
A Sovereign Post‑Quantum Execution Layer
Threshold Dilithium DKG, enclave-bound key isolation, and sealed computation — specified as invariants under an explicit adversary model.
Philosophy
Protocols fail where invariants are absent.
Most chains ship a VM and call the remainder “consensus”. Trust boundaries are implicit. Security properties are discovered by incident response. Cryptography is bolted on after the fact.
- No adversary model. Assumptions are unstated, so they cannot be stress‑tested.
- No determinism. Parallel execution is attempted without explicit state boundaries; reorgs and undefined behavior become protocol features.
- No credible privacy. “Encryption at rest” is not privacy; execution still leaks.
WitnessChain takes the opposite posture: if a property cannot be stated as an invariant and verified under a concrete threat model, it is not part of the protocol.
Core Architecture
Four pillars. No narrative components.
Post‑Quantum Cryptography
Zero‑Knowledge + zkVM
Sealed Computation
JAM Accumulator
graph TB PQC["Threshold Dilithium (QROM)"] --> EXEC["WorkPackages + SAL"] EXEC --> JAM["JAM Accumulator (parallel)"] EXEC --> ZK["RISC-V zkVM proofs"] EXEC --> FHE["TFHE sealed compute"] NET["gRPC over QUIC"] --> PQC
Execution Model
Deterministic parallelism by construction.
WitnessChain uses WorkPackages as a first‑class unit of execution. Each transaction carries a sender‑signed State Access List (SAL): storage slots, callable code hashes, and sealed compute key handles are declared up front.
Off‑list access triggers a deterministic abort: zero state mutation, base gas only, typed receipt, block remains valid. The result is executable determinism under concurrency — not an emergent property of a runtime.
Parallelism is obtained without mutex contention in the hot path: disjoint access masks batch into independent sets, execute in parallel, then merge in a canonical order.
graph TD TX["Tx + signed SAL"] --> MASK["disjoint_access_list (BitVec)"] MASK --> BATCH["Invariant-split partition"] BATCH --> PAR["Parallel exec (disjoint shards)"] PAR --> MERGE["Canonical merge (sorted)"] TX -->|undeclared slot| ABORT["Deterministic abort: no writes"]
Current Phase
Month 2 — Quantum Fortress
- 90-of-101 threshold key material; committee public key is the on-chain anchor.
- QROM-aware signature security posture; abort behavior is first-class.
- Bandwidth discipline via multiplexed rounds over QUIC.
- Remote attestation binds measurement (MRENCLAVE) to published keys.
- Key isolation for witness signing and sealed compute control paths.
- Explicit containment: enclave is a boundary, not a trust amplifier.
- gRPC over QUIC with multiplexed streams and bounded backpressure.
- Lock-free I/O↔crypto handoff (reactor/forge bifurcation).
- Rate-limiting and load shedding against Byzantine peers.
- SIMD bounds gate rejects malformed lattice scalars before worker dispatch.
- Deterministic abort receipts for invalid state surface access (SAL).
- No undefined behavior under concurrency as a protocol invariant.
Roadmap
Sequence, not spectacle.
- Protocol skeleton, state model, baseline consensus wiring.
- Foundational cryptographic interfaces and invariants.
- Threshold Dilithium DKG + committee key anchoring.
- Remote attestation and enclave-bound signing perimeter.
- MPC transport hardening (QUIC, backpressure, load shedding).
- TFHE sealed execution pipelines and key management.
- RISC‑V zkVM proofs + recursive aggregation for light clients.
- DA sampling, proof-carrying execution receipts.
- Privacy-preserving bridge surfaces with circuit breakers.
- DA, clients, and cross-domain security boundaries.
- Public codebase release.
Security Model
Assumptions are explicit or they do not exist.
- Static corruption of up to 33 witnesses (Byzantine fraction < 1/3).
- Adaptive corruption below the threshold for sensitive operations (t = 90 of 101).
- Network control: deliver/delay/reorder messages under bounded delay.
- Full observation of on-chain state, ciphertexts, and ZK proofs.
- Cannot break MLWE/MSIS hardness (classical or quantum) at chosen parameters.
- Cannot break IND‑CPA of the FHE scheme used for sealed computation.
- Cannot observe keys inside honest enclaves (SGX/TrustZone model).
- Cannot shortcut VDF evaluation beyond sequential bounds.
- No trusted operators: security reduces to threshold + cryptographic assumptions.
- Sensitive transitions require t = 90 witness participation; no single key ever exists.
- Violations fail closed: deterministic aborts, typed receipts, no partial state writes.
- Hardware root-of-trust is treated as a boundary, not a magic box.
- Attestation binds enclave measurement to published keys and roles.
- Protocol rules dominate: witnesses cannot mint privilege via off-chain agreements.
Developer Entry
Inspect the system, not the pitch.
- Rust core (deterministic execution boundaries)
- Tokio I/O reactor ↔ Rayon crypto forge separation
- gRPC over QUIC (HTTP/3) witness channels
- SIMD ingress validation (AVX2/AVX‑512)
- Threshold Dilithium DKG + signing
- RISC‑V zkVM + recursive aggregation
- TFHE sealed compute pipelines
- Explicit State Access Lists (SAL)
Codebase release: end of Phase 4 (Bridges + DA + Expansion).
WitnessChain is not a rollup.
Not a fork. Not an extension.
It is a base layer: a system of invariants with explicit trust boundaries, adversary assumptions, and deterministic execution rules — designed for a post‑quantum horizon.
If a property cannot be verified, it is not part of the protocol.
If execution cannot be made deterministic, it is not parallelized.
If secrecy depends on good behavior, it is not privacy.