<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.1.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4648 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC5234 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml">
<!ENTITY RFC8032 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7942 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
]>


<rfc ipr="trust200902" docName="draft-morrison-reviewed-by-trailer-01" category="info">
  <front>
    <title abbrev="Reviewed-By Trailer">Reviewed-By Trailer: Sovereign-Portable Peer-Review Attribution for Content-Hash-Bound Artefacts</title>

    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
      <address>
        <email>blake@truealter.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="18"/>

    
    
    

    <abstract>


<?line 81?>

<t>This document defines a trailer grammar for sovereign-portable peer
review as an extension of the identity-attributed commit grammar in
<xref target="COMMITS"></xref>.  The grammar introduces one required trailer
(<spanx style="verb">Reviewed-By:</spanx>) and three optional companion trailers
(<spanx style="verb">Review-Stance:</spanx>, <spanx style="verb">Review-Of:</spanx>, <spanx style="verb">Witnessed-By:</spanx>) that bind a
Sovereign-tier <spanx style="verb">~handle</spanx> to a specific act of review over a specific
content artefact, cryptographically signed using the Ed25519
mechanism of <xref target="COMMITS"></xref>.  The mechanism applies uniformly to git
commits, document manifests, pre-prints, patent disclosures, and
any other content-addressable artefact.  Reviewer reputation
accumulates on the sovereign handle rather than on a publisher's
platform, making reviewer trust portable across journals,
pre-print servers, and private review contexts.  Pseudonymous
review for anonymous peer-review processes is supported by
permitting a Sovereign handle whose underlying party is concealed
through out-of-band key custody, preserving full cryptographic
verifiability of the review act without disclosing the reviewer's
underlying identity.
The grammar is positioned as complementary to CRediT <xref target="CREDIT"></xref>,
ORCID <xref target="ORCID"></xref>, and DOI <xref target="DOI"></xref> attribution infrastructure, not as a
replacement for them.</t>



    </abstract>



  </front>

  <middle>


<?line 105?>

<section anchor="status-of-this-memo"><name>Status of This Memo</name>

<t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>

<t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>

<t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>

<t>This Internet-Draft will expire on October 13, 2026.</t>

</section>
<section anchor="copyright-notice"><name>Copyright Notice</name>

<t>Copyright (c) 2026 IETF Trust and the persons identified as the
document authors.  All rights reserved.</t>

<t>This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document.</t>

</section>
<section anchor="introduction"><name>Introduction</name>

<section anchor="problem-statement"><name>Problem Statement</name>

<t>Peer review of scholarly, scientific, and technical artefacts is
today captured by a small number of publishing intermediaries whose
editorial platforms hold the only durable record of a reviewer's
contribution.  When a reviewer accepts an invitation from a journal,
the journal records the review against an internal reviewer
profile; when the reviewer moves to another venue, that record does
not travel with them.  The mechanisms currently available for
attaching reviewer identity to a review are fragmented and
individually inadequate:</t>

<t><list style="symbols">
  <t><strong>Journal reviewer databases.</strong>  Each publisher (Elsevier,
Springer Nature, Wiley, PLOS) maintains an internal reviewer
profile.  Reviewer reputation is platform-local.  Migrating
between publishers re-roots reputation.</t>
  <t><strong>ORCID reviewer credit <xref target="ORCID"></xref>.</strong>  ORCID supports a "Peer Review"
activity type in which a publisher asserts that a given ORCID iD
performed a review.  The assertion is publisher-attested; the
reviewer cannot publish a review record without publisher
cooperation, and cannot cryptographically demonstrate the review
occurred without that cooperation.</t>
  <t><strong>CRediT contributor roles <xref target="CREDIT"></xref>.</strong>  CRediT is a controlled
vocabulary for author-level contribution (conceptualisation,
methodology, writing, etc.).  It is orthogonal to review: CRediT
describes what authors did, not what reviewers said.</t>
  <t><strong>Open-review initiatives (eLife <xref target="ELIFE-OPENREVIEW"></xref>, F1000,
arXiv trackbacks).</strong>  These publish review content openly but
continue to locate reviewer identity inside the publisher's
platform; leaving the platform ends the review's discoverability.</t>
  <t><strong>COPE guidance <xref target="COPE"></xref>.</strong>  Establishes ethical norms for peer
review but does not specify a format, attribution mechanism, or
cryptographic binding.</t>
</list></t>

<t>None of the above provides a provider-neutral, DNS-resolvable,
cryptographically-bound attribution mechanism for peer review that
lets a reviewer accumulate portable reputation outside any
publisher's platform.</t>

</section>
<section anchor="design-goals"><name>Design Goals</name>

<t>This document defines a review-trailer grammar with the following
goals:</t>

<t><list style="numbers" type="1">
  <t><strong>Provider-neutral.</strong>  No dependency on any specific publisher,
pre-print server, or editorial platform.</t>
  <t><strong>Sovereign-portable.</strong>  Reviewer reputation accumulates on the
reviewer's sovereign <spanx style="verb">~handle</spanx> rather than on any publisher's
platform.  A reviewer who moves between journals, or between
open review and private review, carries their signed review
history with them.</t>
  <t><strong>Content-bound.</strong>  Every review trailer is bound to a specific
content hash, so that a review of version 1 of a manuscript
cannot be silently re-attributed to version 2.</t>
  <t><strong>Cryptographically verifiable.</strong>  Review attribution is bound
by an Ed25519 signature whose public key is reachable from DNS
without prior trust establishment, reusing the signature model
of <xref target="COMMITS"></xref>.</t>
  <t><strong>Pseudonymity-preserving.</strong>  Anonymous peer review remains a
load-bearing institution in some disciplines.  The grammar
supports pseudonymous review by permitting a Sovereign handle
whose underlying party is concealed through out-of-band key
custody, retaining cryptographic verifiability of the review
act without disclosing the reviewer's underlying identity.</t>
  <t><strong>Category-safe against misattribution.</strong>  Conformant parsers
reject cross-tier handle placement (e.g., an Instrument-tier
handle in a <spanx style="verb">Reviewed-By:</spanx> slot) as a structural grammar
violation, not a policy decision.</t>
</list></t>

</section>
<section anchor="scope"><name>Scope</name>

<t>This document specifies:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">Reviewed-By:</spanx>, <spanx style="verb">Review-Stance:</spanx>, <spanx style="verb">Review-Of:</spanx>, and
<spanx style="verb">Witnessed-By:</spanx> trailer grammar in ABNF <xref target="RFC5234"></xref>.</t>
  <t>Reuse of the <spanx style="verb">Identity-Signature:</spanx>, <spanx style="verb">Identity-Key-Id:</spanx>, and
<spanx style="verb">Identity-Anchor:</spanx> cryptographic trailers from <xref target="COMMITS"></xref>.</t>
  <t>Multiplicity, placement, and ordering rules.</t>
  <t>Verifier behaviour for accepting, rejecting, and surfacing
review states.</t>
  <t>Security and privacy considerations specific to peer review.</t>
</list></t>

<t>This document does NOT specify:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">~handle</spanx> identity primitive itself, which is defined by
<xref target="MCPDNS"></xref> and incorporated by reference through <xref target="COMMITS"></xref>.</t>
  <t>The normative tier taxonomy, which is defined in <xref target="COMMITS"></xref>
Section 3 and restated briefly in Section 3 of this document.</t>
  <t>An editorial workflow or an editorial decision algorithm.  This
document defines an attribution grammar, not a review process.</t>
  <t>The economic rails for reviewer compensation.  These are out of
scope; the anti-extraction posture of Section 8 is summarised at
the level required to motivate protocol-layer design choices.</t>
</list></t>

</section>
</section>
<section anchor="terminology"><name>Terminology</name>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
and "OPTIONAL" in this document are to be interpreted as described
in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in
all capitals, as shown here.</t>

</section>
<section anchor="definitions"><name>Definitions</name>

<dl>
  <dt>Handle</dt>
  <dd>
    <t>A <spanx style="verb">~</spanx>-prefixed identifier per <xref target="MCPDNS"></xref>, as incorporated into
<xref target="COMMITS"></xref>.  Handles are the unit of identity addressing in this
document.</t>
  </dd>
  <dt>Sovereign Tier Handle</dt>
  <dd>
    <t>Per <xref target="COMMITS"></xref> Section 2.2.  A handle representing a human
individual or formal organisation with direct cryptographic
agency; holds its own private key; can sign.</t>
  </dd>
  <dt>Pseudonymous Sovereign Handle</dt>
  <dd>
    <t>A Sovereign-tier handle whose underlying real-world party is
intentionally concealed.  No syntactic marker distinguishes a
pseudonymous Sovereign handle from a directly-identified one;
the distinction is policy-level and is held by the reviewer (or
by an editorial intermediary) through out-of-band key custody
and assignment records.  Pseudonymous Sovereign handles sign
with the same cryptographic weight as any other Sovereign
handle and are admissible wherever a Sovereign handle is
admissible.</t>
  </dd>
  <dt>Instrument Tier Handle</dt>
  <dd>
    <t>Per <xref target="COMMITS"></xref> Section 2.2.  A handle representing an AI model,
API endpoint, or tool class; holds no key; cannot sign.
Instrument handles are inadmissible in review slots.</t>
  </dd>
  <dt>Review Act</dt>
  <dd>
    <t>A discrete act of evaluation performed by a Sovereign reviewer
against a specific content artefact identified by content hash.
A review act produces one trailer block.</t>
  </dd>
  <dt>Content Hash</dt>
  <dd>
    <t>A cryptographic digest (SHA-256 or SHA-512, or the git object
hash family of <xref target="COMMITS"></xref>) of the canonicalised artefact being
reviewed.  The hash binds the review to a specific manifest
state and prevents silent re-attribution across revisions.</t>
  </dd>
  <dt>Review Stance</dt>
  <dd>
    <t>A controlled-vocabulary enumeration of the reviewer's disposition
toward the artefact.  Permitted values are <spanx style="verb">accept</spanx>, <spanx style="verb">reject</spanx>,
<spanx style="verb">revise</spanx>, <spanx style="verb">endorse</spanx>, and <spanx style="verb">dispute</spanx>.</t>
  </dd>
  <dt>Witness</dt>
  <dd>
    <t>A second Sovereign-tier handle that attests to having observed
the review act being performed, without taking review
responsibility.  Used for signing ceremonies and high-stakes
review contexts (patent disclosures, adversarial reviews).</t>
  </dd>
  <dt>Conformant Verifier</dt>
  <dd>
    <t>A consumer of review trailers that implements the parsing,
rejection, and signature-verification rules defined in
Section 7.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="identity-tier-taxonomy-informative-reference"><name>Identity Tier Taxonomy (Informative Reference)</name>

