Hetu: A P2P Communication Layer With Causality Graphs

ETHDenver
27 Feb 202419:01

Summary

TLDRJalen Lee, an assistant professor at NUS, introduces the HE2 protocol, a novel peer-to-peer communication layer designed for large-scale decentralized applications. HE2 offers a middle ground between traditional insecure P2P networks and secure but slow blockchains, providing trusted event ordering and verifiable logical clocks to ensure consistency and security without sacrificing scalability. The protocol leverages zero-knowledge proofs and incremental verifiable computation to create a community-driven platform with a flexible consistency model, suitable for various applications like social media, gaming, and decentralized infrastructure.

Takeaways

  • ๐ŸŽ“ Jalen Lee, an assistant professor at NUS, is discussing the HAT2 protocol at V Labs.
  • ๐Ÿ”— HAT2 aims to generalize distributor consistency for large-scale decentralized applications.
  • ๐Ÿ“ˆ There's a spectrum of consistency levels and trust in peer-to-peer infrastructures, with limited options available.
  • ๐Ÿš€ Traditional TCP/IP and Li P2P offer fast communication but lack security and consistency.
  • ๐Ÿ”’ Blockchains and permissioned BFT protocols provide strong security but are slow and don't scale well.
  • ๐ŸŒŸ HAT2 offers a middle ground with low cost, high scalability, and various consistency levels.
  • ๐Ÿ•’ The protocol leverages a novel verifiable logical clock for trusted event ordering.
  • ๐Ÿ”„ HAT2 is a peer-to-peer communication layer that allows for building distributed applications with different consistency guarantees.
  • ๐Ÿ”„ The verifiable logical clock uses zero-knowledge proofs and incrementally verifiable computation to ensure trust.
  • ๐Ÿ› ๏ธ HAT2 stack consists of a messaging layer, a shim layer, and an application layer for community-driven development.
  • ๐Ÿ“… The HAT2 team plans to launch a testnet in mid-year and mainnet by the end of the year or early next year.

Q & A

  • What is the main focus of the HAT2 protocol?

    -The HAT2 protocol focuses on generalizing the notion of distributor consistency for building large-scale decentralized applications, providing a middle ground between traditional peer-to-peer networks and blockchain technology in terms of consistency and security.

  • What are the limitations of traditional TCP/IP stack or Li P2P in terms of security and consistency?

    -Traditional TCP/IP stack or Li P2P provides fast networking and communication between peers but lacks significant security and consistency, offering only basic security features like end-to-end encryption and message integrity.

  • How does the HAT2 protocol address the scalability issues of blockchain technology?

    -HAT2 protocol leverages a novel verifiable logical clock to provide trusted event ordering at a low cost and with high scalability, allowing for the development of distributed or decentralized applications without the scalability bottlenecks of blockchains.

  • What is the significance of the verifiable logical clock in the HAT2 protocol?

    -The verifiable logical clock is a key component of the HAT2 protocol that allows for the establishment of causal ordering of events in a distributed system without relying on physical clocks. It ensures that the logical causality can be verified by any third party, preventing malicious users from creating false causal dependencies.

  • How does the HAT2 stack structure its layers?

    -The HAT2 stack is structured into three layers: the messaging layer for creating and verifying proofs for logical clocks, the shim layer for building middleware like relay networks and sequencers, and the application layer where developers can propose and build various applications using the logical clocks.

  • What is the HAT Improvement Proposals (HIP) system?

    -The HAT Improvement Proposals (HIP) system is a community-driven approach that allows anyone, not just the core development team, to propose improvements or new components for the HAT2 protocol. It is similar to the EIP system used in Ethereum.

  • What are some potential applications of the HAT2 protocol?

    -Potential applications of the HAT2 protocol include decentralized mutual exclusion, causally and eventually consistent datastores, virtual machines, and shared sequencing layers. It can also be used for social applications, decentralized games, and other interactive applications requiring a balance between consistency and scalability.

  • What is the timeline for the HAT2 protocol development?

    -The current proof of concept (POC) is being developed, with plans to launch a testnet in the middle of the year, followed by a mainnet release by the end of the year or early next year.

  • How can developers contribute to the HAT2 protocol?

    -Developers can contribute by proposing improvements or new components through the HIP system. Once approved, their contributions can be merged into the HAT2 stack. They can also develop applications using the provided APIs and share their ideas with the community.

  • What are the challenges of maintaining a common physical clock in a distributed system?

