@@ -243,6 +243,61 @@ <h2>Introduction</h2>
243
243
are urged to provide citations to prior art that they feel apply.
244
244
</ p >
245
245
246
+ < section class ="nonnormative ">
247
+ < h2 > Goals</ h2 >
248
+
249
+ < p >
250
+ This specification satisfies the following design goals:
251
+ </ p >
252
+
253
+ < dl >
254
+ < dt > Generalized</ dt >
255
+ < dd >
256
+ The log format provided in this specification can contain events that record
257
+ arbitrary operations on data objects, making it broadly useful in different
258
+ market verticals.
259
+ </ dd >
260
+ < dt > Cryptographically Verifiable</ dt >
261
+ < dd >
262
+ The log format is cryptographically verifiable, which can be used to detect log
263
+ tampering, and reduces the reliance on centralized systems and services.
264
+ </ dd >
265
+ < dt > Post-Quantum Ready</ dt >
266
+ < dd >
267
+ The log format uses cryptographic digests, which are secure against quantum
268
+ computers, as the primary mechanism to link events together. The elliptic-curve
269
+ cryptographic signatures, which are not secure against quantum computers, are a
270
+ secondary mechanism used to witness events. This separation of concerns enables
271
+ the cryptographic signature mechanism to be smoothly upgraded to a post-quantum
272
+ secure cryptographic signature scheme on a per-log basis as post-quantum
273
+ resistant digital proofs become more widely adopted.
274
+ </ dd >
275
+ < dt > Decentralized Witnesses</ dt >
276
+ < dd >
277
+ The event witnessing mechanism does not rely on a central authority and
278
+ does not rely on coordination among witnesses.
279
+ </ dd >
280
+ < dt > Oblivous Signatures</ dt >
281
+ < dd >
282
+ The witnessing mechanism relies on oblivious signatures which greatly reduces
283
+ liability related to cryptographic signatures produced by a witness.
284
+ </ dd >
285
+ < dt > Separation of Concerns</ dt >
286
+ < dd >
287
+ The log layer is a separate architectural layer from the event layer, which
288
+ is a separate layer from the operation layer, which defines the algorithms
289
+ that the state machine uses to validate the lifecycle of the data object.
290
+ </ dd >
291
+ </ dl >
292
+ </ section >
293
+
294
+ < section class ="nonnormative ">
295
+ < h2 > Use Cases and Requirements</ h2 >
296
+
297
+ < p >
298
+ </ p >
299
+ </ section >
300
+
246
301
< section id ="conformance ">
247
302
< p >
248
303
A < dfn > conforming log</ dfn > is any [=byte sequence=] that can be
0 commit comments