About Diamante

Diamante is an open-source, decentralized, layer-1, peer-to-peer blockchain network offering a platform for developers to build applications, issue assets, and link to existing financial systems. It aims to empower creators, innovators, and developers to create interoperable projects.

This developer document guide will show you how to develop applications, issue and utilize tokens, perform Operations, establish on and off-ramps, set up a validator node, and more.

Core Concepts

Get a basic understanding of how the Diamante Cryptography and network works.

Diamante Cryptography Overview 

Cryptography is the backbone of the Diamante blockchain, ensuring secure transactions, data integrity, user privacy, and overall system trust. Diamante integrates cutting-edge cryptographic techniques to provide a decentralized and tamper-proof ledger. This section explores the cryptographic mechanisms employed and their significance in maintaining the blockchain's security and efficiency.

  1. Elliptic Curve Cryptography (ECC)
  2. Diamante leverages Elliptic Curve Cryptography (ECC), specifically the Elliptic Curve Digital Signature Algorithm (ECDSA), which is based on the secp256k1 curve. ECC provides high-security levels with smaller key sizes, making it faster and more efficient than traditional cryptographic systems like RSA.

    • Why ECC?
    • ECC ensures robust security while requiring less computational power, reducing the resource demands on network nodes. Its compact key sizes also allow for faster transaction validation and signature verification.

    • Key Pair Generation:
    • ECC relies on mathematical properties of elliptic curves to generate a secure public-private key pair:

      • Private Key: A randomly generated large number kept secret by the user.
      • Public Key: Derived from the private key using elliptic curve multiplication, it serves as the user’s unique identifier.
  3. Digital Signatures
  4. Digital signatures are fundamental to transaction security on Diamante. They authenticate transactions and prevent forgery, ensuring only authorized users can make changes to their accounts.

    • Process:
      • The user signs a transaction with their private key, creating a unique digital signature.
      • Nodes verify the transaction by checking the signature against the user’s public key.
      • If the signature matches, the transaction is considered valid.
    • Benefits:
      • Ensures non-repudiation: Users cannot deny signing a transaction.
      • Prevents tampering: Any modification to the transaction data invalidates the signature.
  5. Hash Functions
  6. Diamante uses cryptographic hash functions, such as SHA-256, to secure transaction data and maintain ledger integrity.

    • Properties of Hash Functions:
      • Deterministic: The same input always produces the same output.
      • Irreversible: It is computationally infeasible to derive the original input from the hash.
      • Collision-resistant: No two different inputs should produce the same hash.
    • Applications in Diamante:
      • Transaction Hashing: Ensures data integrity by detecting any changes to transaction details.
      • Block Hashing: Links blocks in the blockchain, forming an immutable chain. Each block contains the hash of the previous block, ensuring that altering one block invalidates the entire chain.
  7. Ledger Integrity
  8. The Diamante blockchain is designed to be an immutable ledger, with cryptography playing a critical role in achieving this:

    • Block Linking:
      • Each block references the hash of its predecessor, creating a secure chain of blocks.
      • Tampering with any block changes its hash, which propagates to subsequent blocks, alerting the network to inconsistencies.
    • Merkle Trees:
      • Transactions within a block are hashed and organized into a Merkle tree. This structure enables efficient and secure verification of transactions without downloading the entire blockchain.
  9. Public and Private Key Infrastructure
  10. Diamante employs a public-private key system to manage user identities and secure transactions.

    • Private Key:
      • A secret known only to the user, used to sign transactions.
      • If compromised, the security of the account is at risk.
    • Public Key:
      • A key derived from the private key and shared with the network.
      • Used by validators to verify transaction signatures and authenticate users.
    • Account Identification:
      • Public keys act as account addresses, enabling users to send and receive DIAM tokens securely.
  11. Consensus Security
  12. The Diamante Consensus Protocol (DCP) relies heavily on cryptographic primitives to secure communication between validator nodes. Each node uses digital signatures to validate messages, ensuring that only trusted participants influence the ledger’s state.

    • Quorum Sets and Cryptography:
      • Nodes form quorum sets, groups of trusted nodes. Cryptographic verification ensures that only authenticated nodes participate in consensus.
      • This reduces the risk of Sybil attacks and ensures the integrity of the consensus process.
  13. Secure Communication
  14. Diamante secures data transmission across the network using encryption protocols like TLS (Transport Layer Security). This ensures that communication between nodes and users is protected from eavesdropping and interception.

    • Key Features:
      • Encrypts data to prevent unauthorized access.
      • Authenticates the identity of participants to ensure trust.
  15. Protection Against Attacks
  16. Diamante’s cryptographic framework defends against various types of attacks:

    • Double-Spend Attacks:
      • Digital signatures ensure that each transaction is unique and cannot be duplicated.
      • Consensus mechanisms validate transactions to prevent double-spending.
    • Replay Attacks:
      • Transactions include unique sequence numbers, ensuring they cannot be resent maliciously.
    • Byzantine Attacks:
      • The Federated Byzantine Agreement (FBA) model, combined with cryptographic verification, ensures network security even if some nodes act maliciously.
    • Sybil Attacks:
      • Nodes rely on well-defined trust relationships, reducing the risk of fake identities overwhelming the network.

    The Diamante blockchain's cryptographic infrastructure ensures a secure, efficient, and trustworthy environment for decentralized operations. By combining ECC, digital signatures, hash functions, and robust consensus mechanisms, Diamante offers a platform that is not only secure against modern threats but also adaptable to future challenges. For developers and users alike, understanding these cryptographic foundations is key to leveraging the full potential of the network.

Diamante Stack

The Diamante stack is made up of the following components: the networks (Mainnet and Testnet), Diamante Core, Aurora API, and SDKs, each of which plays a specific part in providing financial infrastructure that is resilient to failures, available to anyone, and fast and cheap enough to serve real-world use cases.