    -In a distributed system, maintaining a common physical clock is challenging due to the absence of a shared reference frame, as different nodes may have different relative motions (time dilation) and clock drifts, making it difficult to synchronize clocks accurately.

  • How does the HAT2 protocol ensure consistency without a common physical clock?

    -The HAT2 protocol uses a logical clock based on causal ordering of events, which does not rely on physical time but instead tracks the causal dependencies between events. This allows for a consistent ordering of events without the need for a common physical clock.

Outlines

00:00

๐ŸŽค Introduction to Hat Protocol

Jalen Lee, an assistant professor at the National University of Singapore, introduces the Hat2 protocol. He discusses the challenges of building large-scale decentralized applications with existing infrastructures, which either offer high speed with minimal security or strong security with limited scalability. The Hat2 protocol aims to provide a middle ground, offering more consistency and security options for developers.

05:01

๐Ÿ”„ Event Ordering in Distributed Systems

The importance of event ordering in distributed systems is highlighted, with traditional methods relying on physical clocks. In decentralized systems, a common physical clock is absent, leading to the concept of causal ordering. Lamport's work on logical clocks and event ordering in distributed systems is referenced, emphasizing the need for a trusted way to order events without a physical clock.

10:02

๐Ÿ”’ Verifiable Logical Clock

A new form of verifiable logical clock is introduced, which allows for event ordering in a peer-to-peer environment with potential adversaries. This clock uses zero-knowledge proofs and incrementally verifiable computation to ensure that the logical clauses can be verified by any third party, preventing false logical clocks and maintaining causal dependencies.

15:03

๐ŸŒ HE2 Stack and Community Approach

The HE2 stack is described as a peer-to-peer communication layer that provides trusted event ordering. It consists of a messaging layer, a relay network, and an application layer with a simple API. The HE2 protocol is community-driven, allowing developers to propose improvements. The current proof of concept includes a verifiable logical clock, a peer-to-peer communication library, and demo applications like Z Social. The timeline for the HE2 stack includes a testnet and mainnet release in the coming year.

Mindmap

Keywords

๐Ÿ’กDistributed Consistency

Distributed Consistency refers to the ability of a distributed system to maintain a consistent state across multiple nodes. In the context of the video, it is a core challenge for building large-scale decentralized applications, where the system must ensure that all participants agree on the order and state of events, even when they may not have a common physical clock or may be subject to adversarial conditions.

๐Ÿ’กDecentralized Applications

Decentralized Applications (DApps) are software applications that operate on a decentralized network, often using blockchain technology to ensure trust and security without a central authority. The video emphasizes the need for such applications to have a balance between security, consistency, and scalability, which the hat2 protocol seeks to address.

๐Ÿ’กPeer-to-Peer (P2P) Infrastructure

A Peer-to-Peer (P2P) Infrastructure is a network where each participant (peer) has the same capabilities to share and receive resources. It contrasts with client-server models where resources are centralized. The video script discusses the limitations of P2P infrastructures in terms of security and consistency, which the hat2 protocol aims to improve.

๐Ÿ’กVerifiable Logical Clock

A Verifiable Logical Clock is a system that tracks the order of events in a distributed system without relying on physical time. It uses logical or causal relationships between events to establish a consistent order. In the video, this concept is crucial for the hat2 protocol, as it allows for trust and consistency in a decentralized environment, even when nodes may be adversarial.

๐Ÿ’กZero-Knowledge Proof

A Zero-Knowledge Proof is a cryptographic method that allows one party to prove to another that a statement is true without revealing any information about the statement itself. This concept is integral to the hat2 protocol's verifiable logical clock, as it enables the creation of a trusted event ordering without compromising privacy.

๐Ÿ’กIncrementally Verifiable Computation (IVC)

Incrementally Verifiable Computation (IVC) is a technique that allows multiple parties to collaboratively compute a result while verifying each step of the computation. This ensures that the final result is correct and trustworthy. In the context of the hat2 protocol, IVC is used to build a trusted logical clock that can be verified by any participant in the network.

๐Ÿ’กCausal Consistency

Causal Consistency is a consistency model in distributed systems that ensures the order of events respects the causal relationships between them. This means that if an event A causes an event B, then A must occur before B in the system's view. The video emphasizes the importance of causal consistency for applications that require a certain level of trust and consistency without full global consensus.

