White Paper V2.0
White Paper V2.0
White Paper V2.0
White Paper
As the digital world continues to expand at an unprecedented rate, the need for a blockchain
solution that is secure, scalable, and accessible becomes increasingly apparent. The Savitri
project represents a bold stride towards meeting this need, offering a beacon of hope for a
future where blockchain technology fulfills its revolutionary potential. By championing
innovation, collaboration, and inclusivity, Savitri is not just a blockchain project but a
movement towards a more secure, decentralized, and equitable digital future.
5. Transactions...................................................................................... 25
Glossary ................................................................................................... 48
References ............................................................................................... 51
However, the path to widespread adoption is not without obstacles. Issues such as scalability,
security, and user accessibility continue to hamper the full potential of blockchain technologies.
Additionally, the environmental impact of certain consensus mechanisms, like Proof of Work,
has raised significant concerns.
In this dynamic market, Savitri positions itself as a game-changer. By addressing these
challenges head-on with its innovative Proof of Unity (PoU) consensus mechanism, Savitri offers
a more secure, scalable, and environmentally friendly blockchain solution. With its focus on
accessibility and integration into everyday life, Savitri is poised to drive blockchain technology
beyond its current financial applications, making it a foundational element for a wide range of
digital solutions.an inclusive community through active engagement on social media, forums,
and blockchain events. Offering incentives for community contributions, such as development,
testing, and content creation, can further encourage participation..
• Security: While decentralized blockchains are generally secure, they are not
immune to attacks. For instance, a 51% attack, where a single entity gains control
of the majority of the network's mining power, can threaten the network's integrity.
There's also the risk of smart contract vulnerabilities.
• Interoperability: Many blockchain networks operate in silos and lack the ability to
communicate with one another. This limits the potential for widespread adoption
of blockchain technology, as seamless interaction between different blockchains is
crucial for many applications.
Savitri tackles key challenges facing today's blockchain technology with innovative
solutions. Central to its strategy is the Proof of Unity (PoU) consensus mechanism, designed to
combat the trend towards centralization by fairly distributing authority across all nodes,
enhancing network security and promoting inclusive governance. By optimizing transaction
processing. Savitri addresses scalability and transaction cost issues, enabling faster speeds and
lower costs without compromising on security or decentralization. The project also focuses on
making blockchain technology more accessible and user-friendly, through initiatives like the
Savitri Foundation, which provides educational resources and intuitive tools to broaden user
adoption.
3. Why Savitri
Savitri stands as a beacon in the blockchain technology landscape, promising a revolution
in the world of decentralized networks. This white paper highlights why Savitri is the
cornerstone choice for developers, investors, and users seeking innovative, secure, and
democratic solutions in the realm of cryptocurrencies and blockchain technology. Savitri is
more than a blockchain; it's a movement towards a decentralized digital revolution, inviting
developers, entrepreneurs, and visionaries to contribute to shaping a future where technology
enhances freedom, security, and community. Through collaborative effort and innovative
solutions, Savitri aims to redefine the landscape of blockchain technology, making it a tool for
positive change in the digital age.
In conclusion, Savitri represents not just a response to the current challenges of blockchain
technologies but also a bridge to a future where blockchain and cryptocurrencies play a central
role in technological innovation, digital security, and global economic empowerment. Choosing
Savitri means embracing a vision of the future where blockchain technology serves humanity,
making the digital world a safer, fairer, and more inclusive place.
4. System architecture
4.1. Network Layer
The Savitri blockchain operates through a network of interconnected nodes, including the
Savitri-node and masternode. This software is versatile, functioning as a core block producer, a
relay, or a local access point to the network. The node is comprised of various interconnected
components, ensuring seamless operation and connectivity within the Savitri ecosystem.
• The settlement layer: The settlement layer is primarily concerned with the ownership
and transfer of assets over the blockchain. It’s where are defined the rules of Savitri
• The data layer: in a blockchain refers to the foundational level that handles how data
is structured and stored across the network. It’s one of several layers that make up
the architecture of blockchain technology, each with its own distinct functions and
responsibilities.
• The consensus layer: in a blockchain is crucial for ensuring that all participants in the
network agree on a single, truthful version of the ledger without the need for a
central authority. It’s what makes Savitri technology so revolutionary for creating
trust in a decentralized system.
In the dynamic landscape of the Savitri blockchain ecosystem, a node represents a fundamental
building block, serving as the backbone of the network's decentralized architecture. Nodes are
individual computers or servers that connect to the Savitri blockchain network, playing a crucial
role in maintaining the network's integrity, security, and accessibility. Each node possesses a
complete or partial copy of the blockchain, ensuring redundancy and resilience against data
loss or manipulation.
Operating a node on the Savitri blockchain is both a privilege and a responsibility, allowing
participants to contribute directly to the network's operation. It represents a commitment to
the principles of decentralization, transparency, and security that are foundational to
blockchain technology. Node operators, through their dedication and collective effort, enable
the Savitri blockchain to function as a secure, scalable, and decentralized platform, ready to
support a wide array of applications and innovations.
Masternode:
Within the Savitri blockchain ecosystem, a Masternode is a key infrastructure component that
plays a crucial role in enhancing network functionality, security, and governance. Unlike
standard nodes that primarily support basic transaction verification and block propagation,
Masternodes are empowered with additional responsibilities and capabilities, making them
pivotal to the network's overall performance and resilience.
Masternodes are highly trusted and resource-committed nodes that require a significant stake
in the network's native token to operate. This staking mechanism serves a dual purpose: it
incentivizes the provision of high-quality services by the Masternode operators and secures the
network against malicious actors. The elevated requirements and responsibilities of
Masternodes ensure that only dedicated and invested participants contribute to critical
network operations.
Proof of unity
Proof of Unity (PoU) is an innovative consensus mechanism employed in the Savitri blockchain,
designed to tackle the challenges of security and centralization plaguing traditional blockchain
networks. Unlike competitive models like Proof of Work (PoW) or Proof of Stake (PoS), PoU
fosters a collaborative environment where network nodes work together to ensure security,
streamline operations, and minimize environmental impact.