<t>The review-trailer grammar reuses the three-tier taxonomy defined
in <xref target="COMMITS"></xref> Section 3 without extension.  Pseudonymous review is
expressed as a Sovereign handle whose underlying party is concealed
through out-of-band key custody (Section 2.2); no separate tier or
syntactic suffix is introduced.</t>

<texttable>
      <ttcol align='left'>Tier</ttcol>
      <ttcol align='left'>Cryptographic Agency</ttcol>
      <ttcol align='left'>Admissible in Reviewed-By: / Witnessed-By:</ttcol>
      <ttcol align='left'>Examples</ttcol>
      <c>Sovereign</c>
      <c>Holds own key, signs</c>
      <c>Yes</c>
      <c><spanx style="verb">~alice</spanx>, <spanx style="verb">~example.com</spanx>, <spanx style="verb">~reviewer-kappa</spanx></c>
      <c>Bot</c>
      <c>Scoped delegated key</c>
      <c>No</c>
      <c><spanx style="verb">~example-deps.bot</spanx>, <spanx style="verb">~example-triage.bot</spanx></c>
      <c>Instrument</c>
      <c>No key, no signature</c>
      <c>No</c>
      <c><spanx style="verb">~example-model-1</spanx>, <spanx style="verb">~example-model-2</spanx></c>
</texttable>

<t>The Bot and Instrument tiers are inadmissible in review slots
because peer review is an attestational act that requires
cryptographic sovereign agency.  Conformant verifiers MUST reject
cross-tier placement per Section 7.  Where AI-instrument
involvement in review drafting must be disclosed, the separate
<spanx style="verb">Drafted-With:</spanx> trailer of <xref target="COMMITS"></xref> SHOULD be used alongside
<spanx style="verb">Reviewed-By:</spanx>.</t>

</section>
<section anchor="trailer-grammar-normative"><name>Trailer Grammar (Normative)</name>

<section anchor="abnf"><name>ABNF</name>

<t>The following ABNF <xref target="RFC5234"></xref> defines the syntax of each trailer.
Implementations MUST accept exactly this grammar.  Terminals not
defined here are imported from <xref target="RFC5234"></xref> or from <xref target="COMMITS"></xref>
Section 4.1.</t>

<t>```
reviewed-by-trailer   = "Reviewed-By:" SP review-handle CRLF
review-stance-trailer = "Review-Stance:" SP stance-value CRLF
review-of-trailer     = "Review-Of:" SP content-hash-ref CRLF
witnessed-by-trailer  = "Witnessed-By:" SP sovereign-handle CRLF</t>

<t>review-handle         = sovereign-handle
sovereign-handle      = "~" handle-label
                        ; per <xref target="COMMITS"></xref> Section 4.1</t>

<t>stance-value          = "accept" / "reject" / "revise"
                      / "endorse" / "dispute"</t>

<t>content-hash-ref      = hash-algorithm ":" hash-value
hash-algorithm        = "sha256" / "sha512" / "git-sha1"
                      / "git-sha256"
hash-value            = 1*HEXDIG</t>

