         |                                              |           `-------|-----------|-----'
    |                         +-- TokenChallenge (Issuer) ------------------>|                   |           |
    |                         |                                              |                   |           |
    |                         |                                              |<== Attestation ==>|           |
    |                         |                                              +------ CredentialRequest ----->|
    |                         |                                              |<----- CredentialResponse -----+
    |                         |                                    CredentialFinalization        |           |
    |                         |                                              |                   |           |
    |                         |                                    CredentialPresentation        |           |
    |                         |<-- Request+Token+CredentialRequest(Origin) --+                   |           |
    |<-- CredentialRequest ---+                                              |                   |           |
    +-- CredentialResponse -->|                                              |                   |           |
    |                         +--- Response+CredentialResponse(Origin) ----->|                   |           |
    |                         |                                              |                   |           |
]]></artwork>
          </artset>
        </figure>
        <t>The Origin Issuer <bcp14>MUST NOT</bcp14> issue privately verifiable tokens, as this would
lead to secret material being shared between the Origin and the Reverse Origin.</t>
        <t>A particular deployment model is when the Reverse Origin is the Attester/Issuer.
This model is described in <xref target="fig-deploy-joint-issuer-reserve"/></t>
        <figure anchor="fig-deploy-joint-issuer-reserve">
          <name>Joint Attester and Issuer Deployment Model with reverse</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="384" width="944" viewBox="0 0 944 384" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
                <path d="M 40,80 L 40,368" fill="none" stroke="black"/>
                <path d="M 136,48 L 136,80" fill="none" stroke="black"/>
                <path d="M 216,48 L 216,80" fill="none" stroke="black"/>
                <path d="M 248,80 L 248,368" fill="none" stroke="black"/>
                <path d="M 288,48 L 288,80" fill="none" stroke="black"/>
                <path d="M 592,48 L 592,80" fill="none" stroke="black"/>
                <path d="M 624,80 L 624,176" fill="none" stroke="black"/>
                <path d="M 624,240 L 624,288" fill="none" stroke="black"/>
                <path d="M 624,352 L 624,368" fill="none" stroke="black"/>
                <path d="M 664,48 L 664,80" fill="none" stroke="black"/>
                <path d="M 712,32 L 712,80" fill="none" stroke="black"/>
                <path d="M 736,48 L 736,80" fill="none" stroke="black"/>
                <path d="M 784,80 L 784,144" fill="none" stroke="black"/>
                <path d="M 784,192 L 784,344" fill="none" stroke="black"/>
                <path d="M 824,48 L 824,80" fill="none" stroke="black"/>
                <path d="M 840,48 L 840,80" fill="none" stroke="black"/>
                <path d="M 880,80 L 880,368" fill="none" stroke="black"/>
                <path d="M 912,48 L 912,80" fill="none" stroke="black"/>
                <path d="M 936,48 L 936,80" fill="none" stroke="black"/>
                <path d="M 712,32 L 920,32" fill="none" stroke="black"/>
                <path d="M 8,48 L 136,48" fill="none" stroke="black"/>
                <path d="M 216,48 L 288,48" fill="none" stroke="black"/>
                <path d="M 592,48 L 664,48" fill="none" stroke="black"/>
                <path d="M 736,48 L 824,48" fill="none" stroke="black"/>
                <path d="M 840,48 L 912,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 136,80" fill="none" stroke="black"/>
                <path d="M 216,80 L 288,80" fill="none" stroke="black"/>
                <path d="M 592,80 L 664,80" fill="none" stroke="black"/>
                <path d="M 736,80 L 824,80" fill="none" stroke="black"/>
                <path d="M 840,80 L 912,80" fill="none" stroke="black"/>
                <path d="M 728,96 L 776,96" fill="none" stroke="black"/>
                <path d="M 792,96 L 872,96" fill="none" stroke="black"/>