๐Ÿ’กHat2 Protocol

The Hat2 Protocol is a novel peer-to-peer communication layer designed to provide trusted event ordering and various consistency levels for building distributed or decentralized applications. It aims to offer a middle ground between traditional P2P networks and blockchains, addressing the limitations of both in terms of security, consistency, and scalability.

๐Ÿ’กCommunity-Driven Approach

A Community-Driven Approach refers to the development process where a community of contributors, not just a core development team, can propose and contribute to the growth and improvement of a project. The video script highlights the Hat2 protocol's adoption of this approach, allowing for a more collaborative and open development process.

๐Ÿ’กProof of Concept (POC)

A Proof of Concept (POC) is a demonstration that a particular method or idea is feasible and can be successfully implemented. In the context of the video, the Hat2 protocol has a POC that showcases its capabilities and potential for future development.

Highlights

Introduction to the hat2 protocol for building large scale decentralized applications.

Challenges in achieving consistency and security in peer-to-peer infrastructures.

The spectrum of consistency levels and trust in infrastructures, from traditional TCP/IP to blockchains.

The need for a middle ground between fast but insecure networks and slow but secure blockchains.

HE2 protocol as a peer-to-peer communication layer offering trusted event ordering.

Utilization of a novel verifiable logical clock for event ordering in a decentralized environment.

The concept of causal ordering of events in distributed systems without a common physical clock.

The development of a new logical clock that doesn't depend on physical clocks but on causal dependencies.

The application of zero-knowledge proofs for incrementally verifiable computation in building a trusted logical clock.

Examples of applications that can benefit from the verifiable logical clock, such as decentralized mutual exclusion and causally consistent datastores.

The structure of the HE2 stack, including the messaging layer, shim layer, and application layer.

The community-driven approach of the hat2 protocol, allowing developers to propose improvements.

Proof of concept development and the roadmap for the HE2 stack, including a testnet and mainnet release.

Invitation for community contribution and feedback, with team members present at the event.

Transcripts

play00:03

[Music]

