the authenticated state layer for cyber. the entire cybergraph commits to a single polynomial:

$$\text{BBG\_root} = \text{Lens.commit}(\text{BBG\_poly}) \quad \text{(32 bytes)}$$

one polynomial. all state. every query is a polynomial opening (~200 bytes, 10-50 μs). cross-index consistency is structural — different evaluation dimensions of the same polynomial cannot disagree.

bbg is to cybergraph what a database engine is to a schema. cybergraph defines WHAT. bbg implements HOW.

three laws

  1. bounded locality — operation cost $\propto$ what it touches, not total state size
  2. constant-cost verification — one lens opening: ~200 bytes proof, 10-50 μs
  3. structural security — polynomial binding prevents lying. post-quantum (Brakedown, no pairings)

structure

BBG_poly is a single multivariate polynomial with three dimensions:

$$\text{BBG\_poly}(\text{index}, \text{key}, t) = \text{value}$$

index domain key value
0: particles content-addressed nodes CID energy, π*, axon fields
1: axons_out outgoing edges by source source CID axon pointer, weight
2: axons_in incoming edges by target target CID axon pointer, weight
3: neurons agent state neuron ID focus, karma, stake
4: locations spatial association neuron ID geohash, attestation
5: coins fungible tokens denomination supply, parameters
6: cards non-fungible assets card ID owner, content CID
7: files content availability CID DAS commitment, chunk count
8: time historical snapshots time namespace BBG_root at that time
9: signals finalized signal batches step signal hash

no NMT. no LogUp. cross-index consistency is FREE — axons_out and axons_in are different evaluation dimensions of the same committed polynomial.

private state

individual cyberlinks are private. polynomial commitments handle this:

  • commitment polynomial A(x): all committed private records. membership = one lens opening
  • nullifier polynomial N(x): all spent nullifiers. non-membership = one lens opening showing N(c) ≠ 0

~5,000 constraints per private operation (was ~40,000 with SWBF + MMR). 32-byte witness (was 128 KB).

dependency graph

hemera (hash) → lens (commit) → nox (run) → zheng (prove) → bbg (store) ← this repo

see cyber/research/bbg for the full polynomial state specification, lens for commitment backends, Brakedown for the polynomial commitment scheme

discover all concepts


from subgraph bbg

bbg

authenticated state layer for cyber. individual cyberlinks are private — who linked what is never disclosed. the cybergraph is the public aggregate: axons, neuron summaries, particle energy, token supplies, π* distribution. all derived from cyberlinks, revealing no individual contribution.

three laws

bounded locality. no global recompute for local change. every operation's cost is proportional to what it touches. at 10¹⁵ nodes, global operations are physically impossible.

constant-cost verification. any computation produces a proof verifiable in ~5 μs via zheng-2 folding. verifier work is independent of prover work.

structural security. guarantees from data structure invariants, not protocol correctness. a tree whose internal nodes carry min/max namespace labels cannot lie about completeness — the structure itself prevents it.

structure

13 sub-roots under BBG_root. each is 32 bytes (hemera-2 output). total: 416 bytes.

PUBLIC NMTs (9 roots)
  particles.root       all particles: content + axons, energy, π*
  axons_out.root       by source (outgoing axon index)
  axons_in.root        by target (incoming axon index)
  neurons.root         focus, karma, stake per neuron
  locations.root       proof of location
  coins.root           fungible token denominations
  cards.root           names and knowledge assets
  files.root           content availability (DAS)
  time.root            temporal index (7 namespaces)

PRIVATE STATE (3 roots)
  cyberlinks.root      MMR peaks hash (append-only commitment list)
  spent.root           MMR root (archived consumption proofs)
  balance.root         hash of active consumption bitmap (SWBF 128 KB)

FINALIZATION (1 root)
  signals.root         MMR (finalized signal batches)

key numbers

hash output:          32 bytes (hemera, 24 rounds, ~736 constraints/perm)
proof size:           ~2 KiB (zheng-2, recursive Brakedown)
verification:         ~5 μs
private transfer:     ~40,000 constraints, sub-second proving
cross-index (LogUp):  ~500 constraints per axon update (15× savings)
light client join:    one zheng verification + namespace sync

specification

document content
architecture three laws, ontology, 13 sub-roots, privacy model
state BBG root, state diagram, checkpoint, state transitions
indexes 9 NMT indexes, leaf structures, namespace semantics
privacy mutator set (AOCL + SWBF), record model, transfer circuit
cross-index LogUp cross-index consistency, batch verification
sync sync at three scales: local (device CRDT), global (foculus), query (light client)
data-availability 2D Reed-Solomon, NMT commitment, fraud proofs, DAS
temporal edge decay, pruning protocol, storage reclamation
storage tiered storage model, private record lifecycle

explanations

document question
architecture-overview one polynomial, one root — the full architecture at a glance
why-polynomial-state why polynomial > hash trees: 33x fewer constraints, 5 TB eliminated
polynomial-privacy the privacy boundary: commitment and nullifier polynomials
why-signal-first state is derived from signals: fold(genesis, signals[0..h])
nmt NMT's surviving role: cold storage optimization, not authentication
signal-sync why signal DAG, VDF in the age of agents, structural BFT elimination
foculus-vs-crdt why π convergence replaces CRDTs at global scale
data-availability algebraic DAS, erasure coding, and provable availability

open design

proposal status topic
valence implemented ternary epistemic field in cyberlink 7-tuple
storage-proofs draft proving data retention at all storage tiers

the stack

repo role github
nebu field arithmetic nebu
hemera hash function hemera
nox virtual machine nox
zheng proof system zheng
mudra communication primitives mudra
trident language compiler trident

license

Cyber License: Don't trust. Don't fear. Don't beg.

Dimensions

cyber/research/bbg
BBG: polynomial authenticated state abstract BBG (Big Badass Graph) is the authenticated state layer for cyber. the entire cybergraph — particles, axons, neurons, tokens, temporal state, private records — commits to a single polynomial: $$\text{BBG\_root} = \text{Lens.commit}(\text{BBG\_poly})$$ 32…

Pages in this namespace

Local Graph