Blog

Essays, changelog, and field notes.

ZK proofs, cryptographic provenance, selective disclosure. Where technology and decision-making intersect.

Recent
Business Strategy 2026.04.30

Bridge exploits in 2026: the case for verifiable origin proofs

Bridge exploits in 2026 share one structural pattern: the transactions are cryptographically valid, but cross-system assumptions about origin are not. Today's stack does post-hoc forensics, freezing, and recovery well — yet the receiving system has no canonical way to verify origin before committing. We name this missing layer pre-execution attestation, ship an end-to-end reference implementation in example-origin, and argue the pattern generalizes far beyond bridges — agent-to-tool, oracle-to-contract, model-to-execution.

Read essay →
Announcement 2026.04.28

A Trust Layer for x402

AI agents can now pay over HTTP through x402, but a wallet address and a transaction hash do not tell the receiving server who authorized the payment, under what policy, or whether the data returned was tampered with. Today we publish the Lemma × x402 reference implementation, live on Base Sepolia: every settlement carries a ZK proof bundle inside PAYMENT-RESPONSE — issuer identity, settlement, and data integrity, independently verifiable end-to-end.

Read essay →
Announcement 2026.04.23

Whitepaper: Prove What Your AI Decided On.

As AI agents start making real operational decisions, most systems cannot cryptographically prove what those decisions were based on. Lemma Oracle publishes its whitepaper (v1.0), introducing a trust infrastructure that proves facts without disclosing the underlying data. The paper details three guarantees — authenticity, privacy, and auditability — alongside five CORE use cases and two ADVANCED agent-economy scenarios, framed for the EU AI Act era.

Read essay →
Business Strategy 2026.04.16

"Explainable Management" Powered by Cryptographic Proofs

As AI decision-making becomes widespread, 'explainability'—the ability to retrospectively prove the basis for decisions, not just the outcomes—has become a critical management issue. Against the backdrop of strengthening regulations like the EU AI Act, this article explains the management risks posed by the technical black-box problem. Furthermore, it explores an architecture for 'provable management' and its practical KPIs, utilizing Lemma's Zero-Knowledge Proofs (ZK proofs) and blockchain technology to permanently record AI decision logic and data as a tamper-proof audit trail.

Read essay →
Human Impact 2026.04.07

Verified Attributes in Travel and Public Services

Travel and public services suffer from an inefficient structure where the same personal information is repeatedly submitted and stored across multiple organizations. Passport copies, income certificates, and medical records spread across systems, increasing breach exposure. Lemma proposes a third option: 'Do not share raw data — circulate only verified facts.' This article explores a practical approach to streamlining hotel KYC, visa processing, and public benefit eligibility checks using ZK proofs, all while protecting privacy.

Read essay →
Business Strategy 2026.04.01

Privacy-Preserving Attribute Marketing: Lemma Verifiable AI's Practical Approach

As data sharing within corporate groups becomes restricted by regulations, Lemma Verifiable AI uses Zero-Knowledge Proof technology to verify attributes without disclosing data, enabling secure marketing collaboration. This article explains the technical approach to attribute marketing based on ZK proofs, implementation details, and expected KPI improvements.

Read essay →
Archive
Guides
Technical documentation.

Implementation guides for each layer of the Lemma architecture.

Guides 2026.02.28

Define Your Domain as a Schema

Model how your AI retrieves and clusters knowledge — bucket ages, risk scores, regions — with typed schemas and normalization. Register ZK circuits and generators so every fact traces back to its source.

Read →
Guides 2026.02.28

Disclose Only What AI Needs

Selective disclosure lets holders reveal just the attributes your model requires, while the link to the original issuer signature stays intact.

Read →
Guides 2026.02.28

Encrypt Everything, Expose Nothing

How Lemma keeps every document AES-GCM encrypted so your AI never touches raw PII — only docHash and CID are exposed as stable anchors for provenance.

Read →
Guides 2026.02.28

Prove Facts with Zero Knowledge

Turn business rules like 'over 18' or 'revenue above threshold' into machine-checkable facts. Each proof is permanently recorded with its circuit and generator.

Read →
Guides 2026.02.28

Provenance That Never Disappears

Document commitments, schemas, issuers, and ZK verification results are anchored on-chain. Your RAG index can be rebuilt, your embeddings re-computed — the provenance layer stays permanent.

Read →
Guides 2026.02.28

Query Verified Attributes

Ask 'users over 18 in Japan' and get back attributes with full provenance — proof status, schema, issuer, generator, and verification method — ready for your RAG policy layer.

Read →
Foundations

Lemma Oracle Specs

A cryptographically verified truth layer enabling AI to reason over confidential data via zero‑knowledge proofs, selective disclosure, and on‑chain provenance — all while keeping raw content encrypted.

Read Specs →