The mechanism is based on the equitable distribution of authority and participation across all
nodes, democratizing access and governance of the network. This approach not only speeds up
transaction processing and reduces associated costs but also encourages broader participation
in the network, ensuring it remains open and accessible to everyone.
PoU is crucial for achieving true decentralization, addressing the issue of power concentration
in the hands of a few entities or individuals that could compromise network security. Moreover,
PoU's design aims at a balance between energy efficiency and performance, positioning Savitri
as an eco-sustainable blockchain solution.
Block:
The structure of a block in Savitri is meticulously designed to ensure the integrity, security, and
traceability of data. It comprises the block header, which includes essential metadata such as
the cryptographic hash of the previous block, a timestamp, and the block's own hash value.
This ensures each block is uniquely identifiable and securely anchored within the blockchain's
history, preventing unauthorized alterations.
Moreover, blocks in Savitri are created through a consensus mechanism known as Proof of
Unity (PoU), which emphasizes collaboration over competition among network participants.
This innovative approach not only enhances the efficiency and scalability of transaction
processing but also significantly reduces the environmental impact associated with traditional
blockchain consensus models.
In essence, a block within the Savitri blockchain is more than just a data container; it is a
cornerstone of digital trust, enabling transparent, secure, and decentralized transactions across
the network. This design facilitates a wide range of applications, from financial transactions to
complex smart contracts, making Savitri a versatile platform for the next generation of
blockchain technology.
Monolith Block
In the Savitri blockchain ecosystem, the Monolith Block stands as a pioneering architectural
element designed to streamline network efficiency and accessibility. Unlike traditional blocks
that contain transactional data or smart contract executions, the Monolith Block serves a
specialized function by encapsulating a comprehensive snapshot of the network's state at
regular intervals. This includes an updated registry of active nodes and masternodes, ensuring
that participants have immediate access to the most current network configuration.
Created daily, the Monolith Block facilitates a seamless entry for new nodes, enabling them to
quickly synchronize with the network's current state without the need to process the entirety
of the blockchain's history. This is particularly beneficial for maintaining high levels of network
scalability and performance, as it significantly reduces the bandwidth and storage requirements
for nodes joining the network.
The structure of the Monolith Block is meticulously engineered to include only the essential
information required for network synchronization, making it remarkably lightweight compared
to standard blocks. This design choice not only expedites the onboarding process for new nodes
but also minimizes the computational load on the network, contributing to the overall
sustainability and efficiency of the Savitri blockchain.
By incorporating the Monolith Block into its architecture, the Savitri blockchain addresses
common challenges associated with blockchain scalability and node synchronization. This
innovative approach underscores Savitri's commitment to fostering an accessible, efficient, and
scalable blockchain ecosystem, paving the way for a more inclusive and dynamic digital future.
• Enhancing Security: To safeguard against the theft of private keys and to prevent
attackers from compromising the network by taking control of a majority of nodes.
• Maintaining Network Integrity: To ensure that only productive nodes, or those not
exploiting the network in unforeseen ways, remain active and eligible for rewards.
• Regulating Node Participation: To manage how new nodes join the network and to
remove inactive or non-contributing nodes efficiently.
• Separating Private Keys: Unlike systems where block creation requires the node
operator’s private key to be on the node itself, potentially exposing it to theft or
attack, we keep the private key separate from the block creation process. This
minimizes the risk of key theft from online nodes, especially those hosted on virtual
private servers (VPS), where data center operators might otherwise access the keys.
• Removing Inactive Nodes: Through a scoring system, our Proof of Unity algorithm
identifies and removes nodes that are offline or not actively participating. Nodes with
a zero score are automatically ejected from the registry but can rejoin once they
become active again.
Field Description
The public key corresponds to the node’s configured private key. When blocks
or Proof of Unity messages are produced by a node, the signatures can be
Public Key validated against this key.
The account address of the node owner’s account. This account may legally
change or remove the node registration, and any participation rewards earned
Account Address by the node are credited to this account.
An amount of funds that the node’s owner has put up as collateral to compete
for a spot in the registry, and to incentivize her to maintain the security of her
Locked Balance node’s private key.
A score tracked for this node over time by the Proof of Unity algorithm. A higher
score increases the number of rewards received, while falling to zero will cause
Participation Score the node to be ejected from the registry.
Each node in the Savitri network maintains a private key to sign blocks, ensuring transactions
and messages are authentically from the node. This private key, ideally stored securely on the
node’s device, can also be managed through a separate hardware device for enhanced security.
This measure is crucial because if a node’s private key is compromised, it risks impersonation
and potential loss of locked funds by attackers.
To be part of the registry, a node owner locks a certain amount of Savitri tokens. These funds
are deducted from the owner’s account and held by the network as a security deposit. If a node
is removed or voluntarily exits the registry, these funds are fully returned. The size of the locked
balance plays a role in prioritizing the node’s position in the registration queue, serving as a
deterrent against Sybil attacks without relying solely on Proof of Stake principles.
Nodes awaiting registry entry are placed in a registration queue, ordered by the amount of
their locked funds. Admissions from the queue to the registry occur at regular intervals, with
the pace adjusted based on the registry’s size to maintain network security.
Registering a Node
Registration involves submitting a transaction with the node’s public key, a proof of ownership
(a special message signed by the node’s private key), and the locked fund amount. This
transaction, higher in fee to prevent abuse, locks the specified funds and adds the node to the
queue.
Claiming a Node
In case a node’s private key is lost or compromised, the node can be claimed to recover locked
funds, though this action removes the node from the registry. This mechanism aims to balance
security concerns, ensuring that while nodes are safeguarded against unauthorized control,
owners are incentivized to maintain strict security practices.
Nodes may be ejected from the registry if they become inactive but can re-enter the queue
without additional fees, provided they re-establish activity. This process ensures that only
actively participating nodes remain in the registry, supporting the network’s integrity.
Savitri simplifies this entire process, from registration to management and security of nodes,
ensuring that participants can easily maintain their nodes with minimal technical expertise.
Through the use of a user-friendly wallet application, node owners can effortlessly manage
their registrations and secure their contributions to the network’s Proof of Unity, a novel
approach replacing the traditional Proof of Participation to ensure a more unified and secure
network operation.
The masternode in the Savitri blockchain network plays a critical role by providing enhanced
capabilities beyond those of standard nodes. Its primary functions include storing the entire
blockchain history and creating what is referred to as a "monolith block." This special type of
block is designed to simplify access to the network for new nodes, which only need to download
the headers of the blocks to verify transactions. Initially, the functionality of masternodes to
Enhanced Capabilities: Masternodes are distinguished from standard nodes by their ability to
perform additional tasks that are crucial for the network's functionality:
• Creation of Monolith Blocks: Masternodes generate a daily 'monolith block' that acts
as a comprehensive ledger, listing all network participants, including nodes and
Masternodes. This feature significantly enhances the functionality of Masternodes
within the Savitri ecosystem.
In summary, Masternodes are integral to the functionality, security, and efficiency of the Savitri
blockchain network, offering advanced features that support the overall stability and integrity
of the digital ecosystem.
Proof of Unity (PoU) represents an innovative concept in the blockchain world, aiming to
optimize the transmission of data such as blocks and transactions through a peer-to-peer (P2P)
system among nodes. This method stands out for its ability to facilitate timely communication
between numerous nodes without the need for a central tracking entity. Instead, it uses a
temporary ledger present in each node to track transactions automatically and randomly upon
their reception.
Our goal with this method is to improve network reliability by encouraging the constant
availability of nodes; we wanted to change the paradigm from a system in which nodes
compete to a new system in which nodes cooperate, the scope is to create a distribute network
where the responsibility of maintaining the blockchain’s history more broadly across various
participants, and to fairly reward all contributing nodes. Furthermore, this strategy incentivizes
the network’s registered nodes to self-organize into an efficient structure, reducing the path
In the Proof of Uunity (PoU) framework, whenever a node receives a transaction, it starts a
communication procedure with other nodes, which are randomly chosen from its internal list.
This process involves forwarding the transaction to a selected node and then awaiting a
confirmation response. This confirmation is provided in the form of a receipt, which not only
acknowledges that the transaction was received but also provides a score that indicates the
success level of the transaction transmission. If the transaction is not approved, the receipt will
serve as evidence of this rejection.
To ensure the system’s integrity, nodes are required to regularly publish “commitments”
documenting their transmission activity. This ensures that transmission records are pre-existing
and cannot be fabricated on the spot. When a sample of past transmission activity is requested,
the node must demonstrate that such records were included in the commitments already
published on the blockchain, making it impossible to create them retroactively.
Every transmission within the Savitri network generates a digital receipt, signed by the
recipient, uniquely identifying the participants and the moment of transmission. These receipts
include a commitment in the form of a Merkle root, which in turn aggregates other receipts
previously collected. The inclusion of these receipts in a block allows for an objective validation
of the node’s transmission activity, influencing its participation score.
The system imposes an age filter on receipts, determining their expiration after a certain
number of blocks to emphasize recent network activity. This expiration time varies based on
the number of active nodes, adjusting to the average time between block creations.
Furthermore, the Savitri network periodically updates its topology to determine from which
peers a node can receive and publish receipts, ensuring an equitable distribution of
participation opportunities among all nodes.
In the Savitri network, when one node sends data like a transaction or block to another, the
receiver, upon verifying the data, generates a receipt to acknowledge the transfer. This process
is done even if the data was previously received from a different source, provided it is valid.
• Generating Receipts: After receiving and validating data, the receiving node creates a receipt.
This receipt includes:
The receiver adds a Merkle root from its batch table to the receipt. While other nodes can’t
directly check this, it’s crucial for the receiver to accurately include this for future validations of
data transmissions.
The receiver signs the receipt with its private key to certify its creation and sends it back to the
sender. If a node consistently fails to return valid receipts, it risks being blacklisted.
Organizing Receipts:
When nodes send data, they collect receipts from those who receive them. These receipts are
grouped into batches and each batch has a Merkle root representing the combined evidence
of those transactions.
Batch limits:
There is a limit to the number of receipts that can be included in a single Merkle root,
encouraging nodes to discard receipts that will not be useful for future proofs, such as those
that do not align with peer filters.
Scoring: In Proof of Unity, scoring is the key aspect of block allocation, this together with the
lottery will incentivise teamwork. The score is calculated according to several parameters some
examples are:
Receipts are stored in memory until the node is ready to finalise a batch. The node calculates
the Merkle root for the batch and stores this information in the database, linking it to the block
height in which it was created. Each receipt within the batch is also saved, labelled with the
Merkle root of the batch and its sequence number in the batch.
This method allows nodes to keep track of their interactions within the network, preparing
them to prove their active participation and support the network’s Proof of Unity. This process
ensures a transparent and accountable network, promoting efficiency and integrity in data
propagation.
In the Savitri network, nodes share data as transactions or blocks and confirm these
transmissions through receiving objects. This is how the process is simplified and made secure:
Receipt production:
When one node sends data to another, the recipient, after confirming its validity, generates a
receipt. This receipt includes details such as the public keys of the sender and receiver, the data
type, the hash of the data, the height of the reference block and the hash of that block. It also
contains a Merkle root related to the data batch, which helps in subsequent validations.
Receipt Management:
Receipts expire after a certain period, depending on the block height indicated within them.
Nodes periodically remove these expired receipts to maintain a lean and efficient database,
ensuring that the system’s memory footprint remains constant.
4.2.4. Block
In contrast to centralized systems where client requests are processed in a sequential manner,
decentralized systems, like peer-to-peer networks, allow users to submit data through any
node, leading to transactions being received in varying orders by different nodes.
Blockchain technology addresses the challenge of establishing a consistent order for all
transactions disseminated across the network. Through a pseudo-random selection process,
nodes are tasked with adding groups of transactions, known as blocks, to the collective
transaction history of the network. Each block, containing transactions and additional data, is
securely linked to the preceding block using cryptographic hashes in its metadata, forming a
chain — hence the term “blockchain.” This linkage means altering any block’s data would
necessitate the reconstruction of all following blocks, ensuring the integrity of the transaction
history.
Structure of a block
Unlike centralized systems where tasks are done one by one, decentralized systems, such as
peer-to-peer networks, let users send information through any of the system’s parts. This
means that transactions can arrive in different orders at different places.
Blockchain technology solves the problem of how to put all these transactions in a specific order
across the whole network. It does this by selecting nodes in a sort of random way to group
transactions into blocks. These blocks, which hold transactions and some extra information, are
In the context of the Savitri blockchain, the process of block creation and its protection from
undue modification are key aspects in ensuring the security and integrity of the network. The
creation of a block in a blockchain is an operation that, if not properly controlled, could leave
room for manipulation by block creators, thus compromising the entire system.
The hash function plays a crucial role in block creation, producing a unique hash value from a
set of input data. This function is designed to generate output that appears as uniformly
distributed random numbers, independent of the input data. Although a block hash may seem
like a good source of entropy, i.e. randomness, exploiting it in such a way can be dangerous. An
attacker, having the possibility of altering certain elements of the block such as transaction
order, timestamp or other data, could repeatedly attempt to modify the block until a
‘favourable’ hash is obtained that would allow him to manipulate the blockchain.
The Savitri blockchain incorporates a unique feature known as monolith blocks, designed to
streamline the process of accessing the blockchain’s history. These special blocks are created
once daily and are linked sequentially to the previous monolith block, forming a chain that
allows nodes to leapfrog over regular blocks from the genesis block to the current moment.
This system facilitates rapid access to any point in the blockchain’s history, making it a
lightweight and efficient way to maintain an updated ledger of node registry changes.
Monolith blocks are generated on average once a day and primarily record significant updates
to the node registry, such as the addition or departure of nodes, along with other metadata.
Importantly, they do not contain transaction data, resulting in a very light set of blocks for
download. This design ensures that a node needs to download only a minimal amount of data
for each day of the blockchain’s existence, providing an always up-to-date list of nodes in the
registry at any historical moment. Consequently, this allows nodes to verify if the next monolith
block was created by a legitimate node and make informed decisions in the event of a fork.
The initial step for a new node involves downloading all monolith blocks from the genesis block,
choosing the set of blocks with the highest cumulative difficulty in the event of a fork, until it
reaches the latest available monolith block. The node then uses the hash of the most recent
blockchain snapshot found in a spine block to identify and download a snapshot of the
blockchain from network peers. This process enables a new node to quickly update itself with
the blockchain’s current state within minutes, significantly reducing the time and resources
needed to become a fully participating member of the network.
This innovative approach to blockchain architecture not only enhances the efficiency of
accessing historical data but also simplifies the process for new nodes to join and synchronize
with the network, ensuring the Savitri network remains robust, secure, and accessible.
new_block_seedH=hash(creator_signatureH(hash(block_fingeprintH-1+block_metadataH)))
Where:
– creator_signatureH is the digital signature of the creator of the current block, applied to the
combination of the hash of the previous block’s seed and the current block’s metadata.
– block_metadataH includes additional data of the current block, such as the block number,
timestamp, and hash of the current block’s header, thus increasing the entropy of the seed.
Process Description
Data Combination: Instead of directly signing the seed hash of the previous block,
the block creator combines this hash with the metadata of the current block. This
step introduces an additional layer of unique data that makes the seed more
unpredictabApplication of the
Digital Signature: The block creator applies its digital signature to the combination
of the seed hash of the previous block and the metadata of the current block,
ensuring that the seed cannot be generated without the creator’s private key.
Calculation of the Final Hash: Finally, the hash of the signature result provides the
new seed of the block. This step ensures that the final seed is a fixed hash value
Savitri adopts the Ed25519 digital signature algorithm for creating block seeds, known for its
efficiency and security. A key advantage of Ed25519 is that there is only one possible signature
per message and per private key. This eliminates the possibility for the block creator to choose
between several potential signatures, forcing him to accept the block seed generated by the
protocol without the possibility of alteration.
Block creation:
Within the context of “node registration,” where the complete set of potential block creators
is known, Savitri employs a method that, following each block, pseudo-randomly generates a
priority-ordered list of nodes tasked with creating the next block. If a node fails to produce a
block when it’s their turn (due to being offline, network issues, or voluntary omission), its
participation score is decreased. In such cases, the network waits for a block from the next
node in the randomly ordered list.
To make the block creator selection process more resilient and distributed, an algorithm based
on “weighted voting” and “commitment” concepts could be considered. In this scenario, every
node in the network can participate in the selection of the block creator through a voting
mechanism that accounts for not only the presence of the node but also its reliability and
contribution to the network.
Algorithm Definition:
Commitment Weight Calculation (CWC): Each node commits a certain amount of resources
(e.g., computing power, storage, bandwidth) for a specified period. This commitment is
measurable and is used to calculate a “Commitment Weight” for each node.
NodeWeight = f(resourceCommitment)
Weighted Voting: When it’s time to select the block creator, every node participates in a voting
process. The vote of each node is weighted based on its Commitment Weight, with nodes that
have committed more resources having more weight in the decision.
A unique hash value for the last confirmed block is calculated, serving as the seed for
the pseudo-random selection.
Using the seed, the block creator is selected based on the weighted distribution of
votes.
Failure to Create Handling: If the selected node fails to create the block within a predetermined
time, its Commitment Weight is reduced, affecting its future selection capability. The selection
process is then repeated excluding the failed node.
This algorithm aims to incentivize nodes to maintain a high level of commitment and reliability,
as their ability to influence the block creator selection and earn rewards is directly proportional
to their commitment to the network.
