VerdifaX

Glossary

Every Verdifax-specific term used in these docs, in alphabetical order. External terms (SHA-256, TPM, etc.) are linked out where introduced.

AER — Agent Execution Record

The single tamper-evident record produced at Stage 4 of the pipeline. AER consolidates the six DKEC kernel outputs (DSE, TOK, DSC, NREP, AIVP, DCAE) into one signed object. Its hash, aer_hash, is the input to the cryptographic sealing pipeline (Stage 5).

AIVP — Artificial Intelligence Verification Protocol (Tier 4)

DKEC kernel that governs AI behavior under policy. Performs contradiction detection, policy enforcement, and reasoning validation; emits the Proof Integrity Artifact (PIA hash). Answers: "Did the AI behave correctly under governance rules?"

Attestation

In Verdifax usage, the act of sending a payload through the nine-stage pipeline and receiving back a sealed manifest hash. "Attesting" a model output means making that output verifiable.

DCAE — Deterministic Compute Attestation Engine

DKEC kernel that proves the run executed on trusted hardware. Cooperates with the Hardware Root Engine (HRE) to bind execution to a specific physical machine. Answers: "Was this executed on trusted hardware?"

DKEC — Deterministic Kernel Execution Controller

Stage 3 of the pipeline. Dispatches the six kernels in lockstep and emits the EPA / EFA hashes plus six execution IDs.

DLA — Distributed Ledger Anchor

Stage 9. Produces the final .VFA artifact and runs the independent third-party verifier. The output is final_vfa_hash plus an independent_verified boolean that must be true for the manifest to seal.

DOG — Deterministic Oracle Gateway

Stage 1 of the pipeline. The pipeline's front door — admits the payload, derives the envelope, computes envelope_id and envelope_hash.

DSC — Deterministic State Continuity

DKEC kernel that validates state transitions. Answers: "Was this state transition valid?"

DSE — Deterministic State Engine

DKEC kernel that captures the exact system state at execution time. Answers: "What is the exact system state?"

DTL — Deterministic Transport Layer

Stage 2. Sequences and binds envelopes into a totally-ordered log; emits sequence_id and transport_hash.

EFA — Execution Final Attestation

The hash produced at the end of Stage 3 (DKEC) summarizing the kernel-execution outcome. Distinct from epa_hash which describes the plan.

Envelope

The canonical wrapper for a payload that's been admitted into the pipeline. An envelope is identified by envelope_id (string) and sealed by envelope_hash (64-char hex).

EPA — Execution Plan Attestation

The hash produced at the start of Stage 3 capturing the planned kernel dispatch order, before the kernels actually run.

Formal Verifier Status

A field in the sealed manifest. Must equal the literal string VERIFIED_SOUND_COMPLETE_ZK for the run to be considered sealed. Anything else aborts the manifest.

Hardware Attestation Hash

The output of Stage 5 / L8. A SHA-256 of either a TPM2 quote or an AMD SEV-SNP report, anchoring the run to a specific physical machine.

Leakage Bundle Hash

Stage 5 / L9 output. An upper bound on information that escaped the secure enclave during the run, sealed and included in the manifest.

Manifest Hash

The headline artifact of every Verdifax run. A 64-character lowercase SHA-256 hex digest computed from every other field in the ExecutionManifest. The single value an external verifier checks.

NREP — Non-Repudiation Engine

DKEC kernel that binds execution to the actor that initiated it. Answers: "Who performed this action?"

PIA — Pipeline Integrity Anchor

A §0 spec construct: a hash that ties one stage's output into the next stage's input so the chain cannot be cut and rejoined.

PoTE — Proof of Tamper-Evident execution

Stage 7 output. A Merkle inclusion proof in a transparency log, binding the run to an immutable public record.

Program ID

A 64-character lowercase hex identifier registered with the program registry. Specifies which program is being executed; runs of different programs always produce different manifest hashes.

Registry Record Hash

The §0 hash of the registry record authorizing this program. Required as input to every attest() call. If the registry record changes (e.g., the program is updated), the hash changes — which is intentional.

Replay Fingerprint

Stage 6 output. A deterministic identifier any honest re-execution must reproduce.

Route ID

A free-form deterministic route identifier. Runs of the same program on different routes produce different manifest hashes.

VFA — Verdifax Final Artifact

The signed .vfa file produced at Stage 9 containing the full execution record, the manifest hash, and the independent verifier signature.

ZKSP

Stage 5. The cryptographic core: L7 (transcript), L8 (hardware attestation), L9 (leakage), L10 (formal verifier). Together, they bind the run to a verifiable cryptographic proof.

ZK Proof

In Verdifax, the L7-L10 pipeline's output: a zero-knowledge proof that the run satisfies the formal-verifier predicate without revealing the witness (the inputs, the model, or the runtime state).