<t>handle-label          = 1*63( ALPHA / DIGIT / "-" / "_" / "." )
                        ; per <xref target="COMMITS"></xref>
```</t>

<t>Pseudonymous review is grammatically indistinguishable from
direct-identity review: both forms appear as a <spanx style="verb">sovereign-handle</spanx>
production.  Whether the underlying party is concealed is a
policy-level property held out-of-band by the reviewer (or by an
editorial intermediary that manages pseudonym assignment) and is
not exposed in the trailer grammar.  Cryptographic verification
proceeds identically in either case.</t>

<t>The cryptographic trailers <spanx style="verb">Identity-Signature:</spanx>,
<spanx style="verb">Identity-Key-Id:</spanx>, and <spanx style="verb">Identity-Anchor:</spanx> are imported unchanged
from <xref target="COMMITS"></xref> Section 4.1 and MAY appear in a review trailer
block under the multiplicity rules of Section 4.4 below.</t>

</section>
<section anchor="placement"><name>Placement</name>

<t>Review trailers MUST appear in the trailer/footer block of the
containing artefact.  For git commits, this is the commit message
footer as defined in <xref target="COMMITS"></xref> Section 4.2.  For document
manifests (e.g., a <spanx style="verb">REVIEW.md</spanx> review record, a manifest appended
to a pre-print, or a trailer block embedded in a patent disclosure
submission form), the trailer block MUST appear as the final
block of the document, separated from the preceding content by
exactly one blank line.</t>

<t>A review trailer block is distinguished from a commit trailer
block of <xref target="COMMITS"></xref> by the presence of at least one
<spanx style="verb">Reviewed-By:</spanx> trailer.  The two trailer types MAY coexist on the
same artefact: for example, a pre-print draft committed to a git
repository MAY carry both an <spanx style="verb">Acted-By:</spanx> trailer (attributing the
commit) and a <spanx style="verb">Reviewed-By:</spanx> trailer (attributing a subsequent
review of the committed content).  Verifiers MUST parse them
independently.</t>

</section>
<section anchor="ordering"><name>Ordering</name>

<t>Review trailers SHOULD appear in the following canonical order:</t>

<t><list style="numbers" type="1">
  <t><spanx style="verb">Reviewed-By:</spanx></t>
  <t><spanx style="verb">Review-Stance:</spanx></t>
  <t><spanx style="verb">Review-Of:</spanx></t>
  <t><spanx style="verb">Witnessed-By:</spanx></t>
  <t><spanx style="verb">Identity-Signature:</spanx></t>
  <t><spanx style="verb">Identity-Key-Id:</spanx></t>
  <t><spanx style="verb">Identity-Anchor:</spanx></t>
</list></t>

<t>Verifiers MUST accept trailers in any order, but emitters SHOULD
follow the canonical order to support diff-based review.</t>

</section>
<section anchor="multiplicity-rules"><name>Multiplicity Rules</name>

<t>The following multiplicity constraints apply to a single review
trailer block:</t>

<t><list style="symbols">
  <t><strong><spanx style="verb">Reviewed-By:</spanx></strong> - Exactly one trailer per review block.  A
single artefact MAY receive multiple review blocks over its
lifetime (one per reviewer); each block is independently
attributed and verified.</t>
  <t><strong><spanx style="verb">Review-Stance:</spanx></strong> - At most one trailer per review block.
A review takes exactly one stance at a time.  If the reviewer's
disposition is nuanced (e.g., "revise and resubmit with stance
leaning toward accept"), the primary stance SHOULD be selected
and the nuance recorded in the review body, not in additional
stance trailers.</t>
  <t><strong><spanx style="verb">Review-Of:</spanx></strong> - At most one trailer per review block.  A
review is bound to exactly one content-hash reference.  A
reviewer commenting on multiple artefacts MUST emit a separate
review block per artefact.</t>
  <t><strong><spanx style="verb">Witnessed-By:</spanx></strong> - Zero or more trailers per review block.
Multi-witness ceremonies (e.g., patent disclosure reviews
requiring two witness signatures) are permitted and expected.
Multiple witnesses form an unordered set; order of appearance
is not semantically significant.</t>
  <t><strong><spanx style="verb">Identity-Signature:</spanx> and <spanx style="verb">Identity-Key-Id:</spanx></strong> - These two
trailers MUST appear together or not at all, per <xref target="COMMITS"></xref>
Section 4.4.  When present, they bind to the most recent
preceding <spanx style="verb">Reviewed-By:</spanx> trailer in the block.  Witness
signatures, if required, are recorded as separate trailer
blocks each rooted at a <spanx style="verb">Reviewed-By:</spanx> copy of the reviewer's
handle or, alternatively, as witness-specific signature pairs
whose binding is specified by the containing manifest.</t>
  <t><strong><spanx style="verb">Identity-Anchor:</spanx></strong> - OPTIONAL in this version of the
specification.  Implementations targeting transparency-log-
anchored review attribution MUST emit it.</t>
</list></t>

</section>
</section>
<section anchor="signature-algorithm-normative"><name>Signature Algorithm (Normative)</name>

<section anchor="algorithm-and-signed-payload"><name>Algorithm and Signed Payload</name>

<t>The signature algorithm is Ed25519 <xref target="RFC8032"></xref>, reused unchanged
from <xref target="COMMITS"></xref> Section 5.</t>

<t>The signed payload is the raw byte representation of the
canonicalised-content hash of the artefact under review, as named
in the <spanx style="verb">Review-Of:</spanx> trailer.  The algorithm named in the
<spanx style="verb">content-hash-ref</spanx> determines which digest is produced; the signed
bytes are the raw digest, not a hex-encoded string.</t>

</section>
<section anchor="rationale-for-canonicalised-content-hash-signing"><name>Rationale for Canonicalised-Content-Hash Signing</name>

<t>The signature binds the reviewer's sovereign key to the exact
canonicalised content of the artefact being reviewed.  This is
distinct from (and orthogonal to) the tree-hash signing model of
<xref target="COMMITS"></xref>.  A review is a statement about content, not about
