JACS Attestation vs. Other Standards

JACS occupies a unique position as an agent-layer attestation framework. This page compares JACS with related standards and explains when to use them together.

Comparison Table

FeatureJACSin-toto / SLSASigstore / cosignSCITTIETF RATS / EAT
Primary domainAI agent runtimeBuild provenanceArtifact signingTransparency logsHardware/platform attestation
Identity modelDecentralized (key pairs)Build system certsKeyless (OIDC)Issuer certsPlatform certs
Agent-nativeYesNoNoNoPartial
Offline verificationYesYes (with keys)No (requires Rekor)No (requires log)Depends
Multi-agent quorumYes (M-of-N)NoNoNoNo
Evidence normalizationYes (A2A, email, JWT, custom)NoNoNoPartial (EAT claims)
Transform receiptsYes (derivation chains)Yes (build steps)NoNoNo
Probabilistic claimsYes (confidence + assurance)NoNoNoNo
Post-quantumYes (ML-DSA-87)NoNoNoDepends
Central infrastructureNot requiredNot requiredRequired (Fulcio + Rekor)Required (transparency log)Depends
Schema formatJSON Schema + JCSin-toto layoutSigstore bundleSCITT receiptCBOR/COSE

JACS vs. in-toto / SLSA

Domain difference: in-toto and SLSA focus on build provenance -- proving that a software artifact was built by a specific builder from specific source code. JACS focuses on runtime agent actions -- proving that a specific agent performed a specific action with specific evidence.

Interoperability: JACS exports attestations as DSSE (Dead Simple Signing Envelope) documents, the same format used by in-toto v1.0+. This means:

  • A JACS attestation can include an in-toto predicate type URI
  • SLSA verifiers can validate the DSSE envelope structure
  • JACS and in-toto attestations can coexist in the same verification pipeline

When to use both: If your workflow includes both software builds (use SLSA/in-toto for build provenance) and AI agent actions (use JACS for runtime attestation), you can link them via derivation chains.

JACS vs. Sigstore / cosign

Domain difference: Sigstore provides signing infrastructure (Fulcio CA, Rekor transparency log) and cosign is a tool for signing container images and artifacts. JACS provides its own signing with decentralized identity.

Key difference: Sigstore's keyless signing relies on centralized OIDC identity providers and a public transparency log. JACS uses self-managed key pairs and does not require any centralized infrastructure.

When to use both: Sigstore for container image signing in CI/CD pipelines. JACS for AI agent action signing at runtime. A planned Sigstore bundle verification adapter (N+2) would let JACS attestations reference Sigstore signatures as evidence.

JACS vs. SCITT

Most overlap. SCITT (Supply Chain Integrity, Transparency and Trust) defines a centralized transparency service for recording signed statements about artifacts.

Key difference: SCITT requires a transparency log (centralized notary). JACS is fully decentralized and offline-capable. JACS verification works without contacting any server.

Complementary use: JACS signs and attests. SCITT logs. An organization could use JACS to create signed attestations and then submit them to a SCITT transparency log for auditability, getting the benefits of both decentralized creation and centralized discoverability.

JACS vs. IETF RATS / EAT

Layer difference: RATS (Remote ATtestation procedureS) and EAT (Entity Attestation Token) focus on hardware and platform attestation -- proving that a device or execution environment is in a known-good state. JACS fills the software agent layer above hardware.

Alignment opportunity: JACS claim names could align with IANA-registered EAT claim types where they overlap. A JACS attestation could reference a RATS attestation result as evidence, creating a trust chain from hardware to agent.

IETF drafts of interest:

  • draft-huang-rats-agentic-eat-cap-attest-00 -- Capability attestation for agents, directly aligned with JACS claims model
  • draft-messous-eat-ai-00 -- EAT profile for AI agents
  • draft-jiang-seat-dynamic-attestation-00 -- Dynamic attestation for runtime assertions

JACS vs. CSA Agentic Trust Framework

The Cloud Security Alliance's Agentic Trust Framework defines progressive trust levels that map directly to JACS's trust model:

CSA LevelJACS EquivalentVerification
NoneNo JACSNo signing
BasicOpenValid signature accepted
StandardVerifiedTrust store + DNS verification
EnhancedStrictAttestation-level evidence required

When to Use JACS

Use JACS when you need:

  • Agent identity that works without PKI/CA infrastructure
  • Non-repudiable action logging for AI agent workflows
  • Multi-agent authorization with quorum (M-of-N approval)
  • Offline verification without centralized services
  • Evidence-backed trust that goes beyond simple signing
  • Post-quantum readiness for long-lived agent identities

When to Use JACS Alongside Other Tools

ScenarioJACS + ...
CI/CD pipeline with AI agentsJACS (agent actions) + SLSA (build provenance)
Enterprise with compliance requirementsJACS (signing) + SCITT (transparency log)
IoT/edge with hardware attestationJACS (agent layer) + RATS/EAT (hardware layer)
Container-based agent deploymentJACS (runtime signing) + cosign (image signing)