Skip to content

DECK-0002: Domains (Territory Claims)#7

Open
arkin0x wants to merge 16 commits intomasterfrom
deck/2-stark-proofs
Open

DECK-0002: Domains (Territory Claims)#7
arkin0x wants to merge 16 commits intomasterfrom
deck/2-stark-proofs

Conversation

@arkin0x
Copy link
Copy Markdown
Owner

@arkin0x arkin0x commented Mar 16, 2026

Summary

This DECK specifies a STARK-based proof system for territorial claims (domains) in Cyberspace.

Key Features

  • Asymmetric verification: Prover does O(N) work; verifier does O(log² N) work
  • Zero-knowledge: The Cantor root R is never revealed under any circumstance
  • Succinct proofs: ~40-60 KB regardless of claim size
  • Permissionless verification: Any consumer device can verify any claim in <50ms

Protocol Design

  • No commitment field — The STARK proof IS the commitment
  • Field: Goldilocks prime (2^64 - 2^32 + 1) — STARK-optimized
  • Leaf hash: Poseidon2 — 100x faster in STARK circuits than SHA256
  • Proof hosting: HTTPS with BLAKE3 integrity hash
  • Nostr kind 33333 for claim events

Verification Asymmetry

Claim Height Claim Size Prover Time Verifier Time
Height 35 4m 2-5 days ~10 ms
Height 50 City Years ~25 ms

Any smartphone can verify any claim in under 50 milliseconds.

Files Changed

  • decks/DECK-0002-stark-proofs.md — Complete production-ready specification

Related

XOR added 2 commits March 16, 2026 18:36
- Zero-knowledge proof system for territorial claims
- Asymmetric verification: O(N) prover, O(log² N) verifier
- Root R never revealed under any circumstance
- STARK proof IS the commitment (no separate field)
- Goldilocks field + Poseidon2 hash (STARK-optimized)
- HTTPS hosting with proof_hash integrity
- Nostr kind 33333 for claim events
@arkin0x arkin0x changed the title DECK-0002: STARK Proofs for Construct Claims DECK-0002: STARK Proofs for Domain Claims Mar 16, 2026
XOR added 13 commits March 16, 2026 20:33
- New Section 3: How STARK Proofs Work (beginner-friendly)
- Explain circuit concept, Poseidon2 vs SHA256, inside/outside circuit
- Add concrete Height 4 domain example with step-by-step trace
- Add temporal Cantor tree for block duration (time proof)
- Work now scales with both territory size AND duration
- Renumber all sections for clarity
Critical fixes:
- Add pubkey to public inputs (prevents proof theft)
- Fix spatial enumeration: cubic region with bit-interleaving
- Add d tag for NIP-33 replaceable events
- Define temporal tree padding (repeat last value)
- Specify Poseidon2 parameters (t=4, R_F=8, R_P=22)
- Add domain identifier serialization (16 hex chars)
- Define proof binary format
- Add Domain Lifecycle section (renewal, expiration, revocation)

Significant updates:
- Verification now checks pubkey binding
- Concrete example updated for cubic volume (Height 2 = 64 leaves)
All critical and significant issues addressed:
- Pubkey binding for security
- Cubic volume enumeration (bit-interleaving)
- d tag for NIP-33 replaceable events
- Poseidon2 parameters specified
- Domain lifecycle (renewal, expiration, revocation)
- Conflict resolution priority rules
- Security parameters mandated (min 100 bits)
- Bitcoin oracle sources specified
- Protocol limits (max height 30, max duration 1M blocks)
- Privacy considerations added
- Test vectors updated (Height 2 example)
- Cantor pairing fixed (modulo p)
- Status label consistent (Draft)

Ready for PR #7 review on GitHub.
Key changes:
- 3-axis Cantor pairing (X, Y, Z roots first)
- Commitment output instead of revealing R
- Updated domain event structure
- Revised verification protocol
- Added domain lifecycle (renewal, expiration, revocation)
- Protocol limits and privacy considerations
- Test vectors updated

Aligning with CYBERSPACE v2 specification's 3-axis structure and confidentiality requirements.
1. Structure: 3-Axis (not volumetric tree)
2. Mathematics: Integer Cantor pairing on raw coordinates
3. Privacy: R as private witness for commitment
4. Inputs: Geometric only (base/height)
Major changes:
- Add three-layer capability model (Mathematical, Protocol, Social)
- Add action control / domain policy for protocol-level feature control
- Add content sovereignty mechanics (owner content only in domains)
- Add CP-ABE integration for role-based access (kind 33334)
- Document privacy hierarchy problem (domain owner omniscience)
- Remove temporal axis / expiration (knowledge is irrevocable)
- Clarify discovery vs. recognition distinction

The spec now comprehensively covers:
- What domains are and how they work
- All three enforcement layers
- Protocol-level rights earned by work
- Mathematical capabilities and limitations
- Privacy implications for users
- Fix d tag: 64 hex chars (not 16), matches Public_Commitment
- Add subject tag for human-readable domain name
- Set content field to '<optional: domain description>'
- Clarify h tag purpose (indexing/filtering)
- Explain prefix consistency check in verification
- h tag is optional for indexing optimization
- Only validate h if present
- Clearer step 3 explanation in verification
- Remove spawn and scan (not yet specified)
- Add internal-shard: permission to publish shards referencing domain
- Add external-shard: permission to publish shards without reference
- Define a tag format for domain reference: ["a", "33333:<pubkey>:<domain_id>"]
- Update content sovereignty section to reference shard actions
- Add concrete examples of shard filtering
- Remove content_filter field (replaced by shard actions)
- Remove spawn_list check from policy verification
- Simplify action enforcement (pubkey_list noted as future)
- Update policy validation to be generic
Initial draft specifying:
- Kind 333 derezz event with Cantor proof for spatial proximity
- Temporal ordering rules (timestamp > previous + 1 second)
- Domain owner advantage (knows R = instant derezz)
- Kind 334 spawn event for respawning
- Domain policy derezz: allow/deny for safe zones
- Post-derezz state: victim can only spawn
- Add section 5.3: Domain Owner Exemption
- Owner can bypass all policy restrictions in their domain
- Rationale: work to compute R grants absolute authority
- Update enforcement logic to check owner first
- Renumber subsequent sections (5.4→5.5, 5.5→5.6)
@arkin0x arkin0x changed the title DECK-0002: STARK Proofs for Domain Claims DECK-0002: Domains (Territory Claims) Mar 18, 2026
- Section 12.1: Updated prover requirements table
- Section 14: Removed height limit, all heights valid
- Market determines feasibility, not protocol rules
- Added note about experimental testing for proof sizes at high claims (~60+)
- Proof size limit marked as TBD pending testing
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant