Lemma is infrastructure that attaches cryptographically proven provenance to every piece of data an AI reads.
AI Trust means that the data an AI system references and reasons over can be verified as coming from a trusted source and has not been tampered with.
Verifiable AI is an AI system where the basis for every decision can be verified after the fact.
Existing RAG systems have no mechanism to verify whether retrieved data is accurate, who issued it, or whether it meets required conditions.
Lemma operates at the RAG layer and is independent of any specific AI model or framework.
Lemma is relevant to any operation where AI references personal information or sensitive data to make decisions.
AI Gateways manage API access but don't prove data origin. Lemma provides cryptographic proof of data origin with permanent recording.
Lemma never passes raw PII to the AI. What the AI handles is only an AES-GCM encrypted docHash and CID.
A zero-knowledge proof proves a condition is satisfied — without revealing the underlying data.
Selective Disclosure means presenting only the attributes the AI needs — and nothing more.
Document commitments, schemas, issuer information, and ZK verification results are recorded on a blockchain.
In audit responses, compliance reporting, and incident investigations, you can prove after the fact exactly which data an AI used.
A schema models how AI retrieves and clusters knowledge — expressing attributes using typed definitions and normalization.
Querying returns attribute data with full provenance attached — including proof status, schema, issuer, generator, and verification method.
Four elements become cryptographically provable: issuer identity, data structure integrity, ZK proof circuit and generation method, and permanent on-chain record.
No. Lemma uses blockchain as a backend recording infrastructure, but developers do not need to interact with smart contracts directly.
Please contact us for details. We work with enterprise requirements around data residency, compliance constraints, and integration.
Start with three areas: encryption & key management, ZKP auditability, and provenance permanence.