InvestorsHub Logo
Followers 185
Posts 2462
Boards Moderated 0
Alias Born 02/10/2017

Re: None

Sunday, 07/07/2019 7:01:40 PM

Sunday, July 07, 2019 7:01:40 PM

Post# of 449
Nexus Earth NXS .

The Three Dimensional Chain (3DC)


by Nexus | Jul 7, 2019 | News

The Three Dimensional Chain (3DC)
Nexus is implementing an architecture that is a promising candidate to solving the ‘Blockchain Trilemma’, an opinion that only two of the three qualities, Security, Decentralization and Scalability, are achievable concurrently. Our architecture, the Three Dimensional Chain (3DC) transforms the Ledger into a multi-layered contact processing system, in order to scale the protocol securely with a high degree of decentralization. It chains together cryptographic primitives into a three-dimensional immutable object (a 3D block), and has three core dimensions: reputation channels (X), immutability or authenticity (Y), and time (Z). This architecture is being deployed through the TAO Framework.


Scalability

The architecture of legacy blockchains is comparable to driving a car on a single lane highway – as the volume of cars increases, traffic occurs. Nexus views ‘scalability’ as a requirement, not a feature. Therefore, we design protocols that scale as more nodes join the network, processing unhindered even with the increase of resource requirements.

Using ‘Signature Chains’, ‘Aggregation’ and ‘Computational Sharding’, the 3DC creates parallel lanes of transaction processing to produce the L1 layer, the base layer of the 3DC. Data is then stored between many nodes using what we term ‘Data Sharding’, which eliminates the need for synchronizing and storing the entire blockchain. ‘LISP’ (Location Identifier Separation Protocol) and the ‘LLL’ (Lower Level Library) together form the common interface for this, which results in an increase of data storage as more nodes join the network providing longer term scaling potential.

Why is this important for scaling? The Ethereum Blockchain is over 1TB

Signature Chains
Nexus transactions no longer use the UTXO (Unspent Tx Outputs) architecture, where you have outputs from one transaction being inputs to another, resulting in a large amount of expensive signature verifications for even small transactions. Though UTXO was an important cornerstone of the Bitcoin architecture, it has proven to be outdated and vulnerable to many different types of attacks and scaling limitations.

Why is this important to avoid? 50% of Litecoin’s UTXO is unspendable

As a move away from Legacy Blockchain architecture, Nexus has designed and implemented an architecture named Signature Chains, which act as personal user-level blockchains that contain all of your data as one unique chain. This architecture provides higher scaling characteristics, as only one signature needs to be verified per transaction. Conversely, a single UTXO transaction could contain 1000’s of inputs (and therefore require 1000’s of signature verifications), in order to transact even a small amount of coins (< 0.00001). Additionally, Signature Chains don’t require wallet files, as they are accessible by login credentials (username, password and pin). This verifies authenticity and identity of individuals (through reputation) on the network, without sacrificing privacy.

Aggregation

Transactions in legacy blockchains are not only referenced in a block, they are also transported with it. Though this does contain some positive characteristics for processing, it limits scale as transactions require transport twice, once when created, and again when the block itself is broadcast. In order to combat this inefficiency, the Tritium protocol stores the transaction object separately from the block object, and references its txid inside the block. This is the first form of ‘Aggregation’, that means that a single reference can represent the entire transaction, which reduces the data that is transported in blocks. This results in better levels of scaling, and improved security by lowering the probability of successful Finney attacks on the network.

What’s a Finney Attack? Hal Finney Discovered it in 2011

Computational Sharding
Computational Sharding is necessary for the division of work between specific types of nodes, to create ‘lanes’ which process data in parallel comparable to multiple lanes of a highway. Though computational Sharding is powerful, it can be insecure if implemented incorrectly. The reason is that a ‘shard’ is easier to dominate than an entire network, as it is smaller. The way to resolve this is through the use of a multi-layered ledger (explained in Security) inherent in the 3DC. Layers of consensus allow the shards below to be smaller in size than those above, and ensure that conflicts can be resolved to prevent attacks.