When a transaction is first received from a peer or from a wallet software, the node will first
confirm that the transaction is legal. This includes validating that the transaction is closed by a
valid digital signature for its sending account address and that the parameters of the
transaction are valid according to the transaction type’s rules and the current state of the
database (such as having enough balance to send funds).
If the transaction received is valid, the node will propagate the transaction by transmitting it to
other connected peers, as well as store the transaction in its local mempool. In this way, valid
transactions are echoed across the peer-to-peer network until they are retained in the
mempool of the majority of nodes. Upon receiving a valid transaction, each node will also
return a special object we call a receipt to the sender. Receipts are used in the Proof of Unity
algorithm described below.
When a node receives and validates a new block (described in the section on “blocks” below),
it will contain an ordered list of zero or more transactions, which the node will then apply in
sequence.
For a node, applying a transaction means executing the rules associated with the transaction’s
type to update its local database from an old state to a new state. In the simplest example, this
can mean deducting the balance from one account and adding it to another.
When two parties must swap goods online, it is often useful to have a trusted third party keep
the goods in escrow, such that the swap is only executed when both parties have committed
their assets. Traditionally, this trusted third party holds both of the assets, and if they are not
in fact so trustworthy, they may abscond with both. Therefore, it is useful to have a system in
which the trusted third party may only approve or reject the transfers between parties, but in
no case becomes the owner of the assets.
To facilitate this use case, Savitri users may optionally include in the transaction the account
address of an approver, which may either accept or reject the application of the transaction.
Transactions which require approval are kept in an “escrowed” state by the blockchain, such
that the funds or other assets they confer ownership of cannot be used by either the sender or
• a custom timeout: the number of blocks until, or the date/time at which, the transaction is
automatically rejected (by default 1 day). The maximum timeout is 1 month;
• instructions for the approver: in binary or a JSON format if the approver is an application
on a server, or in a human language if the approver is a regular user of Savitri;
• the behavior for when the transaction timeout: automatically approve or reject.
In the case that the timeout is reached before the approver sends an approval or rejection, the
transaction is automatically approved or rejected and the commission is returned to the
sender.
In order to approve or reject an escrowed transaction, the specified approver must broadcast
an approval transaction, referencing the hash of the pending escrowed transaction and
specifying whether he approves or rejects it. While the approval transaction can be submitted
automatically by centralized services, when a user needs to manually submit the approval for
a transaction, the technical complexities are hidden by the wallet UI.
One use case of such an escrow mechanism would be to configure a centralized server which
manages an approver account and which is programmed to automatically approve transactions
only when certain conditions have been met. For example, an escrowed transaction may
specify that it should only be approved once 10 Ethereum have been transferred to a particular
ETH account and set the approver to be a server which will monitor the Ethereum network to
determine whether to release the funds.
Alternatively, any account may be configured to require explicit approval to accept any
transaction addressed to it. In this case, if an approver account is not specified, the recipient
account automatically becomes the approver. The rest of the mechanics defined above apply
in exactly the same way, with the receiver of the transaction functioning as the approver.
To achieve the current normal behavior of blockchain transactions, any transaction which does
not specify an approver account, and for which the receiver is not configured to require
approval to accept transactions, is applied immediately upon its acceptance in a block.
The owner of an account may at any time enable or disable this mandatory approval behavior
on the account by broadcasting the desired account property setting with a required approval
transaction and specifying whether mandatory approval is enabled (default is “no”).
Each Masternode receives a reward from the network for every block it stores. This allocation
is made randomly, but Masternodes with higher scores and longer network activity times are
Transactions that pay a fee higher than the minimum requirement are often processed more
quickly. This is particularly true during times of high network congestion, where the incentive
for faster processing increases with higher fees. Essentially, by offering to pay more than the
minimum fee, users can prioritize their transactions, allowing them to be confirmed more
swiftly in busy periods.
This fee structure serves multiple purposes: it helps regulate the flow of transactions through
the network, preventing spam and ensuring that resources are allocated efficiently. Moreover,
it provides a mechanism for users to expedite their transactions when needed, offering
flexibility and improved user experience in times of high demand.
Where:
This two-phase voting process ensures that votes are cast securely and anonymously in the
initial phase, with integrity verified in the subsequent phase. It’s designed to prevent
manipulation and ensure that each vote genuinely reflects the operator’s intentions regarding
the network fee scale adjustments.
RewardH=InitialReward−((InitialReward/TotalBlocksIn50Years)×H)
This formula demonstrates our commitment to a transparent and fair approach, where:
We employ a distinctive formula to calculate each node’s score for reward eligibility:
ScoreN=RandomFactor+[1/(1+ActivityLevelN)]
Nodes with the lowest scores are prioritized for rewards, ensuring a fair and inclusive system
that values contribution and participation equally.
The linear reward calculation ensures the minting of tokens is aligned with the target
supply, avoiding excess and promoting long-term sustainability.
Our selection mechanism for reward recipients is crafted to encourage consistent
participation while also drawing new nodes to the network, striking a perfect balance
between rewarding loyalty and fostering growth.
When managing valuable digital assets, it’s risky to rely on a single individual holding the
account key, as it might be lost or compromised. To enhance security, we use multi-signature
(multisig) features. This allows the creation of accounts that need a certain number of
signatures from a group to authorize transactions. For instance, in a group of 10 people, any 4
can sign to approve a transaction.
Nonce (“Access Code”): A unique number to differentiate multisig addresses with the same
participants.
Addresses: A list of account addresses authorized to sign, sorted alphabetically. These can also
be multisig addresses, allowing for a hierarchy.
Nodes manage multisig operations using three tables: multisig info, pending transactions, and
pending signatures. Transactions are executed once all necessary components are present and
valid, maintaining anonymity until execution.
This simplified approach ensures asset security and flexibility in transaction authorization,
catering to various operational needs while preserving privacy and integrity.
