Skip to content

Algorithms & Clauses

The Clausal Machinery of Computable Sovereignty

Version: Catalogue 2.0 · Maintainer: Sovereign Governance Council · Binding: Standard‑817 · SOSL v1.0

Introduction

In SNF, Clauses are algorithmic primitives that realize constitutional guarantees. Each Clause is versioned, publicly registered, and designed for reproducible verification. Clauses compose into Articles (Protocols) and are transported via the Sovereign Genesis Bus. This page enumerates the normative Clause set for SNF v2.0.

Signatures & Commitments

QSS™ — Quantum Sovereign Signature

PQC Signatures: Dilithium / SPHINCS+
Recommended

Role. Authenticity and non‑repudiation for SNF messages and BPR artifacts. Agility via Eclipse schedules.

Inputs. Message envelope (snf.v2.op) and context labels.

Outputs. sig:qss:{alg}:{public-key-id}:{signature-bytes}

Notes. Keys are DID‑bound; rollover must preserve verifiability via inclusion proofs.

LogicSeal™ — Policy‑Bound Commitment

Binding policies and payloads
Recommended

Role. Hash‑commitment that binds operation payloads to policy references, producing non‑repudiable audit units.

Inputs. Canonical JSON payload; policy refs (e.g., ["gdpr.17","ucl.1"]).

Outputs. commit:logicseal:{hash} (+ optional proof map).

Notes. Resistant to re‑contextualization; preserves semantics across jurisdictions.

QOS — Quantum Origin Stamp™

Origin, authorship, lineage
Recommended

Role. Establish unforgeable creation time and provenance; supports asset‑class taxonomies.

Inputs. Asset digest; issuer DID; anchor request.

Outputs. origin:{anchor}:{time}:{issuer} (+ inclusion proof).

Notes. Kyber KEM may be used for anchor exchange where applicable.

Time & Finality Proofs

ChronoFlux™ Engine — Coordinated Time‑Seal

Cross‑anchor orchestration
Recommended

Role. Periodically seals lineage roots into external anchors (e.g., public ledgers), enabling independent verification.

Outputs. seal:chronoflux:{anchor-id}:{tx-ref}

Notes. Multiple anchors reduce correlated failure risk.

ZKChronoSeal™ — Zero‑Knowledge Finality

Public finality without content disclosure
Candidate

Role. Proves that event ordering and inclusion occurred before a timestamp without revealing payload contents.

Outputs. zk:chronoseal:{proof-id} + verifier circuit id.

Notes. Required for AAA deployments handling sensitive sectors.

Merkle‑DAG Ledger

Append‑only lineage with inclusion proofs
Recommended

Role. Canonical lineage substrate for attestations, revocations, and BPR artifacts.

Outputs. root:{hash}, proof:{path}

Notes. Supports ΔΣ overlays and eclipse rollovers.

Privacy & Unlinkability

GhostFrame™

Ephemeral, unlinkable epochs
Candidate

Role. Creates authenticated, short‑lived epochs that break long‑range correlation while preserving auditability.

Outputs. epoch:ghostframe:{id}:{expiry}

Notes. Pair with NASI for human‑legible disclosures.

EchoSentinel™

Selective replay for oversight without linkage
Candidate

Role. Allows oversight bodies to verify subsets of activity with privacy‑preserving attestations.

Outputs. echo:sentinel:{window}:{proof}

Notes. Complements GhostFrame to form privacy duo.

EchoClash™

Collision resistance for replay domains
Research

Role. Prevents adversarial crafting of correlated replays across epochs.

Outputs. anti:replay:{domain}:{tag}

Notes. Optional for AA; recommended for AAA.

Assurance & Anomaly Lenses

ΔΣ (Delta–Sigma) Overlay

Temporal anomaly detection
Recommended

Role. Detects non‑monotonic histories and suspicious latency patterns in lineage streams.

Outputs. delta:sigma:{score} + trace refs.

Notes. Mandatory for public proof publishers.

MetaSentinel™

Meta‑policy consistency checks
Candidate

Role. Ensures that policy guardrails themselves remain within 817 invariants.

Outputs. meta:sentinel:{verdict}

Notes. Emits advisory BPR for human review.

LogicSeal Review

Commitment diffing & provenance
Recommended

Role. Audits LogicSeal commitments across releases; proves no silent policy drift.

Outputs. review:logicseal:{delta}

Notes. Integrates with Merkle Review System.

Sovereign Risk Indices

IEV™ — Identity Erosion Vector

De‑anonymization pressure index
Candidate

Role. Quantifies the ambient risk that a subject can be re‑identified through linkage.

Outputs. iev:{0..100}

Notes. Drives GhostFrame/EchoSentinel activation policies.

SBI™ — Sovereign Breach Index

Rights‑breach likelihood
Candidate

Role. Predicts probability of a rights breach given environment and operator posture.

