Authenticated State Architecture for nox
Version 2.0 — March 2026
"The network doesn't simulate thinking. The network IS thinking."
Abstract
The complete authenticated state architecture for nox — a planetary-scale collective intelligence system targeting 10^15 nodes with cryptographic proofs, privacy by construction, and bounded-locality updates.
Five ontological primitives (particle, cyberlink, neuron, token, focus) authenticated by five cryptographic data structures:
| Primitive | Role | Heritage |
|---|---|---|
| Namespaced Merkle Tree (NMT) | Graph completeness proofs | Celestia (2023—) |
| Merkle Mountain Range (MMR) | Append-only UTXO history | Grin, Neptune (2019—) |
| Sliding-Window Bloom Filter (SWBF) | Private double-spend prevention | Neptune (2024—) |
| WHIR Polynomial Commitments | Edge membership & batch proofs | WHIR (2025) |
| LogUp Lookup Arguments | Cross-index consistency | Polygon, Scroll (2023—) |
Unified by hemera-2 (32-byte output, 24 rounds, ~736 constraints/perm), Goldilocks field, and zheng-2 (1-5 KiB proofs, 10-50 μs verification, folding-first composition).
Three Laws
- Bounded Locality. No global recompute for local change. Every operation's cost proportional to what it touches.
- Constant-Cost Verification. Verification cost is O(1) — bounded by a constant independent of computation size. any computation produces a proof verifiable in 10-50 μs via zheng-2 folding. the verifier's work is independent of the prover's work.
- Structural Security. Guarantees from data structure invariants, not protocol correctness.
See design-principles for the full argument.
The Stack
STORAGE TIERS AUTHENTICATED STATE
───────────── ───────────────────
L1: Hot state (in-memory) NMT roots, aggregate data, mutator set state
32-byte roots, sub-millisecond
L2: Particle data (SSD) full particle/axon data, indexed by CID
content-addressed, milliseconds
L3: Content store (network) particle content (files), indexed by CID
DAS availability proofs, seconds
L4: Archival historical state snapshots, old proofs
DAS ensures availability during active window
PRIVACY MODEL
─────────────
PRIVATE (individual) PUBLIC (aggregate)
────────────────────────────────── ──────────────────────────────────
cyberlink 7-tuple (ν, p, q, τ, a, v, t)
who linked what axon H(p,q): aggregate weight A_{pq}
individual conviction, valence axon market state (s_YES, s_NO)
neuron linking history axon meta-score
market positions (TRUE/FALSE tokens) neuron: focus, karma, stake
UTXO values, owners particle: energy, π*
token: denominations, total supply
content: availability proofs
BBG ROOT — 13 SUB-ROOTS
────────────────────────
particles.root NMT (all particles: content + axons)
axons_out.root NMT by source (outgoing axon index)
axons_in.root NMT by target (incoming axon index)
neurons.root NMT (focus, karma, stake)
locations.root NMT (proof of location)
coins.root NMT (fungible token denominations)
cards.root NMT (names and knowledge assets)
files.root NMT (content availability, DAS)
cyberlinks.root MMR peaks hash (private record commitments)
spent.root MMR root (archived consumption proofs)
balance.root hemera-2 hash (active consumption bitmap)
time.root NMT (temporal index, 7 namespaces)
signals.root MMR (finalized signal batches)
Specification
The full specification is decomposed into focused reference documents:
| document | content |
|---|---|
| architecture | three laws, ontology, 13 sub-roots, privacy model, unified primitives |
| state | BBG root, state diagram, checkpoint, state transitions |
| privacy | mutator set (AOCL + SWBF), privacy boundary, record model, transfer circuit |
| cross-index | LogUp cross-index consistency, batch verification |
| sync | full/incremental namespace sync, light client protocol |
| data-availability | 2D Reed-Solomon, NMT commitment, fraud proofs, DAS |
| temporal | edge decay, pruning protocol, storage reclamation, renewal |
Explanations
| document | question |
|---|---|
| why-nmt | why NMTs cannot be replaced by sorted polynomial commitments |
| why-mutator-set | why mutator set over polynomial + nullifier |
| design-principles | the three laws explained in depth |
Open Design
| proposal | status | topic |
|---|---|---|
| valence | implemented | ternary epistemic field in cyberlink 7-tuple |
| storage-proofs | draft | proving data retention at all storage tiers |
Companion Systems
bbg is the authenticated state layer. it depends on and is used by:
| system | repo | role |
|---|---|---|
| nebu | ~/git/nebu/ | Goldilocks field arithmetic |
| hemera | ~/git/hemera/ | hash function (32-byte output, 24 rounds, x^{-1} S-box) |
| nox | ~/git/nox/ | VM (16 reduction patterns, CCS constraints) |
| zheng | ~/git/zheng/ | proof system (folding-first, algebraic opening, 1-5 KiB proofs) |
| mudra | ~/git/mudra/ | crypto primitives (signatures, key derivation) |
Key Numbers (hemera-2 + zheng-2)
hash output: 32 bytes (4 Goldilocks elements)
tree node: 64 bytes (2 × 32B children) → 1 permutation call
proof size: 1-5 KiB
verification: 10-50 μs
fold per block: ~30 field ops
private transfer: ~40,000 constraints, sub-second proving
cross-index (LogUp): ~500 constraints per edge (15× savings)
light client join: ONE zheng verification + namespace sync
purpose. link. energy.