DVS Use Cases
DVS (Decentralized Validated Services) are the new software modules on Pell Network that, whether EVM-compatible or not, introduce their own validation semantics for verification. As a result, they can implement various distributed systems and decentralized networks with inherited cryptoeconomic security. Below are some potential applications and ideas that can be built on Pell Network:
Rollups
Watch tower
Economic Trust
Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups
Light client bridges
Economic Trust
Verify and accept bridge inputs off-chain with strong quorum to avoid paying high gas costs of the light client smart contract
Fast-mode bridges
Economic Trust
Verify ZK proofs off-chain, and certify that proofs are correct on-chain, to improve security
Reorg resistance
Economic Trust
Nodes with substantial stake attest to the block header of the most recently finalized block to ensure confirmation rules and establish resistance to chain reorganizations
Fast finality
Economic Trust
Fast finality layer enables nearly instantaneous economic finality through rollup state claims validated by a supermajority of nodes
Delayable keeper network
Economic Trust
Non-time-sensitive tasks like challenging optimistic rollups or managing bridge relays
Urgent keeper network
Inclusion Trust
Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups
Single-slot finality
Inclusion Trust
Nodes can opt into signing off on a block’s finality and committing not to build on any chains that exclude that block, if they are willing to accept higher risk due to less verification time
Sequencer
Decentralization Trust
Decentralized transaction ordering service offers rollups a solution to the manipulation and short-term censorship of execution
Data availability
Decentralization Trust
Short-term data availability of transaction blobs ensures state execution correctness and liveness in rollups, particularly for data-heavy applications like gaming and social networking
Cryptography
Threshold
Decentralization Trust
Encrypted message can only be decoded by a large subset of signers, the application useful for commit-reveal and privacy protection, e.g. multiparty computation in Shamir Secret Sharing scenarios
FHE
Decentralization Trust
Fully homomorphic encryption allows nodes to perform functions on the data without knowing the entirety of the data, delivering a robust privacy guarantee
TEE
Economic Trust & Decentralization Trust
Decentralized network of TEEs enhances their security by adding a guarantee that majority of nodes are acting honestly
Naysayer proofs
Decentralization Trust
Naysayer proofs offer an efficient and cost-effective method for handling proofs on-chain, initially accepting proofs optimistically and relying on "naysayers" to flag errors
MEV Varied
Decentralization Trust & Inclusion Trust
A variety of MEV management methods can enhance functionality and protect against targeted frontrunning: PBS, MEV smoothing, threshold encryption for transaction inclusion, multi-lane block proposal, event-driven activation, slot auctions, etc.
Coprocessors
AI execution
Economic Trust & Decentralization Trust
Cost-effective and computationally secure AI inferences can be run on-chain to achieve program integrity, session privacy, and federated learning
Off-chain compute
Economic Trust & Decentralization Trust
Blockchains need serverless cryptoeconomic coprocessors for historical data access and off-chain high-performance compute, while preserving decentralization, in use cases like decentralized databases, game engines, etc.
Relays
Decentralization Trust
Bridges can utilize a decentralized network of relay operators
Risk
Decentralization Trust
Engage a subset of nodes to simulate transactions and perform comprehensive risk analysis to safeguard against malicious actions
ZK Provers
Decentralization Trust
Quick and cost-effective zk proof generation through parallelization methods
Infra
Oracles
Economic Trust & Decentralization Trust
Oracles that enshrine price feeds into Ethereum can be built if they require majority trust on restaked ETH
Execution environments
Economic Trust & Decentralization Trust
Virtual machines to allow developers build Ethereum apps in their favorite programming language
Sidechains
Economic Trust & Decentralization Trust
Settlement for sidechains with new consensus protocols which have low latency and high throughput
Proofs
Economic Trust & Decentralization Trust
On-chain verification for out-of-protocol computation (proof of machinehood), physical decentralization (proof of location), trustless confidentiality (proof of identity), querying big data (proof of storage), etc.
Off-chain Infrastructure
Economic Trust & Decentralization Trust
Bootstrapping general decentralized network with advanced features like circuit breakers (ensure protocol integrity by pausing or disabling functions), decentralized RPC (verifying data authenticity and appending signatures to responses), etc.
Other ideas
...
Last updated