4. Functionality of the IoT-Connected Node: Ensure that the node connected to the IoT
service is capable of: a. Digitally signing data to maintain integrity. b. Associating data
with a wallet, a public key, and the address of the smart contract representing its
identity on the blockchain. c. Sending data to the blockchain through transactions. d.
Upon submission, the blockchain recognizes and validates the transaction.
This streamlined process provides a clear and straightforward guide for developers and
blockchain experts looking to integrate IoT devices with blockchain technology. By leveraging
Keycloak for authentication and implementing a custom IoT component, this approach ensures
secure and efficient data handling and submission to the blockchain.
Both strategies are designed to facilitate the integration of IoT devices into the Savitri Network,
ensuring the secure, direct, and efficient transfer of data to the blockchain. Developers and
blockchain experts involved in the Savitri Network can select the most appropriate solution
based on the specific requirements and constraints of their IoT devices and the overarching
network architecture.
The integration of IoT devices into the Savitri Network involves a series of steps designed to
ensure secure and efficient data transmission from the devices to the blockchain. Below is the
streamlined process:
This process ensures that data from IoT devices is securely integrated into the Savitri Network,
leveraging smart contracts for authentication and using JWT for secure data transmission. This
method not only enhances the security of the data transfer but also streamlines the process
for a seamless integration of IoT devices into the blockchain ecosystem.
7. Hydra Solution
In the dynamic world of blockchain, resilience and operational continuity are paramount. Savitri
is proud to present its latest innovation: Hydra technology. This cutting-edge solution is
designed to ensure that your business remains operational even during network disruptions,
providing unprecedented peace of mind in the blockchain sector.
These security measures are designed to protect the network while operating in a more
controlled mode, reducing the risks of harmful actions or destabilization during periods of
vulnerability.
The heart of this extraordinary resilience is the "monolith block." This critical component of
Hydra verifies the network's state over the past 24 hours and updates the information
accordingly once the network is stable again. This ensures that all operations are updated and
accurately reflect the transactions and activities performed during the disconnection period.
1. Enhanced Resilience: With Hydra, your network is never completely shut down, thus
ensuring critical continuity for business operations.
2. Strengthened Security: By limiting operations during malfunctions, Hydra protects
the network from potential threats or errors that could otherwise exploit such
moments of weakness.
3. Reliable Recovery: The monolith block ensures that no information is lost and that
the network can be quickly updated and synchronized once the connection is
restored.
The Hydra technology for blockchain operates as a resilience and recovery solution, designed
to maintain network functionality during disruptions or disconnections from the main network.
Here's a detailed breakdown of how Hydra works:
Hydra begins its process by monitoring the network continuously. It can detect when the main
blockchain network becomes unreachable or exhibits significant malfunctions. This could be
due to various reasons such as network outages, cyber-attacks, or hardware failures.
Upon detecting a disruption, Hydra automatically shifts the blockchain into a limited
functionality mode. In this state, the blockchain continues to operate but with certain
restrictions:
1. No new nodes or masternodes can be added: This precaution helps prevent potential
security risks or data inconsistencies during the disruption.
2. Transactions are confined to the local network: Only transactions between wallets
that are already part of the local blockchain network can be executed. This isolation
helps prevent unverified or potentially malicious external interactions.
A key component of Hydra technology is the 'monolith block'. This block acts as a
comprehensive snapshot of the blockchain's state at the time of the disruption, capturing all
relevant data and transactions up to that point. The monolith block:
1. Verifies the integrity of data: It ensures that all the information preserved is
accurate and unchanged from before the disruption.
3. Data synchronization: Hydra compares the current state of the local blockchain with
the monolith block and integrates any new transactions or changes that occurred
during the downtime.
4. Restoration of full functionality: New nodes and masternodes can be added again,
and transactions with external wallets are re-enabled, thus returning the blockchain
to its full operational capacity.
Even after normal operations resume, Hydra continues to monitor the network for any further
issues. It is designed to adapt to ongoing changes and can re-activate the limited functionality
mode if new disruptions occur, ensuring continuous protection and resilience.
Through this mechanism, Hydra ensures that the blockchain network remains operational,
secure, and capable of quick recovery, minimizing downtime and maintaining trust among
users.
In the rapidly evolving landscape of cryptocurrency investments, the need for robust risk
management tools has become increasingly apparent. The Crypto Default Swap (CDS) emerges
as an innovative financial instrument designed to protect the value of cryptocurrency assets.
This white paper section delves into the operational mechanics of the CDS, the problems it
addresses, and the benefits it offers to cryptocurrency investors.
The Crypto Default Swap functions as a protective mechanism for cryptocurrency holdings by
allowing investors to hedge against significant market downturns. It operates under a contract
basis where an investor can secure a single cryptocurrency with a CDS for a predetermined
period, typically not exceeding one week. Here’s how it functions:
1. Activation: Investors initiate a CDS by selecting their asset and specifying the
coverage amount within the predefined maximum and minimum limits.
2. Protection Period: During the selected timeframe, the CDS safeguards the investor
against value depreciation by locking in the value at the commencement of the
contract.
• If the value increases, the investor might need to adjust the stable coin amount or
convert it through SAVI coin to maintain coverage.
• If the value decreases, the CDS ensures the investor can retain asset value, allowing
for repurchase at a lower stable coin amount or conversion through SAVI coin.
Contract Conclusion: At the end of the CDS term, assets are either returned to the investor’s
wallet following the successful completion of all contractual obligations or held until all dues
are cleared.
• Market Volatility: By locking in the value of cryptocurrencies, the CDS mitigates risks
associated with the high volatility of crypto markets.
• Liquidity Assurance: The mechanism ensures that investors can exit their positions
without having to liquidate at unfavorable market prices.
• Risk Reduction: The primary benefit is the significant reduction of risk associated
with cryptocurrency investments.
• Value Stabilization: Investors can stabilize the value of their holdings, providing
peace of mind regardless of market conditions.
• Flexible Investment Strategies: With the protection of a CDS, investors can pursue
more aggressive investment strategies, knowing their downside is protected.
