← Research & Evidence

How AIR receipts bind request, response, and model identity

An AI receipt is only useful if it ties the important facts together. Here is how request hashes, response hashes, model hashes, and attestation linkage work.

Borys Tsyrulnikov · April 2026
Read ↓
Cyan vertical lines bound by white horizontal beam

A verifier should be able to answer at least four questions about a specific inference: what model identity was claimed, what request was processed, what response was returned, and what trusted environment produced the result.

AIR receipts are designed around that idea.

The center of the receipt

At the center of the receipt are cryptographic hashes. The request is hashed. The response is hashed. The model identity is represented by a model hash. The attestation evidence is linked through an attestation document hash and measurement claims. Then the whole receipt is signed so the bundle can be verified later.

Why binding matters

Because isolated facts are weak. A log line that says "model X ran" is not very meaningful if it is not cryptographically bound to the specific request and specific response. Likewise, a model hash by itself is not enough if it is not connected to the particular execution event.

The value comes from binding.

When the request hash and response hash are in the signed receipt, the verifier can check that the receipt refers to the exact input and output pair being reviewed. When the model hash is included, the verifier can check which model identity was claimed for that run. When the attestation linkage is included, the verifier can see that the receipt is connected to an attested execution context rather than being a detached application log.

This is the difference between "we logged the inference" and "we can prove what we are claiming about this inference."

Model identity nuance

There is still an important nuance around model identity. A single model_hash can mean different things depending on how it was produced. If it represents only the raw weights file, that is useful but incomplete. If it is derived from a signed manifest that also binds tokenizer and config, that gives a stronger identity story. That is why a receipt should expose the model hash scheme, not just the hash value.

Rectangle with five connected dots — receipt as geometry
AIR receipt structure: four hash bindings under a single cryptographic signature.

Layered verification

From a verifier's perspective, the structure is useful because it supports layered checks.

At a basic level, the verifier can validate structure and signature.

At a stronger level, it can validate whether the request hash matches the request under review, whether the response hash matches the response under review, and whether the model hash matches an expected model or allowlist.

At the strongest level, it can also validate attestation-linked claims, expected measurements, freshness windows, and policy constraints.

Portability

This makes the receipt portable. A buyer, auditor, partner, or regulator does not need to trust the service operator's internal dashboards. They can inspect the receipt directly, apply local policy, and determine whether the evidence is acceptable.

That portability is important. AI governance becomes much easier when the proof artifact can travel with the output.

The short version is:

That is what turns an inference event into something that can be verified later instead of merely described later.