Nomos/Requirements
Software Requirements Specification[edit]
for Nomos: A Privacy-Preserving Multi-Chain Heterogeneous Blockchain Network
Version 1.0 Prepared by Jarrad Hope 29-12-24
1. Introduction[edit]
1.1 Purpose[edit]
This Software Requirements Specification (SRS) document provides a detailed description of the Nomos blockchain network. It outlines the functional and non-functional requirements for a privacy-preserving multi-chain heterogeneous blockchain network designed to serve as infrastructure for Network States.
As such the sovereignty of the system is paramount, requiring privacy through all layers of a typical Blockchain network - network level privacy, validator & consensus privacy, mempool privacy, transaction privacy, bridging/intent privacy, etc.
Consequentially, the network participants create a decentralised authority - a digital parliamentary sovereign, and become ‘Subject-Individuals’ who are bestowed Civil Liberties.
1.2 Document Conventions[edit]
This document uses the following conventions:
- MUST/REQUIRED - Indicates mandatory requirements for MVP
- SHOULD/RECOMMENDED - Indicates requirements for subsequent releases
- MAY/OPTIONAL - Indicates optional features
Terms in italics are defined in the glossary.
1.3 Intended Audience and Reading Suggestions[edit]
This document is intended for:
- Developers implementing the Nomos protocol
- Validators and node operators
- Network State builders and application developers
- Security auditors and researchers
Readers should start with Section 1 for an overview, then:
- Developers should focus on Sections 3 and 4
- Node operators should focus on Sections 2.4 and 5
- Application developers should focus on Sections 2.2 and 4.3
- Security auditors should focus on Sections 4.4 and 5.2
1.4 Product Scope[edit]
The Nomos module is a blockchain network designed to serve as foundational infrastructure for Network States. Its key objectives are:
- Enable privacy-preserving blockchain transactions and computations
- Support multiple sovereign execution environments (Zones)
- Provide censorship resistance through network-level privacy
- Ensure high network resilience through decentralization
- Enable trust-minimized communication between Zones
- Support light client verification
The system aims to overcome limitations of existing blockchain networks by providing comprehensive privacy at every layer:
- Network level: Private P2P communication through libp2p-mix
- Consensus level: Private Proof of Stake through Blend Network & Cryptarchia
- Mempool level: Private transaction propagation
- Execution level: Privacy-preserving computation in Zones
- Cross-zone level: Private cross-zone communication (bridging and intent matching)
- Light client level: Private verification capabilities
This is achieved through:
- Modular architecture separating consensus, execution, and data availability
- Sovereign zones with flexible configurations
- Multiple specialized privacy systems working together
1.5 References[edit]
- Nomos Darkpaper v0.6
- Nomos Blend Network Documentation
- Cryptarchia Protocol Specification
- Native Zones Documentation
- IEEE 830-1998 Recommended Practice for Software Requirements Specifications
2. Overall Description[edit]
2.1 Product Perspective[edit]
Nomos is a novel blockchain system composed of three main layers:
- Base Layer (BL)
- Provides data availability and consensus
- Implements Private Proof of Stake
- Focuses on network resilience and censorship resistance
- Scales through sharding and data availability sampling
- Coordination Layer (CL)
- Enables state transition verification through zero-knowledge proofs
- Provides intent matching and proof aggregation
- Handles cross-zone communication
- Manages special operations like zone creation
- Zones
- Independent execution environments
- Can be configured as ZK-rollups or virtual sidechains
- Share data availability and consensus from Base Layer
- Support arbitrary execution models and privacy requirements
The system is verified by a network of Light Nodes that provide additional security and decentralization.
