In Part II, we dismantled ambient authority and reframed human origin as a permissioned claim, not an inferred property.
Now we answer the hard question:
How do we cryptographically seal a claim of human origin without recreating the same structural flaws that broke identity-based trust?
If “Verifiably Human” is to mean anything, it must be issued, scoped, time-bound, and revocable—just like any other safe authority in a distributed system.
⸻
We begin with a clear definition:
A Human Provenance Policy (HPP) is a cryptographically signed and encrypted artifact that grants scoped authority to assert a specific human-origin claim over a specific piece of content.
It is not a badge. It is not metadata. It is not identity.
It is authority over a claim.
⸻
Not the content alone.
What is sealed is:
In other words, we are sealing:
“This artifact may be asserted as human.captured under these constraints until this expiration.”
Nothing more.
⸻
Modeled after capability-based authority systems, an HPP must include:
policy_type — human_provenance
policy_version — versioned schema for forward compatibility.
artifact_hash — cryptographic digest (e.g., SHA-256) of the content.
scope — one of:
human.capturedhuman.authoredhuman.approvedai.assisted.declaredScopes are mutually exclusive at issuance and may only be downgraded.
issuer — public key of the human or secure capture device.
issued_at
expires_at — mandatory. No permanent claims.
revocation_pointer — reference to a public revocation registry.
nonce — optional replay protection.
⸻
The sealing process follows three stages.
Construct — The policy is assembled locally at the point of capture or authorization.
Sign — The issuer signs the serialized policy with a private key.
Encrypt — The signed policy is encrypted for its intended verifier audience.
⸻
Order matters.
Sign-then-encrypt ensures integrity, confidentiality, and non-repudiation. No plaintext policies should be considered valid.
⸻
Human provenance must expire.
Because keys get compromised, devices get resold, consent changes, and threat models evolve. A permanent claim is indistinguishable from ambient authority.
Short TTLs + revalidation at distribution time prevent stale claims from persisting indefinitely.
⸻
Revocation must be globally observable.
An HPP is invalid if:
Revocation is not optional. Without it, provenance becomes irreversible trust—the very problem we are trying to kill.
⸻
The common mistake: verify once at creation and never again.
Verification must occur before publication, before display, and before amplification. A verifier checks:
If any check fails → the claim is invalid. Fail closed.
⸻
It does not prove personhood, guarantee truth, prevent manipulation after issuance, or eliminate AI.
It does one thing: it makes claims about human origin explicit, bounded, and cryptographically accountable. That is enough to replace ambient trust.
⸻
A blockchain or transparency log may be used to anchor issuer public keys, record revocation events, provide timestamp anchoring, and detect replay. But the ledger is not the authority.
Authority is in the sealed policy. The ledger is audit infrastructure. Confusing those layers recreates the same mistake identity systems made.
⸻
We are not asking, “Is this human?”
We are asking, “Is there valid, scoped, unexpired authority to assert that this artifact was human-originated under defined conditions?”
That replaces assumption with verification, identity with capability, and permanence with expiry. And that is how you kill ambient authority.
