Home
CYNTRISEC// AIR.V1
AIR / V1.0 · IETF DRAFT

Confidential inference.
Cryptographic proof.

Run AI inside hardware-isolated enclaves. Every inference produces a signed receipt covering model identity, data hashes, and lifecycle evidence events.

500+
Tests Across Workspace + CI
16
Compliance Rules
38
Attest Checks
3
Platforms E2E

Attestation, encryption, receipts

EphemeralML protects model weights, user data, and execution integrity through TEE isolation and attestation-bound cryptography.

1

Verify the enclave

Client verifies enclave identity and code measurement against a policy allowlist via COSE/CBOR attestation.

2

Encrypted session

HPKE session established (X25519 + ChaCha20-Poly1305). The host forwards ciphertext only.

3

Gated model loading

Model decryption keys released only when KMS confirms enclave measurement matches policy.

4

Signed receipt

Each inference produces an Ed25519-signed AIR v1 receipt with model hash, I/O hashes, and attestation-linked execution evidence.

W

Model Weights

Encrypted at rest, decrypted only inside an attested enclave. Host never sees plaintext keys.

D

User Data

Prompts and outputs encrypted end-to-end via HPKE. Host relays ciphertext only.

R

Execution Receipts

Each inference produces a verifiable AIR v1 receipt (COSE_Sign1 + CWT + EAT profile) with enclave measurements and Ed25519 signature.

Attested Inference Receipt

Open receipt format based on IETF standards. COSE_Sign1 envelope (RFC 9052) carrying CWT claims (RFC 8392) with EAT profile (RFC 9711), signed with Ed25519.

CWT
Standard claims + AIR private extensions
CDDL
Formal schema definition
10
Golden test vectors
38
AttestCheckCode variants

Receipt verification pipeline (4 stages)

This is the verifier's internal pipeline for validating an AIR v1 receipt — separate from the three-layer trust model above, which describes what is attested.

T1

Parse

COSE/CWT structural validation, required claims present, CDDL conformance.

T2

Crypto

Ed25519 signature verification (verify_strict), hash bindings, key attestation binding.

T3

Chain

Platform-specific trust chain: TDX DCAP collateral, Nitro CA chain, Confidential Space JWT.

T4

Policy

Model allowlist, measurement pinning, freshness windows, sequence continuity.

Key Claims

iss, iat, cti Standard CWT
eat_nonce, eat_profile EAT (RFC 9711)
model_id, model_hash Model identity
request_hash, response_hash I/O binding
attestation_doc_hash TEE evidence
enclave_measurements Platform measurements
security_mode strict / standard

What we guarantee, and what we don't

Designed properties (under stated assumptions)

  • Host ciphertext-only handling — host relays encrypted traffic and cannot directly decrypt prompts, outputs, or model keys under normal operation
  • Attestation-gated key release — model keys released only to approved enclave measurements
  • Session binding — encryption keys bound to attestation + nonce
  • Model integrity — weights are measured inside the TEE and signed manifests can additionally bind tokenizer/config artifacts
  • Per-inference auditability — each receipt carries verifiable model/input/output hash and attestation linkage metadata

Explicitly not claimed

  • Protection against all microarchitectural side-channels
  • Availability guarantees (the host can DoS)
  • Confidentiality under full enclave compromise

Enforcement Controls

Control Mode
Strict evidence collect --strict opt-in
Cleanup-event evidence required --require-destroy-event opt-in
Baseline compliance 16 rules
Receipt max age 3600s

Three-layer trust model (what is attested)

We cryptographically verify the confidential execution environment and policy-bound identity of the workload. Model weights are measured inside the TEE from decrypted bytes. Additional model artifacts are bound via a signed manifest. This model describes the trust claims — the receipt verification pipeline above describes how those claims are checked.

Layer 1: Environment

GPU/CPU attestation proves hardware and firmware state plus confidential-computing mode.

Layer 2: Workload

Policy pins verify the expected image, project, zone, issuer, and nonce freshness before key release.

Layer 3: Model

Weights are hashed inside the TEE from decrypted bytes; signed manifests can additionally bind tokenizer and config.

Model Identity Coverage

  AIR hash scheme:  sha256-manifest
  Manifest:         authoritative
  weights:          bound
  tokenizer:        bound
  config:           bound
  adapters:         not bound

  Receipt emitted with manifest-backed model identity

Three-zone execution boundary

Client (Trusted)

Verifies attestation, holds policy allowlists, establishes HPKE sessions

Host (Untrusted)

Networking, storage, API proxy. Forwards ciphertext only.

Enclave (TEE)

Decrypts data, loads models, runs inference, signs receipts

Client ↔ Host Relay ↔ Enclave • Host ↔ KMS / GCS

Verified across 3 platforms

End-to-end tested on real hardware TEEs with full attestation chain verification.