Data Sharding
Data Sharding is the division of data to be stored between many nodes. This can be thought of as having many warehouses to store packages (data) after they have been transported (computation). Due to every object being ‘verifiable’ by its index hash, the 3DC can provide Data Sharding with limited trust in remote nodes.

The difficulty is, how is the state of so many objects and shards managed? The use of LISP solves this problem. The method by which the 3DC performs Data Sharding, a ‘network’ is created that exists everywhere, where instead of ‘IP’ addresses, you have ‘Hashes’. This could be compared to typing in a txid in your web browser, and receiving that transaction. Using LISP in this manner, we would enable the browser (or LLP in network terms) to open a connection to a hash, which would point to the group of nodes that held that particular piece of data.

The end result of this is, a user can login to their node that has never communicated with the network before, generate their ‘genesis-id’ from their username and open a connection to this hash, which would then use the existing internet to route to the node that contained this particular piece of data. The beauty of this is that the network itself doesn’t need to add superfluous data synchronization across nodes to know where data is held. Nodes use the overlay to route requests to other nodes, resulting in IP addresses as hashes of data that exists in the wonderful world of Nexus.

Data sharding is an essential facet of the 3DC in order to achieve long-term scalability. Amine will provide the opportunity for nodes to run in ‘shard mode’, lowering their disk and memory usage even when the network is experiencing high load. Data sharding in Obsidian will extend to critical network functions, resulting in nodes being required to store only a portion of the entire chain.

Multicast
Additional to the cryptographic structures, the Internet, must be capable of routing efficiently. We utilize what is termed ‘IP Multicast’ which allows a single broadcast of a message to be initiated by a node, rather than every node needing to replicate the message as it is verified. This can be likened to a public speaker broadcasting a message to an audience (multicast), rather than having a one-on-one conversation (unicast), where the message is gossiped from one person to the next. You can imagine how this would not only improve the scalability, but also the integrity of the message (as gossip doesn’t always reflect the original conversation). Packets and transactions will route in constant time no matter how many nodes are part of the system.

Learn more about LISP

Lower Level Library (LLL)
The LLL is the foundation of the TAO Framework, which powers many of the protocol’s subsystems. It includes three core components.

The Lower Level Database (LLD) is Nexus’ fast and modular storage engine, which to the best of our knowledge, is capable of outperforming most existing embedded database engines. Our average results are around 0.33 seconds for 100k writes and reads to disk (one then the other). This rivals other storage engines such as Google’s LevelDB.


The Lower Level Protocol (LLP) is a fundamental component of the Network Layer, a light and fast protocol that allows a developer to customize their packet design and message interpretation. It gains scalability through fundamental simplicity, and is capable of managing a large number of concurrent connections.

The Lower Level Cryptography (LLC) is a light and efficient library that contains many useful cryptographic functions such as Post-Quantum Cryptography, AES and Argon2. The library provides an easily accessible set of high performance cryptographic functions to ensure maximum scaling potential. An example would be our benchmarks of FALCON (used in the TAO) that verified 150k signatures/s on a consumer grade apple laptop, where ECDSA (used in Bitcoin, Ethereum, etc.) performed only 4k signatures/s.

Security
Nexus employs multiple consensus systems that ‘check and balance’ one another. Diversity strengthens the gene pool of the human species, likewise it is an equally important property for the security of a decentralized system.

The 3DC is designed as multiple layers of transaction processing or ‘consensus’, and each of the layers aggregate data from the layer below. The nodes performing work on L2, resolve any conflicts in L1 shards, using ‘Stake’ and ‘Trust’ as the ‘Weight’ to determine consensus. In the event that there is a conflict, it is resolved through the validity of data, which is defined as (Trust + Weight). The L3 layer will consolidate hashes from L2 to create the final 3D block.

Nexus considers the use of cryptography very seriously, as a flaw in these functions could render the entire network insecure. We only employ well tested and thoroughly peer reviewed cryptography, all of which have survived at least the first round of crypto-analysis at NIST competitions.

Trust and Weight
Trust is defined as the total time a specific user (Signature Chain) has been contributing to the network. This time is measured by the consistency and availability of a node to validate transaction data.

Weight is defined as the real time resource contribution that a given node has provided for a one time transaction process. This can be measured in computing cycles through Proof-of-Work (PoW) or other resources such as ‘Stake’ that incurs a cost to provide.

