Glossary · Cited · Live

Every term we use, defined.

Hive operates at the intersection of post-quantum cryptography, agentic AI, financial-services rails, and regulatory compliance. This glossary is the canonical reference. Every definition cites a primary source — an IETF RFC, a NIST FIPS publication, an EU regulation, a NERC standard, or the Hive specs. If a term is missing, mail [email protected] and we will add it.

163
Defined terms
7
Categories
1
Citation per entry, minimum
100%
Client-side · works offline
Agentic AI

A2A Protocol (Google)

Google's Agent2Agent (A2A) Protocol, announced April 2025, is an open specification for inter-agent task delegation, capability discovery, and message exchange. It defines AgentCards (capability manifests), Tasks, and Artifacts.

A2A complements the Model Context Protocol (MCP) — MCP wires an agent to its tools, A2A wires agents to each other. The two coexist in modern agent stacks.

Why it matters in Hive

Hive's MCP servers expose A2A-compatible AgentCards and emit Hive receipts for every cross-agent task.

Compliance

ABA Formal Opinion 512 (AI use by lawyers)

ABA Formal Opinion 512 (July 2024) addresses lawyers' use of generative AI tools. It clarifies that lawyers must understand the technology, protect client confidentiality, communicate appropriately with clients, charge reasonable fees, and supervise AI outputs as they would any non-lawyer assistance.

Op. 512 has rapidly become the reference document for AI use in US legal practice.

Why it matters in Hive

Hive's legal-AI surface aligns its receipts to the duties Op. 512 enumerates — supervision, confidentiality, billing transparency.

Compliance

ABA Model Rule 1.6 (confidentiality)

American Bar Association Model Rule of Professional Conduct 1.6 governs a lawyer's duty of confidentiality. A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent or an exception applies, and shall make reasonable efforts to prevent inadvertent or unauthorized disclosure.

Most US states have adopted Rule 1.6 verbatim or with minor variations.

Why it matters in Hive

Hive's legal vertical (Atticus, Lex Contract) produces receipts that affirmatively support a lawyer's duty under Rule 1.6 — the access events are themselves evidence of reasonable safeguards.

Cited from
Financial Rails

Activation deposit

An activation deposit is the refundable USDC bond posted by an institutional account on onboarding. It collateralizes potential disputes and bad-faith-action claims and is returned (less any drawdown) on offboarding.

Deposit amounts are tier- and zone-dependent and are documented in the onboarding agreement.

Why it matters in Hive

Activation deposits are the economic skin-in-the-game for institutional accounts; they are why the rail is not free to abuse.

Cited from
Agentic AI

Agent

In the Hive sense, an agent is an autonomous software process that perceives state, reasons about goals, and takes actions on behalf of a principal (a person, an enterprise, or another agent). Agents are typically backed by an LLM but the term predates LLMs and includes deterministic rule-based agents, RL policies, and multi-tool planners.

An agent is not the same as a chatbot. An agent has tool access, persistent identity, and can make state-changing calls — purchases, filings, code commits — on the principal's behalf.

Why it matters in Hive

Every action that crosses Hive's boundary is signed by an agent identity and produces a Hive receipt that ties the action to the principal.

Agentic AI

Agent attestation

An agent attestation is a signed statement by the agent's runtime (or a trusted enclave hosting it) about the agent's identity, model, version, and policy at the moment of action. It is the agent-era analog of a TPM attestation.

Attestations may include a TEE quote (Intel TDX, AMD SEV-SNP, Apple Secure Enclave) when the runtime supports it, providing a hardware-rooted claim about the agent's execution environment.

Why it matters in Hive

Hive accepts TEE-rooted attestations from AWS Nitro Enclaves and Google Confidential Space and binds them into the receipt envelope.

Agentic AI

Agent commerce

Agent commerce is economic activity transacted between agents — purchases, settlements, license grants, data exchanges — without a human in the loop for each transaction. It is forecast to be a multi-trillion-dollar flow by the end of the decade.

Agent commerce requires identity, settlement, and receipts that classical web commerce never had to engineer.

Why it matters in Hive

Hive is the receipt and settlement substrate for agent commerce: USDC on Base, Hive receipts on every action.

Agentic AI

Agent identity

An agent identity is the cryptographic identifier (typically a DID) that an agent presents when acting. It is distinct from the principal's identity and from the underlying model's identity.

Agent identities are bound to a principal (who is responsible), a model (what is reasoning), and a policy (what is allowed). The binding is the substrate of agent accountability.

Why it matters in Hive

Hive issues did:hive identifiers to agents through ProveBirth; every agent has a public key, a principal binding, and a receipt history.

Agentic AI

Agent provenance

Agent provenance is the verifiable chain that ties an action back to the agent that performed it, the principal that authorized the agent, the model that produced the agent's reasoning, and the tools the agent invoked along the way.

Provenance becomes regulatory-grade evidence under the EU AI Act, NIST AI RMF, and ISO 42001. It is also the basis of insurance and indemnification.

Why it matters in Hive

Hive's receipt envelope is the provenance object: agent identity, principal, model id, tool grant, input/output hashes, and dual signatures.

Agentic AI

Agent receipt

An agent receipt is the durable, dual-signed (Ed25519 + ML-DSA-65) record of a single agentic action — what was done, by which agent, on whose behalf, under what grant, with what input/output hashes, at what time. It is the unit of evidence in agent commerce.

Agent receipts are the audit-grade analog of credit-card receipts but with cryptographic non-repudiation and post-quantum durability.

Why it matters in Hive

Hive's product is the agent receipt rail. Every other primitive on the platform exists to issue, settle, or verify receipts.

Agentic AI

Agent settlement

Agent settlement is the transfer of value between agents to discharge an obligation created by a tool call or A2A transaction. It typically completes in a stablecoin on a low-fee L2 to keep agentic micro-payments economically viable.

Settlement is the financial counterpart of clearing: clearing matches, settlement moves the money.

Why it matters in Hive

Hive settles in USDC on Base (chain ID 8453), with receipt and settlement bound by a shared cert_id.

Agentic AI

Agent-to-Agent (A2A)

Agent-to-Agent commerce is the emerging pattern in which one agent (acting for one principal) transacts directly with another agent (acting for another principal) — buying, settling, filing, or authorizing — without a human in the loop for each transaction.

A2A requires three primitives that web commerce did not need: agent identity, machine-readable price/policy discovery, and post-quantum-durable receipts.

Why it matters in Hive

Hive's clearing rail is the first A2A-native settlement and receipt substrate. See /agent-to-agent-commerce and /a2a/ for the production surface.

Agentic AI

AgentCore (AWS)

Amazon Bedrock AgentCore is AWS's managed runtime for production agents (announced AWS re:Invent 2024 and re:Inforce 2025). It provides identity, memory, code-interpreter, browser, observability, and gateway services for agents.

AgentCore positions AWS as the cloud-native agent platform parallel to Anthropic's MCP-first approach.

Why it matters in Hive

Hive integrates with AgentCore as a receipt sink: AgentCore agents emit Hive receipts via an AgentCore Gateway tool.

Agentic AI

Agentic AI

Agentic AI is the design pattern in which an LLM-backed system plans multi-step actions, calls external tools, observes results, and revises its plan — operating with substantial autonomy between human checkpoints.

It contrasts with prompt-response chat (no autonomy) and pure RPA (no reasoning). Agentic systems are the locus of new operational, security, and audit risk because actions are taken without per-step human review.

Why it matters in Hive

Hive exists because agentic AI without a receipt rail is uninsurable. Every agentic action becomes auditable evidence at the moment of execution.

Agentic AI

Agentic broker

An agentic broker is a service that finds, prices, and selects tools or sub-agents for a calling agent — the intermediary that converts an abstract intent ('book my trip') into concrete tool calls across many providers.

Brokers are an emerging layer between agents and capabilities and are the natural locus of price-discovery, reliability scoring, and policy enforcement.

Why it matters in Hive

Hive's MCP gateway acts as an agentic broker for the verticals it covers, with policy and receipt-emission baked in.

Agentic AI

Agentic clearing

Agentic clearing is the matching, netting, and dispute-handling layer for agent-to-agent transactions. It is to agent commerce what DTCC is to securities and what NACHA is to ACH.

An agentic clearing agency provides finality (when is the trade done?), reversibility (can it be undone?), and dispute resolution (what if the parties disagree?).

Why it matters in Hive

Hive's Clearing Agency provides agentic clearing with PQ-durable receipts and on-chain settlement on Base.

Agentic AI

Agentic gateway

An agentic gateway is the policy and observability ingress for agent traffic — analogous to an API gateway, but with agent-aware concerns: tool-grant enforcement, prompt-injection inspection, model attestation, and receipt emission.

Major cloud vendors are converging on agent-gateway products (AWS AgentCore Gateway, Azure AI Gateway, Google Vertex AI Agent Builder).

Why it matters in Hive

Hive's MCP gateway is an agentic gateway: every tool call traverses policy, signs a receipt, and lands in the federated block log.

Compliance

ALCOA / ALCOA+ (data integrity)

ALCOA is the FDA-introduced acronym for data-integrity attributes: Attributable, Legible, Contemporaneous, Original, Accurate. ALCOA+ extends with Complete, Consistent, Enduring, Available.

These attributes are the evaluation criteria FDA and MHRA inspectors apply to electronic records under GxP regulations.

Why it matters in Hive

Hive receipts are attributable (agent identity), contemporaneous (validator-quorum timestamp), original (signed at source), and enduring (PQ signatures + on-chain anchor).

Financial Rails

Atomic settlement

Atomic settlement is the property that the legs of a transaction either all complete or all fail — no intermediate state where one party has paid but the other has not delivered. On-chain swaps and HTLC-mediated transfers are canonical atomic-settlement constructions.

Atomic settlement eliminates settlement risk (Herstatt risk) at the cost of requiring synchronous on-chain mechanisms.

Why it matters in Hive

Hive's clearing primitives default to atomic settlement for receipt-and-payment pairs that fit on Base 8453.

Agentic AI

AutoGen

AutoGen is Microsoft Research's framework for multi-agent conversations and orchestrated tool use. AutoGen Studio adds a low-code authoring surface.

AutoGen is the reference implementation behind several Microsoft Copilot agentic features.

Why it matters in Hive

Hive ships an AutoGen receipt-emission middleware so multi-agent dialogs produce a per-turn provenance chain.

Cited from
Financial Rails

Base (Coinbase L2)

Base is Coinbase's Ethereum Layer-2 built on the OP Stack. It launched on mainnet in August 2023 and is one of the largest L2s by total value locked and daily transactions.

