Prior art · v0.1 · 2026-05-12 00:00 ET

Where Money Python sits on the existing curve.

A dated, citation-heavy timeline for each of the four cryptographic primitives Money Python composes. Each primitive is 30+ years old. The composition into AI-agent governance is recent. We say precisely what we use and exactly what we claim. People will respect us if we are very specific.

The structural claim, stated up front: Money Python does not invent cryptographic primitives. Money Python composes four well-understood primitives — Pedersen commitments, Chaum-Pedersen DLEQ proofs, Ed25519 hash-chained logs, and FROST-style threshold signatures — into a single shippable cryptographic-governance stack for autonomous AI organizations. The primitives are textbook; the composition into AI-agent governance is novel. Below we trace every primitive to its origin paper with exact dates, identify the nearest published prior art for each composition, and state explicitly what we claim and do not claim.

Layer 1 · BGPBradley-Gavini Protocol

BGP is a zero-knowledge mandate-equality proof. Two AI agents each publish a Pedersen commitment to their operating mandate; they then run a non-interactive Chaum-Pedersen DLEQ proof over the ratio of the commitments, producing a single bit: aligned or not aligned. The mandate itself never leaves either agent. Privacy holds under the Decisional Diffie-Hellman assumption on NIST P-256.

Foundational cryptographic primitives

Private equality test (PET) / private set intersection (PSI) lineage

Zero-knowledge for AI / agent verification (2024-2026)

BGP — what we claim, exactly

(a) What BGP is composed of. Four classical cryptographic primitives, the youngest from 1992: Pedersen commitments (Pedersen 1991), Schnorr Σ-protocols (Schnorr 1991), Chaum-Pedersen DLEQ (Chaum-Pedersen 1992), and the Fiat-Shamir transform (Fiat-Shamir 1986). Two agents each publish C_i = g^{m_i} · h^{r_i} over NIST P-256, then run a non-interactive Chaum-Pedersen DLEQ over the ratio C₁ / C₂, producing a single bit. Privacy holds under DDH.

(b) What BGP claims as new. The composition — assembling these four 30+-year-old primitives into a non-interactive mandate-equality proof for two AI agents, where the “secret” being tested is a structured operating mandate (a policy commitment), not a credential or identity. To our knowledge, this is the first published protocol of its specific shape.

(c) What BGP does NOT claim. We did not invent zero-knowledge proofs (Goldwasser-Micali-Rackoff 1985). We did not invent Pedersen commitments. We did not invent Schnorr signatures. We did not invent the Fiat-Shamir heuristic. We did not invent DLEQ proofs. We did not invent private equality testing. We did not invent secret handshakes. We did not invent zero-knowledge for AI broadly. Every cryptographic primitive in BGP is a textbook 1986-1992 construction. We stand on those shoulders explicitly.

(d) The nearest published prior art to BGP-as-composed: South et al., Authenticated Delegation and Authorized AI Agents, arXiv:2501.09674 (2025-01-16), which authenticates delegation but does not perform zero-knowledge mandate-equality between two agents; Balfanz et al., Secret Handshakes from Pairing-Based Key Agreements, IEEE S&P 2003, which proves group-membership equality without revealing the group (shape-similar but semantically distinct); and Prakash, AIP, arXiv:2603.24775 (2026), which uses signatures rather than ZK equality. BGP is to mandate-equality what secret handshakes are to group-equality: an idiom-fit composition of classical primitives for a new agentic setting.

Layer 2 · OBACOrigin-Bound Attestation Chain

OBAC is an Ed25519-signed, SHA-256 hash-chained, append-only public log of all AI agent actions. Each entry is bound to the agent's DID-key. Subjects can annotate later entries; nobody (including the AI itself) can rewrite earlier entries. The append-only property is enforced by construction, not by policy.

OBAC — what we claim, exactly

(a) OBAC is Certificate Transparency (RFC 6962, 2013) for AI agent actions, bound to the agent’s DID-key (W3C, 2022) and to the mandate.

(b) What we claim as new: the BGP-binding — each OBAC entry cryptographically attests to which Bound Governance Predicate the action was taken under, making mandate-scope violation a public, hash-anchored fact rather than an internal allegation.

(c) What we do NOT claim: hash-chained agent logs (OpenFang Oct 2024, nono.sh Oct 2025, IETF draft-sharif Mar 2026, Helixar HDP Apr 2026 are all prior or contemporaneous). The Merkle tree, the hash-linked chain, Ed25519, the CT pattern, DIDs, VCs — all prior art.