2.2 Product Functions[edit]
The major functions of Nomos include:
Base Layer MUST:
- Execute Private Proof of Stake consensus through Blend Network & Cryptarchia
- Provide data availability guarantees
- Enable network-level privacy through the libp2p-mix module
- Support sharding for scalability
- Process and order data blobs
Coordination Layer MUST:
- Verify zero-knowledge proofs
- Enable cross-zone communication
- Manage zone lifecycle operations
- Support intent matching and aggregation
- Process special operations
Zones MUST:
- Support independent state execution
- Enable flexible security/performance tradeoffs
- Allow arbitrary execution models
- Support privacy-preserving computation
- Enable data availability sampling
2.3 User Classes and Characteristics[edit]
The system serves the following user classes, who collectively participate in network governance:
- Validators
- Operate nodes in the Base Layer and Coordination Layer
- Require technical knowledge to run nodes
- Need to stake tokens as security deposit
- Participate in consensus and verification
- Contribute to network security and decentralization
- Zone Operators
- Deploy and manage sovereign execution environments
- Require deep technical knowledge
- Need to ensure zone security and performance
- May implement custom privacy features
- Enable sovereign community governance
- Application Developers
- Build applications on zones
- Need to understand zone capabilities
- Implement corruption-resistant institutions
- Interact with cross-zone communication
- Create tools for community coordination
- End Users
- Interact with applications built on zones
- Run light nodes for verification
- Require privacy protections
- Need simple interfaces
- Participate in network validation and governance
2.4 Operating Environment[edit]
The Base Layer MUST:
- Support commodity hardware for validators
- Operate on standard Linux/Unix systems
- Support home internet connections
- Handle intermittent connectivity
The Coordination Layer MUST:
- Support specialized hardware for proof generation
- Operate on high-performance systems
- Handle high bandwidth requirements
- Support distributed proof generation
Zones MAY:
- Require specialized hardware
- Implement custom networking protocols
- Support different consensus mechanisms
- Have unique performance requirements
2.5 Design and Implementation Constraints[edit]
The system has the following constraints:
- Required Privacy Constraints (MVP)
- Network communication MUST be privacy-preserving through libp2p-mix
- Validator stakes MUST remain private through Blend Network
- Block proposers MUST remain anonymous through Cryptarchia
- Cross-zone communication MUST support basic privacy guarantees
- Intent matching SHOULD preserve privacy where possible
- Performance Constraints (MVP)
- Base Layer MUST support commodity hardware
- Light nodes MUST operate with minimal resources
- Proof generation MUST be practical
- Network bandwidth usage MUST be optimized
- Message mixing overhead MUST be manageable
- Security Constraints (MVP)
- No trusted setup for core protocol
- No centralized components
- Basic cryptographic primitives MUST be proven secure
- Security MUST scale with network size
- Privacy guarantees MUST be maintained under partial compromise
- Compatibility Constraints (MVP)
- MUST support different zone architectures
- MUST enable cross-zone communication
- MUST support core privacy technologies
- MUST enable sovereign execution environments
- MUST allow flexible privacy/performance tradeoffs
2.6 User Documentation[edit]
The following documentation MUST be provided:
- Node operator guides
- Zone deployment documentation
- Application development guides
- Light node user guides
- Protocol specifications
- Security documentation
2.7 Assumptions and Dependencies[edit]
Assumptions:
- Cryptographic primitives remain secure
- Network bandwidth continues to increase
- Hardware costs continue to decrease
- Privacy remains a priority for users
Dependencies:
- Required Privacy Technologies:
- Zero-knowledge proof systems for state verification
- Message mixing and blending for consensus privacy
- Cover traffic generation for anonymity sets
- Private P2P communication protocols
- Recommended Privacy Enhancements:
- Intent privacy techniques
- Relationship hiding mechanisms
- Advanced cryptographic primitives
- Core Infrastructure:
- Data availability sampling
- Distributed key generation
- Threshold cryptography
3. External Interface Requirements[edit]
3.1 User Interfaces[edit]
The system MUST provide the following interfaces:
- Validator Node Interface
- Command line interface for node operation
- Configuration management interface
- Monitoring and metrics interface
- Key management interface
- Zone Operator Interface
- Zone deployment interface
- Zone management interface
- State transition interface
- Cross-zone communication interface
- Developer Interface
- Zone development SDK
- Smart contract interfaces
- Privacy-preserving computation interfaces
- Cross-zone communication APIs
- Light Node Interface
- Simple setup interface
- Verification interface
- Network coordination interface
- Data availability sampling interface
3.2 Hardware Interfaces[edit]
Base Layer Nodes MUST:
- Support commodity CPU hardware
- Support standard network interfaces
- Support standard storage interfaces
- Support consumer-grade memory
Coordination Layer Nodes MUST:
- Support specialized proof generation hardware
- Support high-bandwidth network interfaces
- Support high-performance storage
- Support sufficient memory for proof generation
Zone Nodes MAY:
- Require specialized hardware
- Support custom networking hardware
- Implement specific storage requirements
- Need high-performance memory
3.3 Software Interfaces[edit]
The system MUST provide:
- Network Protocol Interfaces
- P2P networking modules, i.e. libp2p-mix (for network privacy)
- Blend Network modules:
- PTM (validator connections and drop messages)
- MBM (consensus message mixing and timing)
- CTM (cover traffic generation)
- Data availability protocols
- Cross-zone communication protocols
- Cryptographic Interfaces
- Zero-knowledge proof systems
- Threshold encryption systems
- Key management systems
- Commitment schemes
- Storage Interfaces
- Data availability storage
- State storage
- Proof storage
- Configuration storage
- Development Interfaces
- Zone development frameworks
- Smart contract languages
- Privacy-preserving computation tools
- Cross-zone communication libraries
3.4 Communications Interfaces[edit]
The system MUST implement:
- Network-Level Communication
- Privacy-preserving P2P protocols through libp2p-mix module
- Consensus privacy as Blend Network protocol
- Data availability sampling
- Consensus communication as Cryptarchia
- Cross-Zone Communication
- Trust-minimized bridging
- Message passing protocols
- State verification
- Atomic operations
- Light Node Communication
- Data availability verification
- Proof verification
- Network coordination
- Exit protocols
4. System Features[edit]
4.1 Base Layer[edit]
4.1.1 Private Proof of Stake[edit]
Description: The Base Layer MUST implement a Private Proof of Stake consensus mechanism that preserves validator privacy and prevents targeted attacks.
Functional Requirements:
PPOS-001: Validator Privacy
- The system MUST implement basic privacy:
- Hide validator stakes through Blend Network
- Preserve block proposer anonymity
- Prevent stake deanonymization attacks
- Maintain validator metadata privacy
- The system SHOULD support enhanced privacy:
- Advanced timing analysis protection
- Enhanced anonymity set generation
- Improved network attack resistance
PPOS-002: Consensus Security
- The system MUST provide basic security:
- Prevent stake grinding attacks
- Ensure fair block production
- Maintain consensus finality
- Handle network partitions
- The system SHOULD implement advanced security:
- Quantum attack resistance
- Eclipse attack prevention
- Advanced fork choice rules
- Complex partition handling
PPOS-003: Network Resilience
- The system MUST ensure basic resilience:
- Support commodity hardware validators
- Handle intermittent connectivity
- Recover from network failures
- Maintain liveness under attack
- The system SHOULD provide enhanced resilience:
- Advanced recovery mechanisms
- Dynamic attack mitigation
- Adaptive network topology
- Self-healing capabilities
4.1.2 Data Availability[edit]
Description: The Base Layer MUST provide scalable data availability with light client verification capabilities.
