Papers
Topics
Authors
Recent
Search
2000 character limit reached

Constant-Size Crypto Evidence Structures

Updated 28 November 2025
  • Constant-size cryptographic evidence structures are a fixed-length abstraction that compress and sign all event data, ensuring uniform integrity and non-equivocation.
  • They use a hash-and-sign methodology with efficient composition via hash chains and Merkle trees, achieving predictable verification cost and high throughput.
  • These structures are essential for regulated AI workflows, providing immutable, scalable audit trails in sectors like healthcare, pharmaceuticals, and finance.

Constant-size cryptographic evidence structures are a cryptographic abstraction optimized for generating, storing, and verifying verifiable audit evidence for AI workflows in regulated environments. In such settings, each workflow event must be bound to immutable evidence in a way that ensures integrity, non-equivocation, efficiency, and compliance with audit and regulatory requirements. The core design objective is that each evidence item—regardless of the complexity or size of the underlying event—has a strictly fixed, small size and supports uniform, predictable verification cost per event (Kao, 21 Nov 2025).

1. Mathematical Abstraction and Model

A constant-size cryptographic evidence structure is parameterized by a security parameter λ\lambda and an integer kk (the number of cryptographic fields). The structure consists of:

  • Event domain EE for workflow events.
  • A family of encoding functions {φi:E{0,1}}iI\{\varphi_i: E \to \{0,1\}^*\}_{i \in I} where I={0,1,...,k1}I = \{0, 1, ..., k-1\}.
  • A collision-resistant hash function H:{0,1}{0,1}λH: \{0,1\}^* \to \{0,1\}^\lambda.
  • A signature scheme Σ=(KeyGen,Sign,Verify)\Sigma = (\text{KeyGen}, \text{Sign}, \text{Verify}) with message space {0,1}kλ\{0,1\}^{k \cdot \lambda}.

The evidence-item type is

Ev=({0,1}λ)k\text{Ev} = (\{0,1\}^\lambda)^k

i.e., a tuple of kk fixed-length bit-strings. Given an event EEE \in E, an evidence item is ev=(f0,f1,...,fk1)Evev = (f_0, f_1, ..., f_{k-1}) \in \text{Ev}, together with an authenticator σ=Σ.Signsk(ev)\sigma = \Sigma.\text{Sign}_{sk}(ev). The combined size of (ev,σ)(ev, \sigma) is kλk \cdot \lambda bits plus the (fixed) size of the signature, independent of φi(E)|\varphi_i(E)|.

2. Integration with Regulated AI Workflow Models

Regulated AI workflows are formalized as sequences or DAGs of events {E}\{E\}, where each event EE carries:

  • A unique identifier id(E)id(E),
  • Structured metadata meta(E)meta(E) (actor, timestamp, configuration, etc.),
  • Input references in(E)in(E),
  • Output references out(E)out(E).

The complete event record is M(E)=(id(E),meta(E),in(E),out(E))M(E) = (id(E), meta(E), in(E), out(E)). Evidence generation binds evev to all salient information in M(E)M(E), such that any tampering with an event or its metadata disrupts the cryptographic binding.

3. Core Algorithms

The evidence structure exposes the following API:

Setup:

  • Input: 1λ1^\lambda
  • Output: Public parameters pp=(λ,k,{φi},H,Σ)pp = (\lambda, k, \{\varphi_i\}, H, \Sigma)

KeyGen:

  • Input: 1λ1^\lambda
  • Output: (sk,pk)Σ.KeyGen(1λ)(sk, pk) \leftarrow \Sigma.\text{KeyGen}(1^\lambda)

GenEvidence:

  • Input: pppp, sksk, EE
  • Output: (ev,σ)(ev, \sigma) where evEvev \in \text{Ev} and σ\sigma authenticates evev
  • Steps:

    1. Recover k,{φi},Hk, \{\varphi_i\}, H from pppp.
    2. For i=0k1i=0\dots k-1: miφi(E)m_i \leftarrow \varphi_i(E); fiH(mi)f_i \leftarrow H(m_i).
    3. ev(f0,...,fk1)ev \leftarrow (f_0,...,f_{k-1}).
    4. σΣ.Signsk(ev)\sigma \leftarrow \Sigma.\text{Sign}_{sk}(ev).
    5. Return (ev,σ)(ev, \sigma).