Team 5% 100,000,000
Marketing 5% 100,000,000
1400
1200
1000
787 824
713 730 746
800 692
600 471
400
200
0
2024 2025 2026 2027 2028 2029 2030 2074
Quantity Coin
This deliberate reduction of the available currency supply through the burning of transaction
fees serves multiple purposes. Firstly, it acts as an anti-inflationary measure, ensuring that the
value of the token remains stable or potentially increases over time by curtailing the total
supply. Secondly, it aligns the interests of the token holders and the network's overall health,
as reducing the supply tends to incentivize holding, contributing to a more robust and stable
economic ecosystem.
By integrating this token burning mechanism directly into the consensus process, Savitri
ensures that every transaction contributes to the long-term viability and value appreciation of
the network's currency. This innovative feature underscores Savitri's dedication to pioneering
economic models that promote scarcity, value preservation, and the long-term success of the
blockchain ecosystem.Market Strategy: Positioning Savitri for Global Success
Savitri's market strategy is crafted to secure a prominent place in the blockchain sector. It's not
just about launching a new technology but creating a movement that brings blockchain into
mainstream use. Here's how Savitri plans to execute this ambitious strategy:
• Partnerships with Educational Institutions: Collaborating with universities and tech schools
to integrate blockchain studies into their curriculum, emphasizing the innovative solutions
Savitri brings to real-world problems.
• Government and Regulatory Bodies Engagement: Working closely with government entities
to ensure compliance and explore opportunities for blockchain to enhance public services and
infrastructure.
• Community Building and Engagement: Leveraging platforms like Reddit, Twitter, and
Telegram to engage with the community, gather feedback, and foster a sense of ownership and
involvement among early adopters and enthusiasts.
• Success Stories and Use Cases: Showcasing real-world applications and successes of the
Savitri platform to illustrate its potential, encouraging adoption by demonstrating tangible
benefits and solved problems.
• Developer Grants and Incentives: Offering financial grants, resources, and support to
developers creating innovative applications on Savitri, aiming to lower barriers to entry
and encourage experimentation and development.
• User-Friendly Interfaces: Developing intuitive user interfaces for both developers and end-
users, making it simpler to interact with the blockchain, whether it's for building
applications or conducting transactions.
• Through these strategic pillars, Savitri aims not just to introduce a new blockchain solution
but to foster a thriving, global ecosystem that leverages blockchain technology for
innovation, efficiency, and problem-solving across industries. This detailed market
strategy is designed to ensure that Savitri becomes synonymous with accessible, scalable,
and sustainable blockchain technology.
• High transaction fees and slow processing times in current DeFi platforms due to network
congestion.
• Low Transaction Costs and High Speed: Utilizing Savitri’s Proof of Unity (PoU) consensus
mechanism ensures faster transaction processing with significantly lower fees, making
DeFi more accessible and economically viable for all users.
Execution:
• Develop a DeFi application on Savitri’s layer-1 blockchain that offers lending, borrowing,
and yield farming services.
• Lack of transparency and traceability in supply chains, leading to inefficiencies and fraud.
• Smart Contracts for Automation: Automate supply chain processes like payments and
verifications, reducing human error and increasing efficiency.
Execution:
• Partner with manufacturers and distributors to implement Savitri’s blockchain for real-
time tracking of product movements.
• Develop smart contracts that trigger automatic payments upon the fulfillment of specific
conditions, streamlining the supply chain.
• Security vulnerabilities in IoT devices lead to data breaches and unauthorized access.
• Difficulty in managing and authenticating vast numbers of devices within the IoT
ecosystem.
• Decentralized Security: By treating each IoT device as a network node, Savitri enhances
security through decentralized consensus, reducing single points of failure.
• Efficient Device Management: Savitri’s ability to integrate IoT devices directly with the
blockchain simplifies device management and authentication.
Execution:
• Implement a secure IoT platform on Savitri’s network, where each device is registered as
a unique node with specific access rights and functions.
• Provide a dashboard for users to monitor and manage their IoT devices, leveraging Savitri’s
secure and transparent ecosystem.
Scalability issues have long plagued existing blockchain networks, leading to increased transaction
costs and slower processing times. Savitri addresses these challenges head-on with PoU, which
eschews the competitive nature of traditional consensus mechanisms for a collaborative approach,
enabling faster transaction speeds and reduced costs. This paradigm shift not only enhances
network efficiency but also fosters a more inclusive blockchain ecosystem by ensuring that the
network remains open and accessible to all.
Security concerns, particularly the risk of centralized control and vulnerability to attacks, are also
significant hurdles. Savitri's distributed authority model, inherent in the PoU mechanism, equitably
distributes participation and governance across the network, thereby bolstering its security against
attacks and manipulation.
User accessibility and the integration of blockchain into daily life are at the core of Savitri's vision.
By simplifying the user interface and providing educational resources and development support
through the Savitri Foundation, the project aims to lower barriers to blockchain adoption. This
approach promises to extend the benefits of blockchain technology beyond financial transactions,
encompassing various applications that benefit from its principles of transparency and
immutability.
The results of implementing the Savitri project's solutions are manifold. Firstly, by solving scalability
and security issues, Savitri ensures that its blockchain can support a high volume of transactions
efficiently and securely, making it a viable platform for a wide range of applications. Secondly, the
project's commitment to sustainability resonates with a growing demand for environmentally
responsible technology solutions, potentially attracting a broader user base. Lastly, by focusing on
user accessibility and practical applications, Savitri has the potential to drive the widespread
adoption of blockchain technology, making it a staple in digital interactions across various sectors.
In conclusion, the Savitri project represents a comprehensive and forward-thinking response to the
challenges currently facing blockchain technology. Through its innovative consensus mechanism,
commitment to environmental sustainability, and focus on democratizing access, Savitri is not just
a blockchain project but a movement towards a decentralized, secure, and equitable digital future.
As the project moves forward, it invites collaboration and innovation, setting the stage for a new
chapter in the evolution of blockchain technology, where it becomes a central pillar in the digital
age, enhancing freedom, security, and community across the globe.
