DVS Use Cases

DVS (Decentralized Validated Services) are the new software modules on Pell Network that, whether EVM-compatible or not, introduce their own validation semantics for verification. As a result, they can implement various distributed systems and decentralized networks with inherited cryptoeconomic security. Below are some potential applications and ideas that can be built on Pell Network:

Rollups

Use Case
Trust Type
Description

Watch tower

Economic Trust

Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups

Light client bridges

Economic Trust

Verify and accept bridge inputs off-chain with strong quorum to avoid paying high gas costs of the light client smart contract

Fast-mode bridges

Economic Trust

Verify ZK proofs off-chain, and certify that proofs are correct on-chain, to improve security

Reorg resistance

Economic Trust

Nodes with substantial stake attest to the block header of the most recently finalized block to ensure confirmation rules and establish resistance to chain reorganizations

Fast finality

Economic Trust

Fast finality layer enables nearly instantaneous economic finality through rollup state claims validated by a supermajority of nodes

Delayable keeper network

Economic Trust

Non-time-sensitive tasks like challenging optimistic rollups or managing bridge relays

Urgent keeper network

Inclusion Trust

Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups

Single-slot finality

Inclusion Trust

Nodes can opt into signing off on a block’s finality and committing not to build on any chains that exclude that block, if they are willing to accept higher risk due to less verification time

Sequencer

Decentralization Trust

Decentralized transaction ordering service offers rollups a solution to the manipulation and short-term censorship of execution

Data availability

Decentralization Trust

Short-term data availability of transaction blobs ensures state execution correctness and liveness in rollups, particularly for data-heavy applications like gaming and social networking

Cryptography

Use Case
Trust Type
Description

Threshold

Decentralization Trust

Encrypted message can only be decoded by a large subset of signers, the application useful for commit-reveal and privacy protection, e.g. multiparty computation in Shamir Secret Sharing scenarios

FHE

Decentralization Trust

Fully homomorphic encryption allows nodes to perform functions on the data without knowing the entirety of the data, delivering a robust privacy guarantee

TEE

Economic Trust & Decentralization Trust

Decentralized network of TEEs enhances their security by adding a guarantee that majority of nodes are acting honestly

Naysayer proofs

Decentralization Trust

Naysayer proofs offer an efficient and cost-effective method for handling proofs on-chain, initially accepting proofs optimistically and relying on "naysayers" to flag errors

MEV Varied

Decentralization Trust & Inclusion Trust

A variety of MEV management methods can enhance functionality and protect against targeted frontrunning: PBS, MEV smoothing, threshold encryption for transaction inclusion, multi-lane block proposal, event-driven activation, slot auctions, etc.

Coprocessors

Use Case
Trust Type
Description

AI execution

Economic Trust & Decentralization Trust

Cost-effective and computationally secure AI inferences can be run on-chain to achieve program integrity, session privacy, and federated learning

Off-chain compute

Economic Trust & Decentralization Trust

Blockchains need serverless cryptoeconomic coprocessors for historical data access and off-chain high-performance compute, while preserving decentralization, in use cases like decentralized databases, game engines, etc.

Relays

Decentralization Trust

Bridges can utilize a decentralized network of relay operators

Risk

Decentralization Trust

Engage a subset of nodes to simulate transactions and perform comprehensive risk analysis to safeguard against malicious actions

ZK Provers

Decentralization Trust

Quick and cost-effective zk proof generation through parallelization methods

Infra

Use Case
Trust Type
Description

Oracles

Economic Trust & Decentralization Trust

Oracles that enshrine price feeds into Ethereum can be built if they require majority trust on restaked ETH

Execution environments

Economic Trust & Decentralization Trust

Virtual machines to allow developers build Ethereum apps in their favorite programming language

Sidechains

Economic Trust & Decentralization Trust

Settlement for sidechains with new consensus protocols which have low latency and high throughput

Proofs

Economic Trust & Decentralization Trust

On-chain verification for out-of-protocol computation (proof of machinehood), physical decentralization (proof of location), trustless confidentiality (proof of identity), querying big data (proof of storage), etc.

Off-chain Infrastructure

Economic Trust & Decentralization Trust

Bootstrapping general decentralized network with advanced features like circuit breakers (ensure protocol integrity by pausing or disabling functions), decentralized RPC (verifying data authenticity and appending signatures to responses), etc.

Other ideas

...

Last updated