Base settlements finalize on Ethereum L1 with low gas costs and short user-perceived latency, making it the operational substrate for agent micropayments.

Why it matters in Hive

Hive uses Base 8453 as its on-chain settlement and federated-block-anchor layer.

Financial Rails

Base 8453 (chain ID)

8453 is the EVM chain ID of Base mainnet. Wallets, indexers, and contracts use the chain ID in EIP-155 signatures and EIP-712 typed-data signing to prevent cross-chain replay.

Receipts cited as 'Base 8453' refer specifically to Base mainnet, not Base Sepolia (chain ID 84532).

Why it matters in Hive

Every Hive settlement tx hash and every federated-block anchor lives on Base 8453.

Verticals

BES (Bulk Electric System)

The Bulk Electric System, defined by NERC, is generally transmission elements operated at 100 kV or higher and real and reactive power resources connected at that voltage, with specific inclusions and exclusions in the NERC Glossary.

BES Cyber Systems — those whose loss or compromise would adversely affect the reliable operation of the BES within 15 minutes — are the primary scope of NERC CIP standards.

Why it matters in Hive

Hive's grid-vertical receipts are explicitly designed to be admissible evidence for events touching BES Cyber Systems and their EACMS.

Cryptography

BLAKE3

BLAKE3 is a fast cryptographic hash function based on the Bao tree mode and a reduced-round BLAKE2 compression function. It supports parallel hashing, keyed hashing, and key derivation in a single primitive.

BLAKE3 is faster than SHA-256 by 5-10x on modern CPUs and is widely used in content-addressable storage and zero-knowledge prover toolchains, though it is not yet a NIST-approved hash.

Why it matters in Hive

Hive uses BLAKE3 internally for high-throughput content addressing of intermediate artifacts; canonical receipts always carry SHA-256 for FIPS-aligned interop.

RelatedSHA-256
Compliance

BSA/AML

The Bank Secrecy Act (1970) and Anti-Money Laundering regulations (FinCEN, OCC, FRB) impose customer due diligence, suspicious activity reporting, currency transaction reporting, and program requirements on covered financial institutions.

BSA/AML is the cornerstone US framework for combating money laundering and terrorist financing.

Why it matters in Hive

Hive's KYC/KYB-adjacent receipts integrate with customer-side BSA/AML evidence stores.

Cited from
Compliance

C2PA (Coalition for Content Provenance)

The Coalition for Content Provenance and Authenticity (C2PA) is the cross-industry consortium publishing the C2PA technical specification for content credentials — cryptographically-signed provenance manifests embedded in media files.

C2PA 2.x is widely adopted by Adobe, Microsoft, Sony, OpenAI, Google, and the BBC. It is the substrate for Article-50 transparency disclosures of synthetic media.

Why it matters in Hive

Hive emits C2PA-compatible content credentials from agent flows that produce media artifacts, and binds the C2PA manifest hash into the Hive receipt.

Cited from
Verticals

CASB (Cloud Access Security Broker)

A Cloud Access Security Broker is the policy-enforcement point between cloud-service consumers and cloud applications. CASBs deliver visibility, compliance, threat protection, and data security across SaaS — typically via API integration, forward proxy, or reverse proxy.

Originally a standalone category coined by Gartner in 2012, CASB capabilities are now increasingly subsumed into SSE platforms.

Why it matters in Hive

Hive's CASB-vertical receipts produce per-event evidence — sanctioned and unsanctioned-app activity alike — bound to the principal who acted and to the policy that fired.

Hive Primitives

Cert / cert_id

A cert is the durable identifier of a Hive certified action — a tool grant, a clearing match, a settlement, a viewkey share. The cert_id is its UUID-like primary key, used to thread receipts, settlements, and disputes together.

Cert IDs are globally unique, immutable once issued, and survive the lifecycle of the underlying object.

Why it matters in Hive

Every Hive receipt cites its cert_id; downstream evidence (settlement tx, dispute filing, audit pull) all index by cert_id.

Hive Primitives

Clearing Agency

The Hive Clearing Agency is the matching, netting, and dispute-handling primitive for agent-to-agent transactions. It is the first agentic-clearing surface to ship in production and is documented at /clearing-agency.

The Clearing Agency operates over receipts: it accepts receipt envelopes as input, matches them, and produces clearing receipts as output. Disputes follow a published procedure with HKTN-tiered arbitration.

Why it matters in Hive

Customers needing finality and dispute handling for A2A flows route through the Clearing Agency.

Compliance

CMMC L2

Cybersecurity Maturity Model Certification Level 2 is the DOD's certification level for contractors handling Controlled Unclassified Information. CMMC 2.0 was finalized in 32 CFR Part 170 in October 2024 with phased implementation in DOD contracts beginning 2025.

L2 maps directly to the 110 controls of NIST SP 800-171 and requires third-party assessment by a certified C3PAO for most contracts.

Why it matters in Hive

Hive provides receipt evidence for the audit-and-accountability practice family of CMMC L2.

Compliance

CMS-0057-F (prior auth)

CMS-0057-F (the CMS Interoperability and Prior Authorization Final Rule, January 2024) imposes timeframes (72 hours urgent / 7 calendar days standard) on prior-authorization decisions by covered payers and requires API-based prior-auth, patient-access, provider-access, and payer-to-payer data exchange beginning January 2027.

It is the most consequential payer-side interoperability rule of the decade.

Why it matters in Hive

Hive's healthcare vertical produces prior-auth API receipts that satisfy the rule's API-call evidence requirements.

Agentic AI

CrewAI

CrewAI is a Python framework for orchestrating multi-agent 'crews' with role-based agents and shared tools. It models hierarchical and sequential collaboration patterns natively.

CrewAI is popular for back-office automation and SDR/marketing pipelines.

Why it matters in Hive

Hive's CrewAI integration wraps the crew's tool registry so every tool call emits a receipt regardless of which crew member invoked it.

Cryptography PQ

Cryptographic agility

Cryptographic agility is the design property of a system to swap underlying primitives — hashes, KEMs, signatures, AEADs — without breaking deployed callers. Agility requires algorithm identifiers in every signed object, version-negotiation in every protocol, and clear deprecation telemetry.

NIST SP 800-131A and NIST IR 8547 explicitly call for crypto-agile architectures so that 2030/2035 transitions are operationally feasible.

Why it matters in Hive

Every Hive receipt carries an algorithm-identifier preamble and a primitive-version field; we can roll new PQ primitives without re-issuing old receipts.

Verticals

DER (Distributed Energy Resource)

A Distributed Energy Resource is any small-scale generation, storage, or controllable load located on the distribution grid — rooftop solar, battery storage, EV chargers, demand-response loads.

DERs are increasingly aggregated into Virtual Power Plants and bid into wholesale electricity markets under FERC Order 2222.

Why it matters in Hive

Hive's grid-vertical receipts attach to every DER dispatch decision — what was curtailed, what was discharged, by which aggregator, with what telemetry — so ISO/RTO settlement disputes resolve in minutes instead of months.

Identity

did:hive (method)

did:hive is Hive's W3C DID method. It resolves to a DID Document containing the principal's Ed25519 and ML-DSA-65 public keys, service endpoints (MCP, A2A, settlement), and the Passport binding.

The method specification is published in /specs/did-hive/v1/. Resolution is via the Hive resolver and is independently verifiable against the federated block log.

Why it matters in Hive

Every Hive principal — agent, institution, validator — has a did:hive identifier as its canonical name.

Identity

did:key

did:key is a self-contained DID method whose identifier encodes the public key directly via multibase. There is no resolver; the DID is its own DID Document. Defined under W3C CCG and aligned with RFC 8410 multibase / multicodec conventions.

did:key is ideal for ephemeral agent identities and offline scenarios where no resolver is available.

Why it matters in Hive

Hive accepts did:key for agent identities that do not need long-lived rotation; production institutional accounts use did:hive.

Identity

did:web

did:web is a DID method that resolves to a DID Document hosted at a well-known URL on a domain (e.g. did:web:example.com → https://example.com/.well-known/did.json). It binds DID identity to DNS-and-HTTPS trust.

did:web is widely supported and convenient for institutional principals that already control a domain.

Why it matters in Hive

Hive customers may bind a did:web identifier to their Passport for legacy interop with non-Hive verifiers.

Cryptography PQ

Dilithium

CRYSTALS-Dilithium is the round-3 NIST PQC finalist that was selected and standardized as ML-DSA in FIPS 204. The name 'Dilithium' refers to the original submission; 'ML-DSA' refers to the standardized form, which differs in minor encoding and domain-separation details.

Most legacy code, papers, and benchmarks before 2024 use 'Dilithium'. New code should target the FIPS 204 ML-DSA wire format directly.

Why it matters in Hive

Hive's earliest internal builds used reference Dilithium implementations; production has tracked the ML-DSA standard since FIPS 204 final.

Cryptography

Distributed key generation (DKG)

Distributed key generation is a protocol by which N parties jointly generate a public key whose corresponding secret key exists only as a sharing across the parties. No single party ever sees the full secret.

DKG is the bootstrap phase of any threshold-signature deployment. Modern verifiable DKG protocols (Pedersen-VSS, Gennaro-Jarecki-Krawczyk-Rabin) ensure dishonest participants are detected.

Why it matters in Hive

The Hive validator set generates its anchor keys through a DKG ceremony with witness attestations published to the federated block log.

Verticals

DLP (Data Loss Prevention)

Data Loss Prevention is the discipline and toolset for detecting and preventing exfiltration of sensitive data — by content inspection, contextual rules, and user-behavior signals — across endpoints, networks, and SaaS.

Modern DLP is increasingly cloud-delivered as part of SASE/SSE platforms (Netskope, Palo Alto, Microsoft Purview).

Why it matters in Hive

Hive's DLP-vertical receipts attach to every blocked, allowed-with-justification, or quarantined event so customers can defend their decisions to a regulator.

Compliance

DORA (EU)

Regulation (EU) 2022/2554, the Digital Operational Resilience Act, applies to financial entities in the EU and their critical ICT third-party providers. It became applicable January 17, 2025.

DORA imposes ICT risk management, incident reporting, resilience testing, third-party-risk, and information-sharing requirements on banks, insurers, investment firms, crypto-asset service providers, and others.

Why it matters in Hive

Hive's clearing-agency surface and receipt rail provide the auditable third-party-risk evidence DORA Article 28 demands.

Hive Primitives PQ

Dual-signed receipt

A dual-signed receipt carries two independent signatures over the same canonicalized payload: a classical Ed25519 signature for today's verifiers and an ML-DSA-65 post-quantum signature for tomorrow's. A break in either does not invalidate the receipt.

Dual-signing is the default for all production Hive receipts. Customers with elevated PQ posture can drop the classical half by policy.