VerifyEvidence:

  • Input: pppp, pkpk, EE, ev=(f0,...,fk1)ev=(f_0,...,f_{k-1}), σ\sigma

  • Output: accept/reject
  • Steps:

    1. Recover {φi},H\{\varphi_i\}, H.
    2. For i=0k1i=0\dots k-1: miφi(E)m_i \leftarrow \varphi_i(E); if H(mi)fiH(m_i) \ne f_i return reject.
    3. If Σ.Verifypk(ev,σ)\Sigma.\text{Verify}_{pk}(ev, \sigma) is false, reject.
    4. Otherwise, accept.

4. Precise Security Formulations

Two formal goals are established:

Audit Integrity: In the “Game GI,” an adversary AA cannot produce a tuple (E,ev,σ)(E^*, ev^*, \sigma^*) passing verification for an event never returned by the evidence oracle, assuming HH is collision-resistant and Σ\Sigma is EUF-CMA.

Non-Equivocation: In “Game GNE,” it is infeasible for AA to generate two distinct sequences SSS \ne S' of evidence items linking to the same anchor (e.g., hash-chain tip or Merkle root), such that both locally verify and differ on at least one event. This is implied by the collision-resistance of HH.

5. Hash-and-Sign Instantiation

A generic instantiation fixes Σ\Sigma as any EUF-CMA signature scheme and HH as a collision-resistant hash. Encoders φi\varphi_i extract respective event features:

  • φ0(E)=id(E)time(E)\varphi_0(E) = id(E) || time(E),

  • φ1(E)=digest of meta(E)\varphi_1(E) = \text{digest of } meta(E),
  • φ2(E)=digest of in(E)\varphi_2(E) = \text{digest of } in(E),
  • ...,
  • φk1(E)=context-link\varphi_{k-1}(E) = \text{context-link}.

Each fi=H(φi(E))f_i = H(\varphi_i(E)), and σ=Signsk(f0,...,fk1)\sigma = \text{Sign}_{sk}(f_0,...,f_{k-1}). The values evev and σ\sigma together represent constant-size, strongly bound evidence per event.

6. Compositionality: Hash Chains and Merkle Trees

Evidence structures can be composed to ensure tamper-evident audit trails and batch anchoring:

  • Hash Chains: Starting from 0=0λ\ell_0 = 0^\lambda, each step links j=H(j1evj)\ell_{j} = H(\ell_{j-1}\,||\,ev_j). The chain tip can be anchored externally.
  • Merkle Trees: Batched evidence items {ev1,...,evn}\{ev_1,...,ev_n\} are arranged as leaves; the root RR serves as anchor. Each evjev_j can be verified with a standard Merkle proof.

Both methods preserve constant per-event data and use a short, constant-size anchor, facilitating batch and cross-organizational verification.

7. Asymptotic Complexity and Implementation

Let kk be fixed:

  • GenEvidence: Θ(k)\Theta(k) hashes plus O(1)O(1) public-key operation.
  • VerifyEvidence: Θ(k)\Theta(k) hashes plus O(1)O(1) public-key operation.
  • LinkChain (n items): Θ(n)\Theta(n) hashes.
  • Merkle Tree (n items): Θ(n)\Theta(n) hashes for tree construction.

Empirical microbenchmarks (Rust, 256-bit CRHF, Edwards-curve signature, k=10k=10):

  • Single-threaded: 3.5×1043.5 \times 10^4 events/s (28.4 µs/event)
  • Multi-threaded (16 cores): 2.8×1052.8 \times 10^5 events/s (5.7 µs/event)
  • Batch verification (CPU, 16 threads): 2.5×1052.5 \times 10^5 events/s (6.1 µs/event)
  • Batch verification (GPU, M=106M = 10^6): 4.0×1054.0 \times 10^5 events/s (2.5 µs/event)
  • Storage for N=106N = 10^6: A few GB for all (ev,σ)(ev, \sigma) pairs, which is competitive with or superior to text logs, but with cryptographic guarantees (Kao, 21 Nov 2025).

8. Industrial and Regulatory Applications

Constant-size cryptographic evidence structures are well-suited for domains requiring rigorous, scalable, and regulator-aligned auditability:

  • Clinical trials: Immutable audit items for randomization, consent, data access, and AI inference.
  • Pharmaceutical manufacturing: Batch decisions, QC, policy changes, and environmental logging (including TEE support).
  • Medical AI governance: Tamper-evident histories for model updates, config changes, PHI access, and review events.
  • Financial compliance: Transparent, fixed-size audit items for algorithm updates, sign-offs, and transaction batches.

Uniform size and layout enable efficient hardware implementations (GPU, TEE), supporting high-throughput audit with strong cryptographic semantics throughout lifecycle-critical AI workflows (Kao, 21 Nov 2025).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Constant-Size Cryptographic Evidence Structures.