Outputs. sbi:{0..1}

Notes. Exposed to PAE as decision prior.

Human Silence Index™

Consent fatigue & silence risk
Research

Role. Signals when lack of explicit consent likely reflects fatigue, not approval.

Outputs. hsi:{0..1}

Notes. UCL must downgrade consent validity under high HSI.

Lineage & Review

Merkle Review System

Independent reproducible audits
Recommended

Role. Third‑party reproduction of attestation sets using public roots and inclusion paths.

Outputs. review:merkle:{root}:{coverage%}

Notes. Must publish coverage and anomalies with ΔΣ references.

FameVector™

Public accountability weighting
Research

Role. Weights audit sampling toward high‑impact operators and popular deployments.

Outputs. fame:vec:{weights}

Notes. Input to Merkle Review scheduling.

Identifiers & Registries

All Clauses must be registered with stable identifiers. Suggested encoding:

FamilyIdentifier FormExample
Signatureqss:{alg}:{ver}qss:dilithium3:v1
Commitmentlogicseal:{hash}:{ver}logicseal:blake3:v1
Time‑Proofzk:chronoseal:{ver}zk:chronoseal:v1
Lineagemerkle:{root‑alg}:{ver}merkle:sha3:v2
Privacyghostframe:{ver}ghostframe:v1
Assurancedelta:sigma:{ver}delta:sigma:v2
Registries are append‑only with mirrorable snapshots and inclusion proofs, per Standard‑817.

Normative Schemas (Excerpts)

Clause Identifier Record

{
  "$id": "https://schema.constitutionfabric.org/snf.v2.clause-id.json",
  "type": "object",
  "required": ["family","id","version","status","uri"],
  "properties": {
    "family": {"enum":["signature","commitment","timeproof","privacy","assurance","lineage","index"]},
    "id": {"type":"string"},
    "version": {"type":"string"},
    "status": {"enum":["research","candidate","recommended","retired"]},
    "uri": {"type":"string","format":"uri"},
    "notes": {"type":"string"}
  }
}

Clause Output Envelope

{
  "$id": "https://schema.constitutionfabric.org/snf.v2.clause-out.json",
  "type": "object",
  "required": ["clause","inputs","output","time","attestation"],
  "properties": {
    "clause": {"type":"string"},
    "inputs": {"type":"object"},
    "output": {"type":"string"},
    "time": {"type":"string","format":"date-time"},
    "attestation": {"type":"string"},
    "lineage": {"type":"string"}
  }
}

Worked Examples

1) UCL Consent with Privacy Epoch

// UCL grant under GhostFrame epoch
{"op":"grant","subject":{"did":"did:cf:xyz"},
 "policy":{"refs":["ucl.1"],"version":"817.2"},
 "attachments":{"ghostframe":"epoch:ghostframe:g1:2025-12-01T00:00:00Z","qss":"sig:…"},
 "payload":{"scope":"location:coarse","ttl":"7d"},
 "time":"2025-09-07T20:38:00Z"}

// ΔΣ overlay on lineage stream
{"overlay":"delta:sigma:v2","score":0.04,"trace":"root:…"}

2) InfinityWipe with ZK Finality

// Request
{"op":"nullify","subject":{"did":"did:cf:123"},
 "jurisdiction":{"origin":"EU","loci":["US"]},
 "policy":{"refs":["gdpr.17","cloudact.702"],"version":"817.2"},
 "attachments":{"qss":"sig:dilithium:…","logicseal":"hash:…"},
 "payload":{"class":"PII","scope":"full"},
 "time":"2025-09-07T20:41:12Z"}

// ChronoFlux → ZKChronoSeal
{"seal":"seal:chronoflux:ledgerX:tx123","zk":"zk:chronoseal:v1#proof:…"}

Security Considerations

  • Agility: All PQC and hash families must be eclipse‑agile with dual‑proof periods.
  • Side‑channels: Constant‑time implementations; redact timing leakage in proof narration.
  • Replay: Require EchoClash in high‑sensitivity deployments.
  • Correlation: Activate GhostFrame/EchoSentinel on elevated IEV.
  • Governance: Public proofs for clause retirements and replacements.

Conformance Levels

LevelRequirementsTarget Use
A — Proof‑Aware Implements QSS + LogicSeal; emits clause‑out envelopes; participates in registries (read‑only). Lightweight clients, dashboards.
AA — Policy‑Adherent Integrates ΔΣ overlays; supports ZKChronoSeal verification; privacy epochs available. Institutional processors, research clouds.
AAA — Sovereign‑Grade Operates proof publishers; runs EchoClash; exposes public audit APIs; participates in Council ballots. Critical national/international deployments.

Glossary

  • BPR — Binding Policy Resolution, signed arbitration artifact.
  • Clause — Algorithmic primitive that powers Articles.
  • Epoch — Time‑bounded domain for unlinkability.
  • Overlay — Secondary analytics layer over lineage streams.