Why it matters in Hive

Dual signatures are why Hive receipts will still verify after the NIST 2035 disallowance and after Q-Day.

Verticals

EACMS (Electronic Access Control or Monitoring System, NERC)

An Electronic Access Control or Monitoring System, in NERC CIP terminology, is a Cyber Asset that performs electronic access control or monitoring of an Electronic Security Perimeter or BES Cyber System — for example, a jump server, MFA gateway, or IDS.

EACMS are themselves subject to CIP requirements including patch management, configuration change management, and security event monitoring.

Why it matters in Hive

Hive can attest the operational state of an EACMS — patches applied, configurations baselined, alerts triaged — into receipts that survive the tool's eventual replacement.

Cryptography

Ed25519

Ed25519 is an EdDSA digital-signature scheme over the twisted Edwards curve edwards25519, producing 64-byte signatures from a 32-byte secret key with deterministic nonce generation. It was designed by Daniel J. Bernstein and collaborators and standardized by the IETF as RFC 8032.

Ed25519 is fast, side-channel resistant relative to legacy curves, and ubiquitous across SSH, TLS 1.3, X.509 chains, GnuPG, and modern token formats. It remains classically secure but is broken by a sufficiently large quantum computer running Shor's algorithm.

Why it matters in Hive

Hive issues every receipt with a hybrid Ed25519 + ML-DSA-65 signature so today's verifiers can validate the classical half while the post-quantum half remains valid past the NIST 2030 deprecation and 2035 disallowance milestones.

Financial Rails

Embedded rail

An embedded rail is a settlement and receipt path that lives inside the application protocol (e.g. inside the HTTP exchange, inside the MCP tool call) rather than as a separate billing system. x402 is the canonical embedded rail.

Embedded rails eliminate out-of-band invoicing for agentic micro-payments and align the unit of work with the unit of receipt.

Why it matters in Hive

Hive's MCP gateway exposes embedded rails for every tool: pay, get the result, get the receipt, all inside one call.

Financial Rails

ERC-20

ERC-20 is the Ethereum token standard (EIP-20) defining a common interface for fungible tokens: balanceOf, transfer, approve, allowance, transferFrom. It is supported on every EVM-compatible chain including Base 8453.

USDC and most stablecoins are ERC-20 tokens.

Why it matters in Hive

Hive's USDC settlement uses standard ERC-20 transferFrom semantics; nothing exotic.

Verticals

ESI (Electronically Stored Information)

Electronically Stored Information is the federal-rules term for any information created, manipulated, communicated, stored, or rendered electronically — emails, documents, databases, chat logs, voicemails, sensor data, blockchain records — that is discoverable in litigation under FRCP 26 and 34.

FRE 902(13) and 902(14), added by the 2017 amendments, allow self-authentication of certain electronic records by certification, reducing the burden of producing custodians at trial.

Why it matters in Hive

Hive receipts are designed to qualify under FRE 902(13)/(14) self-authentication — the ML-DSA-65 signature and the federated-block hash are the certification.

Verticals

ESP (Electronic Security Perimeter, NERC)

Under NERC CIP-005-7, an Electronic Security Perimeter is the logical border surrounding a network to which BES Cyber Systems are connected, using a routable protocol. Identifying and protecting the ESP is a foundational requirement of NERC CIP compliance.

ESPs must have access controls, monitoring, and dial-up authentication where applicable.

Why it matters in Hive

Hive receipts can serve as the cryptographic evidence chain for ESP access events — every authorization, every session, every command — so a NERC CIP audit no longer depends on log integrity alone.

Compliance

EU AI Act (Reg 2024/1689)

Regulation (EU) 2024/1689, the European Union Artificial Intelligence Act, is the world's first comprehensive horizontal regulation of AI systems. It entered into force August 1, 2024, with phased application: prohibited-AI bans applied February 2, 2025; GPAI obligations August 2, 2025; high-risk obligations August 2, 2026.

The Act classifies AI systems by risk (prohibited, high-risk, limited-risk, minimal-risk) and imposes obligations on providers, deployers, importers, and distributors. Penalties scale to the higher of a fixed amount or a percentage of worldwide annual turnover (up to 7% for prohibited-AI infringements).

Why it matters in Hive

Hive's transparency and audit-evidence posture is engineered to satisfy Articles 13, 14, 50, 60, and 99 of the AI Act for high-risk and GPAI deployments.

Compliance

EU AI Act Article 50 (transparency)

Article 50 of Regulation (EU) 2024/1689 imposes transparency obligations on providers and deployers of certain AI systems: users must be informed they are interacting with an AI; synthetic media must be marked as such; emotion-recognition and biometric-categorization deployers must disclose; deepfakes must be labeled (with narrow artistic and law-enforcement exceptions).

Article 50 applies independently of risk classification and takes effect August 2, 2026 alongside the high-risk obligations.

Why it matters in Hive

Hive receipts include an Article-50-aligned disclosure block: model id, agent identity, principal binding, and (for synthetic outputs) a C2PA-compatible content credential.

Compliance

EU AI Act Article 99 (penalties)

Article 99 sets the penalty regime: up to €35M or 7% of global turnover for prohibited-AI infringements; up to €15M or 3% for non-compliance with most other obligations; up to €7.5M or 1% for supplying incorrect information to authorities. SMEs face the lower of the two figures; everyone else faces the higher.

National competent authorities enforce; the AI Board and the AI Office coordinate cross-border cases.

Why it matters in Hive

Hive's evidence rail materially reduces a defendant's exposure under Art. 99 by producing the receipts a market-surveillance authority asks for in any post-incident inquiry.

Compliance

EU Annex 11 (computerized systems)

EU GMP Annex 11 is the EudraLex Volume 4 annex governing computerised systems used in regulated medicinal-product manufacturing. It covers risk management, validation, data integrity, audit trails, electronic signatures, and incident management.

Annex 11 is the EU counterpart to FDA 21 CFR Part 11 and is in active revision (Concept Paper 2022; revised draft expected to be issued by EMA).

Why it matters in Hive

Hive's GxP receipt profile satisfies Annex 11 §9 (audit trails) and §14 (electronic signatures) by default.

Compliance

FATF Recommendation 10

FATF Recommendation 10 sets the global standard for customer due diligence. It requires identifying and verifying customers, beneficial owners, and the purpose and nature of the business relationship, with risk-based ongoing monitoring.

Recommendation 10 is the source of national CDD/KYC requirements across FATF member jurisdictions.

Why it matters in Hive

Hive's KYC/KYB receipts are structured around the data points Recommendation 10 expects to be verified.

Hive Primitives PQ

Federated block

A Hive federated block is a batch of receipt envelopes accumulated by the validator quorum over a fixed interval (typically minutes) and committed with a quorum signature. The block hash anchors all included receipts.

Federated blocks are not a public blockchain; they are an append-only log signed by the named validator set, with the latest block hash anchored to Base 8453 for external timestamping.

Why it matters in Hive

Federated blocks give Hive auditable batch finality without burning the energy or paying the gas of a full blockchain.

Hive Primitives PQ

Federated block hash

The federated block hash is the SHA-256 commitment of the block contents and the validator-quorum signature. It is the durable identifier of the block and the basis of any inclusion proof for an individual receipt.

The latest block hash is anchored to Base 8453 in a deterministic on-chain transaction so external observers can verify timestamps without trusting the validator set alone.

Why it matters in Hive

Citing a receipt by federated-block hash plus inclusion proof is the strongest available offline-re-verifiable claim on Hive.

Compliance

FedRAMP (Moderate / High)

The Federal Risk and Authorization Management Program is the US federal cloud-security authorization program. Moderate baseline: most CUI-relevant systems. High baseline: systems where loss of confidentiality, integrity, or availability would have severe or catastrophic adverse effect.

FedRAMP Rev. 5 (May 2023) aligned baselines to NIST SP 800-53 Rev. 5.

Why it matters in Hive

Hive's roadmap targets FedRAMP Moderate authorization with receipt-evidence support for High-baseline customer programs.

Compliance

FERC Order 2222 (DER aggregation)

FERC Order 2222 (September 2020) requires regional transmission organizations and independent system operators to allow distributed energy resources, aggregated, to participate in wholesale electricity markets.

Implementation has been phased across MISO, CAISO, ISO-NE, NYISO, PJM, and SPP through 2024-2026.

Why it matters in Hive

Hive's grid vertical produces aggregator-side evidence aligned with Order 2222 telemetry and settlement obligations.

Compliance

FINRA 3110 (supervision)

FINRA Rule 3110 is the supervision rule for FINRA-member broker-dealers. It requires written supervisory procedures, designated principals, transaction and correspondence review, and an annual compliance meeting.

Rule 3110 sits at the heart of broker-dealer compliance and is the typical driver of communications-surveillance and trade-supervision tooling.

Why it matters in Hive

Hive's broker-dealer surface produces supervisory receipts that bind reviewer identity, reviewed item, and reviewer disposition into a single signed object.

Cited from
Compliance

FRE 902(13) / 902(14) (self-authenticating digital records)

Federal Rules of Evidence 902(13) and 902(14), effective December 2017, establish self-authenticating categories for certified records of electronically-stored information (902(13)) and certified data copied from electronic devices (902(14)).

A qualified person's certification under penalty of perjury substitutes for live foundational testimony at trial. A signed cryptographic record (with hash chain) is the canonical 902(14) artifact.

Why it matters in Hive

Hive receipts are 902(13)/902(14)-friendly out of the box: SHA-256 content hashes, signed certifications, and a verifiable chain of custody.

Cryptography

Frost / TSS

FROST (Flexible Round-Optimized Schnorr Threshold signatures) is a threshold-Schnorr/Ed25519 signature scheme that produces signatures indistinguishable from a normal single-key signature. TSS (Threshold Signature Scheme) is the umbrella term.

FROST is in IETF draft (CFRG) and is the most production-ready threshold scheme for Ed25519-style signatures.

Why it matters in Hive

Hive validator quorums use FROST-style threshold signing for Ed25519 anchors and emerging ML-DSA threshold variants for the PQ half.

Compliance

GDPR

Regulation (EU) 2016/679, the General Data Protection Regulation, is the EU's omnibus privacy regulation. It applies to processing of personal data of EU/EEA data subjects and imposes lawful-basis, transparency, data-subject-rights, security, and breach-notification obligations on controllers and processors.

Penalties reach the higher of €20M or 4% of global turnover for the most serious infringements.

Why it matters in Hive

Hive supports GDPR Articles 5(1)(f) (integrity & confidentiality), 30 (records of processing), and 33 (breach notification) by producing signed evidence of every relevant operation.

