# DVS Use Cases

DVS (Decentralized Validated Services) are the new software modules on Pell Network that, whether EVM-compatible or not, introduce their own validation semantics for verification. As a result, they can implement various distributed systems and decentralized networks with inherited cryptoeconomic security. Below are some potential applications and ideas that can be built on Pell Network:

### Rollups <a href="#rollups" id="rollups"></a>

<table><thead><tr><th width="151">Use Case</th><th width="142">Trust Type</th><th>Description</th></tr></thead><tbody><tr><td>Watch tower</td><td>Economic Trust</td><td>Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups</td></tr><tr><td>Light client bridges</td><td>Economic Trust</td><td>Verify and accept bridge inputs off-chain with strong quorum to avoid paying high gas costs of the light client smart contract</td></tr><tr><td>Fast-mode bridges</td><td>Economic Trust</td><td>Verify ZK proofs off-chain, and certify that proofs are correct on-chain, to improve security</td></tr><tr><td>Reorg resistance</td><td>Economic Trust</td><td>Nodes with substantial stake attest to the block header of the most recently finalized block to ensure confirmation rules and establish resistance to chain reorganizations</td></tr><tr><td>Fast finality</td><td>Economic Trust</td><td>Fast finality layer enables nearly instantaneous economic finality through rollup state claims validated by a supermajority of nodes</td></tr><tr><td>Delayable keeper network</td><td>Economic Trust</td><td>Non-time-sensitive tasks like challenging optimistic rollups or managing bridge relays</td></tr><tr><td>Urgent keeper network</td><td>Inclusion Trust</td><td>Vigilant monitoring for incorrect state executions and timely challenges are essential to ensure the security of optimistic rollups</td></tr><tr><td>Single-slot finality</td><td>Inclusion Trust</td><td>Nodes can opt into signing off on a block’s finality and committing not to build on any chains that exclude that block, if they are willing to accept higher risk due to less verification time</td></tr><tr><td>Sequencer</td><td>Decentralization Trust</td><td>Decentralized transaction ordering service offers rollups a solution to the manipulation and short-term censorship of execution</td></tr><tr><td>Data availability</td><td>Decentralization Trust</td><td>Short-term data availability of transaction blobs ensures state execution correctness and liveness in rollups, particularly for data-heavy applications like gaming and social networking</td></tr></tbody></table>

### Cryptography <a href="#cryptography" id="cryptography"></a>

<table><thead><tr><th width="150">Use Case</th><th width="141">Trust Type</th><th>Description</th></tr></thead><tbody><tr><td>Threshold</td><td>Decentralization Trust</td><td>Encrypted message can only be decoded by a large subset of signers, the application useful for commit-reveal and privacy protection, e.g. multiparty computation in Shamir Secret Sharing scenarios</td></tr><tr><td>FHE</td><td>Decentralization Trust</td><td>Fully homomorphic encryption allows nodes to perform functions on the data without knowing the entirety of the data, delivering a robust privacy guarantee</td></tr><tr><td>TEE</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Decentralized network of TEEs enhances their security by adding a guarantee that majority of nodes are acting honestly</td></tr><tr><td>Naysayer proofs</td><td>Decentralization Trust</td><td>Naysayer proofs offer an efficient and cost-effective method for handling proofs on-chain, initially accepting proofs optimistically and relying on "naysayers" to flag errors</td></tr><tr><td>MEV Varied</td><td>Decentralization Trust &#x26; Inclusion Trust</td><td>A variety of MEV management methods can enhance functionality and protect against targeted frontrunning: PBS, MEV smoothing, threshold encryption for transaction inclusion, multi-lane block proposal, event-driven activation, slot auctions, etc.</td></tr></tbody></table>

### Coprocessors <a href="#coprocessors" id="coprocessors"></a>

<table><thead><tr><th width="150">Use Case</th><th width="141">Trust Type</th><th>Description</th></tr></thead><tbody><tr><td>AI execution</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Cost-effective and computationally secure AI inferences can be run on-chain to achieve program integrity, session privacy, and federated learning</td></tr><tr><td>Off-chain compute</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Blockchains need serverless cryptoeconomic coprocessors for historical data access and off-chain high-performance compute, while preserving decentralization, in use cases like decentralized databases, game engines, etc.</td></tr><tr><td>Relays</td><td>Decentralization Trust</td><td>Bridges can utilize a decentralized network of relay operators</td></tr><tr><td>Risk</td><td>Decentralization Trust</td><td>Engage a subset of nodes to simulate transactions and perform comprehensive risk analysis to safeguard against malicious actions</td></tr><tr><td>ZK Provers</td><td>Decentralization Trust</td><td>Quick and cost-effective zk proof generation through parallelization methods</td></tr></tbody></table>

### Infra

<table><thead><tr><th width="150">Use Case</th><th width="141">Trust Type</th><th>Description</th></tr></thead><tbody><tr><td>Oracles</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Oracles that enshrine price feeds into Ethereum can be built if they require majority trust on restaked ETH</td></tr><tr><td>Execution environments</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Virtual machines to allow developers build Ethereum apps in their favorite programming language</td></tr><tr><td>Sidechains</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Settlement for sidechains with new consensus protocols which have low latency and high throughput</td></tr><tr><td>Proofs</td><td>Economic Trust &#x26; Decentralization Trust</td><td>On-chain verification for out-of-protocol computation (proof of machinehood), physical decentralization (proof of location), trustless confidentiality (proof of identity), querying big data (proof of storage), etc.</td></tr><tr><td>Off-chain Infrastructure</td><td>Economic Trust &#x26; Decentralization Trust</td><td>Bootstrapping general decentralized network with advanced features like circuit breakers (ensure protocol integrity by pausing or disabling functions), decentralized RPC (verifying data authenticity and appending signatures to responses), etc.</td></tr></tbody></table>

### Other ideas <a href="#other-ideas" id="other-ideas"></a>

...