Platform TEE Status
AWS Nitro (m6i) Nitro Enclaves PASS
GCP CPU (c3-standard-4) Intel TDX PASS
GCP GPU (a3-highgpu-1g) NVIDIA H100 CC PASS
Pilot Completed

Insurance workflow pilot on GCP TDX: 3/3 confidential requests completed, 3/3 AIR receipts verified offline.

See what a verified receipt looks like

Every inference run produces signed execution evidence. Expand to see real output from ephemeralml-verify and ephemeralml-compliance.

AIR v1 covers attestation-linked execution evidence. Legacy EphemeralML compliance flows can additionally record self-reported cleanup events, but AIR v1 itself does not claim cryptographic proof of deletion.

EphemeralML AIR v1 Receipt Verification

  Receipt:     01020304-0506-0708-090a-0b0c0d0e0f10
  Model:       minilm-l6-v2 v1.0.0
  Platform:    nitro-pcr
  Sequence:    #1
  Issuer:      cyntrisec.com

  --------------------------------------------------------------
  4-Layer Verification:
  --------------------------------------------------------------
  [parse]   COSE envelope              [PASS]
  [parse]   Algorithm header            [PASS]
  [parse]   Content type                [PASS]
  [parse]   Payload present             [PASS]
  [parse]   AIR v1 profile              [PASS]
  [crypto]  Signature (Ed25519)         [PASS]
  [claim]   Receipt ID valid            [PASS]
  [claim]   Model hash non-zero         [PASS]
  [claim]   Measurements present        [PASS]
  [claim]   Measurement type valid      [PASS]
  [policy]  Model ID match              [SKIP]
  [policy]  Timestamp freshness         [SKIP]
  --------------------------------------------------------------

  VERIFIED (AIR v1)
EphemeralML Receipt Verification

  Receipt:     68796942-19cf-4b60-a17c-91e5a0de8555
  Model:       minilm-l6-v2 v1.0.0
  Platform:    tdx-mrtd-rtmr
  Sequence:    #0

  --------------------------------------------------------------
  Checks:
  --------------------------------------------------------------
  Signature (Ed25519)         [PASS]
  Model ID match              [SKIP]
  Measurement type            [SKIP]
  Timestamp freshness         [SKIP]
  Measurements present        [PASS]
  Attestation source          [SKIP]
  Image digest                [SKIP]
  Destroy evidence            [SKIP]
  --------------------------------------------------------------

  VERIFIED
Compliance Verification — baseline profile

  SIG-001   Ed25519 signature             [PASS]  verified (strict)
  SIG-002   CBOR deterministic encoding   [PASS]  canonical round-trip
  ATT-001   Attestation present           [PASS]  evidence item found
  ATT-002   Attestation hash match        [PASS]  SHA-256 == receipt hash
  MEAS-001  Measurements 48 bytes         [PASS]  all MRTD/RTMR valid
  MEAS-002  Recognized type               [PASS]  tdx-mrtd-rtmr
  FRESH-001 Receipt within max age        [PASS]  age 6s <= 3600s
  FRESH-002 Not future-dated              [PASS]
  MODEL-001 Model ID present              [PASS]  minilm-l6-v2
  MODEL-002 Manifest present              [PASS]  ModelManifest found
  CHAIN-001 Receipt chain valid           [PASS]  first in chain
  CBOR-001  Deterministic encoding        [PASS]  canonical bytes match
  KEY-001   Key bound to attestation      [PASS]  binding found
  POLICY-001 Policy version               [PASS]  v1-default
  SEQ-001   Sequence numbers              [PASS]  sequence_number=0
  DESTROY-001 Destroy evidence            [PASS]  5 action(s)

  All 16 rules passed for profile 'baseline'
  compliant: true

HIPAA evidence mapping

Receipt fields can be mapped to HIPAA 164.312 control categories. This is evidence support, not certification.

164.312(a) Access Control

Enclave isolation evidence — attested hardware boundary prevents unauthorized access to data during processing.

164.312(b) Audit Controls

Signed receipt evidence — each inference produces a verifiable audit record with model identity and data hashes.

164.312(c) Integrity

Model hash + attestation linkage — signed manifests bind model weights, tokenizer, and config artifacts.

164.312(e) Transmission Security

AEAD encryption evidence — end-to-end encrypted transport (X25519 + ChaCha20-Poly1305).

Built with

Rust 2021
GCP Confidential Space
Intel TDX
AWS Nitro Enclaves
NVIDIA H100 CC
HPKE (X25519)
ChaCha20-Poly1305
Ed25519
COSE / CWT / EAT
Candle ML
Cloud KMS
cargo-audit CI

Start building with EphemeralML

Integrate confidential AI inference into your stack. Check the quickstart guide, explore the source, or request a pilot.