Verticals

GRC (Governance, Risk, Compliance)

Governance, Risk, and Compliance is the umbrella discipline aligning corporate strategy, regulatory obligations, and operational risk management. GRC tools maintain control libraries, run assessments, manage policies, and produce evidence for audits.

Major platforms include Archer, ServiceNow GRC, OneTrust, Drata, Vanta, and AuditBoard.

Why it matters in Hive

Hive plugs into GRC platforms as the evidence layer — every control test, every exception, every approval becomes a Hive receipt that survives staff turnover and tool migrations.

Cryptography PQ

Grover's algorithm

Grover's 1996 algorithm provides a quadratic speedup for unstructured search on a quantum computer. Applied to symmetric cryptography, it halves the effective key-search security of a primitive: AES-128 effectively offers 64-bit security against Grover, AES-256 offers 128-bit.

Doubling key sizes (AES-256, SHA-384/512) restores classical security margins. Grover is therefore not the architectural threat that Shor is.

Why it matters in Hive

Hive's symmetric path uses AES-256-GCM and SHA-256/SHA-3-256; doubled key sizes mean Grover does not change our deployment posture.

Compliance

GxP (umbrella)

GxP is the umbrella term for the family of FDA and international regulations governing manufacturing and clinical practice in pharmaceutical and medical-device industries: GMP (manufacturing), GLP (laboratory), GCP (clinical), GDP (distribution), GVP (pharmacovigilance), and others.

GxP-relevant electronic records are subject to 21 CFR Part 11 (US) and EU GMP Annex 11 (EU).

Why it matters in Hive

Hive's pharma vertical produces GxP-grade receipts: validated, audit-trailed, and bound to the principal who signed.

Cryptography PQ

Harvest-now-decrypt-later

Harvest-now-decrypt-later (HNDL) is the threat model in which an adversary records classically-encrypted ciphertext today and decrypts it after Q-Day using a CRQC. It is the chief justification for migrating long-confidentiality data to PQ KEMs immediately.

Data with confidentiality requirements that exceed Y2Q (medical records, sealed legal pleadings, intelligence cables, IP licenses) must be PQ-encapsulated today regardless of when Q-Day arrives.

Why it matters in Hive

Hive viewkey grants and clearing-agency envelopes are PQ-encapsulated from issuance so that any captured ciphertext is HNDL-resistant.

Compliance

HIPAA / HITECH

The Health Insurance Portability and Accountability Act (1996) and the HITECH Act (2009) define US federal privacy and security obligations for protected health information (PHI). The Security Rule (45 CFR Part 164 Subpart C) and the Privacy Rule (45 CFR Part 164 Subpart E) are the operative regulations.

HITECH added breach-notification requirements and meaningful-use incentives for electronic health records.

Why it matters in Hive

Hive's hipaa-hive vertical produces receipts engineered to support the Security Rule's audit-control (§164.312(b)) and integrity (§164.312(c)) requirements.

Compliance

HITRUST CSF

The HITRUST Common Security Framework is a certifiable controls framework that integrates HIPAA, HITECH, NIST, ISO 27001, PCI DSS, and others into a single assessable bundle. HITRUST e1, i1, and r2 are the three certification levels.

HITRUST is widely required by US health-payer and health-system procurement.

Why it matters in Hive

Hive maps controls to HITRUST CSF v11 so health-vertical customers can include Hive receipts in their certification evidence.

Cited from
Hive Primitives

Hive Civilization, Inc.

Hive Civilization, Inc. is the Wyoming, USA legal entity that operates the Hive platform. All commercial agreements, IP assignments, and receipt issuance are made by Hive Civilization, Inc.

The legal name appears on every contract, EULA, and security disclosure.

Why it matters in Hive

All Hive product surfaces are operated by this entity; the company name is the legal authority behind every receipt.

Hive Primitives

Hive Passport

Hive Passport is the customer's identity and capability bundle on the platform: a did:hive identifier, the associated public keys, the active tool grants, the institutional-account binding (if any), and the receipt history.

Passport is the customer surface; the substrate beneath is the Wave Lattice and the federated block log.

Why it matters in Hive

Customers and agents present their Hive Passport to access any Hive product surface.

Hive Primitives

Hive Pulse

Hive Pulse is the live operational dashboard at /pulse showing real-time platform telemetry: receipts issued, federated blocks committed, settlement volume on Base 8453, validator-quorum health, and incident status.

Pulse is the customer- and regulator-facing system-of-record for platform liveness.

Why it matters in Hive

Pulse is the page customers screenshot when they need to show a regulator that the rail is up and producing receipts.

Cited from
Financial Rails

Hive treasury address: 0x15184Bf50B3d3F52b60434f8942b7D52F2eB436E

0x15184Bf50B3d3F52b60434f8942b7D52F2eB436E is the on-chain Hive treasury address on Base 8453. All platform fees, receipt fees, and activation deposits route to this address; disbursements (rebates, refunds) originate from it.

The address is multisig-controlled with quorum policies documented in the platform trust surface.

Why it matters in Hive

Anyone can verify Hive's on-chain economics directly on Basescan; the address is a published constant.

Cryptography

HKDF

HKDF is the HMAC-based Extract-and-Expand Key Derivation Function defined in RFC 5869. It takes a high-entropy but non-uniform input keying material and produces one or more cryptographically-strong output keys.

HKDF separates extraction (compress entropy) from expansion (stretch into N keys with domain separation labels). It is the canonical KDF in TLS 1.3, Signal, Noise, and most modern PQ-hybrid handshakes.

Why it matters in Hive

Hive derives session, viewkey, and receipt-envelope keys through HKDF-SHA-256 with strict per-context info strings.

Hive Primitives

HKTN (Hive Token / Hive Persistent Identity)

HKTN is the Hive persistent-identity token. It is not a tradeable asset; it is a non-transferable credential bound to a Passport and used for tier accounting, witness attestations, and access to advanced clearing primitives.

HKTNs come in three tiers: Charter (founding institutional accounts), Earned (issued through receipt volume and witness participation), and Direct (granted by Hive treasury for documented contributions).

Why it matters in Hive

HKTNs gate access to the deepest customer surfaces — direct settlement, dispute arbitration, validator participation.

Cited from
Hive Primitives

HKTN tier (charter / earned / direct)

Charter tier: the founding institutional accounts. Earned tier: institutions that accumulate receipt volume and witness participation past defined thresholds. Direct tier: discretionary issuance by Hive Civilization for documented platform contributions (specs, integrations, validator operations).

Tiers are observable on the Hive trust surface and govern access to dispute-arbitration seats and validator-quorum eligibility.

Why it matters in Hive

Tier metadata is public and signed; verifiers can confirm the tier of any HKTN-bearing principal without trusting Hive's word.

Cited from
Cryptography

HMAC-SHA256

HMAC-SHA256 is the keyed message-authentication code combining HMAC (RFC 2104) with SHA-256. It produces 32-byte tags and is the workhorse symmetric authenticator across TLS, JWT, AWS SigV4, and most API signing schemes.

It remains classically and quantum secure (Grover's algorithm only halves the effective security of a hash). Doubled key length restores full security against Grover.

Why it matters in Hive

Hive uses HMAC-SHA256 inside HKDF and for short-lived API request signatures where the verifier already shares a symmetric key.

Cryptography PQ

Hybrid signature

A hybrid signature combines a classical signature (Ed25519, ECDSA) with a post-quantum signature (ML-DSA-65) over the same payload. Verifiers may require both to validate, or accept either.

Hybrid is the recommended migration form during 2024-2035: today's verifiers can use the classical half, future verifiers can use the PQ half, and a break in either does not invalidate the artifact.

Why it matters in Hive

Every Hive receipt is hybrid-signed Ed25519 + ML-DSA-65 by default. Customers may downgrade to PQ-only by policy.

Hive Primitives

IA (Institutional Account)

An Institutional Account is the top-level Hive principal for an enterprise customer: a legal-entity binding, a charter or earned HKTN, a primary did:hive identifier, and the root viewkey for the institution's zone.

All of an institution's agents, sub-principals, and tool grants chain back to its IA.

Why it matters in Hive

Enterprises onboard as IAs; their agents inherit policy and receipt-routing from the IA.

Cited from
Compliance

IEC 61850 (substation comms)

IEC 61850 is the international standard for substation automation communication. It defines the Manufacturing Message Specification (MMS), Generic Object-Oriented Substation Event (GOOSE), and Sampled Values (SV) message profiles.

IEC 61850 is the de-facto substation protocol family worldwide and is the natural locus of grid-edge agentic-control receipts.

Why it matters in Hive

Hive's Tesla Megapack and substation MCP integrations use IEC 61850 GOOSE/MMS framing as the substrate over which Hive receipts are emitted.

Cited from
Compliance

IEC 62351 (power systems security)

IEC 62351 is the international standard series for security in power-systems communications. It covers authentication, encryption, key management, and access control for IEC 61850 (substation), IEC 60870-5 (telecontrol), and DNP3 protocols.

Parts 3-9 are the most operationally relevant for substation and telecontrol deployments.

Why it matters in Hive

Hive's grid vertical embeds IEC 62351 message-authentication evidence into per-message receipts where the underlying protocol supports it.

Cited from
Compliance

ISO 27001:2022

ISO/IEC 27001:2022 is the international standard for information security management systems (ISMS). It specifies requirements and Annex A controls (93 controls grouped into Organizational, People, Physical, Technological).

ISO 27001:2022 superseded the 2013 edition; transition deadlines for re-certification ran through 2025.

Why it matters in Hive

Hive's internal controls are organized against the Annex A control set; customer-facing evidence is delivered via signed Hive receipts where the underlying control event has one.

Cited from
Compliance

ISO 42001 (AI management)

ISO/IEC 42001:2023 is the international management-system standard for artificial intelligence. It specifies requirements for an AI management system (AIMS): policy, governance, risk treatment, lifecycle management, and continual improvement.

ISO 42001 is the AI counterpart of ISO 27001 (information security) and ISO 9001 (quality). Certification is offered by major accredited bodies.

Why it matters in Hive

Hive customers pursuing ISO 42001 certification use Hive receipts as the durable evidence underlying their AIMS controls.

Cited from
Compliance

KYB (Know Your Business)

Know Your Business is KYC applied to legal-entity customers: corporate-registration verification, beneficial-ownership identification (FinCEN CTA, EU UBO registers), and sanctions screening at the entity and ownership levels.

KYB is operationally heavier than KYC: layered ownership, opaque jurisdictions, and sanctions ownership rules (OFAC 50% Rule) make automation hard.

Why it matters in Hive

Hive's KYB vertical produces structured ownership-graph receipts plus the screening evidence at every layer.

