Why Replicated Consensus Fails on Non-Deterministic & Computationally Expensive Workloads
Standard blockchains require deterministic state transition functions (STFs). Non-deterministic computations yield divergent state roots, halting consensus. Computationally expensive STFs exceeding block times induce liveness failures.
Superposition of Execution Models via Decoupling Asynchronous Workloads from the Critical Path
Symphony keeps deterministic replication on the critical path while delegating expensive or non-deterministic execution to async enshrined nodes with proof-based settlement.
The Product Lattice: Introducing Dual Safety
Applications declare safety requirements as upsets across heterogeneous proof systems (TEE and ZKP).
Exploiting Structure and Symmetry: Special-Purpose ZK for LLMs
Symphony scales proof generation and verification by composing heterogeneous proof systems across architecture-specific boundaries in the transformer computational graph.
Exploiting Structure by Proxy of Tree Reduction for Aggregation
Unlike sequential aggregation, Symphony exploits sublinear tree reduction to recursively aggregate heterogeneous proofs and align proving workload with network topology.
Extended External Validity: Constraining the Proposer
Proposed blocks must satisfy an extended set of validation predicates to enforce protocol-level constraints at inclusion, exclusion, and ordering boundaries.
Protocol-Enforced Inclusion and Exclusion
User-Forced Inclusion (UFI) and Application-Ordered User-Forced Exclusion (AOUFE) provide programmable censorship-resistance and scheduled inclusion constraints. When predicates conflict, UFI supersedes AOUFE to preserve user-forced inclusion guarantees.
ACE: Application-Defined Ordering Constraints
Smart contracts can assert Application-Controlled Execution (ACE) predicates to enforce strict transaction sequencing and mitigate toxic Maximal Extractable Value (MEV) extraction.