| Internet-Draft | PSI Protocol | March 2026 |
| Singh | Expires 18 September 2026 | [Page] |
This document specifies the Proof of Sovereign Integrity (PSI) Protocol, version 1.2, a cryptographic framework enabling organizations to prove compliance with AI regulations without disclosing proprietary model architectures, training data, or inference logic.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 18 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The proliferation of artificial intelligence systems across critical sectors has created an urgent need for verifiable compliance mechanisms. The EU AI Act mandates technical conformity assessment for high-risk AI systems. The PSI Protocol addresses these limitations through cryptographic verification primitives.¶
Commit: An atomic action submitted for compliance verification.¶
Predicate: A machine-readable regulatory requirement.¶
PIL: Protocol Intervention Layer (runtime execution gate).¶
The PSI Protocol operates as a 4-stage pipeline: COMMIT, CHALLENGE, PROVE, and VERIFY.¶
PSI uses SHA-256 for hashing, Ed25519 for digital signatures, and Groth16-compatible zero-knowledge commitments over BN128 fields.¶
The PIL evaluates actions BEFORE commit, blocking HIGH or UNACCEPTABLE risk patterns.¶
Human oversight is provided by 5 auditors with a 3/5 threshold for ratification.¶
Extends PSI to space-based compute environments, defining radiation-tolerant proof generation.¶
Protocol mitigates log tampering, false-negatives, and single points of failure.¶
This document requests registration of application/psi-proof+json and the psi:// URI scheme.¶