Functional Requirements:
DAS-001: Data Sampling and Verification
- The system MUST implement basic sampling:
- Efficient data availability sampling
- Light client verification support
- Sample size optimization
- Verification latency targets
- The system SHOULD support advanced sampling:
- Adaptive sample sizes
- Enhanced verification methods
- Optimized proof generation
- Advanced fraud proofs
DAS-002: Data Organization
- The system MUST implement basic sharding:
- Data segmentation and distribution
- Cross-shard verification
- Shard synchronization
- Data redundancy management
- The system SHOULD support advanced sharding:
- Dynamic shard allocation
- Cross-shard optimization
- Adaptive redundancy
- Load balancing
DAS-003: Data Integrity and Recovery
- The system MUST ensure basic integrity:
- Data reconstruction capabilities
- Integrity verification
- Error detection and correction
- Bandwidth optimization
- The system SHOULD implement advanced features:
- Advanced reconstruction methods
- Enhanced error correction
- Optimized bandwidth usage
- Proactive integrity checks
4.1.3 Network and Consensus Privacy[edit]
Description: The Base Layer MUST implement two complementary privacy systems:
- Required for MVP:
- Nomos Blend Network: A specialized privacy system for Private Proof of Stake with three modules:
- PTM (Persistent Transmission Module): Manages validator connections and drop messages
- MBM (Message Blending Module): Processes consensus messages through mixing and timing obfuscation
- CTM (Cover Traffic Module): Generates anonymity sets through cover messages
- libp2p-mix: A P2P networking module for general network privacy
- Nomos Blend Network: A specialized privacy system for Private Proof of Stake with three modules:
- Future Enhancements:
- Advanced timing analysis protection
- Enhanced anonymity set generation
- Improved network attack resistance
Functional Requirements:
BNP-001: Persistent Transmission Module
- The system MUST maintain persistent validator connections with basic privacy:
- Establish and maintain secure validator connections
- Handle drop messages for connection privacy
- Monitor connection quality and health
- Manage connection lifecycles securely
- The system SHOULD implement advanced connection features:
- Dynamic connection management based on network conditions
- Enhanced privacy through adaptive drop message rates
- Advanced connection health monitoring and recovery
- Optimized connection resource management
BNP-002: Message Blending Module
- The system MUST process and blend consensus messages:
- Process consensus messages through mixing
- Implement basic timing analysis protection
- Integrate fully with Cryptarchia protocol
- Maintain message timing obfuscation
- The system SHOULD enhance message privacy:
- Advanced timing analysis protection mechanisms
- Enhanced message mixing algorithms
- Complex timing pattern obfuscation
- Optimized message processing and blending
BNP-003: Cover Traffic Module
- The system MUST generate minimum required cover traffic:
- Generate and maintain cover message streams
- Create sufficient anonymity sets
- Optimize resource usage for cover traffic
- Balance privacy and bandwidth usage
- The system SHOULD implement advanced cover traffic:
- Dynamic cover traffic generation based on network activity
- Enhanced anonymity set management
- Advanced traffic pattern obfuscation
- Efficient resource utilization strategies
BNP-004: Network Privacy Integration
- The system MUST provide network-level privacy:
- Network-level privacy for non-consensus messages
- Basic private P2P communication capabilities
- Private data dissemination mechanisms
- Basic traffic analysis protection
- The system SHOULD enhance network privacy:
- Advanced traffic analysis protection
- Optimized cover traffic generation
- Larger anonymity set maintenance
- Improved network attack resistance
4.2 Coordination Layer[edit]
4.2.1 Zero-Knowledge Verification[edit]
Description: The Coordination Layer MUST provide efficient zero-knowledge proof verification for state transitions and cross-zone communication.
Functional Requirements:
ZKV-001: Proof Verification Core
- The system MUST implement basic verification:
- Efficient ZK proof verification
- Support for multiple proving systems
- Basic proof validity checks
- Verification cost optimization
- The system SHOULD support advanced verification:
- Hardware-accelerated verification
- Parallel proof verification
- Advanced validity checks
- Dynamic cost optimization
ZKV-002: Proof Aggregation
- The system MUST support basic aggregation:
- Proof batching and combining
- Cross-zone proof aggregation
- Aggregation validity checks
- Resource usage optimization
- The system SHOULD implement advanced aggregation:
- Dynamic batch sizing
- Multi-layer aggregation
- Complex validity preservation
- Enhanced resource efficiency
ZKV-003: System Evolution
- The system MUST handle basic updates:
- Proof system upgrades
- Parameter updates
- Backward compatibility
- Version management
- The system SHOULD support advanced features:
- Zero-downtime upgrades
- Seamless version transitions
- Cross-version compatibility
- Update verification guarantees
4.2.2 Intent Solving[edit]
Description: The Coordination Layer MUST provide private intent matching and solving capabilities that preserve user privacy while enabling efficient cross-zone transaction processing.
