Jump to content
Toggle sidebar
Logos
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information
Editing
Nomos/Requirements
(section)
Page
Discussion
English
Read
Edit
View history
More
Read
Edit
View history
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== 2. Overall Description == <span id="product-perspective"></span> === 2.1 Product Perspective === Nomos is a novel blockchain system composed of three main layers: # Base Layer (BL) * Provides data availability and consensus * Implements Private Proof of Stake * Focuses on network resilience and censorship resistance * Scales through sharding and data availability sampling # Coordination Layer (CL) * Enables state transition verification through zero-knowledge proofs * Provides intent matching and proof aggregation * Handles cross-zone communication * Manages special operations like zone creation # Zones * Independent execution environments * Can be configured as ZK-rollups or virtual sidechains * Share data availability and consensus from Base Layer * Support arbitrary execution models and privacy requirements The system is verified by a network of Light Nodes that provide additional security and decentralization. <span id="product-functions"></span> === 2.2 Product Functions === The major functions of Nomos include: Base Layer MUST: * Execute Private Proof of Stake consensus through Blend Network & Cryptarchia * Provide data availability guarantees * Enable network-level privacy through the libp2p-mix module * Support sharding for scalability * Process and order data blobs Coordination Layer MUST: * Verify zero-knowledge proofs * Enable cross-zone communication * Manage zone lifecycle operations * Support intent matching and aggregation * Process special operations Zones MUST: * Support independent state execution * Enable flexible security/performance tradeoffs * Allow arbitrary execution models * Support privacy-preserving computation * Enable data availability sampling <span id="user-classes-and-characteristics"></span> === 2.3 User Classes and Characteristics === The system serves the following user classes, who collectively participate in network governance: # Validators * Operate nodes in the Base Layer and Coordination Layer * Require technical knowledge to run nodes * Need to stake tokens as security deposit * Participate in consensus and verification * Contribute to network security and decentralization # Zone Operators * Deploy and manage sovereign execution environments * Require deep technical knowledge * Need to ensure zone security and performance * May implement custom privacy features * Enable sovereign community governance # Application Developers * Build applications on zones * Need to understand zone capabilities * Implement corruption-resistant institutions * Interact with cross-zone communication * Create tools for community coordination # End Users * Interact with applications built on zones * Run light nodes for verification * Require privacy protections * Need simple interfaces * Participate in network validation and governance <span id="operating-environment"></span> === 2.4 Operating Environment === The Base Layer MUST: * Support commodity hardware for validators * Operate on standard Linux/Unix systems * Support home internet connections * Handle intermittent connectivity The Coordination Layer MUST: * Support specialized hardware for proof generation * Operate on high-performance systems * Handle high bandwidth requirements * Support distributed proof generation Zones MAY: * Require specialized hardware * Implement custom networking protocols * Support different consensus mechanisms * Have unique performance requirements <span id="design-and-implementation-constraints"></span> === 2.5 Design and Implementation Constraints === The system has the following constraints: # Required Privacy Constraints (MVP) * Network communication MUST be privacy-preserving through libp2p-mix * Validator stakes MUST remain private through Blend Network * Block proposers MUST remain anonymous through Cryptarchia * Cross-zone communication MUST support basic privacy guarantees * Intent matching SHOULD preserve privacy where possible # Performance Constraints (MVP) * Base Layer MUST support commodity hardware * Light nodes MUST operate with minimal resources * Proof generation MUST be practical * Network bandwidth usage MUST be optimized * Message mixing overhead MUST be manageable # Security Constraints (MVP) * No trusted setup for core protocol * No centralized components * Basic cryptographic primitives MUST be proven secure * Security MUST scale with network size * Privacy guarantees MUST be maintained under partial compromise # Compatibility Constraints (MVP) * MUST support different zone architectures * MUST enable cross-zone communication * MUST support core privacy technologies * MUST enable sovereign execution environments * MUST allow flexible privacy/performance tradeoffs <span id="user-documentation"></span> === 2.6 User Documentation === The following documentation MUST be provided: * Node operator guides * Zone deployment documentation * Application development guides * Light node user guides * Protocol specifications * Security documentation <span id="assumptions-and-dependencies"></span> === 2.7 Assumptions and Dependencies === Assumptions: * Cryptographic primitives remain secure * Network bandwidth continues to increase * Hardware costs continue to decrease * Privacy remains a priority for users Dependencies: * Required Privacy Technologies: ** Zero-knowledge proof systems for state verification ** Message mixing and blending for consensus privacy ** Cover traffic generation for anonymity sets ** Private P2P communication protocols * Recommended Privacy Enhancements: ** Intent privacy techniques ** Relationship hiding mechanisms ** Advanced cryptographic primitives * Core Infrastructure: ** Data availability sampling ** Distributed key generation ** Threshold cryptography <span id="external-interface-requirements"></span>
Summary:
Please note that all contributions to Logos may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Logos:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)