would use technical proposal known as SPREE would utilize Polkadot’s unique shared-security and improve composability, though blockchains would still remain isolated
Polkadot
has low composability with limited opportunity for collaboration between its ecosystems similar to bridged blockchains but with a different security profile
RISC-zero
RISC-V is open-source virtual machine platform for producing SNARKs of computation
RISC-V benchmark of proof generation alone in 2024 takes over 61,000x longer than simply recompiling and executing even when executing on 32 times as many cores, using 20,000x more RAM and additional GPU, according to PolkaVM benchmarking in 2024 when compared to RISC-zero's benchmark
Cost multiplier of proving using RISC-zero is 66,000,000x the cost to execute using a RISC-V recompiler, according to hardware rental agents https://cloud-gpus.com/
SNARK proof generation slowdowns could reduce to 50,000x from regular native execution and could mostly be parallelized according to Thaler 2023 through advancements in cryptographic techniques, but still several orders of magnitude greater required to compete on a cost-basis with established crypto-economic techniques such as ELVES
ELVES - competes with crypto-economic techniques such as SNARKs
Heterogeneous
communication properties (such as datagram latency and semantic range), security properties (e.g. costs for reversion, corruption, stalling and censorship) and economic properties (e.g. cost of accepting and processing incoming messages or transactions)
Fragmented Meta-Networks for computation scalability
Fragmented approach (e.g. Cosmos, Avalanche)
system of scaling-by-fragmentation approach by networks of a homogenous consensus mechanic, yet staffed by separately motivated sets of validators.
no homogenous security—and therefore trustlessness—guarantees.
homogeneity of fragmentation approach allows for reasonably consistent yet superficial messaging mechanics to present a fairly unified interface to the multitude of connected networks
homogeneity of fragmentation approach allows for reasonably consistent yet superficial messaging mechanics to present a fairly unified interface to the multitude of connected networks
consistency is superficial since networks are trustless only if their validators operate correctly under a crypto-economic security framework enforced by economic incentives and punishments
Centralization approach
Polkadot (single validator set)
Ethereum (strategy of heterogenous rollup secured partially by same validator set operating under a coherent incentive framework)
jam
smart-contract functionality similar to Ethereum
secure and scalable in-core/on-chain dualism
JAM offers service that provides an abstraction closer to the actual computation model generated by the validator nodes its economy incentives that was not offered previously
goals
resilience - resistant from being stopped, corrupted and censored
generality - able to perform Turing-complete computation
performant - able to perform fast computation at low cost
coherent - causal relationships possible between different parts of state impacting how well individual applications may be composed
accessibility - no negligible barriers to innovation, easy, fast, cheap and permissionless.
size-synchrony antagonism
describes the combination of the "performance" and "coherence" goals according to information theoretic principles
example:
fully-coherent (synchronous) system
as the state-space of information systems grow and utilise for its data processing, the more space the state must occupy and the greater the mean and variance of distances between state components causing interactions to become slower requiring subsystems to consider that distances between interdependent components of state could be significantly different, which requires asynchrony, such that the system necessarily becomes less synchronous
fully-incoherent (asynchronous) system
achieved by ignoring security for the moment, and sacrificing coherency, and applying the divide and conquer maxim and fragmenting the state of the system to create two independent smaller-state systems rather than the previous single large-state system, such that this pattern applies a step-curve to the principle behind meta-networks Polkadot or a scaled Ethereum, where;
intra-system processing: low size, high synchrony
inter-system processing: high size, low synchrony
semi-coherent system
explored by JAM, the middle-ground in the antagonism, which avoids persistent fragmentation of the statespace of the system as with existing approaches, achieved by using a new model of computation that pipelines a highly scalable element to a highly synchronous element, but whilst asynchrony is not avoided, it does increase granularity over how it is traded against size.
fragmentation can be made ephemeral rather than persistent, drawing upon a coherent state and fragmenting it only for as long as it takes to execute any given piece of processing on it.
unlike with snark-based L2-blockchain techniques for scaling, this model draws upon crypto-economic mechanisms and inherits their low-cost and high-performance profiles and averts a bias toward centralization.
service profile
declare a general-purpose rules-based service profile for a general-purpose service of a resilient Web3 digital system that offers strong guarantees to be unstoppable and Turing complete and allows for the use-cases.
it needs a general-purpose rule-set to deliver to a massively multiuser application platform
service
offers collect/refine/join/accumulate model of computation
offers CoreChains service that is Polkadot-compatible and where model largely based on architecture of Polkadot
permissionless - allowing anyone to deploy code as a service on it for a fee commensurate with the resources this code utilizes
execution - induces execution of the deployed code through the procurement and allocation of core-time, which is a metric of resilient and ubiquitous computation similar to purchasing gas in Ethereum
scaling approaches in blockchain - TODO section 2
polkadot virtual machine (PVM)
TODO section 4
TODO - additional material important for the protocol definition of pvm in appendices A & B
safrole consensus protocol - TODO section 4
common clock - TODO section 4
formalism - TODO section 4
full protocol definition
part 1 - correct on-chain state-transition formula
helpful for all nodes wishing to validate the chain state
part 2 - in sections 14 and 19 the honest strategy for the off-chain actions of any actors who wield a
validator key
performance characteristics of the protocol - in section 20
serialization and Merklization
TODO - in appendices C & D, it contains various additional material important for the protocol definition
cryptography
TODO - in appendices E, G, it contains various additional material important for the protocol definition
notes
JAM
Polkadot
RISC-zero
ELVES - competes with crypto-economic techniques such as SNARKs
Heterogeneous
Fragmented Meta-Networks for computation scalability
jam
goals
size-synchrony antagonism
service profile
service
permissionless - allowing anyone to deploy code as a service on it for a fee commensurate with the resources this code utilizes
execution - induces execution of the deployed code through the procurement and allocation of core-time, which is a metric of resilient and ubiquitous computation similar to purchasing gas in Ethereum
scaling approaches in blockchain - TODO section 2
polkadot virtual machine (PVM)
safrole consensus protocol - TODO section 4
common clock - TODO section 4
formalism - TODO section 4
full protocol definition
performance characteristics of the protocol - in section 20
serialization and Merklization
cryptography
glossary
values of all simple constant terms used in JAM