DeepAI AI Chat
Log In Sign Up

Accumulate: An identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities

by   Kyle Michelson, et al.

The Accumulate Protocol ("Accumulate") is an identity-based, Delegated Proof of Stake (DPoS) blockchain designed to power the digital economy through interoperability with Layer-1 blockchains, integration with enterprise tech stacks, and interfacing with the World Wide Web. Accumulate bypasses the trilemma of security, scalability, and decentralization by implementing a chain-of-chains architecture in which digital identities with the ability to manage keys, tokens, data, and other identities are treated as their own independent blockchains. This architecture allows these identities, known as Accumulate Digital Identifiers (ADIs), to be processed and validated in parallel over the Accumulate network. Each ADI also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand the utility of multi-signature transactions. A two token system provides predictable costs for enterprise users, while anchoring all transactions to Layer-1 blockchains provides enterprise-grade security to everyone.


page 1

page 18

page 21


BlockChain I/O: Enabling Cross-Chain Commerce

By enabling users to safely transfer digital tokens without trusted inte...

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

In this paper we address the issue of identity and access control within...

Interchain Timestamping for Mesh Security

Fourteen years after the invention of Bitcoin, there has been a prolifer...

Blockchain Gateways, Bridges and Delegated Hash-Locks

In the current work we discuss the notion of gateways as a means for int...

Incentive-based integration of useful work into blockchains

Blockchains have recently gained popularity thanks to their ability to r...

Mining counterexamples for wide-signature algebras with an Isabelle server

We propose an approach for searching for counterexamples of statements a...

Confidential Token-Based License Management

In a global economy with many competitive participants, licensing and tr...