Q1-Q4 2023
• Test monolith block
Q1-Q2 2024
• Foundation opened
Q3-Q4 2024
• Mobile application development
• Launch pad
• Listings
Q1 2025
• Release open main net
Node: A computer, mobile, device or server that participates in the blockchain network,
maintaining a copy of the ledger and, in the case of Savitri, contributing to the consensus
process through the PoU mechanism.
Master Node: Nodes with advanced functionalities within the Savitri network, requiring a
significant stake of SAVI tokens to operate. Master Nodes perform critical roles, including the
creation of Monolith Blocks.
Monolith Block: A special type of block used in the Savitri blockchain to simplify network
entry for new nodes by providing a complete snapshot of the network's state.
Smart Contracts: Self-executing contracts with the terms of the agreement between buyer
and seller directly written into lines of code. They are executed automatically when predefined
conditions are met.
IoT (Internet of Things): The extension of Internet connectivity into physical devices,
vehicles, and other objects embedded with electronics, software, sensors to collect and
exchange data.
SAVI: The native token of the Savitri network, used for transactions, paying fees,
consensus rewards, and as a means of staking in Master Nodes.
Supply Chain Transparency: The complete and unobstructed visibility of all parts and
processes along the supply chain, from production to delivery, facilitated by blockchain
technology.
Hash Function: A function that converts an input (or 'message') into a fixed-length string
of bytes, typically a sequence of numbers and letters. Hash functions are a critical component
of blockchain technology to maintain data integrity.
Mining: The process through which transactions are verified and added to the public
blockchain ledger. In the context of blockchains like Bitcoin, mining also involves creating new
coins as a reward for the work done.
Peer-to-Peer (P2P) Network: A network of computers where all machines share and
access data without the need for a central server. Blockchains operate on P2P networks to
ensure decentralization and censorship resistance.
Public Key Cryptography: A form of cryptography that uses pairs of keys: a public one,
which can be shared freely, for encrypting messages, and a private one, for decrypting them. It
is fundamental to the security of blockchain transactions.
Token Burning: The process of permanently removing a number of tokens from the
available circulation, usually to manage inflation or increase the scarcity of a cryptocurrency.
Wallet: Software or hardware that allows users to store and manage their cryptographic
keys for cryptocurrencies, facilitating the sending and receiving of digital currencies.
51% Attack: An attack on a blockchain network where a single entity or a group of miners
controls more than 50% of the network's hashing power, allowing them to manipulate
transactions or rewrite parts of the blockchain.
Gas: A unit of measure indicating the computational cost necessary to perform operations
or transactions on the Ethereum network. Gas is used to allocate network resources and to
prevent spam or DDoS attacks.
[2] Buterin, V. (2013). "Ethereum White Paper: A Next Generation Smart Contract &
Decentralized Application Platform." [Online]. Available:
https://ethereum.org/en/whitepaper/. Accessed on [Date].
[3] Swan, M. (2015). "Blockchain: Blueprint for a New Economy." O'Reilly Media. ISBN: 978-
1491920497.
[4] Mougayar, W. (2016). "The Business Blockchain: Promise, Practice, and Application of the
Next Internet Technology." Wiley. ISBN: 978-1119300311.
[6] Tapscott, D., & Tapscott, A. (2016). "Blockchain Revolution: How the Technology Behind
Bitcoin and Other Cryptocurrencies is Changing the World." Penguin Books Ltd. ISBN: 978-
1101980132.
[7] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). "An Overview of Blockchain
Technology: Architecture, Consensus, and Future Trends." In Proceedings of the 2017 IEEE
6th International Congress on Big Data. [Online]. Available: DOI:
10.1109/BigDataCongress.2017.85.
[9] Casey, M. J., & Vigna, P. (2018). "The Truth Machine: The Blockchain and the Future of
Everything." St. Martin's Press. ISBN: 978-1250114570.
[10] Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). "Blockchain Technology:
Beyond Bitcoin." Applied Innovation Review, Issue 2. [Online]. Available:
https://sutardja.berkeley.edu/wp-content/uploads/2015/09/AIR-2016-Blockchain.pdf.
Accessed on [Date].
[11] Iansiti, M., & Lakhani, K. R. (2017). "The Truth About Blockchain." Harvard Business Review.
[Online]. Available: https://hbr.org/2017/01/the-truth-about-blockchain. Accessed on
[Date].
[12] Nakamoto, S. (2008). "Bitcoin: A Peer-to-Peer Electronic Cash System." [Online]. Available:
https://bitcoin.org/bitcoin.pdf. Accessed on [Date].
[13] Buterin, V. (2013). "Ethereum White Paper: A Next Generation Smart Contract &
Decentralized Application Platform." [Online]. Available:
https://ethereum.org/en/whitepaper/. Accessed on [Date].
[14] Swan, M. (2015). "Blockchain: Blueprint for a New Economy." O'Reilly Media. ISBN: 978-
1491920497.
[15] Mougayar, W. (2016). "The Business Blockchain: Promise, Practice, and Application of the
Next Internet Technology." Wiley. ISBN: 978-1119300311.
[18] Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). "An Overview of Blockchain
Technology: Architecture, Consensus, and Future Trends." In Proceedings of the 2017 IEEE
6th International Congress on Big Data. [Online]. Available: DOI:
10.1109/BigDataCongress.2017.85.
[20] Casey, M. J., & Vigna, P. (2018). "The Truth Machine: The Blockchain and the Future of
Everything." St. Martin's Press. ISBN: 978-1250114570.
[21] Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). "Blockchain Technology:
Beyond Bitcoin." Applied Innovation Review, Issue 2. [Online]. Available:
https://sutardja.berkeley.edu/wp-content/uploads/2015/09/AIR-2016-Blockchain.pdf.
[22] Iansiti, M., & Lakhani, K. R. (2017). "The Truth About Blockchain." Harvard Business Review.
[Online]. Available: https://hbr.org/2017/01/the-truth-about-blockchain.