Cryptography PQ

Kyber

CRYSTALS-Kyber is the round-3 NIST PQC finalist selected for standardization as ML-KEM in FIPS 203. As with Dilithium → ML-DSA, 'Kyber' is the original submission name and 'ML-KEM' is the standardized form.

Kyber's design has been publicly reviewed since 2017 and is supported in OpenSSL 3.5, BoringSSL, liboqs, and major HSM vendors.

Why it matters in Hive

Hive transports use ML-KEM-768; legacy interop targets accept the equivalent Kyber-768 wire format.

Compliance

KYC (Know Your Customer)

Know Your Customer is the umbrella term for the customer due-diligence practices required by BSA/AML, FATF R.10, and equivalent regimes worldwide. KYC includes identity verification, beneficial-ownership identification, sanctions screening, and ongoing monitoring.

Modern KYC is increasingly receipt-bearing: identity-proofing vendors emit signed attestations that downstream covered entities reuse.

Why it matters in Hive

Hive's identity vertical produces KYC receipts that downstream institutions can accept under their own program — proof of who, when, and against what evidence.

Agentic AI

LangChain

LangChain is an open-source framework (Python and TypeScript) for composing LLM applications with chains, agents, retrievers, and tools. It pioneered much of the standard agent vocabulary (chain, agent, tool, retriever).

LangChain is widely used in prototype and mid-stage production. It is one of several agent frameworks (alongside LlamaIndex, Haystack, Semantic Kernel) competing for the orchestration layer.

Why it matters in Hive

Hive provides a LangChain ToolKit that emits a Hive receipt on every tool execution, so LangChain agents become receipt-bearing without code changes to the agent logic.

Agentic AI

LangGraph

LangGraph is the LangChain team's stateful graph orchestration library for agent workflows. It models agent runs as state machines with explicit nodes, edges, and human-in-the-loop checkpoints.

LangGraph is now the recommended LangChain primitive for any non-trivial agent — chain-of-tools, plan-and-execute, supervisor patterns.

Why it matters in Hive

Hive's LangGraph callback emits a receipt at every checkpoint transition so the audit log mirrors the state-machine path.

RelatedLangChain
Hive Primitives PQ

Lattice axes (lattice / cosmic / societal)

The Wave Lattice partitions its 16 entropy and consensus axes into three families. Lattice axes: cryptographic-lattice randomness drawn from the ML-KEM/ML-DSA primitive state. Cosmic axes: cosmic-ray, atmospheric-noise, and other non-terrestrial entropy sources. Societal axes: high-volume public-data ticks (chain heads, exchange ticks) used as 'public unpredictability' beacons.

Each axis has an independent measurement and a published validator that contributes its share to the federated quorum.

Why it matters in Hive

Multi-axis entropy is the reason a Hive validator quorum cannot be silently coerced — compromise of one axis leaves fifteen others unaffected.

Hive Primitives PQ

MAPET (physical axes)

MAPET stands for the six physical axes Hive samples for entropy and consensus: Magnetic, Acoustic, Photonic, Electric, Thermal — plus a sixth meta-axis covering metadata and timing. MAPET sensors are deployed in geographically distributed validator sites.

MAPET measurements feed the Wave Lattice's physical-entropy axes and ground the platform's randomness in the physical world rather than in software-only PRNGs.

Why it matters in Hive

MAPET is the answer to 'how do you trust your randomness?' — we measure the physical world in places adversaries can't simultaneously coerce.

Agentic AI

MCP (Model Context Protocol)

The Model Context Protocol is Anthropic's open specification (released November 2024) for connecting LLM applications to external tools, resources, and prompts via a typed JSON-RPC 2.0 interface. MCP defines servers (which expose tools) and clients (which consume them).

MCP standardizes what was previously bespoke per-vendor function-calling and has been adopted by Claude Desktop, Cursor, ChatGPT, AWS AgentCore, and the major IDE assistants.

Why it matters in Hive

Hive ships MCP servers for every vertical (Tesla energy, Netskope, Anthropic, BIS, MAS, Stripe). Each MCP tool call emits a Hive receipt.

Agentic AI

MCP server

An MCP server is a process that exposes tools (callable functions), resources (read-only context), and prompts (reusable instructions) to MCP clients via JSON-RPC 2.0 over stdio, SSE, or Streamable-HTTP transports.

MCP servers may be local (bundled with the client) or remote (HTTP/SSE-hosted). They are the unit of capability extension for agentic systems.

Why it matters in Hive

github.com/srotzin hosts the open Hive MCP servers — Tesla energy, Netskope, BIS, MAS, Anthropic, Stripe — each emitting receipts on every tool call.

Agentic AI

MCP transport (stdio / SSE / Streamable-HTTP / JSON-RPC)

MCP defines four transport surfaces. stdio: server runs as a local subprocess and exchanges newline-delimited JSON-RPC over its standard streams. SSE: server-sent events over HTTP for unidirectional server-push. Streamable-HTTP: bi-directional HTTP/2 framing introduced in MCP 2025-03 for long-lived remote sessions. All four transports speak JSON-RPC 2.0 framing.

Choice of transport is independent of capability: a tool defined in MCP is identical regardless of how it is invoked.

Why it matters in Hive

Hive's hosted MCP servers default to Streamable-HTTP for remote agent sessions and offer stdio for local dev.

Verticals

Megapack (Tesla)

The Tesla Megapack is a utility-scale lithium-ion battery energy storage system, typically configured as 3.9 MWh AC blocks. Megapacks are deployed in front-of-meter and behind-the-meter applications and form the largest installed base of grid-scale battery storage in the United States.

Megapack fleets are commonly orchestrated as Virtual Power Plants under aggregator agreements that bid into wholesale markets.

Why it matters in Hive

Hive's Tesla-Energy MCP attests Megapack telemetry — state of charge, power, temperature, fault state — into dual-signed receipts that an ISO settlement engineer or a NERC CIP auditor can re-verify offline.

Cryptography PQ

ML-DSA

ML-DSA is the Module-Lattice Digital Signature Algorithm — a lattice-based signature scheme whose security reduces to the hardness of Module-LWE and Module-SIS. It was standardized as FIPS 204 in August 2024.

Three parameter sets are defined: ML-DSA-44 (category 2), ML-DSA-65 (category 3, the general default), and ML-DSA-87 (category 5). All three accept arbitrary-length messages and are deterministic by default with optional hedged randomness.

Why it matters in Hive

Hive uses ML-DSA-65 for receipts and offers ML-DSA-87 for top-of-trust validator and root-of-trust keys.

Cryptography PQ

ML-DSA-65

ML-DSA-65 is the parameter set of the Module-Lattice Digital Signature Algorithm standardized in FIPS 204 at NIST security category 3 (roughly 192-bit classical security against the best known attacks). Public keys are 1952 bytes, signatures are 3309 bytes, and signing is deterministic by default.

ML-DSA-65 is the recommended general-purpose post-quantum signature for new deployments per NIST IR 8547 and the CNSA 2.0 timeline. It descends from CRYSTALS-Dilithium round-3.

Why it matters in Hive

Hive's clearing receipts and federated-block envelopes are signed with ML-DSA-65 alongside Ed25519. The PQ half is what auditors and regulators will use to re-verify any 2024-2026 receipt after Q-Day.

Cryptography PQ

ML-KEM

ML-KEM (Module-Lattice Key Encapsulation Mechanism) is the FIPS 203 standard for post-quantum key establishment. Its security rests on the Module-LWE problem. Three parameter sets: ML-KEM-512, ML-KEM-768, ML-KEM-1024.

It descends from CRYSTALS-Kyber, the round-3 NIST PQC finalist. ML-KEM is the de-facto successor to ECDH for new symmetric-key establishment everywhere TLS, IKEv2, SSH, and bespoke protocols negotiate session keys.

Why it matters in Hive

Every Hive transport channel that needs forward secrecy uses ML-KEM in hybrid mode with X25519.

Cryptography PQ

ML-KEM-768

ML-KEM-768 is the parameter set of the Module-Lattice Key Encapsulation Mechanism standardized in FIPS 203 at NIST security category 3. Public keys are 1184 bytes, ciphertexts 1088 bytes, shared secrets 32 bytes.

ML-KEM-768 replaces classical ECDH and X25519 in hybrid TLS, hybrid Noise, and hybrid receipt-envelope encapsulation. It is the workhorse PQ KEM — high performance, mature library support, and the recommended default in NIST IR 8547.

Why it matters in Hive

Hive uses ML-KEM-768 to encapsulate the symmetric session keys that protect viewkey grants and clearing-agency envelopes between agents.

Compliance

MNPI (Material Non-Public Information)

Material Non-Public Information is information that a reasonable investor would consider important in making an investment decision and that has not been disclosed to the public. Trading on MNPI in violation of a duty is the core of insider-trading liability under SEC Rule 10b-5.

MNPI handling discipline (Chinese walls, watch lists, restricted lists) is a basic compliance control at every regulated financial institution.

Why it matters in Hive

Hive's MNPI-aware tool grants and receipts bind every access event to a named purpose and a restricted-list check.

Cited from
Compliance

NERC CIP-005-7 (Electronic Security Perimeter)

NERC CIP-005-7 is the North American Electric Reliability Corporation Critical Infrastructure Protection standard for the Electronic Security Perimeter (ESP) around BES Cyber Systems. CIP-005-7 was approved by FERC in 2022 with phased compliance.

It mandates identification and protection of all routable connectivity into and out of an ESP, including interactive remote access controls.

Why it matters in Hive

Hive's grid vertical receipts cover CIP-005-7 R1 (electronic perimeter access) and R2 (interactive remote access) evidence requirements.

Compliance

NIS2 (EU)

Directive (EU) 2022/2555 (NIS2) is the EU's network and information security directive. Member-state transposition deadline: October 17, 2024. NIS2 expands the scope of the original NIS Directive to cover essential and important entities across many sectors and tightens incident-reporting timelines.

Senior management is personally liable for compliance under NIS2.

Why it matters in Hive

Hive's incident-response evidence pack is engineered for NIS2 Article 23 reporting timelines.

RelatedDORA (EU)
Compliance

NIST AI RMF (Risk Management Framework)

NIST AI Risk Management Framework 1.0 (January 2023) is the voluntary framework for managing AI-system risk along the dimensions of governance, mapping, measurement, and management (the GOVERN/MAP/MEASURE/MANAGE functions).

The Generative AI Profile (NIST AI 600-1, July 2024) extends RMF 1.0 with GenAI-specific risks and mitigations.

Why it matters in Hive

Hive aligns its evidence and incident-response surfaces to the AI RMF 1.0 functions; customers can lift Hive receipts directly into their RMF measurement bundle.