play00:08

all right um so yeah today I'm very

play00:10

excited to uh share with you guys uh our

play00:13

hat to protocol um so forgive me I'm uh

play00:17

I just recently got a pretty bad code so

play00:18

my voice is a bit like a bit shaky uh

play00:20

but hope hope everybody can hear me is

play00:23

it good oh good okay cool all right so

play00:26

uh first a quick introduction uh so my

play00:28

name is Jalen Lee uh so I'm currently an

play00:31

assistant professor at the National

play00:33

University of Singapore and also I'm

play00:35

representing uh at the V Labs uh to uh

play00:38

to tell you more about our uh very

play00:41

recent hat2 protocol uh where we try to

play00:44

generalize uh this generalized notion of

play00:46

distributor consistency uh for building

play00:49

uh large scale decentralized

play00:54

applications all right um so let me

play00:57

first start with I guess all of you

play00:59

heers are

play01:00

uh our developers uh in the web stre

play01:03

space so uh you you guys use or have

play01:06

been uh developing infrastructure or use

play01:08

large scale peer-to-peer

play01:10

infrastructures um but so far there are

play01:13

very limited uh number of options in

play01:15

terms of what kind of consistency you

play01:17

get uh or kind of security you get from

play01:19

this infrastructure right so I here I

play01:22

gave you sort of like a graphical

play01:24

illustration the kind of spectrum of

play01:26

consistency levels or the kind of trust

play01:28

you get from this

play01:30

infrastructures so on the very uh left

play01:34

far end of the spectrum you get things

play01:36

like traditional TCP IP stack or Li P2P

play01:39

or things like that where you can build

play01:41

very fast um very fast networking right

play01:46

uh communication between different peers

play01:48

in a uh in a peer-to-peer Network right

play01:51

but the problem is that you don't really

play01:52

get a lot of security or consistency

play01:54

from these infrastructures right so you

play01:57

kind of get uh the bare minimum kind of

play01:59

security if you do end to endend

play02:01

encryption right so that gives you

play02:03

things like authent authentication

play02:05

Integrity of your messages but you don't

play02:07

get much more than that right uh so if

play02:10

you build distributed applications or

play02:12

decentralized applications would require

play02:14

a lot more security or consistency uh

play02:16

instead what you do is you choose the

play02:18

far right end of the spectrum where you

play02:21

use probably a blockchain use a uh

play02:23

permission bft protocol or you use any

play02:26

other form of infrastructure like Layer

play02:28

Two rops reaking and other forms of

play02:31

instructure that gives you very very

play02:34

strong security right so you have a

play02:36

totally ordered uh uh set of blocks

play02:39

right so everybody agrees on the order

play02:41

so there's Global consensus right uh so

play02:43

security wise is really good uh it's a

play02:46

very strong consistency uh but the

play02:48

problem is it's very slow it doesn't

play02:50

really scale right so for many kind of

play02:52

applications it's not probably not ideal

play02:54

to use this infrastructure as well right

play02:56

but we can see that this is a spectrum

play02:58

right so you don't only have two end

play03:00

points there's a lot of ground in the

play03:02

middle right so all these middle uh for

play03:05

Security Options and consistency options

play03:08

they're currently not a lot of uh for

play03:10

you infrastructure wise for to use right

play03:14

um but actually we see that there are a

play03:17

lot of applications which can actually

play03:18

benefit from a more uh slightly more

play03:21

relaxed level consistencies or trust

play03:23

models um to to scale them right so here

play03:26

I just gave you a sense of uh example

play03:29

application but here definitely there

play03:30

are not a uh exhaustive list right so

play03:34

here things like social applications

play03:36

right things like communication between

play03:37

different AI agents right uh like Games

play03:40

social games um uh and more recent like

play03:44

uh uh decentralized physical

play03:45

infrastructure and so on so forth right

play03:47

so all these applications right they are

play03:49

so they're they're proper one of the

play03:51

main properties that very interactive

play03:54

right so there are a lot of interactions

play03:55

between different parties in the network

play03:57

a lot of communications going on right

play03:59

so putting them on chain is probably not

play04:02

the best option because of the

play04:03

scalability bottleneck so even though

play04:05

you have more scalability options these

play04:07

days uh but eventually because the cost

play04:10

and then there's still limited

play04:11

throughput and scalability is still not

play04:15

ideal for you to to to build these

play04:16

applications on top on the other hand

play04:18

these application do require some level

play04:20

of security and trust and also

play04:23

consistency right so for example if

play04:24

you're building social applications you

play04:26

want to have some kind of consistency so

play04:28

that your followers right your tweets

play04:31

right so there are there there there the

play04:32

follow your followers right so these are

play04:34

your your your uh your metadata changes

play04:36

there there are some kind of consistency

play04:38

guarantees right so so there's so at

play04:41

this moment you either choose right the

play04:43

uh the very uh very uh so infrastructure

play04:46

that they don't give you anything or you

play04:48

you choose like blockchains uh so which

play04:50

are fairly Limited in terms of

play04:53

scalability right uh so in this talk so

play04:56

we're going to introduce HE2 uh which

play04:58

does provide this kind of Middle Ground

play05:00

where there are offers a lot more kind

play05:03

of consistency and Security Options for

play05:05

you to build distributed or

play05:06

decentralized applications right so HE2

play05:09

is a peer-to-peer communication layer

play05:11

right so but uh so compared to existing

play05:14

peer-to-peer infrastructures or

play05:16

communication infrastructure uh it

play05:18

additionally provides this what we call

play05:20

trusted event ordering uh naturally from

play05:22

this communication layer right uh and

play05:25

then underlying it we are leveraging a

play05:27

novel um form of verifiable logical

play05:30

clock uh which we I'm going to elaborate

play05:33

uh in a few minutes um so the so the so

play05:36

the so the nice thing about HE2 is that

play05:39

it is very low cost and then very highly

play05:42

scalable um but also it gives provides

play05:45

the opportunity for distributed or

play05:47

decentralized application to build

play05:49

various consistency levels on top of it

play05:52

uh and then so it has really really wide

play05:54

kind of applic applicability right so

play05:56

all the applications I just show you uh

play05:59

will will benefit from our communication

play06:01

stack so let me just elaborate by

play06:04

starting from a little bit background

play06:07

right so uh so when you build any kind

play06:11

of applications distributed systems

play06:13

right so the order of events is a really

play06:16

important aspect right so no matter what

play06:18

you do you care about some kind of

play06:20

ordering right either is like between

play06:21

different blogs or not between a uh a

play06:24

social social media post and then some

play06:27

other activities right so these are all

play06:28

events and you care about the ordering

play06:30

so how do you order events in a system

play06:33

right so the most traditional way so for

play06:35

example if you come to uh this e Denver

play06:38

event where you look at all the events

play06:41

uh in this in this uh in on the schedule

play06:43

so you clearly Mark right what is what

play06:46

time is each event happening right so

play06:48

that's the most traditional way of

play06:49

ordering events right so my talk starts

play06:51

at 1:45 and then the previous stock

play06:54

start at like 1 uh 1 p.m. or 1:30 p.m.