Functional Requirements:
ISM-001: Intent Matching Core
- The system MUST implement basic matching:
- Match compatible intents efficiently
- Ensure atomic execution across zones
- Handle partial transactions
- Support different intent types
- The system SHOULD support advanced matching:
- Dynamic matching optimization
- Complex intent compatibility rules
- Multi-party intent matching
- Resource-aware matching
ISM-002: Intent Privacy
- The system SHOULD provide basic privacy:
- Basic intent privacy during matching
- Simple relationship hiding
- Minimal information disclosure
- Privacy-preserving validation
- The system SHOULD implement enhanced privacy:
- Advanced intent obfuscation
- Complex relationship hiding
- Zero-knowledge intent matching
- Privacy-preserving optimization
ISM-003: Cross-Zone Coordination
- The system MUST enable basic coordination:
- Cross-zone atomic execution
- Basic state synchronization
- Intent propagation
- Failure handling
- The system SHOULD support advanced features:
- Complex atomic operations
- Advanced state management
- Optimized propagation
- Comprehensive failure recovery
4.3 Zones[edit]
4.3.1 Execution Environments[edit]
Description: Zones MUST provide flexible and sovereign execution environments with configurable security and performance characteristics.
Functional Requirements:
ZEE-001: Virtual Machine Support
- The system MUST provide support VM capabilities
- The system SHOULD enable VM extensibility:
- Zero-knowledge virtual machine integration
- Multi-party computation environments
- Hardware-accelerated execution environments
- Domain-specific VM optimization
ZEE-002: Consensus and State Management
- The system MUST enable sovereign execution:
- Independent consensus mechanism selection
- State transition rule customization
- Cross-zone state verification
- State sovereignty preservation
- The system SHOULD support execution evolution:
- Consensus mechanism upgrades
- State transition rule modifications
- Cross-zone state synchronization
- State recovery mechanisms
ZEE-003: Privacy and Scalability
- The system MUST implement execution privacy:
- Private state transitions
- Confidential smart contracts
- Selective state disclosure
- Private cross-zone interactions
- The system SHOULD enable execution scaling:
- Parallel transaction processing
- State sharding capabilities
- Cross-zone execution optimization
- Resource utilization management
4.4 Network Privacy[edit]
Description: The system MUST implement comprehensive network-level privacy through libp2p-mix and Blend Network protocols to prevent traffic analysis and protect validator identities.
Functional Requirements:
NWP-001: Network Communication Privacy
- The system MUST implement private P2P communication:
- Encrypted peer connections through libp2p-mix
- Private peer discovery mechanisms
- Network topology obfuscation
- Traffic pattern hiding
- The system SHOULD enhance network privacy:
- Dynamic peer selection strategies
- Advanced routing algorithms
- Network partition resistance
- Topology optimization
NWP-002: Traffic Analysis Protection
- The system MUST prevent traffic analysis:
- Message size normalization
- Timing pattern obfuscation
- Flow correlation prevention
- Cover traffic integration
- The system SHOULD implement enhanced protections:
- Adaptive traffic shaping
- Dynamic cover traffic generation
- Advanced timing obfuscation
- Flow fingerprint resistance
NWP-003: Network Resilience
- The system MUST provide network resilience:
- Peer connection redundancy
- Network attack resistance
- Failure recovery mechanisms
- Byzantine fault tolerance
- The system SHOULD enable advanced resilience:
- Self-healing network topology
- Dynamic route optimization
- Attack mitigation strategies
- Automated recovery procedures
4.5 Cross-Zone Communication[edit]
Description: The system MUST provide secure and private cross-zone communication through two complementary mechanisms:
- Trust-minimized bridging through the Coordination Layer for verifiable state transitions
- Direct message passing between zones with Base Layer fallback for data availability
Functional Requirements:
CZC-001: Trust-Minimized Bridging
- The system MUST implement bridging through Coordination Layer:
- Zero-knowledge state transition verification
