The PoC consensus mechanism requires only a small amount of computing and IO resource consumption to maintain high security consensus, allowing most resources to be used for other meaningful work.
The EPoSt mechanism makes full use of the advantages of the hardware-based Trusted Execution Environments (TEEs). Compared to purely cryptographic ZKP-based methods, it is 100+ times faster in terms of verification speed.
Thanks to the efficient consensus mechanism, a significant number of devices at the network edge can participate in storage mining and provide trusted computing resources, giving full play to the advantages of decentralized network structure.
Local Trusted Environment
For the scenarios that do not make any change to the global consensus ledger, storage nodes can use their computing and bandwidth resources to provide trusted computing and network transmission services for users.
Proof-of-Capacity (PoC) and Efficient Proof-of-Spacetime (EPoSt) are used as the consensus mechanism. PoC can maintain high security consensus with a small energy consumption after the initial Seal operation.
EPoSt consumes only a few computing resources to verify the storage and takes full advantage of the chip’s hard-to-crack feature to provide security for the consensus process. It consists of two challenges: LivingPoSt and WinningPoSt. Storage nodes can obtain storage incentives by continuously completing challenges.
Sukhavati’s storage layer provides a medium to establish a decentralized data access gateway covering both Web3.0 and Web2.0 storage ecosystems, to connect various protocol islands, and to provide unified data storage, retrieval, and management services for Web3.0 applications.