play06:57

or something right so by looking at the

play06:59

different time span time stamp you can

play07:01

know exactly which event happened first

play07:04

so but the problem is that in a truly

play07:06

distributed or decentralized system this

play07:08

kind of physical clock or commonly

play07:11

agreed physical clock is not present so

play07:13

there are multiple reasons why you don't

play07:15

have that in a decentralized

play07:18

system so first from a theoretical

play07:21

perspective uh if you guys uh have heard

play07:24

or learned about relativity right so in

play07:27

relativity right so different objects uh

play07:30

which have different relative motions

play07:32

they actually don't have the same common

play07:34

clock right uh so this phen phenomena is

play07:37

called time dilation so for example uh

play07:39

here I show uh on the left is the

play07:42

international uh space uh station right

play07:45

so and then so because it's moving with

play07:47

a relative motion with for example this

play07:49

is the location of e dver right because

play07:52

if if there is relative motion so the

play07:54

time actually disagree with each other

play07:56

right so they don't have the common

play07:58

time so the other problem is that even

play08:01

if you have if you don't have relative

play08:03

motion among different objects because

play08:06

your clocks devices they are not perfect

play08:09

right so they cannot track your physical

play08:11

time um very accurately right um so for

play08:15

example depending on what kind of clock

play08:17

technology you use if you use U small

play08:20

atomic clocks right versus very uh so

play08:23

sorry very sophisticated atomic clocks

play08:25

versus a simple clock you can find your

play08:27

computer like a crystal oscillator so

play08:29

they have very different clock drifts

play08:31

right so it's very hard for you have to

play08:33

have perfectly synchronized clocks among

play08:35

different

play08:37

parties right so if we can't have like a

play08:41

a common agree upon physical clock what

play08:44

can we do to have uh to to order events

play08:47

in a distributed system so here we look

play08:50

at uh look back in the literature in

play08:52

distributed systems so back in 1978 uh

play08:56

so a famous distributed system

play08:58

researcher uh his name is Lassie Lamport

play09:01

uh who later got theer award for some of

play09:04

this work including this so uh he

play09:07

published a seminal work called time

play09:09

clocks and The Ordering of events in

play09:11

distributed system where he exactly talk

play09:13

about this problem so if you don't have

play09:16

physical clock in the system how can you

play09:18

order events so he argued that the only

play09:21

trusted way of ordering events in a

play09:23

distributed system is to look at The

play09:25

Logical ordering of different events or

play09:27

another way of saying it is called the

play09:29

Cal causal ordering of events in a

play09:31

system so what is causal event ordering

play09:33

in a system so here I show if you have

play09:35

multiple processes in a distributed

play09:38

system right so they talk to each other

play09:40

through messaging right so you don't

play09:42

have a clock so you don't know which

play09:44

event happened first but you know for

play09:45

sure that if I send the message from

play09:48

process P to process Q the sending of

play09:51

the event must happen before the

play09:53

receiving of the message now I establish

play09:55

a causal dependency between these events

play09:57

and then you can use this if I I receive

play09:59

a message and later send another event

play10:01

uh and sorry I send another message I

play10:03

know the sending of the next message

play10:06

causally depending on I received the

play10:08

previous message right because the

play10:09

sending May cly depend on actually

play10:11

receive the previous message right and

play10:13

then you can do a transitive closure of

play10:16

these events then you get this what they

play10:18

called a happened before relationship

play10:20

which captured the causal orological

play10:22

dependency between different events so

play10:24

that you don't require any physical

play10:26

clock and then that is the true ordering

play10:28

of the the system that nobody can

play10:30

disagree with right so that's a pretty

play10:32

cool and a pretty strong kind of uh uh

play10:35

event ordering property and then uh

play10:37

let's lample argue that now we can

play10:40

develop a new kind of clock that doesn't

play10:42

depend on physical clock but instead on

play10:44

a logical clock this logical clock

play10:46

essentially track this causal uh causal

play10:49

dependency between different events by

play10:51

looking at this causal clock sorry

play10:53

logical Clause you can infer what's the

play10:55

causal dependency between different

play10:57