Reputation based Consensus ~ Simplified

Tritium Trust Whitepaper

pBFT + Reputation Channels (L1)

As transactions are received by the network, nodes start verifying them immediately. The transaction speed of L1 channels will vary based on the risk that a merchant wishes to assume, ranging from sub-second speeds to five seconds. For higher value transactions, it will be recommended that they receive additional weight from validation on the next consensus layer: L2, reducing transaction speed to 15 seconds plus.

pBFT + PoS Trust Network (L2)

As an extension to the existing Proof-of-Stake system, L2 will form the second layer of consensus above L1. The L2 layer ensures safety and liveness, cross-shard communication, and resolves conflicts from the L1 layer. It represents the horizontal chaining of L1 channels, and is a major step towards a truly decentralized and scalable ledger.

Decentralized Mining Pool (L3)

This layer will use PoW based mining shares computed from the work performed by the nodes of L2. Consensus will be determined by the largest value of shares + Trust, in order to reach a final agreement on the most valid 3D block.

Checking and Balancing
In order to have the highest degree of security, decisions cannot be concentrated in one form, as this creates the ability for ‘coercion’. If there is only one form of cost that provides security, the system can be easily dominated due to limited ‘checking and balancing’. Bitcoin is a prime example of a victim that is suffering from resource domination or ‘centralization’.

Bitcoin Hashrate Distribution

As can be seen from the link above, four organizations control more than 51% of Bitcoin’s hashrate, meaning, that the entire security of Bitcoin is reliant on them and the decisions that they make. This situation is an example of centralization resulting from resource domination, which has lead to proposed solutions such as UASF (User Activated Soft Fork) and multiple Bitcoin forks such as Bitcoin Cash, Bitcoin SV, Bitcoin Gold, etc.


Though promising, UASF was unable to reach a level where it could be effective, as the required percentage of miner’s consent was too high.

Cryptography

The copy/paste mentality of source code used to create many cryptocurrency projects has led to many critical flaws in security. Below is one such example that created a pandemonium for hundreds of projects that inherited a flaw from Zcoin.

Fatal Flaws may be embedded in all Privacy Coins

Nexus employs the following cryptographic functions: FALCON (a second round contender for the NIST Post-Quantum cryptography competition), Argon2 (winner of the password hashing competition, and a superior alternative to S-Crypt or B-Crypt), and Keccak (winner of the SHA3 competition).

We also do not rely on the security of only one cryptographic function for the security of the entire system, and treat every public key as disposable once used. This means our security uses many different layers of redundancy to provide protection, in the event that one of them becomes vulnerable. Relying on a single private key for security is a ticking time bomb, though this approach is largely used by most blockchain applications.

Cryptographic Flaws found in IOTA

Signature Chains decouple key management from the user account, meaning that with the click of a button, you are able to change the type of key that your account uses. This gives users the option to use Post-Quantum cryptography such as FALCON, or the option to use more time-tested Brainpool curves. If there were any flaws found in either of these cryptographic schemes, you are able to change with ease your key type.

These safeguards are important in order to protect systems over time, as ongoing crypto-analysis are always finding vulnerabilities and attack vectors that will begin to break cryptographic standards.

Large Bitcoin Collider Finds Another Bitcoin Private Key

Decentralization
Many protocols have moved away from PoW due its large energy requirements Its very competitive nature also leads to an increasing amount of resources in order to search for a block, as the traditional model of PoW only rewards the winning miner of each block, which incentivizes miners to pool resources.

An alternative is EOS’ Delegated Proof of Stake, though it relies on only twenty-one block producers, yielding a low degree of decentralization. There are several solutions that have been proposed for the scaling of a blockchain: Bitcoin’s Segregated Witness and Lightning Network, and Ethereum’s Plasma. Though promising, both essentially depend on off-chain solutions to provide scaling (a more centralized approach). They create payment channels or ‘side chains’, that rely on a small group of verifiers to recommit updated balances. Younger protocols have proposed multilayered systems, though we are unaware of any designs that place as much emphasis on Decentralization as the 3DC.