                <path d="M 888,96 L 920,96" fill="none" stroke="black"/>
                <path d="M 248,112 L 264,112" fill="none" stroke="black"/>
                <path d="M 472,112 L 616,112" fill="none" stroke="black"/>
                <path d="M 632,142 L 648,142" fill="none" stroke="black"/>
                <path d="M 632,146 L 648,146" fill="none" stroke="black"/>
                <path d="M 760,142 L 776,142" fill="none" stroke="black"/>
                <path d="M 760,146 L 776,146" fill="none" stroke="black"/>
                <path d="M 624,160 L 672,160" fill="none" stroke="black"/>
                <path d="M 832,160 L 872,160" fill="none" stroke="black"/>
                <path d="M 632,176 L 672,176" fill="none" stroke="black"/>
                <path d="M 840,176 L 880,176" fill="none" stroke="black"/>
                <path d="M 256,240 L 272,240" fill="none" stroke="black"/>
                <path d="M 608,240 L 624,240" fill="none" stroke="black"/>
                <path d="M 48,256 L 64,256" fill="none" stroke="black"/>
                <path d="M 224,256 L 248,256" fill="none" stroke="black"/>
                <path d="M 40,272 L 64,272" fill="none" stroke="black"/>
                <path d="M 248,288 L 272,288" fill="none" stroke="black"/>
                <path d="M 576,288 L 616,288" fill="none" stroke="black"/>
                <path d="M 624,352 L 720,352" fill="none" stroke="black"/>
                <path d="M 784,352 L 872,352" fill="none" stroke="black"/>
                <path d="M 920,32 C 928.83064,32 936,39.16936 936,48" fill="none" stroke="black"/>
                <path d="M 728,96 C 719.16936,96 712,88.83064 712,80" fill="none" stroke="black"/>
                <path d="M 920,96 C 928.83064,96 936,88.83064 936,80" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="880,352 868,346.4 868,357.6" fill="black" transform="rotate(0,872,352)"/>
                <polygon class="arrowhead" points="880,160 868,154.4 868,165.6" fill="black" transform="rotate(0,872,160)"/>
                <polygon class="arrowhead" points="784,144 772,138.4 772,149.6" fill="black" transform="rotate(0,776,144)"/>
                <polygon class="arrowhead" points="640,176 628,170.4 628,181.6" fill="black" transform="rotate(180,632,176)"/>
                <polygon class="arrowhead" points="640,144 628,138.4 628,149.6" fill="black" transform="rotate(180,632,144)"/>
                <polygon class="arrowhead" points="624,288 612,282.4 612,293.6" fill="black" transform="rotate(0,616,288)"/>
                <polygon class="arrowhead" points="624,112 612,106.4 612,117.6" fill="black" transform="rotate(0,616,112)"/>
                <polygon class="arrowhead" points="264,240 252,234.4 252,245.6" fill="black" transform="rotate(180,256,240)"/>
                <polygon class="arrowhead" points="56,256 44,250.4 44,261.6" fill="black" transform="rotate(180,48,256)"/>
                <g class="text">
                  <text x="44" y="68">Origin</text>
                  <text x="100" y="68">Issuer</text>
                  <text x="252" y="68">Origin</text>
                  <text x="628" y="68">Client</text>
                  <text x="780" y="68">Attester</text>
                  <text x="876" y="68">Issuer</text>
                  <text x="332" y="116">TokenChallenge</text>
                  <text x="428" y="116">(Issuer)</text>
                  <text x="704" y="148">Attestation</text>
                  <text x="752" y="164">CredentialRequest</text>
                  <text x="756" y="180">CredentialResponse</text>
                  <text x="620" y="196">CredentialFinalization</text>
                  <text x="624" y="212">|</text>
                  <text x="620" y="228">CredentialPresentation</text>
                  <text x="440" y="244">Request+Token+CredentialRequest(Origin)</text>
                  <text x="144" y="260">CredentialRequest</text>
                  <text x="148" y="276">CredentialResponse</text>
                  <text x="236" y="276">-&gt;</text>
                  <text x="424" y="292">Response+CredentialResponse(Origin)</text>
                  <text x="620" y="308">CredentialFinalization</text>
                  <text x="624" y="324">|</text>
                  <text x="620" y="340">CredentialPresentation</text>
                  <text x="752" y="356">Token</text>
                  <text x="784" y="372">|</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
                                                                                        +--------------------------.
+---------------+         +--------+                                     +--------+     |  +----------+ +--------+  |
| Origin Issuer |         | Origin |                                     | Client |     |  | Attester | | Issuer |  |
+---+-----------+         +---+----+                                     +---+----+     |  +-----+----+ +----+---+  |
    |                         |                                              |           `-------|-----------|-----'
    |                         +-- TokenChallenge (Issuer) ------------------>|                   |           |
    |                         |                                              |                   |           |
    |                         |                                              |<== Attestation ==>|           |
    |                         |                                              +------ CredentialRequest ----->|
    |                         |                                              |<----- CredentialResponse -----+
    |                         |                                   CredentialFinalization         |           |
    |                         |                                              |                   |           |
    |                         |                                   CredentialPresentation         |           |
    |                         |<-- Request+Token+CredentialRequest(Origin) --+                   |           |
    |<-- CredentialRequest ---+                                              |                   |           |
    +--- CredentialResponse ->|                                              |                   |           |
    |                         +--- Response+CredentialResponse(Origin) ----->|                   |           |
    |                         |                                   CredentialFinalization         |           |
    |                         |                                              |                   |           |
    |                         |                                   CredentialPresentation         |           |
    |                         |                                              +------------ Token ----------->|
    |                         |                                              |                   |           |
]]></artwork>
          </artset>
        </figure>
        <t>This deployment <bcp14>SHOULD</bcp14> not allow the Reverse Origin such as an Initial Issuer
to infer the request made to the Origin, as it would break unlinkability.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Privacy Pass <xref target="RFC9576"/> states</t>
      <ul empty="true">
        <li>
          <t>In general, limiting the amount of metadata permitted helps limit the extent
to which metadata can uniquely identify individual Clients. Failure to bound the
number of possible metadata values can therefore lead to a reduction in Client
privacy. Most token types do not admit any metadata, so this bound is implicitly
enforced.</t>
        </li>
      </ul>
      <t>In Privacy Pass with a reverse flow, Clients are provided with new PrivateTokens
depending on their request. They can present these tokens to continue making further
requests.</t>
      <t>While the tokens are still unlinkable, the <tt>token_key_id</tt> associated to them
represent metadata. It leaks some information about the Client. The following
subsections discuss the issues that influence the anonymity set, and possible
mitigations/safeguards to protect against this underlying problem.</t>
      <section anchor="issuer-face-values">
        <name>Issuer face values</name>
        <t>When setting up a reverse flow deployment, an Origin <bcp14>MAY</bcp14> operate multiple
Issuers, and assign them some metadata to them. The amount of possible metadata
grows as <tt>2^(origin_issuers)</tt>.</t>
        <t>We RECOMMEND that:</t>
        <ol spacing="normal" type="1"><li>
            <t>Origins define their anonymity sets, and deploy no more than
<tt>log2(#anonymity_sets)</tt>. This bounds the possible anonymity sets by design.</t>
          </li>
          <li>
            <t>Clients to only send 1 PrivateToken per request. This is consistent with <xref section="3.2" sectionFormat="of" target="RFC9577"/>
and <xref section="11.6.2" sectionFormat="of" target="RFC9110"/> which only allows one challenge response to be
provided as part of Authorization HTTP header.</t>
          </li>
          <li>
            <t>Issuers metadata to be publicly disclosed via an Origin endpoint, and
externally monitored.</t>
          </li>
        </ol>
      </section>
      <section anchor="token-for-specific-clients">
        <name>Token for specific Clients</name>
        <t>In Privacy Pass with a reverse flow, an Origin <bcp14>MAY</bcp14> operate multiple Issuers,
with arbitrary metadata associated to them. A malicious Origin <bcp14>MAY</bcp14> uses this
opportunity to associate certain token values to a specific set of Clients.</t>
        <t>Let's consider the following deployment: the Origin operates two Issuers A and
B. The Client sends Token_A, and (CredentialRequest_A, CredentialRequest_B). Issuer B is
associated to people that like croissant. Issuer A is for the rest of the clients.</t>
        <t>If a Client requests croissant, or sends Token_B, the Origin provides
CredentialResponse_B. If not, it provides CredentialResponse_A.</t>
        <t>Over time, this means the Origin is able to track people that like croissants.</t>
        <t>To mitigate this, we RECOMMEND:</t>
        <ol spacing="normal" type="1"><li>
            <t>The initial PrivateToken to be provided by an Issuer not in control of the
Origin.</t>
          </li>
          <li>
            <t>Clients to reset their state regularly with the initial Issuer.</t>
          </li>
        </ol>
      </section>
      <section anchor="swap-endpoint-and-its-privacy-implication">
        <name>Swap endpoint and its privacy implication</name>
        <t>With multiple Issuers, a Client <bcp14>MAY</bcp14> end up with a bunch of tokens, for various
Issuers. Origins <bcp14>MAY</bcp14> propose a swap endpoint at which a Client can exchange one
or more Origin tokens against one or more new Origin tokens.</t>
        <t>The Origin <bcp14>SHOULD</bcp14> ensure this endpoint receives enough traffic to not reduce the
anonymity sets.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BATCHED-TOKENS">
          <front>
            <title>Batched Token Issuance Protocol</title>
            <author fullname="Raphael Robert" initials="R." surname="Robert">
