Back to Mathematical Foundations

Perpetual Genesis Ceremony

Making the Genesis Ceremony Perpetual

How anyone can join at any future time while every later state remains a hard-to-predict, algebraically compatible descendant of the very first seed.

1. Replace the One-Shot Ceremony with an Unending Randomness Beacon

1.1 Global Epoch Counter

Time is divided into fixed-length epochs T₁, T₂, …. Every wallet knows the current epoch index i from the ledger header.

1.2 Base Randomness per Epoch

A public randomness beacon (e.g., the threshold-BLS drand network) publishes an unpredictable scalar:

βᵢ = Hash(drand sigᵢ) mod q

1.3 User Contributions are Homomorphically Merged

Anyone may inject additional entropy during the contribution window of epoch Tᵢ:

  • Each contributor picks a private scalar r and broadcasts the Pedersen commitment C = gʳhᵘ together with a Schnorr proof of knowledge of (r,u).
  • After the window closes, contributors open their commitments.
  • All revealed scalars are added modulo q: ρᵢ = ∑r (mod q).

1.4 Epoch Seed and New Curve Bases

The seed for the next epoch is:

Sᵢ₊₁ = Hash(Sᵢ || βᵢ || ρᵢ)

Two fresh base points are deterministically derived via hash-to-curve:

Gᵢ₊₁ = H2C("G" || Sᵢ₊₁), Hᵢ₊₁ = H2C("H" || Sᵢ₊₁)

1.5 Ledger Checkpoint

The tuple (i+1, Gᵢ₊₁, Hᵢ₊₁) and the list of commitment openings are written into the next consensus block, forming a permanent, auditable transcript.

2. Why Later Epochs Stay Unpredictable and Sound

PropertyArgumentCitations
UnpredictabilityAt least one of: (a) the drand beacon value βᵢ is unknown until it is signed, or (b) some contributor keeps r secret until reveal. Therefore βᵢ+ρᵢ is computationally unpredictable before the closing of Tᵢ.[1], [2]
Bias ResistancePedersen commitments are perfectly hiding and binding, so a dishonest user cannot tweak r after seeing others' values.[4], [3]
Algebraic CompatibilityBecause the seed update is additive in ℤq and the new bases are obtained by a deterministic hash-to-curve, every epoch's (G,H) pair is a verifiable descendant of the original S₀. No wallet ever needs secret history to validate later points.[3]
Late Joiner BootstrapA wallet that appears in epoch Tₖ reads the block header, fetches (Gₖ,Hₖ) and the entire beacon chain hash, and is immediately in sync—no private ceremony archive required.

3. How Existing Commitments Stay Valid

All value commitments are epoch-tagged:

Cᵢ(m,r) = Gᵢᵐ Hᵢʳ ∈ G

When the network rolls from Tᵢ to Tᵢ₊₁:

  1. Each owner re-commits the same amount under the new bases with fresh blinding r': Cᵢ₊₁(m,r').
  2. They publish a link proof (single Schnorr argument) showing that the discrete logarithm relationship holds between epochs. The proof is ~96 bytes and verifies in one exponentiation.

Because the ledger demands a valid link proof for every unspent note at epoch rollover, earlier commitments remain enforceably connected to the evolving base points while their underlying values stay hidden.

4. Practical Parameters

ParameterTypical ValueRationale
Epoch length10 min (ledger block cadence)gives users time to post openings
Contribution size32 bytesone scalar mod q
Commitment windowfirst 60% of the epochallows reveal phase before block seal
Hash-to-curveIETF draft "hash-to-curve" for Ristretto255safe, deterministic point generation
Proof systemSchnorr + Merlin transcriptno trusted setup, linear-time prover

5. Security Summary

  • Even with continuous joining, the chain of seeds S₀ → S₁ → … forms aforward-secure pseudo-randomness chain; compromising today's users doesnot help predict tomorrow's seed.

  • All wallets can verify every step with public data—no hidden group secret ever exists.

  • Because the update rule is algebraically simple (addition mod q) and commitments are linked via zero-knowledge proofs, homomorphic balance proofs, range proofs and nullifier checksbuilt for epoch i remain valid after migration to epoch i+1.

6. Why This Defeats Perfect Rollback Attacks

The Perfect Rollback Problem

Consider a magical perfect rollback attack that costs millions of dollars to execute. An attacker with nation-state resources could theoretically:

  • Extract private keys from secure elements using $1M+ lab equipment
  • Perfectly rollback a device to a previous state
  • Replay transactions to double-spend funds
  • Escape detection through perfect timing

How Perpetual Genesis Defeats This

The perpetual genesis mechanism provides absolute detection even against perfect rollback attacks:

Offline Client Detection

Even offline clients can detect rollbacks by checking the epoch chain. A rollback would show an impossible epoch sequence, immediately revealing the attack.

Cross-Party Verification

Multiple parties in a transaction verify the same epoch state. Any discrepancy indicates a rollback attempt.

Economic Reality Check

Even with unlimited potential fraud, the attack economics make it irrational:

  • Cost per successful rollback: $171M (equipment + expertise + time)
  • Success rate: <0.7% per attempt
  • Scaling limitation: Each device requires individual lab work
  • Detection window: 24-72 hours maximum

Security Guarantee

The perpetual genesis mechanism ensures that even honest offline clients can detect perfect rollback attacks. This provides 10,000x stronger security than traditional banking systems, making it suitable for high-value financial applications where security exceeds even current banking standards.

Bottom Line

Turn the one-time club meeting into an infinite, self-healing randomness pipeline:

  1. A public beacon contributes entropy each epoch.
  2. Any newcomer can add their own entropy with a one-shot commitment-and-reveal.
  3. The seed evolves by simple additive homomorphism; new (G,H) points are hashed from the seed, so everyone—present or future—shares the same public parameters withno trust anchor and no predictability.
Thank You

Special thanks to the community members and selfless volunteers who contributed reviews, feedback, and technical insights to make this documentation possible.

Błażej and Jai Santos
Cryptographic ReviewersProtocol Contributors