|
76 | 76 | </t> |
77 | 77 | </section> |
78 | 78 |
|
| 79 | + <section anchor="problem-statement"> |
| 80 | + <name>Problem Statement</name> |
| 81 | + <t> |
| 82 | + Digital documents lack creation-process provenance. Existing |
| 83 | + cryptographic mechanisms address complementary but insufficient |
| 84 | + aspects of this gap: COSE signatures <xref target="RFC9052"/> |
| 85 | + prove key possession, trusted timestamps |
| 86 | + <xref target="RFC3161"/> prove that content existed at a given |
| 87 | + time, and media provenance standards such as C2PA |
| 88 | + <xref target="C2PA"/> track the custody and transformation of |
| 89 | + digital assets after creation. None of these mechanisms reveals |
| 90 | + how a document was produced or how it evolved during authorship. |
| 91 | + </t> |
| 92 | + <t> |
| 93 | + Non-cryptographic approaches have emerged to address this gap, |
| 94 | + but each carries fundamental limitations: |
| 95 | + </t> |
| 96 | + <dl> |
| 97 | + <dt>Surveillance-based methods:</dt> |
| 98 | + <dd>Screen recording, keystroke logging, and similar monitoring |
| 99 | + capture the authoring process but are inherently |
| 100 | + privacy-invasive, require continuous trust in a third-party |
| 101 | + archive, and produce evidence that cannot be independently |
| 102 | + verified without access to the surveillance |
| 103 | + infrastructure.</dd> |
| 104 | + <dt>Detection-based methods:</dt> |
| 105 | + <dd>Stylometric classifiers and AI-generated content detectors |
| 106 | + operate on finished output rather than the creation process. |
| 107 | + These tools are probabilistic, degrade as generative models |
| 108 | + improve, are vulnerable to adversarial evasion, and exhibit |
| 109 | + systematic bias against non-native language speakers |
| 110 | + <xref target="Liang2023"/>. Their outputs do not constitute |
| 111 | + deterministic, independently reproducible evidence.</dd> |
| 112 | + </dl> |
| 113 | + <t> |
| 114 | + The need for creation-process provenance extends across sectors |
| 115 | + and jurisdictions. AI-assisted authoring is entering clinical |
| 116 | + documentation workflows, prompting the U.S. Department of |
| 117 | + Health and Human Services to seek input on how to maintain |
| 118 | + accountability when AI tools contribute to medical records |
| 119 | + <xref target="HHS-AI-RFI"/>. The autonomous content generation |
| 120 | + capabilities of AI agents have led the National Institute of |
| 121 | + Standards and Technology to examine security implications, |
| 122 | + including the attribution of agent-produced output |
| 123 | + <xref target="NIST-AI-Agents-RFI"/>. In creative industries, |
| 124 | + the Authors Guild has launched a human authorship certification |
| 125 | + program for books, but absent cryptographic process evidence, |
| 126 | + the program relies entirely on author self-attestation |
| 127 | + <xref target="AG-Human-Authored"/>. The common requirement across |
| 128 | + these sectors is a standardized mechanism to verify how content |
| 129 | + was produced rather than inferring it after the fact. Such a |
| 130 | + mechanism must satisfy four properties: |
| 131 | + </t> |
| 132 | + <ol> |
| 133 | + <li><em>Privacy-preserving:</em> Evidence must not require |
| 134 | + disclosure of document content or invasive behavioral |
| 135 | + surveillance. Cryptographic hashes, not raw content, must form |
| 136 | + the evidentiary basis.</li> |
| 137 | + <li><em>Independently verifiable:</em> Proofs must be |
| 138 | + self-contained and deterministically checkable by any Verifier |
| 139 | + without access to external archives or proprietary |
| 140 | + systems.</li> |
| 141 | + <li><em>Tamper-evident:</em> Evidence must form a cryptographic |
| 142 | + chain resistant to retroactive modification, reordering, or |
| 143 | + selective omission.</li> |
| 144 | + <li><em>Process-documenting:</em> The mechanism must capture how |
| 145 | + a document evolved over time, not merely what it contains at a |
| 146 | + point in time.</li> |
| 147 | + </ol> |
| 148 | + </section> |
| 149 | + |
79 | 150 | <section anchor="use-cases"> |
80 | 151 | <name>Use Cases</name> |
81 | 152 | <t> |
82 | | - Stakeholders across creative industries, education, law, and |
83 | | - commerce increasingly need to determine how content was produced, |
84 | | - not merely what it contains. Post-hoc detection techniques |
85 | | - (stylometric classifiers, watermark detectors) are demonstrably |