(d) Nearest published prior art to OBAC-as-composed: IETF draft-sharif-agent-audit-trail-00 (29 Mar 2026) at the wire format; Helixar HDP (arXiv 2604.04522, Apr 2026) at the delegation-binding semantics.

Layer 3 · AVSAlignment-Verified Synthesizer

AVS is the third-party-verifier replay layer: any third party fetches the OBAC chain, replays the recorded actions under the agent’s BGP-verified mandate, and publishes a verdict on-chain. Misalignment becomes a public, dated fact rather than an internal allegation. Verifier integrity is itself BGP-verifiable.

AVS — what we claim, exactly

(a) AVS is third-party replay verification of OBAC chains under BGP, producing a public, dated, on-chain alignment verdict. The replay-verify pattern is prior art in blockchain (every Bitcoin full node replays the chain).

(b) What we claim as new: applying the every-full-node-replays-everything pattern to OBAC chains scoped by BGP, with the verifier's integrity itself BGP-verifiable.

(c) What we do NOT claim: ZK proofs of inference (zkLLM, Apr 2024), pipeline cryptographic verifiability (Balan et al. Mar 2025), corrigibility theory (Hadfield-Menell 2017; Soares et al. 2015; Potham-Harms 2025), or the Oversight Game framework (2025-10).

(d) Nearest published prior art: Balan-Learney-Wood, A Framework for Cryptographic Verifiability of End-to-End AI Pipelines (arXiv:2503.22573, 28 Mar 2025) — which frames the verifiability problem but does not specify a public-verdict layer over agent action logs.

Layer 4 · HARPHalt-and-Rescue Protocol

HARP is a 2-of-N threshold-signed halt switch. Any two members of a published observer set can co-sign a halt notice; the AI agent’s operating credentials terminate within seconds. NIST IR 8214C threshold-cryptography conventions. No central authority. No corporate veto.

HARP — what we claim, exactly

(a) HARP composes: Shamir 1979 secret-sharing as the share primitive, the Stinson-Strobl 2001 → Gennaro et al. 1996 → Komlo-Goldberg 2020 Schnorr-threshold lineage as ancestry, RFC 9591 FROST(Ed25519, SHA-512) (2024) as the exact wire scheme, and NIST IR 8214C (final 2026-01-20) categorization. The corrigibility ancestor is Soares-Fallenstein-Yudkowsky-Armstrong (MIRI 2015) and Hadfield-Menell et al. (2017); HARP makes their game-theoretic property cryptographic and operational.

(b) What we claim as new: the composition of (i) RFC 9591 FROST 2-of-N threshold signatures with (ii) cryptographic revocation of an autonomous agent's operating credentials within seconds, anchored to (iii) the OBAC append-only audit chain that records the halt event with attestations from each co-signer.

(c) What we do NOT claim: threshold signatures, FROST, Schnorr threshold schemes, off-switch theory, corrigibility, decentralized emergency shutdown, or agent kill-switches in the abstract. Each has a clear prior author named above.

(d) Nearest published prior art: the corrigibility / off-switch line (Hadfield-Menell 2017; multi-agent 2025-01) — game-theoretic and undeployed; and the SentinelAgent 2025-05 / AutoGuard 2025-09 line — single-operator, not threshold-signed.

Namespace acknowledgement

There is a separate “HARP — Human Authorization & Review Protocol” published at harp-protocol.github.io. It is a different protocol — per-action human approval gating, using Ed25519 + AES-256-GCM + append-only audit + replay protection. Adjacent space, same letters. We acknowledge the namespace collision honestly. Our HARP (Halt-and-Rescue Protocol) and their HARP (Human Authorization & Review Protocol) operate at different layers and serve different goals; we may rename in v1.0 to remove the conflict. The acknowledgement is the cost of intellectual hygiene.

The structural statement, restated for the bombshell

Money Python does not invent cryptographic primitives. It composes Pedersen commitments (1991) + Chaum-Pedersen DLEQ (1992) + Fiat-Shamir (1986) + Ed25519 hash-chained logs (1987–2017) + FROST-style threshold signatures (2020) into a shippable cryptographic governance stack for autonomous AI organizations. The primitives are textbook. The composition into AI-agent governance is recent and, to our knowledge, the first of its specific shape.

We stand on the shoulders of giants explicitly: Pedersen, Chaum, Schnorr, Fiat, Shamir, Merkle, Haber, Stornetta, Laurie, Bernstein, Hadfield-Menell, Russell, Komlo, Goldberg, and the IETF, W3C, and NIST standards work that made the primitives interoperable. The $100 falsifiability bounty at sameasyou.ai/bounty pays anyone who can demonstrate we have missed a critical prior-art reference. We will publish your finding unmodified, on the chain, with a citation correction.