events right so so this paper and the

play11:00

notion of logical clock on causal

play11:02

dependency have a lot of implication a

play11:05

huge implication on the development of a

play11:07

lot of distributed and decentralized uh

play11:10

protocols to this state um so we are uh

play11:14

taking this protocol and this notion a

play11:17

step forward so we are looking at how do

play11:19

we build logical clock in a

play11:21

decentralized environment right so a

play11:23

peer-to-peer environment one of the

play11:24

biggest challenges in this peer-to-peer

play11:26

envir environment is the presence of

play11:29

potentially malicious or adversaries

play11:31

users right so pantin knows or another

play11:34

way of saying it right so because

play11:36

traditional logical clock depends on all

play11:39

the protoc all the all the participant

play11:41

in the system follow exactly the

play11:43

protocol of updating The Logical clock

play11:45

right so if there are any pantin node in

play11:48

the system it will break the break the

play11:50

entire notion of logical clock and the

play11:53

caal dependency guarantees right so what

play11:55

we do is we have done some uh recent re

play11:58

research and and then we found or we

play12:00

developed a new way a new logical clock

play12:02

called verifiable logical clock uh that

play12:05

ensures that the The Logical Clause pass

play12:08

in the system can be verified by any

play12:10

third party right so that means nobody

play12:12

can can uh create a false logical clock

play12:15

that breaks Lo uh causal dependencies

play12:18

right and then so I mean I'm not going

play12:20

to have the time to give you all the

play12:21

technical background uh but a hell of a

play12:23

gist is that we leverage this new in

play12:26

noal application of zero knowledge proof

play12:29

so this is very recent uh development in

play12:31

the space uh so this new technique is

play12:33

called incrementally verifiable

play12:35

computation or IVC that allows us to

play12:38

have multiple parties in the system by

play12:40

passing these messages build a trusted

play12:42

logical clock with a verifiable

play12:47

proofs right and by applying this uh

play12:50

this novel kind of verifiable logical

play12:53

clock we're able to build a lot of

play12:55

interesting applications and

play12:57

infrastructure on top of it here I just

play12:59

give you a some quick uh examples that

play13:02

we recently developed uh but you can

play13:04

certainly think of using this verifiable

play13:06

logical clock for a lot of more

play13:08

interesting applications right so for

play13:10

example we can use uh this verifiable

play13:12

logical clock to build decentralized

play13:14

Mutual exclusion or the other way of

play13:15

saying is like m a a lock right uh a

play13:18

synchronization primitive between

play13:20

different participant in the system

play13:22

without centralized trust or centralized

play13:25

server for log Services right and you

play13:27

can build as I I hinted in the beginning

play13:29

of the talk right so there are a lot of

play13:31

application that I want something uh

play13:33

consistency levels not that are not like

play13:35

strictly consistent right not

play13:37

linearizable in a more technical sense

play13:40

right so here we are able to use this uh

play13:42

verifiable logical clock to build

play13:44

causally and eventually consistent data

play13:46

stores and then uh uh things like

play13:48

virtual machines right so your virtual

play13:50

machine State doesn't need to be always

play13:52

synchronized across each other but we

play13:54

guarantee either eventually synchronized

play13:57

or if there's a c dependency between the

play13:59

different updates we make sure everybody

play14:01

observed them in a causally consistent

play14:03

order right and then we can use this

play14:06

logical verifiable logical clock to

play14:08

build a shared sequencer for example

play14:10

right here we're able to use the partial

play14:12

ordering property of this verifi logical

play14:15

clock to easily scale a shared

play14:17

sequencing

play14:21

layer right uh and then so so far we

play14:25

have built a so from this verif a

play14:28

logical clock we build a HE2 stack uh so

play14:31

this HE2 stack as I mentioned before is

play14:34

a peer-to-peer communication layer right

play14:37

um so sorry that the the the picture

play14:39

might be a little bit blurry and small

play14:41

uh So currently we we can structure as

play14:43

three three kind of layers so the first

play14:45

layer is underlying the the lowest layer

play14:47

we have this messaging layer where um so

play14:50

we can the messaging layer creates the

play14:53

uh the proof and then generate generate

play14:55

proofs and then verify uh the for the

play14:58

for this logical clocks and verify this

play15:00

logical clock while generating messaging

play15:02

and then this layer also uh uh build

