Constant-Size Crypto Evidence Structures
- Constant-size cryptographic evidence structures are a fixed-length abstraction that compress and sign all event data, ensuring uniform integrity and non-equivocation.
- They use a hash-and-sign methodology with efficient composition via hash chains and Merkle trees, achieving predictable verification cost and high throughput.
- These structures are essential for regulated AI workflows, providing immutable, scalable audit trails in sectors like healthcare, pharmaceuticals, and finance.
Constant-size cryptographic evidence structures are a cryptographic abstraction optimized for generating, storing, and verifying verifiable audit evidence for AI workflows in regulated environments. In such settings, each workflow event must be bound to immutable evidence in a way that ensures integrity, non-equivocation, efficiency, and compliance with audit and regulatory requirements. The core design objective is that each evidence item—regardless of the complexity or size of the underlying event—has a strictly fixed, small size and supports uniform, predictable verification cost per event (Kao, 21 Nov 2025).
1. Mathematical Abstraction and Model
A constant-size cryptographic evidence structure is parameterized by a security parameter and an integer (the number of cryptographic fields). The structure consists of:
- Event domain for workflow events.
- A family of encoding functions where .
- A collision-resistant hash function .
- A signature scheme with message space .
The evidence-item type is
i.e., a tuple of fixed-length bit-strings. Given an event , an evidence item is , together with an authenticator . The combined size of is bits plus the (fixed) size of the signature, independent of .
2. Integration with Regulated AI Workflow Models
Regulated AI workflows are formalized as sequences or DAGs of events , where each event carries:
- A unique identifier ,
- Structured metadata (actor, timestamp, configuration, etc.),
- Input references ,
- Output references .
The complete event record is . Evidence generation binds to all salient information in , such that any tampering with an event or its metadata disrupts the cryptographic binding.
3. Core Algorithms
The evidence structure exposes the following API:
Setup:
- Input:
- Output: Public parameters
KeyGen:
- Input:
- Output:
GenEvidence:
- Input: , ,
- Output: where and authenticates
- Steps:
- Recover from .
- For : ; .
- .
- .
- Return .
VerifyEvidence:
Input: , , , ,
- Output: accept/reject
- Steps:
- Recover .
- For : ; if return reject.
- If is false, reject.
- Otherwise, accept.
4. Precise Security Formulations
Two formal goals are established:
Audit Integrity: In the “Game GI,” an adversary cannot produce a tuple passing verification for an event never returned by the evidence oracle, assuming is collision-resistant and is EUF-CMA.
Non-Equivocation: In “Game GNE,” it is infeasible for to generate two distinct sequences of evidence items linking to the same anchor (e.g., hash-chain tip or Merkle root), such that both locally verify and differ on at least one event. This is implied by the collision-resistance of .
5. Hash-and-Sign Instantiation
A generic instantiation fixes as any EUF-CMA signature scheme and as a collision-resistant hash. Encoders extract respective event features:
,
- ,
- ,
- ...,
- .
Each , and . The values and together represent constant-size, strongly bound evidence per event.
6. Compositionality: Hash Chains and Merkle Trees
Evidence structures can be composed to ensure tamper-evident audit trails and batch anchoring:
- Hash Chains: Starting from , each step links . The chain tip can be anchored externally.
- Merkle Trees: Batched evidence items are arranged as leaves; the root serves as anchor. Each can be verified with a standard Merkle proof.
Both methods preserve constant per-event data and use a short, constant-size anchor, facilitating batch and cross-organizational verification.
7. Asymptotic Complexity and Implementation
Let be fixed:
- GenEvidence: hashes plus public-key operation.
- VerifyEvidence: hashes plus public-key operation.
- LinkChain (n items): hashes.
- Merkle Tree (n items): hashes for tree construction.
Empirical microbenchmarks (Rust, 256-bit CRHF, Edwards-curve signature, ):
- Single-threaded: events/s (28.4 µs/event)
- Multi-threaded (16 cores): events/s (5.7 µs/event)
- Batch verification (CPU, 16 threads): events/s (6.1 µs/event)
- Batch verification (GPU, ): events/s (2.5 µs/event)
- Storage for : A few GB for all pairs, which is competitive with or superior to text logs, but with cryptographic guarantees (Kao, 21 Nov 2025).
8. Industrial and Regulatory Applications
Constant-size cryptographic evidence structures are well-suited for domains requiring rigorous, scalable, and regulator-aligned auditability:
- Clinical trials: Immutable audit items for randomization, consent, data access, and AI inference.
- Pharmaceutical manufacturing: Batch decisions, QC, policy changes, and environmental logging (including TEE support).
- Medical AI governance: Tamper-evident histories for model updates, config changes, PHI access, and review events.
- Financial compliance: Transparent, fixed-size audit items for algorithm updates, sign-offs, and transaction batches.
Uniform size and layout enable efficient hardware implementations (GPU, TEE), supporting high-throughput audit with strong cryptographic semantics throughout lifecycle-critical AI workflows (Kao, 21 Nov 2025).