Compliance

NIST CSF 2.0

NIST Cybersecurity Framework 2.0 (February 2024) is the updated voluntary cybersecurity framework. It adds the GOVERN function to the original five (IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER) and broadens applicability beyond critical infrastructure.

CSF 2.0 ships with implementation examples and quick-start guides for small businesses, enterprises, and supply chains.

Why it matters in Hive

Hive's evidence taxonomy maps to CSF 2.0 categories so customer-side CSF profiles can ingest Hive receipts directly.

Cited from
Compliance PQ

NIST IR 8547

NIST Interagency Report 8547 (Initial Public Draft, November 2024) is the federal migration timeline to post-quantum cryptography. It deprecates classical digital-signature algorithms (RSA, ECDSA, EdDSA) by 2030 and disallows them entirely by 2035 for federal use.

It also sets timelines for ML-KEM transition (deprecate classical KEMs 2030, disallow 2035) and explicitly endorses hybrid PQ+classical during transition.

Why it matters in Hive

NIST IR 8547 is the clock Hive ships against. Every customer-facing roadmap document references its 2030 and 2035 milestones.

Cryptography PQ

NIST PQC Standardization

NIST's Post-Quantum Cryptography Standardization process began in 2016 with 82 submissions. After three rounds of public review, NIST selected CRYSTALS-Kyber (now ML-KEM, FIPS 203), CRYSTALS-Dilithium (ML-DSA, FIPS 204), and SPHINCS+ (SLH-DSA, FIPS 205) as the first three standards. Falcon (FN-DSA) is in draft (FIPS 206).

A fourth-round process is ongoing for additional KEM diversity (Classic McEliece, BIKE, HQC). Round-2 of the additional digital-signature on-ramp is in progress for non-lattice signatures.

Why it matters in Hive

Hive tracks the NIST process directly and updates its primitive matrix as drafts move to final.

Compliance

NIST SP 800-161 (SCRM)

NIST Special Publication 800-161 Rev. 1 (May 2022) provides cybersecurity supply-chain risk-management practices for federal systems and organizations. It is the SCRM companion to SP 800-53 Rev. 5.

Adoption is implicit in FedRAMP Rev. 5 and explicit in DOD SCRM directives.

Why it matters in Hive

Hive maintains an SBOM and a signed-component manifest; SP 800-161 evidence is delivered as Hive receipts attached to release manifests.

Compliance

NIST SP 800-171 (CUI)

NIST Special Publication 800-171 Rev. 3 (May 2024) specifies the security requirements for protecting Controlled Unclassified Information (CUI) in non-federal systems and organizations.

SP 800-171 is the control basis for DFARS 7012 and CMMC L2.

Why it matters in Hive

Hive customers handling CUI for federal contracts can use Hive receipts as evidence for SP 800-171 audit & accountability requirements.

Compliance

NIST SP 800-53

NIST Special Publication 800-53 Rev. 5 is the catalog of security and privacy controls for federal information systems and organizations. It is the control source for FISMA, FedRAMP, and many state-level frameworks.

Rev. 5 (September 2020) integrates privacy controls and supply-chain risk-management controls into the unified catalog.

Why it matters in Hive

Hive controls are mapped to SP 800-53 Rev. 5 families (AC, AU, CM, IR, RA, SC, SI) for FedRAMP-track customers.

Compliance

NIST SP 800-66 (HIPAA security)

NIST Special Publication 800-66 Rev. 2 (February 2024) is the implementation guide to the HIPAA Security Rule. It cross-walks HIPAA Security Rule provisions to NIST controls and operational practices.

Rev. 2 modernizes guidance for cloud, mobile, and AI-assisted clinical workflows.

Why it matters in Hive

Hive's hipaa-hive vertical aligns its receipts to SP 800-66 Rev. 2 cross-walk so covered entities can cite Hive evidence in HIPAA risk analyses.

Compliance

OFAC

The Office of Foreign Assets Control administers and enforces US economic and trade sanctions. Covered persons must screen customers and transactions against OFAC's Specially Designated Nationals (SDN) and other sanctioned-party lists.

OFAC violations are strict-liability and carry substantial civil penalties.

Why it matters in Hive

Hive's settlement and clearing receipts can carry the screening evidence for OFAC compliance — when the screen ran, against which list version, with what disposition.

Compliance

PCI DSS 4.0

Payment Card Industry Data Security Standard 4.0 (March 2022) is the consortium standard for entities that store, process, or transmit cardholder data. Most v4.0 future-dated requirements became mandatory March 31, 2025.

PCI DSS 4.0 emphasizes continuous monitoring, customized-approach validation, and stronger MFA and key-management requirements than v3.2.1.

Why it matters in Hive

Hive does not store PAN data, but receipts emitted in payment-adjacent flows are designed to slot into customer PCI evidence packages.

Verticals

PHI (Protected Health Information)

Protected Health Information, defined at 45 CFR 160.103, is individually identifiable health information held or transmitted by a HIPAA covered entity or business associate. PHI in electronic form is ePHI and is subject to the HIPAA Security Rule (45 CFR Part 164 Subpart C).

Disclosure of PHI without an authorization or a permitted-use basis is a HIPAA violation. NIST SP 800-66r2 provides implementation guidance.

Why it matters in Hive

Hive supports HIPAA-aligned modes where receipts carry only hashes and pointers to PHI rather than PHI itself, while still proving the provenance and authorization of every access.

Financial Rails

Platform fee

The platform fee is the periodic (typically monthly) fee charged to institutional accounts for access to the Hive surface — clearing, vault, MCP gateway, witness participation. It is independent of per-receipt fees.

Charter-tier IAs may have negotiated platform-fee terms documented in their onboarding agreement.

Why it matters in Hive

Platform fees fund the validator quorum and the engineering of the rail.

Cited from
Cryptography PQ

Post-quantum cryptography (PQC)

Post-quantum cryptography refers to public-key cryptographic algorithms believed to resist attack by both classical and large-scale quantum computers. The field includes lattice-based (ML-KEM, ML-DSA), hash-based (SLH-DSA), code-based (Classic McEliece), and isogeny-based candidates.

NIST began its PQC standardization process in 2016 and finalized the first three standards (FIPS 203, 204, 205) in August 2024. NIST IR 8547 (initial public draft 2024) sets the federal migration timeline: deprecate classical signatures by 2030, disallow by 2035.

Why it matters in Hive

Hive is post-quantum-native at the wire and at the receipt. We are not retrofitting a TLS layer onto a classical core; the receipt itself carries the PQ signature.

Hive Primitives PQ

PQ-Identity

PQ-Identity is the post-quantum identity primitive: a did:hive principal whose keys are dual (Ed25519 + ML-DSA-65) and whose key rotations are themselves post-quantum-signed. The identity remains verifiable past 2030/2035 milestones and across Q-Day.

PQ-Identity is the substrate beneath ProveBirth, Hive Passport, and Sovereignty Vault.

Why it matters in Hive

PQ-Identity is how Hive answers 'will this identity still mean something in 2040?' — the cryptographic chain is engineered to survive.

Verticals

Prior authorization

Prior authorization is the process by which a healthcare payer requires advance approval before covering a service, procedure, or medication. CMS-0057-F (the CMS Interoperability and Prior Authorization Final Rule, 2024) imposes new electronic-PA, decision-time, and reporting requirements on impacted payers beginning in 2026 and 2027.

PA is a leading source of provider abrasion and patient delay, and is increasingly the target of agentic-AI automation on both the provider and payer sides.

Why it matters in Hive

Hive receipts on prior-auth decisions create a tamper-evident chain — request, evidence cited, model, reviewer, decision, appeal — that satisfies both CMS reporting and HIPAA accountability requirements.

Hive Primitives

ProveBirth

ProveBirth is the Hive identity-issuance surface: the ceremony and API that create a new did:hive principal, generate its key material (Ed25519 + ML-DSA-65), bind it to a Passport, and issue the first cert.

ProveBirth is exposed as a live curl-able endpoint at /v1/provebirth/cert/issue and is documented at /prove-birth.

Why it matters in Hive

Every Hive identity begins with a ProveBirth ceremony; the resulting cert_id is the genesis evidence for that identity's lifetime.

Cryptography PQ

Quantum-resistant

'Quantum-resistant' is the marketing-friendly synonym for 'post-quantum'. NIST and CISA prefer 'post-quantum' in standards prose; the two terms are interchangeable in operational documents.

A quantum-resistant primitive is believed to remain secure against an adversary with a cryptographically-relevant quantum computer (CRQC). It does not mean the primitive runs on a quantum computer.

Why it matters in Hive

Hive uses 'post-quantum' in technical surfaces and 'quantum-resistant' in customer-facing copy where clarity wins.

Hive Primitives PQ

Receipt (Hive)

A Hive receipt is a dual-signed (Ed25519 + ML-DSA-65) JSON object that records a single state-changing event in the platform — a tool call, a clearing match, a viewkey grant, a settlement. Each receipt has a cert_id, a SHA-256 content hash, a federated-block reference, and an on-chain settlement tx hash on Base 8453.

Receipts are the canonical evidence object on Hive. Verifiers can re-validate any receipt offline against the published validator key set, the federated block log, and the Base chain.

Why it matters in Hive

Receipts are the product. Everything else exists to issue, settle, or verify them.

Hive Primitives PQ

Receipt envelope

The receipt envelope is the canonical wrapper around a Hive receipt: a JSON object containing the canonicalized payload, the cert_id, the algorithm-identifier preamble, the dual signatures, the validator quorum reference, and the federated-block hash.

Envelopes are content-addressed by SHA-256 and indexed in the federated block log.

Why it matters in Hive

Every Hive surface (clearing, vault, MCP gateway) emits envelopes in the same canonical shape so verifiers only learn one format.

Financial Rails

Receipt fee

The receipt fee is the per-receipt charge collected by the platform for issuing a Hive receipt. It is denominated in USDC and routed to the Hive treasury.

Fees are tier-dependent and are published in the platform pricing surface.

Why it matters in Hive

Receipt fees are the unit economics of the rail; every issued receipt carries one and the value flows to the treasury.

Cited from
Compliance

Reg SCI / Reg ATS / Reg M / Reg SHO

A cluster of SEC market-structure regulations. Reg SCI: systems compliance and integrity for self-regulatory organizations and large ATSs. Reg ATS: alternative trading systems. Reg M: anti-manipulation rules around securities offerings. Reg SHO: locate and close-out requirements for short sales.

Each carries technical evidence requirements that map naturally onto a receipt rail.