- Cross-zone transaction atomicity
- State commitment verification
- Bridge security guarantees
- Atomic intent execution
- The system SHOULD support bridge evolution:
- Multi-zone atomic operations
- Optimized proof generation
- Enhanced bridge security
- Efficient state verification
- Advanced bridging protocols
CZC-002: Message Passing Protocol
- The system MUST enable direct zone communication:
- Reliable message delivery guarantees
- Base Layer fallback mechanisms
- Message ordering preservation
- Communication failure recovery
- State synchronization protocols
- The system SHOULD enhance messaging capabilities:
- Optimized message routing
- Advanced failure detection
- Efficient state synchronization
- Resource-aware communication
- Dynamic routing optimization
CZC-003: Privacy Preservation
- The system MUST protect cross-zone privacy:
- Transaction source/destination hiding
- State transition confidentiality
- Relationship metadata protection
- Communication pattern obfuscation
- Intent privacy preservation
- The system SHOULD implement privacy enhancements:
- Zero-knowledge message passing
- Enhanced metadata protection
- Advanced pattern hiding
- Cross-zone anonymity sets
- Relationship hiding protocols
4.6 Light Node Network[edit]
Description: The Light Node Network MUST provide efficient verification capabilities while minimizing resource requirements, enabling users to validate the network’s integrity without running full nodes.
Functional Requirements:
LNV-001: Data Availability Verification
- The system MUST enable light client verification:
- Data availability sampling verification
- Fraud proof validation
- Sample size management
- Bandwidth-efficient verification
- Resource usage optimization
- The system SHOULD support verification enhancements:
- Adaptive sampling strategies
- Optimized proof validation
- Enhanced fraud detection
- Network-aware sampling
- Dynamic sample size adjustment
LNV-002: Zero-Knowledge Proof Validation
- The system MUST support proof verification:
- Zone state transition validation
- Cross-zone communication verification
- Selective proof verification
- Resource-efficient validation
- Proof aggregation verification
- The system SHOULD enable advanced validation:
- Parallel proof verification
- Proof aggregation validation
- Optimized verification paths
- Hardware acceleration support
- Batched proof verification
LNV-003: Network Security
- The system MUST provide security features:
- Secure network exit protocol implementation
- Verifiable data reconstruction mechanisms
- Decentralized coordination protocol
- Byzantine fault detection
- Network partition handling
- The system SHOULD enable advanced security:
- Automated exit coordination
- Enhanced data reconstruction
- Advanced fault detection
- Network attack resistance
- Self-healing mechanisms
5. Other Nonfunctional Requirements[edit]
5.1 Performance Requirements[edit]
- Base Layer Performance
- MUST support at least 10,000 validators
- MUST process at least 1000 transactions per second
- MUST maintain block times under 2 seconds
- MUST support home internet bandwidth limits
- SHOULD optimize proof verification costs
- SHOULD minimize state growth
- Coordination Layer Performance
- MUST verify proofs within 100ms
- MUST handle proof aggregation efficiently
- MUST support parallel proof generation
- MUST optimize cross-zone communication
- SHOULD minimize proof sizes
- SHOULD optimize intent matching
- Zone Performance
- MUST support custom performance requirements
- MUST handle state transitions efficiently
- MUST optimize cross-zone operations
- MUST support parallel execution
- SHOULD enable horizontal scaling
- SHOULD minimize resource usage
5.2 Security Requirements[edit]
- Required Network Security (MVP)
- MUST prevent stake deanonymization through Blend Network
- MUST prevent traffic analysis through libp2p-mix
- MUST ensure message privacy for consensus
- MUST prevent targeted attacks on validators
- MUST protect against basic network attacks
- Required Cryptographic Security (MVP)
- MUST use proven cryptographic primitives
- MUST ensure proof soundness for state verification
- MUST protect private keys and validator identities
- MUST implement secure message mixing