86 | | - insufficient for this purpose: they degrade as generative models |
87 | | - improve, are defeated by paraphrasing, and exhibit systematic |
88 | | - bias against non-native language speakers, with one study |
89 | | - finding that detectors misclassified over 61% of essays by |
90 | | - non-native English writers as AI-generated |
91 | | - <xref target="Liang2023"/>. Institutions relying on these |
92 | | - detectors face significant litigation risk, as courts have begun |
| 153 | + The provenance gap identified in |
| 154 | + <xref target="problem-statement"/> has concrete consequences |
| 155 | + across multiple domains. Where detection-based methods have been |
| 156 | + deployed as substitutes for process evidence, the results have |
| 157 | + been problematic: Liang et al. found that GPT detectors |
| 158 | + misclassified over 61% of essays by non-native English writers |
| 159 | + as AI-generated <xref target="Liang2023"/>, and courts have |
| 160 | + begun |
93 | 161 | ruling that sanctions based solely on AI detection scores lack |
94 | | - valid evidentiary basis. |
95 | | - </t> |
96 | | - <t> |
97 | | - PoP addresses this gap through process attestation: capturing |
98 | | - tamper-evident evidence of how content is created, rather than |
99 | | - making probabilistic inferences about finished output. This |
100 | | - approach complements existing media provenance standards such as |
101 | | - C2PA <xref target="C2PA"/>, which tracks the custody and |
102 | | - transformation of digital assets after creation. Where C2PA |
103 | | - attests to what happened to content, PoP attests to how content |
104 | | - came into existence. |
| 162 | + valid evidentiary basis. The following use cases illustrate how |
| 163 | + process attestation addresses needs that neither content |
| 164 | + detection nor custody-based provenance can satisfy. |
105 | 165 | </t> |
106 | 166 | <t> |
107 | 167 | Importantly, PoP does not assert that human-authored content is |
@@ -1657,6 +1717,7 @@ jitter-seal = HMAC-SHA-256(seal-key, seal-input) |
1657 | 1717 | </references> |
1658 | 1718 | <references> |
1659 | 1719 | <name>Informative References</name> |
| 1720 | + <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3161.xml"/> |
1660 | 1721 | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3552.xml"/> |
1661 | 1722 | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml"/> |
1662 | 1723 | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9266.xml"/> |
@@ -1764,6 +1825,35 @@ jitter-seal = HMAC-SHA-256(seal-key, seal-input) |
1764 | 1825 | </front> |
1765 | 1826 | <seriesInfo name="Internet-Draft" value="draft-mihalcea-seat-use-cases-01"/> |
1766 | 1827 | </reference> |
| 1828 | + <reference anchor="HHS-AI-RFI" target="https://www.regulations.gov/docket/HHS-ONC-2026-0001"> |
| 1829 | + <front> |
| 1830 | + <title>Request for Information: Accelerating the Adoption and Use of Artificial Intelligence as Part of Clinical Care</title> |
| 1831 | + <author> |
| 1832 | + <organization>U.S. Department of Health and Human Services, Office of the National Coordinator for Health Information Technology</organization> |
| 1833 | + </author> |
| 1834 | + <date year="2025" month="December"/> |
| 1835 | + </front> |
| 1836 | + <seriesInfo name="Federal Register" value="2025-23641"/> |
| 1837 | + </reference> |
| 1838 | + <reference anchor="NIST-AI-Agents-RFI" target="https://www.regulations.gov/docket/NIST-2025-0035"> |
| 1839 | + <front> |
| 1840 | + <title>Request for Information Regarding Security Considerations for Artificial Intelligence Agents</title> |
| 1841 | + <author> |
| 1842 | + <organization>National Institute of Standards and Technology</organization> |
| 1843 | + </author> |
| 1844 | + <date year="2026" month="January"/> |
| 1845 | + </front> |
| 1846 | + <seriesInfo name="Federal Register" value="2026-00206"/> |
| 1847 | + </reference> |
| 1848 | + <reference anchor="AG-Human-Authored" target="https://authorsguild.org/news/ag-launches-human-authored-certification-to-preserve-authenticity-in-literature/"> |
| 1849 | + <front> |
| 1850 | + <title>Authors Guild Launches "Human Authored" Certification to Preserve Authenticity in Literature</title> |
| 1851 | + <author> |
| 1852 | + <organization>The Authors Guild</organization> |
| 1853 | + </author> |
| 1854 | + <date year="2025" month="January"/> |
| 1855 | + </front> |
| 1856 | + </reference> |
1767 | 1857 | </references> |
1768 | 1858 | </references> |
1769 | 1859 |
|
|
0 commit comments