commit history; binding the review to the content hash preserves
the review's attribution across re-export of the artefact into
different containers (a pre-print re-uploaded to arXiv, the same
manuscript ingested by a journal's submission system, a patent
specification exported to PDF) as long as the canonicalisation
yields the same digest.</t>

<t>Manifest hashes (envelope digests of the publisher's submission
record) are deliberately NOT used as the signed payload.  If a
publisher re-packages the artefact, the manifest hash changes
while the content is identical; binding reviews to manifest
hashes would invalidate reviewer signatures under routine
publisher operations.  The authority over what constitutes
"canonical content" rests with the artefact's originator (the
author) rather than with the publisher; this preserves
sovereign-portability of review.</t>

</section>
<section anchor="signature-format"><name>Signature Format</name>

<t>Signature encoding follows <xref target="COMMITS"></xref> Section 5.4 without
modification.  The trailer value is <spanx style="verb">ed25519:</spanx> followed by the
base64url-encoded 64-byte signature per <xref target="RFC4648"></xref>.</t>

</section>
</section>
<section anchor="dns-resolution-normative-reference"><name>DNS Resolution (Normative Reference)</name>

<section anchor="reviewer-key-resolution"><name>Reviewer Key Resolution</name>

<t>The reviewer's public key is resolved via the <spanx style="verb">_alter.&lt;zone&gt;</spanx> DNS
record mechanism of <xref target="MCPDNS"></xref>, exactly as specified in <xref target="COMMITS"></xref>
Section 6.1.  No mechanism is provided for verifiers to learn,
from the trailer grammar or the DNS record alone, whether a given
Sovereign handle is operated by a directly-identified party or by
a concealed party under pseudonymous key custody.  Where the
distinction matters editorially, it is conveyed through separate
out-of-band channels (editorial assignment records, conference of
record); the protocol layer does not surface it.</t>

</section>
<section anchor="witness-resolution"><name>Witness Resolution</name>

<t>Witness handles resolve identically to reviewer handles.
Witnesses MUST be Sovereign-tier handles.  Although the grammar
does not distinguish pseudonymous from directly-identified
Sovereign handles, the witness role is expressly an on-the-record
presence attestation; witnesses SHOULD therefore use Sovereign
handles whose underlying identity is publicly resolvable by the
intended verifier audience, since concealed-party witnessing
materially weakens the attestation.</t>

</section>
</section>
<section anchor="verifier-behaviour-normative"><name>Verifier Behaviour (Normative)</name>

<t>A conformant verifier MUST perform the following steps in order:</t>

<t><list style="numbers" type="1">
  <t><strong>Parse all review trailers from the trailer block.</strong>  Trailers
appearing outside the block MUST be ignored.</t>
  <t><strong>Reject cross-slot category errors.</strong>  For each trailer,
resolve the handle's tier per <xref target="MCPDNS"></xref>.  If any handle appears
in a slot other than its tier's admissible slot - for example,
an Instrument-tier handle in a <spanx style="verb">Reviewed-By:</spanx> slot, or a
Bot-tier handle in a <spanx style="verb">Reviewed-By:</spanx> or <spanx style="verb">Witnessed-By:</spanx> slot -
the trailer block is malformed and the verifier MUST reject it
as a category error.  The error message SHOULD identify the
offending trailer by name.</t>
  <t><strong>Validate the controlled-vocabulary stance.</strong>  If a
<spanx style="verb">Review-Stance:</spanx> trailer is present, its value MUST be one of
the five stance values defined in Section 4.1.  Unknown stance
values MUST cause the review to be marked as malformed.</t>
  <t><strong>Verify signatures, if present.</strong>  If <spanx style="verb">Identity-Signature:</spanx>
and <spanx style="verb">Identity-Key-Id:</spanx> are present, the verifier MUST:  <vspace blankLines='1'/>
a. Extract the <spanx style="verb">key-id</spanx> from the <spanx style="verb">Identity-Key-Id:</spanx> trailer.
b. Resolve the corresponding public key by querying the
   <spanx style="verb">Reviewed-By:</spanx> handle's <spanx style="verb">_alter</spanx> record per Section 6.1.
c. Compute or retrieve the canonicalised-content hash of the
   artefact referenced by <spanx style="verb">Review-Of:</spanx>.
d. Verify the Ed25519 signature against that hash using the
   resolved public key.  <vspace blankLines='1'/>
If signature verification fails, the verifier MUST mark the
review as <spanx style="verb">unverified</spanx> and MUST NOT report it as having a valid
sovereign attribution.</t>
  <t><strong>Verify content-hash binding.</strong>  If <spanx style="verb">Review-Of:</spanx> is present,
the verifier SHOULD recompute the content hash from the
artefact as delivered and compare it to the value in
<spanx style="verb">Review-Of:</spanx>.  Mismatch indicates either artefact tampering or
review attribution to a different version; the verifier MUST
surface this condition and MUST NOT silently accept the
review.</t>
</list></t>

<t>A conformant verifier SHOULD additionally:</t>

<t><list style="numbers" type="1">
  <t><strong>Distinguish review states in user-facing output.</strong>  Verifiers
SHOULD present three distinct states:
  <list style="symbols">
      <t><spanx style="verb">verified</spanx> - <spanx style="verb">Reviewed-By:</spanx> present with a valid
<spanx style="verb">Identity-Signature:</spanx> resolving to the published key AND
content-hash match.</t>
      <t><spanx style="verb">claimed</spanx> - <spanx style="verb">Reviewed-By:</spanx> present without a signature, or
with a signature whose key cannot be resolved.</t>
      <t><spanx style="verb">hash-mismatch</spanx> - signature valid but content digest differs
from <spanx style="verb">Review-Of:</spanx>.</t>
    </list>
Conflating these states is a security defect.  Whether a
<spanx style="verb">verified</spanx> review is directly-identified or pseudonymous is
not derivable from the grammar; verifiers MUST NOT attempt to