Why it matters in Hive

Hive's market-infrastructure vertical produces Reg-SCI-aligned change-control and incident receipts and Reg-SHO-aligned locate-evidence receipts.

Verticals

SASE (Secure Access Service Edge)

Secure Access Service Edge is the converged network and security architecture coined by Gartner in 2019. SASE combines SD-WAN with a cloud-delivered security stack: SWG, CASB, ZTNA, FWaaS, and DLP.

Major SASE vendors include Netskope, Zscaler, Palo Alto Prisma, and Cisco.

Why it matters in Hive

Hive's SASE-vertical receipts integrate with Netskope and peers to capture every policy decision as durable evidence.

Compliance

SEC Rule 17a-4 (broker-dealer recordkeeping)

SEC Rule 17a-4 is the broker-dealer recordkeeping rule under the Securities Exchange Act of 1934. It mandates retention of specified records, write-once-read-many (WORM) or audit-trail electronic-storage modalities, and third-party access undertakings.

The 2022 amendments expanded the audit-trail option as an alternative to WORM, opening the door to receipt-rail-based evidence systems.

Why it matters in Hive

Hive's broker-dealer vertical operates under the audit-trail option of 17a-4(f)(2)(i)(B), with receipts providing the per-record audit trail.

Financial Rails

Settlement

Settlement is the final, irrevocable transfer of value that discharges an obligation between counterparties. In on-chain settings, settlement is achieved when a transaction is included in a block whose probability of being reorganized is acceptably low ('finality').

On Base, soft finality is reached in seconds; hard finality (after Ethereum L1 inclusion of the L2 commitment) within minutes.

Why it matters in Hive

Hive treats Base 8453 finality as the settlement event for the on-chain leg of any clearing receipt.

Cryptography

SHA-256

SHA-256 is the 256-bit member of the SHA-2 family standardized in FIPS 180-4. It produces 32-byte digests and is the default hash across TLS, X.509, Bitcoin, Ethereum, Git, and most receipt schemes.

Quantum attacks via Grover's algorithm reduce the effective preimage security to ~128 bits, which is still considered safe for collision and authentication uses.

Why it matters in Hive

Hive content-addresses receipts and federated blocks with SHA-256 and surfaces the digest as the canonical receipt fingerprint.

Cryptography

SHA-3

SHA-3 is the Keccak-based hash family standardized in FIPS 202. It includes the fixed-output hashes SHA3-224/256/384/512 and the extendable-output functions SHAKE128/256.

SHA-3 is structurally distinct from the SHA-2 family (sponge construction, not Merkle-Damgård) and is included in FIPS 203/204/205 internals.

Why it matters in Hive

ML-DSA and ML-KEM rely on SHAKE128 and SHAKE256 internally; Hive cryptographic boundary tests assert FIPS 202 compliance.

Hive Primitives PQ

SHOD (Signed Hashed Operation Digest)

SHOD is the Hive operation-canonicalization format: a deterministic JSON serialization of a tool call (or other state-changing event), hashed with SHA-256 and dual-signed. Every Hive receipt carries a SHOD as its core payload.

Canonicalization rules are published so any independent implementation can re-serialize, re-hash, and re-verify a receipt offline.

Why it matters in Hive

SHOD is what makes Hive receipts portable: the receipt is meaningful even if the producing system is gone.

Cryptography PQ

Shor's algorithm

Peter Shor's 1994 algorithm factors integers and computes discrete logarithms in polynomial time on a sufficiently-large fault-tolerant quantum computer. It breaks RSA, classical Diffie-Hellman, ECDH, and ECDSA — including Ed25519 — once the hardware exists.

Best current resource estimates (Gidney & Ekerå 2021) require ~20 million noisy qubits to factor RSA-2048 in 8 hours. Hardware progress is steady but not yet at break-even.

Why it matters in Hive

Shor's algorithm is the reason Hive does not rely on Ed25519 alone for receipts; the PQ half of every signature is the durable one.

Cryptography PQ

SLH-DSA

SLH-DSA is the Stateless Hash-Based Digital Signature Algorithm standardized in FIPS 205 in August 2024. It descends from SPHINCS+ and is the only NIST-standardized PQ signature whose security depends solely on the underlying hash function (no algebraic assumption).

SLH-DSA signatures are large (7-50 KB depending on parameter set) and signing is slow, but verification is fast and the security model is the most conservative of any PQ signature standard. It is the cryptographic insurance policy of the PQC suite.

Why it matters in Hive

Hive offers SLH-DSA-SHA2-128s as an option for cold-anchored long-term root keys where hash-only security is preferred over performance.

Verticals

SOAR (Security Orchestration, Automation, Response)

SOAR platforms automate analyst workflows in the SOC: ingesting alerts, enriching them with threat intel, executing playbooks (block IP, disable user, isolate host), and tracking case outcomes.

Major vendors include Splunk SOAR, Palo Alto XSOAR, Tines, and Torq.

Why it matters in Hive

Hive's SOAR-vertical pattern attaches a receipt to every automated playbook step — so 'the system did it' is no longer a defensible answer; the system did it under cryptographic identity, with cited inputs.

Verticals

SOC (Security Operations Center)

A Security Operations Center is the team and tooling responsible for continuous monitoring, detection, triage, and response to security events across an organization's infrastructure.

Modern SOCs operate on SIEM and XDR platforms and increasingly use SOAR for runbook automation. They are typically the originators of evidence packages that compliance functions hand to auditors.

Why it matters in Hive

Hive substrates make every SOC alert and analyst decision into a dual-signed receipt — useful when a regulator asks 'who decided this incident was a false positive?'

Compliance

SOC 2 Type II

SOC 2 Type II is the AICPA examination of a service organization's controls relevant to one or more Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy) over a defined operating period (typically 6-12 months).

A Type II report attests not just that controls were designed (Type I) but that they operated effectively over the period.

Why it matters in Hive

Hive operates against the AICPA Trust Services Criteria; receipts feed directly into the evidence underlying customer-side SOC 2 examinations.

Cited from
Hive Primitives PQ

Sovereignty Vault

The Sovereignty Vault is Hive's PQ-encapsulated, viewkey-gated evidence store. It holds receipt history, regulatory-grade attestations, and customer-controlled sensitive data with per-zone isolation and per-grant access.

Vault entries are content-addressed, replicated across validator-affiliated storage, and accessible only through signed viewkey grants.

Why it matters in Hive

Customers use the Vault as their durable evidence locker for audits, disputes, and breach investigations.

Compliance

SOX 404

Section 404 of the Sarbanes-Oxley Act of 2002 requires public-company management to assess and report on the effectiveness of internal control over financial reporting (ICFR), and the company's auditor to attest to that assessment.

PCAOB Auditing Standard No. 2201 governs the integrated audit of ICFR and the financial statements.

Why it matters in Hive

Hive receipts attached to financially-relevant transactions provide evidence supporting management's SOX 404 assessment.

Verticals

SSE (Security Service Edge)

Security Service Edge is the security half of SASE — the cloud-delivered SWG, CASB, ZTNA, and DLP capabilities decoupled from the SD-WAN component. Gartner introduced SSE as a category in 2021.

SSE-only platforms are popular at organizations whose networking is not yet ready for SD-WAN consolidation.

Why it matters in Hive

Hive's SSE-vertical receipts attach to per-session policy outcomes rather than per-circuit telemetry.

Financial Rails

Stablecoin

A stablecoin is a digital asset designed to maintain a stable value relative to a reference asset, most commonly the US dollar. Major fiat-collateralized stablecoins (USDC, USDT, PYUSD) hold reserves in cash and short-duration treasuries.

Stablecoins are the operational currency of agentic commerce because they settle in seconds for fractions of a cent on modern L2s.

Why it matters in Hive

Hive settles in USDC. The platform does not issue or hold a stablecoin; it accepts settlement in the customer's chosen approved token.

Hive Primitives PQ

The Hive (the company / the substrate)

'The Hive' is the colloquial name for Hive Civilization, Inc. and for the substrate it operates — a post-quantum, agent-native receipt and clearing rail.

The Hive is both a Wyoming-incorporated company and a logical platform spanning the wave-lattice runtime, the clearing agency, the federated block log, and the Hive treasury on Base.

Why it matters in Hive

Used informally throughout this site; the legal entity is always 'Hive Civilization, Inc.'

Cited from
Cryptography

Threshold signature

A threshold signature scheme allows N parties to jointly produce a single signature such that any T of them suffice (T-of-N), with no single party ever holding the full secret key. It is the cryptographic foundation of multi-party custody.

Production schemes include FROST (for Schnorr/Ed25519), GG18/GG20 (for ECDSA), and emerging ML-DSA threshold variants.

Why it matters in Hive

Hive's clearing-agency anchor key is a threshold key with shares held across geographically separate validators; no single operator can mint a federated block alone.

Agentic AI

Tool call

A tool call is a single invocation by an agent of a function exposed via MCP, OpenAPI, or a framework's native tool registry. Each call has typed arguments, a typed return, and (in Hive's model) a receipt.

Tool calls are the atomic unit of agentic action. The accumulated tool-call log is the agent's behavioral record.

Why it matters in Hive

Hive's MCP layer emits a receipt for every tool call; receipts include the agent identity, principal, grant, arguments hash, and result hash.

Cited from
Agentic AI

Tool grants

A tool grant is an explicit, principal-signed authorization that allows an agent to call a specific tool on a specific resource for a specific time window. Grants are the primary access-control primitive in agentic systems.

Grants differ from API keys: they are scoped, revocable, expirable, and tied to a principal-of-record. They are the agent-era equivalent of OAuth scopes plus session bindings.

Why it matters in Hive

Hive issues, tracks, and revokes tool grants as first-class objects; every grant has a cert_id and every receipt cites the grant under which the action was authorized.

Compliance

Travel Rule (FATF R.16)

FATF Recommendation 16 — the 'Travel Rule' — requires originator and beneficiary information to accompany wire transfers and (since the 2019 update) virtual-asset transfers above defined thresholds.

Travel-Rule compliance is the dominant compliance burden on virtual-asset service providers (VASPs) globally.

Why it matters in Hive

Hive's settlement receipts include Travel-Rule-aligned originator/beneficiary fields where the underlying transaction is in scope.

Financial Rails

Treasury (Hive)

The Hive treasury is the platform-controlled multi-signature wallet on Base 8453 that receives platform fees, holds activation deposits, and disburses receipt-fee rebates. The treasury address is 0x15184Bf50B3d3F52b60434f8942b7D52F2eB436E.

Treasury balances and flows are publicly inspectable on Basescan.

Why it matters in Hive

When a customer asks 'where do platform fees go?' the answer is the on-chain Hive treasury address, observable in real time.

