Technical Specification

Protocol for verifiable computational experiments

K-Veritas binds experiment metadata to tamper-evident records so any reviewer can independently verify what was executed.

Core Principles

Passivity

Observers monitor execution without mutating original experiment logic.

Data boundaries

Captured evidence focuses on metadata and telemetry, not proprietary datasets.

Environment integrity

Dependencies and runtime fingerprints are recorded to detect drift.

Tamper-Evidence

Any modification to the signed report invalidates verification.

Data Models

EntityCaptured Metadata
SessionGlobal

Experiment UUID, machine fingerprint, attestation token, project root

RunRecordProcess

Command, duration, exit status, stdout and stderr hashes

SealRecordCrypto

Canonical data hash, RSA-PSS signature, nonce, timestamp

Cryptographic Signing

payload = "{data_hash}:{nonce}:{signed_at}"
signature = RSA-PSS-SHA256(payload, salt=MAX, key=4096)

The DataHash is a canonical SHA-256 digest of captured execution state. The signer validates machine identity and token context before sealing.

Metric Capture

K-Veritas captures telemetry from real-time output streams. Each metric remains linked to traceable execution context.

KVERITAS_METRIC name=<id> value=<float> [step=<label>]

Example (Python): print(f"KVERITAS_METRIC name=accuracy value={acc}")
Example (Bash): echo "KVERITAS_METRIC name=loss value=0.24"

Standard Workflow

01

init

Client registers with the server using a machine fingerprint.

02

run

Experiment executes while runtime outputs are monitored and hashed.

03

seal

Session is finalized and cryptographically signed.

04

verify

Independent audit of the embedded signature and metrics.