classify reviews along that axis from the trailer block alone.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="reviewer-reputation-portability"><name>Reviewer Reputation Portability</name>

<t>Once a reviewer accumulates a signed review history on a sovereign
<spanx style="verb">~handle</spanx>, that history is architecturally outside any publisher's
control.  A publisher cannot unilaterally revoke, rewrite, or
platform-lock the reviewer's past signed reviews; a reviewer
migrating to a new publisher carries the chain of signed review
acts with them, and any verifier (a future organisation, a tenure
committee, a grant panel, an adversarial peer) can check the
chain end-to-end without publisher cooperation.</t>

<t>This is an intentional redistribution of control away from
platform-owned reviewer databases.  Publishers remain the venue
of record for the editorial decision process; they cease to be
the venue of record for the reviewer's reputation.</t>

</section>
<section anchor="pseudonymity-and-anonymous-peer-review"><name>Pseudonymity and Anonymous Peer Review</name>

<t>A Sovereign handle whose underlying party is concealed carries
the same cryptographic weight as a directly-identified Sovereign
handle and is grammatically indistinguishable from it.  This
preserves double-blind review where disciplinary norms require
it, while still producing a verifiable signed review chain.
Publishers operating anonymous-review workflows MAY mint or
delegate a per-review Sovereign handle for the reviewer, discard
the assignment-to-real-identity binding after the editorial
process concludes, and rely on the reviewer's own key custody to
retain the signed record for future portability.</t>

<t>The mapping between a concealed Sovereign handle and its
underlying party is the responsibility of the reviewer and,
optionally, of the editorial intermediary that facilitates the
pseudonymous assignment.  This document does not specify that
mapping mechanism; implementations SHOULD document the assignment
and custody model they use.</t>

</section>
<section anchor="review-spam"><name>Review Spam</name>

<t>A malicious sovereign MAY publish arbitrary signed reviews
attributing nonsense stances to arbitrary artefact hashes.  The
mitigation is not a protocol-layer filter but the reputational
cost absorbed by the reviewer's own handle: spammy signatures
accumulate against the same sovereign key that carries the
reviewer's legitimate work.  Verifiers SHOULD surface reviewer
history to readers (e.g., "this handle has produced 12 reviews
across 4 venues, of which 2 appear to be spam").</t>

</section>
<section anchor="review-bribery-and-conflict-of-interest"><name>Review Bribery and Conflict of Interest</name>

<t>The grammar does not and cannot prevent a reviewer from being
bribed to produce an unjustified positive review, nor from
concealing a conflict of interest.  Any economic counter-incentive
is external to this specification: implementations operating on
incentive-aligned rails can apply return-on-reputation invariants
in which sustained honest reviewing compounds the reviewer's
earnings stream while a single detected conflict-of-interest
violation invalidates a disproportionate fraction of that stream.
Conflict disclosure is a policy-layer concern; this protocol
provides the truthful path for honest reviewers, not a
verification path against dishonest ones.</t>

</section>
<section anchor="witness-collusion"><name>Witness Collusion</name>

<t>Witness trailers attest to the presence of the reviewer at the
review act; they do not attest to the review's substantive
merit.  Two witnesses colluding with a dishonest reviewer can
still produce a validly-signed multi-witness block over a
fraudulent review.  Witness signatures therefore raise the cost
of forgery but do not eliminate it.  High-stakes review contexts
(patent disclosure reviews, adversarial expert reviews) SHOULD
require witnesses whose sovereign identities have independent
reputational stakes that are lost by collusion.</t>

</section>
<section anchor="content-hash-forgery"><name>Content-Hash Forgery</name>

<t>An attacker who can forge content with the same canonicalised
hash as an honestly-reviewed artefact can silently re-attribute
the reviewer's signature to forged content.  The mitigation is
the cryptographic strength of the chosen <spanx style="verb">hash-algorithm</spanx>.
Implementations SHOULD default to <spanx style="verb">sha256</spanx> or stronger and SHOULD
NOT accept <spanx style="verb">git-sha1</spanx> for high-assurance review contexts, in
line with <xref target="COMMITS"></xref> Section 8.4.</t>

</section>
<section anchor="key-custody-at-the-review-signing-boundary"><name>Key Custody at the Review-Signing Boundary</name>

<t>The same key-custody considerations as <xref target="COMMITS"></xref> Section 8.6
apply unchanged: the signing operation MUST NOT occur in an
unprivileged process that does not mediate access to the private
key.  Signing ceremonies for high-stakes reviews (patent
disclosures, adversarial expert reviews) SHOULD additionally
bind the signing key to a hardware authenticator and record the
witness handles inside the trailer block before the signature is
produced.</t>

</section>
<section anchor="negative-attribution-missing-review-disclosure"><name>Negative Attribution: Missing Review Disclosure</name>

<t>A publisher MAY elect to omit the <spanx style="verb">Reviewed-By:</spanx> trailer when
publishing a review in order to conceal the reviewer's identity
even after review acceptance; this is detectable by the reviewer
themselves (who retains their own signed copy) but not by third
parties.  The grammar defined here provides the positive
attribution path; it does not force publishers to disclose
reviewer identity where editorial policy forbids it.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<section anchor="pseudonymity-as-a-first-class-concern"><name>Pseudonymity as a First-Class Concern</name>

<t>Anonymous peer review exists because disciplinary communities
have judged the costs of fully-attributed review (retaliation,
seniority bias, disciplinary politics) to exceed the benefits.
