Validator Network
The Validator Network is a critical component of the Xylem Protocol that ensures transactions follow protocol rules without taking custody of users’ assets. Unlike other protocols that may use FROST DKG (Flexible Round-Optimized Schnorr Threshold Distributed Key Generation), Xylem employs a simpler yet robust approach.
How Our Validator Network Works
Instead of relying on FROST DKG, the Xylem validator network uses a simpler multi-signature approach with the following key features:
- Direct Multi-signature Validation: Each validator independently validates transaction requests against protocol rules
- No Shared Key Material: Validators maintain individual keys and do not participate in distributed key generation
- M-of-N Consensus: Transactions require signatures from a threshold of validators (e.g., 7-of-10) to be valid
- Individual Accountability: Each validator’s actions are attributable and auditable on-chain
Benefits of Our Approach
By not using FROST DKG, the Xylem validator network offers several advantages:
- Simplicity: Easier to implement, audit, and understand
- Reduced Complexity: No complex key generation ceremonies or specialized cryptography
- Direct Accountability: Clear attribution of validator actions
- Individual Key Management: Validators can employ their own security practices
- Dynamic Validator Rotation: Easier to add or remove validators through governance
Validator Selection
Validators are selected through a governance process by XYLEM token holders. The protocol uses the following criteria for validator selection:
- Technical reliability and uptime
- Geographic distribution
- Institutional diversity
- Security practices
- Reputation and track record
Security Model
The security of the validator network relies on:
- Threshold Security: Requiring M-of-N validators prevents a small number of malicious validators from compromising the system
- Economic Incentives: Validators are incentivized to follow protocol rules
- Transparent Verification: All validator actions can be independently verified on-chain
- Regular Rotation: The validator set is periodically reviewed and can be adjusted through governance
The validator network interacts with the Transaction Builder to process user requests for creating vaults, minting XYM, repaying debt, and other protocol functions in a secure and decentralized manner.