              <organization>Phoenix R&amp;D</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare Inc.</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies two variants of the Privacy Pass issuance
   protocol that allow for batched issuance of tokens.  These allow
   clients to request more than one token at a time and for issuers to
   issue more than one token at a time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-batched-tokens-06"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC9576">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="A. Davidson" initials="A." surname="Davidson"/>
            <author fullname="J. Iyengar" initials="J." surname="Iyengar"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies the Privacy Pass architecture and requirements for its constituent protocols used for authorization based on privacy-preserving authentication mechanisms. It describes the conceptual model of Privacy Pass and its protocols, its security and privacy goals, practical deployment models, and recommendations for each deployment model, to help ensure that the desired security and privacy goals are fulfilled.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9576"/>
          <seriesInfo name="DOI" value="10.17487/RFC9576"/>
        </reference>
        <reference anchor="RFC9578">
          <front>
            <title>Privacy Pass Issuance Protocols</title>
            <author fullname="S. Celi" initials="S." surname="Celi"/>
            <author fullname="A. Davidson" initials="A." surname="Davidson"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document specifies two variants of the two-message issuance protocol for Privacy Pass tokens: one that produces tokens that are privately verifiable using the Issuer Private Key and one that produces tokens that are publicly verifiable using the Issuer Public Key. Instances of "issuance protocol" and "issuance protocols" in the text of this document are used interchangeably to refer to the two variants of the Privacy Pass issuance protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9578"/>
          <seriesInfo name="DOI" value="10.17487/RFC9578"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PRIVACYPASS-ACT">
          <front>
            <title>Privacy Pass Issuance Protocol for Anonymous Credit Tokens</title>
            <author fullname="Samuel Schlesinger" initials="S." surname="Schlesinger">
              <organization>Google</organization>
            </author>
            <author fullname="Thibault Meunier" initials="T." surname="Meunier">
              <organization>Cloudflare Inc.</organization>
            </author>
            <date day="13" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the issuance and redemption protocols for
   tokens based on the Anonymous Credit Tokens (ACT) protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-schlesinger-privacypass-act-01"/>
        </reference>
        <reference anchor="PRIVACYPASS-ARC">
          <front>
            <title>Privacy Pass Issuance Protocol for Anonymous Rate-Limited Credentials</title>
            <author fullname="Cathie Yun" initials="C." surname="Yun">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Armando Faz-Hernandez" initials="A. F." surname="Faz-Hernandez">
              <organization>Cloudflare</organization>
            </author>
            <date day="4" month="February" year="2026"/>
            <abstract>
              <t>   This document specifies the issuance and redemption protocols for
   tokens based on the Anonymous Rate-Limited Credential (ARC)
   cryptographic protocol.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-arc-protocol-00"/>
        </reference>
        <reference anchor="PRIVACYPASS-BBS">
          <front>
            <title>BBS for PrivacyPass</title>
            <author fullname="Watson Ladd" initials="W." surname="Ladd">
              <organization>Akamai Technologies</organization>
            </author>
            <date day="26" month="February" year="2024"/>
            <abstract>
              <t>   Existing token types in privacy pass conflate attribution with rate
   limiting.  This document describes a token type where the issuer
   attests to a set of properties of the client, which the client can
   then selectively prove to the origin.  Repeated showings of the same
   credential are unlinkable, unlike other token types in privacy pass.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ladd-privacypass-bbs-01"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9577">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="S. Valdez" initials="S." surname="Valdez"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document defines an HTTP authentication scheme for Privacy Pass, a privacy-preserving authentication mechanism used for authorization. The authentication scheme specified in this document can be used by Clients to redeem Privacy Pass tokens with an Origin. It can also be used by Origins to challenge Clients to present Privacy Pass tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9577"/>
          <seriesInfo name="DOI" value="10.17487/RFC9577"/>
        </reference>
      </references>
    </references>
    <?line 447?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank Tommy Pauly, Chris Wood, Raphael Robert, and Armando Faz Hernandez
for helpful discussion on Privacy Pass architecture and its considerations.</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <t>v02</t>
      <ul spacing="normal">
        <li>
          <t>Diagrams now use Credential instead of Token, and use both Finalization and Presentation as keyword</t>
        </li>
        <li>
          <t>Rework the intro to make it consistent with Anonymous credentials evolutions</t>
        </li>
        <li>
          <t>Have Anonymous credentials use case, given it needs a new architecture</t>
        </li>
        <li>
          <t>Editorial pass on PrivacyPass-Reverse header</t>
        </li>
      </ul>
      <t>v01</t>
      <ul spacing="normal">
        <li>
          <t>Editorial pass on the introduction</t>
        </li>
        <li>
          <t>Add a motivation section: refunding tokens, bootstraping issuer, attester feedback loop</t>
        </li>
        <li>
          <t>Split protocol overview via HTTP headers in its own section</t>
        </li>
        <li>
          <t>Add consideration about anonymous credentials in joint origin/issuer deployment</t>
        </li>
      </ul>
      <t>v00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
        <li>
          <t>Possibility of a new HTTP request for inlining request</t>
        </li>
        <li>
          <t>Privacy considerations about additional metadata</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
