Technology
A clean-sheet redesign built on NIST-standardized Post-Quantum Cryptography, unified memory optimization, and mandatory privacy infrastructure.
Post-Quantum Primitives
The Po8 Network transitions from elliptic curve geometry to high-dimensional lattice geometry. Security relies on the Module-Learning With Errors (MLWE) problem—exponentially hard for both classical and quantum computers.
| Primitive | Algorithm | Security Level | Purpose |
|---|---|---|---|
| Key Encapsulation | ML-KEM-768 (Kyber) | NIST Level 3 (AES-192) | Encrypted node-to-node sessions, hybridized with X25519 |
| Digital Signature | ML-DSA-65 (Dilithium) | NIST Level 3 | Transactions, validator votes, governance actions |
| Fallback Root | SLH-DSA (SPHINCS+) | Hash-based | Governance escape hatch if lattices fall |
Hybrid Session Keys
K_session = HKDF(ECDH(X25519) || Decaps(Kyber)). Implicit rejection prevents timing leaks and blinds chosen-ciphertext probes. If either stack is compromised, the other maintains security.
Rust Implementation
The po8-core repository is engineered in Rust for memory safety and concurrency. Each crate maps to a specific responsibility.
po8-consensus
Forked CometBFT with ML-DSA verification paths. 60-second block time allows for Mixnet delay and cover traffic. Instant finality for DeFi composability.
po8-vm
revm-based EVM execution with the Quantum Abstraction Layer (QAL). Addresses derived from SHA3-256 of ML-DSA public keys, truncated to 20 bytes.
po8-crypto
FFI bindings to liboqs exposing Kyber/Dilithium operations. All polynomial operations stay in the NTT domain to prevent O(n²) DoS vectors.
tensor-miner
Apple Neural Engine client using MLX APIs. Generates and multiplies 8192×8192 INT8 matrices directly in unified memory.
Native Precompiles
Heavy PQC operations are exposed to the EVM runtime via precompiled contracts, allowing Solidity developers to treat post-quantum cryptography as first-class citizens.
0x20
ML_KEM_DECAPS
Enables on-chain key exchange between contracts or rollups.
0x21
ML_DSA_VERIFY
Validates lattice signatures from ERC-4337 smart accounts or bridges.
0x22
NTT_MUL
Accelerates polynomial multiplication for Halo2/zkRollup circuits.
Quantum Abstraction Layer
Smart Account Flow
- Addresses are SHA3-256 of ML-DSA public keys, truncated to 20 bytes
- Every user account is an ERC-4337 smart account with custom validateUserOp logic
- Bundlers verify ML-DSA signatures via precompiles before submitting to the EVM
- Dilithium signatures (~3.3 KB) are segregated SegWit-style to keep execution paths lean
Execution Flow
Inside the EVM, contracts receive familiar msg.sender values. Existing Solidity applications (Uniswap, Aave, etc.) deploy without code changes.
contract QuantumBridge {
function bridge() external {
IERC20(token).transferFrom(
msg.sender, vault, amount
);
}
}
TensorChain & InferNet
The Batch-1 Efficiency Gap
Industrial GPUs collapse in efficiency when forced to process single inference requests. Consumer NPUs are optimized for low-latency, single-batch inference—exactly the workload of TensorChain.
Massive overhead from kernel launches, PCIe synchronization, and static power draw.
Unified Memory Architecture allows direct access without copying. Optimized for latency.
Matrix Puzzle Mechanics
- Seed Derivation: Miner takes previous block hash and nonce to derive seed σ
- Matrix Generation: CSPRNG generates two matrices A and B, sized to target 75% of system RAM
- Compute: Calculate noisy product C' = (A+E)·(B+F) in INT8, saturating tensor cores
- Verification: Freivalds' algorithm verifies in O(n²) instead of O(n³)—instant verification of heavy NPU work
Usage-Based Dynamic Issuance
The economics layer closes the loop around the hardware. A PID-style controller adjusts issuance based on how much NPU compute and bandwidth users actually buy, turning PO8 into a resource credit rather than a purely speculative asset.
e(t) = U_target − U_actual, where utilization measures purchased TensorChain, InferNet, and Mixnet capacity.
Issuance Channel
- I_base guarantees validator liveness and a baseline of Mixnet cover traffic
- When utilization is low, issuance temporarily increases to keep edge hardware online
- When utilization is high, issuance decays and miners are paid primarily from fees
Burn & Saturation
- Base ledger fees are fully burned to price PQC-heavy block space
- Protocol takes on inference and transport fees are partially burned
- Stake saturation caps rewards per validator, forcing large holders to back many physical nodes