This document accepts that judgment by treating pseudonymous
Sovereign handles as first-class cryptographic participants
rather than as a degraded fallback.  Because pseudonymous and
directly-identified Sovereign handles are grammatically
indistinguishable, implementations cannot reliably classify a
review as pseudonymous from the trailer block alone; they MUST
NOT emit operational warnings or user-facing nudges that
characterise a review as lower-trust on the basis of suspected
pseudonymity.</t>

</section>
<section anchor="dns-linkability-risk"><name>DNS-Linkability Risk</name>

<t>Every DNS resolution of a <spanx style="verb">~handle</spanx> leaks the verifying party's
interest in that handle to the DNS path (recursive resolvers,
on-path observers, zone operators).  Reviewers performing
sensitive reviews under pseudonymous Sovereign handles SHOULD
host the handle's zone with an infrastructure provider that is
not the same entity as the publisher; otherwise the publisher's
own DNS telemetry can de-pseudonymise review-assignment patterns.</t>

</section>
<section anchor="right-to-withdraw-a-review"><name>Right to Withdraw a Review</name>

<t>A reviewer who wishes to withdraw a past review cannot unmake
the cryptographic fact of the signed block; they MAY publish a
superseding trailer block (a <spanx style="verb">Reviewed-By:</spanx> carrying a
<spanx style="verb">Review-Stance: dispute</spanx> against their own prior review hash)
that records the retraction without erasing the prior signature.
The grammar is append-only by construction; retraction is done
forward, not by deletion.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="trailer-name-registration"><name>Trailer Name Registration</name>

<t>If a git/document trailer name registry is established by IANA
(see <xref target="COMMITS"></xref> Section 9.1), this document requests registration
of the following additional trailer names with reference to this
specification:</t>

<t><list style="symbols">
  <t><spanx style="verb">Reviewed-By</spanx></t>
  <t><spanx style="verb">Review-Stance</spanx></t>
  <t><spanx style="verb">Review-Of</spanx></t>
  <t><spanx style="verb">Witnessed-By</spanx></t>
</list></t>

<t>The cryptographic trailers (<spanx style="verb">Identity-Signature</spanx>,
<spanx style="verb">Identity-Key-Id</spanx>, <spanx style="verb">Identity-Anchor</spanx>) are registered by <xref target="COMMITS"></xref>
and are not separately registered here.</t>

</section>
<section anchor="stance-value-registry"><name>Stance Value Registry</name>

<t>This document requests IANA registration of a "Peer Review Stance
Values" registry, initially populated with the five values of
Section 4.1 (<spanx style="verb">accept</spanx>, <spanx style="verb">reject</spanx>, <spanx style="verb">revise</spanx>, <spanx style="verb">endorse</spanx>, <spanx style="verb">dispute</spanx>).
The registration policy is "Specification Required" (RFC 8126).
Extensions to the vocabulary MUST justify why the existing five
values are insufficient for the proposed use case.</t>

</section>
<section anchor="no-other-iana-actions"><name>No Other IANA Actions</name>

<t>This document requests no other IANA actions.  The <spanx style="verb">did:alter:</spanx>
URI scheme, the <spanx style="verb">identitylog://</spanx> URI scheme, and the Ed25519
signature encoding are all inherited from <xref target="COMMITS"></xref>.</t>

</section>
</section>
<section anchor="relationship-to-existing-standards"><name>Relationship to Existing Standards</name>

<t>The review-trailer grammar is intended to coexist with and
complement existing peer-review attribution infrastructure, not
to replace it.</t>

<texttable>
      <ttcol align='left'>Mechanism</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <ttcol align='left'>Coexistence with this spec</ttcol>
      <c>ORCID peer-review activity <xref target="ORCID"></xref></c>
      <c>Publisher-attested review record</c>
      <c>Complementary.  ORCID records THAT a review occurred; <spanx style="verb">Reviewed-By:</spanx> records WHAT the review was.  Both can coexist on the same review act.</c>
      <c>CRediT contributor roles <xref target="CREDIT"></xref></c>
      <c>Author-side contribution taxonomy</c>
      <c>Orthogonal.  CRediT describes what authors did; <spanx style="verb">Review-Stance:</spanx> describes what reviewers said.  No overlap.</c>
      <c>DOI attribution <xref target="DOI"></xref></c>
      <c>Persistent identifier for the artefact</c>
      <c>Complementary.  A <spanx style="verb">Review-Of:</spanx> trailer MAY carry a DOI alongside or instead of a content hash where the DOI resolves to an immutable content manifest.</c>
      <c>COPE ethics guidance <xref target="COPE"></xref></c>
      <c>Normative ethical framework for peer review</c>
      <c>Orthogonal.  COPE specifies duties; this document specifies attribution grammar.  Implementations conforming to both are recommended.</c>
      <c>eLife publish-review-curate</c>
      <c>Open-review editorial model</c>
      <c>Complementary.  The eLife model benefits from portable reviewer identity; <spanx style="verb">Reviewed-By:</spanx> provides the portability without requiring platform lock-in.</c>
      <c>arXiv trackbacks <xref target="ARXIV"></xref></c>
      <c>Informal linkage between reviews and pre-prints</c>
      <c>Complementary.  Trackbacks can carry <spanx style="verb">Reviewed-By:</spanx> blocks as machine-readable review records, upgrading informal trackback to cryptographic attribution.</c>
      <c><spanx style="verb">Co-Authored-By: Claude</spanx></c>
      <c>Informal AI co-authorship convention</c>
      <c>Inadmissible in review slots.  AI drafting assistance on a review SHOULD be disclosed via the <spanx style="verb">Drafted-With:</spanx> trailer of <xref target="COMMITS"></xref>, not via co-authorship.</c>
</texttable>

<t>Cryptographically-bound pseudonymous review - a Sovereign handle
whose underlying party is concealed and whose review acts remain
fully verifiable - is novel to this specification and has no
analogue in prior peer-review attribution infrastructure.  ORCID
