As I read it, all of these steps are standalone. One claim does not authenticate another claim.
If this is about stopping dishonest people, then all prior claims must be validated first. There needs to be a verifiable chain of custody. (Bob received this picture from Alice. Bob confirmed Alice's signature, and here is Bob's signature. Carol received the picture and validated both Bob and Alice's signature. Carol cannot just validate Bob since Bob may have lied about validating Alice's signature. Dave validates Carol, Bob, and Alice. Erin validates Dave, Carol, Bob, and Alice. Etc.)
In C2PA we handle this via ingredients - but the info about what they are and how they work is spread out across the document...we need to bring this together and explain!
From the JPEG Fake Media group
In C2PA we handle this via ingredients - but the info about what they are and how they work is spread out across the document...we need to bring this together and explain!