- MUST ensure atomic cross-zone operations
- Required Protocol Security (MVP)
- MUST prevent double spending
- MUST ensure consensus safety
- MUST handle byzantine behavior
- MUST protect against grinding attacks
- MUST maintain validator anonymity
- Enhanced Security (Future)
- SHOULD resist quantum attacks
- SHOULD prevent eclipse attacks
- SHOULD support key rotation
- SHOULD implement forward secrecy
- SHOULD prevent MEV extraction
- SHOULD handle network partitions
- SHOULD enhance intent privacy
- SHOULD protect relationship metadata
5.3 Software Quality Attributes[edit]
- Reliability
- MUST maintain network availability
- MUST ensure data persistence
- MUST handle node failures
- MUST recover from errors
- SHOULD provide redundancy
- SHOULD implement fault tolerance
- Maintainability
- MUST support protocol upgrades
- MUST enable bug fixes
- MUST allow parameter updates
- MUST support backwards compatibility
- SHOULD enable modular updates
- SHOULD minimize upgrade complexity
- Usability
- MUST provide clear interfaces
- MUST support easy deployment
- MUST enable simple configuration
- MUST handle errors gracefully
- SHOULD provide helpful documentation
- SHOULD implement intuitive APIs
5.4 Business Rules[edit]
- Tokenomics
- MUST implement fair token distribution
- MUST provide validator incentives
- MUST handle transaction fees
- MUST support restaking
- SHOULD prevent stake centralization
- SHOULD optimize economic security
- Governance
- MUST enable protocol upgrades
- MUST support parameter changes
- MUST handle disputes
- MUST enable coordination
- SHOULD support decentralized governance
- SHOULD enable stake-weighted voting
6. Other Requirements[edit]
- Legal Requirements
- MUST comply with privacy regulations
- MUST handle data protection
- MUST support regulatory compliance
- MUST enable selective disclosure
- SHOULD support identity verification
- SHOULD enable compliance reporting
- Internationalization
- MUST support multiple languages
- MUST handle different timezones
- MUST support various regions
- MUST enable local customization
- SHOULD support cultural differences
- SHOULD handle different regulations
Appendix A: Glossary[edit]
- Base Layer (BL): The foundational layer providing consensus and data availability
- Blend Network: A specialized privacy system for Private Proof of Stake consisting of:
- PTM (Persistent Transmission Module): Manages validator connections and drop messages
- MBM (Message Blending Module): Processes consensus messages through mixing and timing obfuscation
- CTM (Cover Traffic Module): Generates anonymity sets through cover messages
- Coordination Layer (CL): The layer handling proof verification and cross-zone communication
- Cryptarchia: A consensus protocol that works with Blend Network to implement Private Proof of Stake
- Data Availability Sampling: A technique for efficient data verification
- Intent: A high-level description of desired transaction outcomes
- libp2p-mix: A P2P networking module providing general network-level privacy
- Light Node: A resource-efficient node for network verification
- Private Proof of Stake: A privacy-preserving consensus mechanism implemented through Blend Network and Cryptarchia
- Zero-Knowledge Proof: A cryptographic method for verifying computations
- Zone: An independent execution environment with sovereign state
- Cross-Zone Communication: Interaction between different execution environments
Appendix B: Analysis Models[edit]
- Network Architecture
- Base Layer topology
- Coordination Layer structure
- Zone relationships
- Communication paths
- Protocol Flows
- Consensus process
- Proof verification
- Cross-zone operations
- Light node verification
- Security Models
- Threat models
- Attack vectors
- Defense mechanisms
- Privacy guarantees
Appendix C: To Be Determined List[edit]
- Base Layer
- Optimal sharding parameters
- Stake inference mechanisms
- Network scaling limits
- Upgrade mechanisms
- Coordination Layer
- Proof aggregation schemes
- Intent matching algorithms
- Cross-zone protocols
- Verification optimization
- Zones
- Execution model standards
- Privacy technology integration
- State transition schemes
- Communication protocols
- General
- Governance mechanisms
- Economic parameters
- Upgrade procedures