records publisher-attested facts about named identities; CRediT
describes author contributions; DOI identifies artefacts.  None
of the three expresses the cryptographically-bound
pseudonymous-reviewer role that peer review has relied on for a
century but has had no portable attribution grammar for.  That
grammar is the load-bearing contribution of this document.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author thanks colleagues at Alter Meridian Pty Ltd for the
framing of sovereign-portable reputation as the governance wedge,
and the eLife open-review community and the arXiv operators whose
prior work on open peer review has made the grammar here possible.
Additional contributors will be named at review time.</t>

</section>
<section anchor="references"><name>References</name>

<section anchor="normative-references"><name>Normative References</name>

<t><xref target="RFC2119"></xref>  Bradner, S., "Key words for use in RFCs to Indicate
           Requirement Levels", BCP 14, RFC 2119, March 1997.</t>

<t><xref target="RFC4648"></xref>  Josefsson, S., "The Base16, Base32, and Base64 Data
           Encodings", RFC 4648, October 2006.</t>

<t><xref target="RFC5234"></xref>  Crocker, D. and P. Overell, "Augmented BNF for Syntax
           Specifications: ABNF", STD 68, RFC 5234, January 2008.</t>

<t><xref target="RFC8032"></xref>  Josefsson, S. and I. Liusvaara, "Edwards-Curve Digital
           Signature Algorithm (EdDSA)", RFC 8032, January 2017.</t>

<t><xref target="RFC8174"></xref>  Leiba, B., "Ambiguity of Uppercase vs Lowercase in
           RFC 2119 Key Words", BCP 14, RFC 8174, May 2017.</t>

<t><xref target="COMMITS"></xref>  Morrison, B., "Identity-Attributed Git Commits via
           Tier-Structured Trailers",
           draft-morrison-identity-attributed-commits, work in
           progress.</t>

<t><xref target="MCPDNS"></xref>   Morrison, B., "Discovery of Model Context Protocol
           Servers via DNS TXT Records",
           draft-morrison-mcp-dns-discovery, work in progress.</t>

</section>
<section anchor="informative-references"><name>Informative References</name>

<t><xref target="RFC7942"></xref>  Sheffer, Y. and A. Farrel, "Improving Awareness of
           Running Code: The Implementation Status Section",
           BCP 205, RFC 7942, July 2016.</t>

<t><xref target="CREDIT"></xref>           National Information Standards Organization,
                   "CRediT (Contributor Roles Taxonomy),
                   NISO Z39.104-2022",
                   https://credit.niso.org/, 2022.</t>

<t><xref target="ORCID"></xref>            ORCID, Inc., "ORCID Public API",
                   https://info.orcid.org/documentation/, 2023.</t>

<t><xref target="COPE"></xref>             Committee on Publication Ethics, "Core
                   Practices and Guidance",
                   https://publicationethics.org/core-practices,
                   2019.</t>

<t><xref target="ELIFE-OPENREVIEW"></xref> eLife Sciences Publications, Ltd., "eLife's
                   Publish-Review-Curate Model",
                   https://elifesciences.org/about/peer-review,
                   2023.</t>

<t><xref target="ARXIV"></xref>            Cornell University, "arXiv.org - An Open-Access
                   Archive", https://arxiv.org/, 1991.</t>

<t><xref target="DOI"></xref>              International DOI Foundation, "The DOI
                   Handbook",
                   https://www.doi.org/the-identifier/resources/handbook/,
                   2020.</t>

<t><xref target="ANTHROPIC-COAUTHOR"></xref> Anthropic, "Co-Authored-By: Claude - convention
                     for AI-assisted commits".</t>

</section>
</section>
<section anchor="authors-address"><name>Author's Address</name>

<t>Blake Morrison
Alter Meridian Pty Ltd</t>

<t>Email: blake@truealter.com
URI: https://truealter.com</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC4648;
&RFC5234;
&RFC8032;
&RFC8174;
<reference anchor="COMMITS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-attributed-commits/">
  <front>
    <title>Identity-Attributed Git Commits via Tier-Structured Trailers</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
  <front>
    <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC7942;
<reference anchor="CREDIT" target="https://credit.niso.org/">
  <front>
    <title>CRediT (Contributor Roles Taxonomy), NISO Z39.104-2022</title>
    <author >
      <organization>National Information Standards Organization</organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="ORCID" target="https://info.orcid.org/documentation/">
  <front>
    <title>ORCID Public API</title>
    <author >
      <organization>ORCID, Inc.</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="COPE" target="https://publicationethics.org/core-practices">
  <front>
    <title>Committee on Publication Ethics - Core Practices and Guidance</title>
    <author >
      <organization>Committee on Publication Ethics</organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="ELIFE-OPENREVIEW" target="https://elifesciences.org/about/peer-review">
  <front>
    <title>eLife's Publish-Review-Curate Model</title>
    <author >
      <organization>eLife Sciences Publications, Ltd.</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="ARXIV" target="https://arxiv.org/">
  <front>
    <title>arXiv.org - An Open-Access Archive</title>
    <author >
      <organization>Cornell University</organization>
    </author>
    <date year="1991"/>
  </front>
</reference>
<reference anchor="DOI" target="https://www.doi.org/the-identifier/resources/handbook/">
  <front>
    <title>The DOI Handbook</title>
    <author >
      <organization>International DOI Foundation</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="ANTHROPIC-COAUTHOR" target="https://docs.anthropic.com/claude/docs/co-authored-by-convention">
  <front>
    <title>Co-Authored-By: Claude - convention for AI-assisted commits</title>
    <author >
      <organization>Anthropic</organization>
    </author>
    <date year="2025"/>
  </front>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

