INTRODUCTION
CHAIN
RESOURCES
INNOVATION
CONNECT

Sahyadri Documentation

Build on a rule-based protocol, not assumptions.

This documentation describes the Sahyadri protocol architecture, validation rules, node operation, and integration interfaces. All behavior described here is enforced at the protocol level.

Network
Consensus
Application PoW
State

Core Architecture

Sahyadri is composed of a deterministic consensus layer and an application-layer Proof-of-Work system. Consensus is responsible for ordering and finality. Proof-of-Work imposes economic cost on block proposal and transaction inclusion. Both layers operate independently but are cryptographically bound.

Deterministic Consensus
Application-layer PoW
State (UTXO)

Block Lifecycle

A transaction flows through local verification, global propagation, block proposal, proof computation, and deterministic finalization. Once finalized, a block is irreversible.

TX
Validation
Mempool
Template
PoW
Consensus
Finalized

Running a Node

Anyone can run a Sahyadri node without permission. Nodes verify transactions, validate blocks, and enforce protocol rules. Supported node types include full, pruned, archive, and light clients.

Transaction Model

Sahyadri uses a UTXO-based transaction model. Each transaction consumes previous outputs and creates new, independently spendable outputs. Ownership is proven by cryptographic signatures, not identity.

Proof-of-Work (Application Layer)

Proof-of-Work is applied at the application layer to enforce a real computational cost on block proposal. Work is cryptographically bound to transaction ordering and state commitment, preventing manipulation or precomputation.

Consensus & Finality

Sahyadri consensus provides deterministic finality. Once a block is accepted, it cannot be reorganized or reversed. Finality does not depend on accumulated confirmations.

Monetary Policy

Sahyadri enforces a fixed supply and deterministic issuance schedule. Block rewards follow a halving model defined at genesis. No governance process can modify supply or issuance.

Security Model

Security emerges from verifiable computation, deterministic finality, and economic incentives. Invalid blocks are rejected. Dishonest behavior results in wasted computation and zero reward.

Governance (Limited)

Governance cannot alter monetary rules or transaction history. It exists only to adjust a narrow set of non-monetary parameters within fixed bounds.

APIs & Integration

Sahyadri exposes interfaces for transaction submission, state queries, and block inspection. These APIs allow wallets, payment systems, and layer-2 protocols to integrate without trust assumptions.

Contributing

Sahyadri is open-source. Contributors are expected to follow protocol specifications and deterministic design principles.

Sahyadri does not ask you to trust the system. It allows you to verify it.