play15:05

build a traditional p-to-p communic

play15:07

layer things like cadamia uh DHT right

play15:11

and then on top of it we have a a middle

play15:14

what we call the shim layer where we

play15:16

build a sort of like a a relay Network

play15:19

where there's a large scale uh

play15:21

peer-to-peer network with a lot of

play15:23

participants messaging each other uh

play15:26

with uh the underlying shared sorry

play15:29

underlying a verifiable logical clock in

play15:31

this each messages and on top of it

play15:34

expose a simple to use API to the

play15:36

application layer where the application

play15:38

can use uh the The Logical clocks from

play15:41

the underlying layers to build their uh

play15:44

desired consistent levels and their

play15:46

applications so that's the current hat2

play15:49

protocol uh hat to stack uh and then we

play15:52

are a very Community Driven approach

play15:55

right so so we uh uh we develop a fairly

play15:59

interesting and pretty novel uh protocol

play16:01

called the hat to Improvement uh

play16:04

proposals this is like the EIP system

play16:07

right where everybody not just the our

play16:09

core development team can propose um

play16:12

different Improvement on top of K to

play16:14

protocol or a components of the hatter

play16:16

protocol right so here we gave you some

play16:19

we roughly coarsely developed into three

play16:22

different layers so the first layer is

play16:24

called hiip a layer so this is the like

play16:26

the fundamental layers of the the HE2

play16:29

protocol so here so we build the

play16:31

fundamental technology behind HE2 things

play16:34

like logical clocks uh the peer-to-peer

play16:36

Network and then uh the incrementally

play16:39

verifiable verifiable computation right

play16:41

and then on top of it there is the hip B

play16:44

layer where we there's the middle uh

play16:46

middleware that people can build things

play16:48

like the relay Network I mentioned about

play16:50

and also things like sequencers and then

play16:53

random number generators and then there

play16:55

are many developers who care more about

play16:58

the upper level applications and then

play17:00

they can propose uh things like

play17:02

Messengers for social applications uh

play17:05

decentralized games or things like

play17:07

social other kind of social applications

play17:08

on top of it right so we open up uh this

play17:11

hip system to all the developers in the

play17:14

system uh in the in the community right

play17:15

everybody can propose right and then

play17:17

once it's approved uh they can be merged

play17:20

into uh the Hato

play17:23

stack right so currently we have a proof

play17:26

of concept right so if you're interested

play17:28

feel free to check uh check out our uh

play17:31

GitHub page right so currently we have a

play17:33

few of these components currently

play17:35

already built things like The verifiable

play17:37

Logical clock so the underlying

play17:39

peer-to-peer communication Library uh

play17:41

and then we also developed some a few

play17:43

applications on top of it already as a

play17:45

demo right things like uh a social

play17:47

application called Z social and then a

play17:49

random number

play17:53

generation right so um so this is our

play17:56

prep proposed timeline for our uh HE2

play17:59

stack and HE2 protocol uh so I don't

play18:02

know if you guys can read it but we are

play18:04

currently roughly here so we're uh we

play18:07

develop our current propal concept POC

play18:10

and then our goal is to have the test

play18:12

net some sometime uh in the middle of

play18:14

this year right so which is here uh and

play18:17

then later this year and by the end of

play18:18

this year or early next year where our

play18:20

plan is to row out the main net of hat2

play18:23

uh so we welcome everybody to uh

play18:25

contribute uh to talk to us give us

play18:27

feedback

play18:29

um so uh so many of our team members are

play18:32

here at East Denver so if you are

play18:35

interest in our protocol or our stack

play18:37

feel free to talk us uh so uh so aasha

play18:42

is here in this I think somewhere here

play18:45

uh that's me and then I think Sean is

play18:46

also here and then we have many other

play18:48

people here from the uh the hat2 team uh

play18:51

and then uh also uh follow us on Twitter

play18:54

uh and then we welcome all your feedback

play18:56

and then yeah I think that's it and

play18:57

thanks everybody

play18:59

bu

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
DecentralizedApplicationsPeer-to-PeerTrustedEventOrderingScalableSecureConsistentCommunityDevelopmentDistributedSystemsLogicalClockVerifiableProtocolsSocialApplicationsBlockchainLayerTwoRopstenInfrastructureConsistencyLevelsScalabilityCausalOrderingZeroKnowledgeProofIncrementallyVerifiableComputationHE2StackTestnetMainnetNationalUniversitySingaporeVLabsJalenLeeEastDenver