The 3DC aims to improve decentralization through many methods that include; L1 Reputation Channels, Decentralized Pools on the L2 and L3 layers, Reputation Incentive Structures, and Peer Discovery.

L1 Reputation Channels
L1 Reputation channels are designed to require a low amount of resources in comparison to the L2 and L3 layers. This is to enable the use of smaller mobile devices which in turn will provide higher levels of decentralization. This is possible as the L2 consensus layer above adds weight to ensure the security of the channels below. Reputation is the final ingredient that the 3DC employs to maintain security while achieving high levels of decentralization. It is aggregated through all three layers of the 3DC, to quantify the ‘validity’ of the 3D block.

Decentralized Staking Pool (L2)
The L2 layer is the core of the 3DC that manages data aggregation and contract processing. This layer also receives shares from the miners on the L3 layer above, in order to accumulate their work and reward the miners collectively. The more shares that are included from the L3 layer, the greater the accumulated Weight and Trust will be for the given 3D block. Therefore, the 3DC incentivises L2 validators to include as many shares as possible to ensure that their 3D block is accepted as the most valid in the 3D chain.

The L2 layer is driven by a ‘Proof-of-Stake’ weighting, that identifies all nodes in the consensus process as contributors, and therefore produces a higher degree of decentralization compared to existing Proof-of-Stake (PoS) protocols. The 3DC will require a lower minimum balance in order to stake with than the current PoS protocol.

Decentralized Mining Pool (L3)
Instead of miners having the authority to determine the next block by finding the winning hash, mining will become a group-wide activity forming the L3 layer of the 3DC. Miners who submit hashes to the network perform work that locks the L2 cross links. This provides the infrastructure for a more decentralized consensus process, while also inheriting the positive properties that mining offers.

Peer Discovery
Any blockchain relies on the ability of nodes to connect directly (peer-to-peer) to maintain a decentralized and evenly distributed topology. Therefore, nodes must be able to be discovered by their peers, by being able to accept connection requests. Though this is not a novel concept, it is pivotal to peer-to-peer networks and yet is seldom achievable, due to the need for NAT (Network Address Translator) traversal logic which is why Bitcoin has only a meager 10% of nodes that are discoverable.

Alternatively, Nexus uses the LISP Overlay for ‘NAT traversal’ to maintain higher levels of node availability. LISP uses static Endpoint Identifiers (EIDs) that can even be reached when roaming between different networks (WiFi, cell towers, etc.). This gives nodes higher levels of mobility, allowing them to be located anywhere on the internet, behind NATs in residential environments, in cloud providers, and behind mobile carriers while still being discoverable.

Reputation Incentive Structures
Reputation is an important requirement for the functioning of decentralized systems, in order to create a healthy global network. We will implement reputation on all three layers of the 3DC, as a secondary component to Weight to improve the overall Byzantine Fault Tolerance. Of equal importance, reputation can improve the decentralization through incentive structures facilitated through variable rewards to nodes that have earned a higher reputation. Longer term contributors to a system can be awarded a higher reputation, and therefore a higher return for their contribution, giving rise to a long standing view of Nexus that:

“Not everyone has money, but everyone has time”

Learn more about Reputation

Decentralized Solutions

We are currently unaware of any other multi-layered architectural design that combines both PoS and PoW, that integrates the LISP Overlay, that is able to provide data sharding, or any technology similar to that of Signature Chains. Combined with the seven layered Software Stack, the 3DC holds promise to be a highly scalable, secure and decentralized contract engine fit for global adoption.

The Software Stack, set to be released with Tritium, provides an easy to use API interface to build with Contracts that can be used for a variety of decentralized solutions, including the registration of digital assets and certificates, supply chain management, graphic licensing, educational certificates, royalty payments and Securitised Token Offerings (STOs). We envision that this technology will aid in the distribution of resources to more people, so that they can benefit from all the exciting innovations that blockchain is able to provide.

Metatron’s Cube

The architecture of the 3DC is inspired by ‘Metatron’s Cube’ that depicts the five platonic solids, which are geometrical forms that are said to act as a template for all life.

https://nexusearth.com/news/the-three-dimensional-chain-3dc/

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.