Internet-Draft PSI Protocol March 2026
Singh Expires 18 September 2026 [Page]
Workgroup:
Network Working Group
Internet-Draft:
draft-singh-psi-00
Published:
Intended Status:
Standards Track
Expires:
Author:
K. Singh
Apex Intelligence Empire

Proof of Sovereign Integrity (PSI): A Cryptographic Protocol for Verifiable AI Regulatory Compliance

Abstract

This document specifies the Proof of Sovereign Integrity (PSI) Protocol, version 1.2, a cryptographic framework enabling organizations to prove compliance with AI regulations without disclosing proprietary model architectures, training data, or inference logic.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 18 September 2026.

Table of Contents

1. Introduction

The proliferation of artificial intelligence systems across critical sectors has created an urgent need for verifiable compliance mechanisms. The EU AI Act mandates technical conformity assessment for high-risk AI systems. The PSI Protocol addresses these limitations through cryptographic verification primitives.

2. Terminology

Commit: An atomic action submitted for compliance verification.

Predicate: A machine-readable regulatory requirement.

PIL: Protocol Intervention Layer (runtime execution gate).

3. Protocol Overview

The PSI Protocol operates as a 4-stage pipeline: COMMIT, CHALLENGE, PROVE, and VERIFY.

4. Cryptographic Primitives

PSI uses SHA-256 for hashing, Ed25519 for digital signatures, and Groth16-compatible zero-knowledge commitments over BN128 fields.

5. Deterministic Pre-Flight

The PIL evaluates actions BEFORE commit, blocking HIGH or UNACCEPTABLE risk patterns.

6. Sovereign Tribunal

Human oversight is provided by 5 auditors with a 3/5 threshold for ratification.

7. Orbital Integrity Protocol (OIP)

Extends PSI to space-based compute environments, defining radiation-tolerant proof generation.

8. Security Considerations

Protocol mitigates log tampering, false-negatives, and single points of failure.

9. IANA Considerations

This document requests registration of application/psi-proof+json and the psi:// URI scheme.

10. References

[RFC8032]
Josefsson, S. and I. Liusvaara, "Edwards-Curve Digital Signature Algorithm (EdDSA)", RFC 8032, , <https://www.rfc-editor.org/info/rfc8032>.

Author's Address

Kawaljeet Singh
Apex Intelligence Empire
Balaclava Victoria
Australia