Protocol Flow
This document details the operational flow of the TACo protocol - how information and operations move through the system. For an overview of the actors involved and their roles, see the UML Use Case Diagram.
The TACo protocol operations follow several distinct but interconnected flows:
Distributed Key Generation (DKG)
Adopting developers (cohortAuthority) initiate and manage a one-time DKG initialization ritual at network setup
The initialization produces a unified public key and each node maintains its own private key fragment
The
cohortAuthority
manages parameters for the ritual and cohort compositionA minimum of one honest party is required during DKG to ensure the secret material is not spoofed
Encryption with defined Access-Conditions
Data producers use the public key generated by the DKG to encrypt their content locally
Each encrypted payload can be accompanied by specific access conditions, allowing different payloads to have different condition sets
Access conditions define who can access the encrypted data and when
The distribution of the encrypted content (ciphertext) falls outside TACo's scope
Decryption Services
Data consumers present encrypted content to nodes along with authentication
Nodes independently verify that the consumer meets the payload's access conditions
For each node that validates the conditions, a decryption fragment is provided to the consumer
Once a threshold of nodes have provided their fragments, the consumer can locally combine these fragments to decrypt the content
Cohort Management
Node participation is secured through economic staking in the TACo Nodes Network
Cohorts can rotate members according to predefined rules set by the
cohortAuthority
The rotation rules can be tailored to balance security, availability, and decentralization needs
For a more detailed explanation of the protocol operations, see How TACo Works.
Integration Points
The protocol flow integrates with various TACo components:
User applications interact with the TACo protocol through the Client SDK (taco-web)
Access Conditions enables the definition and validation of conditional access to the encrypted data
TACo Nodes Network provides the economic staking mechanism for node operators
Coordinator contract manages cohort formation and DKG rituals on-chain
For details on how these components relate to each other architecturally, see Protocol Architecture.
For conceptual explanations of the protocol's design principles, see How TACo Works.
Last updated