UML Use Case Diagram
Last updated
Last updated
The TACo protocol enables secure, conditional access to encrypted data across a decentralized network. This document outlines the primary actors in the TACo ecosystem and their key interactions with the protocol.
The TACo protocol facilitates interactions between four main actors:
The adopting developer integrates TACo into their application and becomes the cohortAuthority
, responsible for:
Initiating and managing the Distributed Key Generation (DKG) process
Setting network parameters for their application's cohort
Managing cohort composition and rotation policies
Transferring cohort authority (optionally) to a multisig or DAO for decentralized governance
Data producers are users or systems that want to share encrypted data with conditional access:
Encrypt content using the public key generated by the DKG
Specify access conditions that must be met before content can be decrypted
Create logical combinations of conditions (AND, OR, NOT) for complex access patterns
Distribute the encrypted content via channels outside the TACo protocol
Data consumers are users or systems that request access to encrypted content:
Request decryption services from the TACo network
Present authentication and verification materials to prove they meet access conditions
Receive decryption fragments from nodes when conditions are met
Combine fragments locally to decrypt content
Node operators are entities that run TACo nodes in the network:
Participate in DKG rituals to generate and manage key material
Verify access conditions when decryption is requested
Provide decryption fragments to qualified data consumers
Stake tokens to secure network participation
The DKG process is the foundation of the TACo protocol:
The adopting developer initiates the DKG ritual
A cohort of nodes (30-100) is selected from the network
Nodes collaboratively generate a unified public key and distribute private key fragments
The public key becomes available for data encryption
Data producers use TACo to create encrypted content with programmable access control:
The data producer retrieves the public key for their target application
They define access conditions that must be met for decryption
They encrypt their content locally using the public key
The conditions are embedded with the encrypted content
The encrypted package is distributed to potential consumers
Data consumers request access to encrypted content:
The consumer requests decryption from the TACo network
They provide authentication and condition-fulfillment proofs
Network nodes independently verify the consumer meets all conditions
Qualifying consumers receive decryption fragments from nodes
Once a threshold of fragments is received, the content can be decrypted locally
The TACo protocol includes mechanisms for managing node participation:
The cohortAuthority establishes cohort parameters
Node operators stake tokens to participate in the network
The cohortAuthority can define rotation policies for cohort membership
Cohort composition may change over time according to predefined rules
For a detailed explanation of how these use cases are implemented in the protocol's operations, see the document.