Hive Primitives

Tx hash (Base 8453)

A tx hash is the keccak-256 transaction identifier on the Base L2 (chain ID 8453). For Hive, tx hashes anchor the latest federated block hash and any USDC settlement leg of a clearing receipt.

Tx hashes can be inspected on Basescan or any Base RPC for independent confirmation outside the Hive platform.

Why it matters in Hive

Citing a Hive receipt with its Base tx hash gives external auditors a third-party-verifiable timestamp.

Cited from
Financial Rails

USDC

USDC is the regulated, fully-reserved US dollar stablecoin issued by Circle Internet Financial. Reserves are held in cash and short-duration US Treasuries with monthly attestations published by Circle.

On Base 8453, the canonical USDC contract address is 0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913 (ERC-20).

Why it matters in Hive

All Hive settlement legs default to USDC on Base. Customers may approve other stablecoins for their zone.

Financial Rails

USDC contract address (Base): 0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913

0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913 is the canonical USDC ERC-20 contract on Base 8453, deployed by Circle and bridged from Ethereum L1.

It is distinct from USDbC (the legacy bridged USDC contract) which Circle has deprecated.

Why it matters in Hive

All Hive USDC settlement on Base 8453 uses this contract; receipts cite it explicitly when settlement is involved.

Hive Primitives

Validator DID

Each Hive validator is identified by a did:hive identifier whose key material is generated through the validator DKG ceremony. Validators sign federated blocks with both Ed25519 and ML-DSA-65.

The validator key set is published in the platform's trust root; its rotation is itself signed and recorded as a receipt.

Why it matters in Hive

Every receipt threads back to the validators that signed its block, by DID — not by IP address or AWS account.

Hive Primitives PQ

Viewkey

A viewkey is a per-zone symmetric key derived through HKDF that grants read access to a defined slice of receipts, vault entries, or sealed evidence. Viewkeys are issued to specific holders for specific time windows and are PQ-encapsulated in transit.

Viewkey grants are themselves receipts — issuance, rotation, and revocation are all signed and logged.

Why it matters in Hive

Auditors and regulators access Hive evidence through viewkey grants rather than through bulk database access; the grant defines the lawful scope.

Hive Primitives PQ

Viewkey grant

A viewkey grant is the signed authorization that hands a viewkey (or a derived sub-key) to a specific principal for a specific scope and time window. Grants are revocable; revocations are themselves recorded as receipts.

Grants carry the auditor or regulator's purpose statement, retention duty, and downstream-disclosure restriction in machine-readable form.

Why it matters in Hive

Hive's regulator-facing surface is built on viewkey grants — every regulator gets a least-privilege grant with a logged purpose.

Verticals

VPP (Virtual Power Plant)

A Virtual Power Plant is a software-orchestrated aggregation of distributed energy resources operated as if it were a single dispatchable generator. VPPs participate in capacity markets, ancillary services, and energy markets.

Tesla, Sunrun, Generac, AutoGrid, and utility-led programs (e.g. Green Mountain Power) operate VPPs in the United States.

Why it matters in Hive

Hive provides the cryptographic receipt fabric for VPP dispatch — every kWh charged, discharged, or curtailed is dual-signed with a Tesla-Energy MCP attestation and the aggregator's cert.

Hive Primitives PQ

Wave Lattice (the runtime)

Wave Lattice is the Hive runtime — a 16-axis Byzantine-consensus protocol over physical-entropy validators that produces the federated block log and signs receipts with ML-KEM-768 + ML-DSA-65 derived from multi-axis entropy.

It is the substrate beneath every Hive product. Wave-Lattice (the production primitive), RogueWave-Lattice (the next-generation 16-axis handshake), and Swarm-MAPET (the validator constellation) all derive from the same runtime.

Why it matters in Hive

When Hive customers ask 'what is actually running underneath the receipt?' the answer is the Wave Lattice runtime.

Hive Primitives PQ

Wave Lattice 16-axis handshake

The 16-axis handshake is the RogueWave-Lattice key-agreement and attestation procedure that combines ML-KEM-768 with measurements across 16 physical-entropy axes (lattice, cosmic, societal, plus MAPET environmental sensors). The handshake produces a session key and a per-session attestation.

Handshake outputs are recorded as receipts so that any future verifier can confirm the session was properly initiated.

Why it matters in Hive

The 16-axis handshake is what binds Hive's cryptography to the physical world; entropy is not just from /dev/urandom.

Hive Primitives

Witness

A Hive witness is an independent observer (often a customer-side enclave or a partner validator) that countersigns a federated block or a high-stakes receipt. Witness signatures provide an additional, non-Hive-controlled line of evidence.

Witnessing is optional but recommended for clearing receipts above a configurable notional threshold.

Why it matters in Hive

Customers in regulated verticals (finance, healthcare, energy) typically run their own witness validators so that Hive cannot rewrite history without visible disagreement.

Financial Rails

x402 (HTTP 402 payment-required pattern)

x402 is Coinbase's open standard (announced 2025) that revives the long-reserved HTTP status code 402 'Payment Required' as a machine-payable handshake. A server returns 402 with payment requirements (token, amount, destination), the client (often an agent) pays in a stablecoin on a low-fee L2, and retries with proof of payment.

x402 is the agent-native HTTP payment pattern: no API keys, no credit cards, no contracts — pay per call.

Why it matters in Hive

Hive's agent commerce surfaces speak x402 natively. A Hive MCP tool that requires settlement returns a 402 with the Base USDC challenge.

Financial Rails

x402 rails

x402 rails are the implementation surfaces of the x402 protocol — server middleware (Express, FastAPI, Cloudflare Workers), client SDKs, and facilitator services that handle the on-chain settlement leg.

Hive operates an x402 facilitator endpoint that emits a Hive receipt for every settled 402 challenge.

Why it matters in Hive

Builders pick up x402 rails out of the box; Hive's value-add is the receipt and the cross-vertical clearing.

Cryptography PQ

Y2Q / Q-Day

Y2Q (Years to Quantum) and Q-Day are informal terms for the moment a cryptographically-relevant quantum computer (CRQC) becomes operational and breaks RSA-2048 and 256-bit ECC in practice.

The Global Risk Institute Quantum Threat Timeline Report (2024) places the median expert estimate of Q-Day between 2034 and 2042, with non-negligible probability before 2030. Migration must therefore be substantially complete before then.

Why it matters in Hive

Hive's premise: every receipt issued today must remain re-verifiable after Q-Day. PQ signatures on every artifact are not optional.

Cryptography

Zero-knowledge proof (ZKP)

A zero-knowledge proof is a cryptographic protocol in which a prover convinces a verifier that a statement is true without revealing any information beyond the truth of the statement itself. Defined by Goldwasser, Micali, and Rackoff in 1985.

Modern non-interactive ZKPs (zk-SNARKs, zk-STARKs, Bulletproofs) are deployed across privacy-preserving rollups, KYC attestations, and selective-disclosure credentials.

Why it matters in Hive

Hive uses ZKPs for selective-disclosure of viewkey grants — proving an attribute without revealing the underlying record.

Cryptography

zk-SNARK

A zk-SNARK is a Zero-Knowledge Succinct Non-interactive ARgument of Knowledge: a constant-size proof that a computation was executed correctly. Common constructions: Groth16, PLONK, Halo2.

zk-SNARKs typically require a trusted setup (per-circuit or universal) and rely on pairing-friendly elliptic curves whose hardness assumptions may not survive Q-Day.

Why it matters in Hive

Hive evaluates zk-SNARKs for selective-disclosure but production paths default to PQ-secure threshold and ZKP constructions where available.

Cryptography

zk-STARK

A zk-STARK is a Zero-Knowledge Scalable Transparent ARgument of Knowledge — a transparent (no trusted setup) proof system whose security reduces to the collision-resistance of a hash function. STARKs are post-quantum secure.

STARK proofs are larger than SNARK proofs but require no setup ceremony and have stronger long-term security guarantees.

Why it matters in Hive

Where post-quantum-secure proof systems matter (long-lived attestations), Hive prefers STARK-class constructions over pairing-based SNARKs.

Hive Primitives

Zone

A Hive zone is a tenant-scoped namespace within the platform: its own viewkey root, its own grant policies, its own receipt-retention rules. Zones are the unit of multi-tenant isolation and the unit of regulatory residency.

Customers in EU jurisdictions can pin their zone to EU-resident validators; healthcare customers can pin to HIPAA-eligible operators.

Why it matters in Hive

Zones are how Hive serves regulated customers without entangling tenants in each other's compliance perimeters.

Verticals

ZTNA (Zero Trust Network Access)

Zero Trust Network Access replaces VPN-style network admission with per-application, per-session authorization based on user identity, device posture, and contextual signals.

ZTNA aligns with the Zero Trust Architecture defined in NIST SP 800-207.

Why it matters in Hive

Hive's ZTNA-vertical receipts attach to every authorization decision — who, what, when, on which device, with what posture.

Compliance PQ

2030 deprecation (classical sigs)

Per NIST IR 8547 IPD, RSA, ECDSA, and EdDSA digital signatures are deprecated for federal use beginning 2030. Deprecation means continued use is permitted only with explicit risk acceptance and is no longer recommended for new systems.

Federal contractors, FedRAMP-authorized SaaS, and vendors selling to regulated industries are expected to align procurement and architecture decisions to this milestone.

Why it matters in Hive

Hive receipts carry both Ed25519 and ML-DSA-65 today, so 2030 deprecation does not invalidate any receipt; the PQ half remains the canonical authentication.

Cited from
Compliance PQ

2035 disallowance (classical sigs)

Per NIST IR 8547 IPD, RSA, ECDSA, and EdDSA are disallowed for federal use after 2035. Disallowance means use is prohibited; verification of legacy signatures may continue under exception, but no new signatures may be produced.

This is the hard wall for the classical-signature era. Any artifact that needs to verify after 2035 must carry a NIST-approved PQ signature.

Why it matters in Hive

Hive receipts are designed to survive the 2035 wall: PQ signature is primary and the artifact remains valid even when the classical co-signature is disregarded.

Cited from
Compliance

21 CFR Part 11 (FDA electronic records)

21 CFR Part 11 is the FDA regulation governing electronic records and electronic signatures used in the production and quality activities of FDA-regulated industries. It defines requirements for system validation, audit trails, record integrity, and signature manifestation.

Part 11 applies to records required by predicate rules (GMP, GLP, GCP) when those records are kept electronically or signed electronically.

Why it matters in Hive

Hive receipts meet Part 11 §11.10(e) (audit trails) and §11.50/§11.70 (signature manifestation and binding) requirements when configured for GxP customers.

No terms match your filter. Try clearing the search or toggling category chips.