Objects, Accounts, and Stores
Condensation is a complete data system. It can
- store and retrieve data like a database or a file system,
- send data to other users or devices like messengers,
- and share and synchronize data like cloud services.
Condensation thereby follows a distributed actor-message-passing approach, and encrypts all data end-to-end.
With Condensation, data is stored as trees of objects. An object consists of a list of hashes pointing to other objects, and a sequence of bytes:
H denotes the number of hashes preceding the data. The data part often holds a record, and is usually encrypted.
Objects are identified by their SHA-256 hash (32 bytes):
Objects are inherently immutable. Changing an object's content yields a different hash, and therefore makes it a different object.
Through the hash list, an object may span a tree:
Trees can be arbitrarily large, and may form blockchains, binary search trees, or other data structures.
Naturally, the object hash also serves as identifier for the tree it spans.
Since trees are immutable, they cannot be modified directly. To modify data, a new tree is derived from the current tree:
If the tree is structured wisely, a large part of the old tree's data can be reused in the new tree. This yields efficient data modification, and efficient versioning.
Several modifications can be applied at the same time, leading to the equivalent of a database transaction.
Remembering a tree hash is enough to refer to an arbitrary amount of data. Hence – besides storing objects – an actor (user) just needs to manage a few hashes to store, publish, and share data. For that, each actor owns an account with three boxes. Each box keeps a set of hashes:
- The public box points to the actor's public information. It should contain a single hash.
- The private box points to the actor's private data, and should contain a single hash as well.
- The in-queue box collects messages sent by other actors, and may contain an arbitrary number of hashes.
In contrast to objects and trees, boxes are mutable. Hashes can be added and removed.
Objects and accounts are kept on a Condensation store:
The objects make up the bulk of the data, and are organized as hash table. The account list has a slightly more sophisticated structure, but only deals with 32-byte hashes.
A Condensation store can be accessed through 5 functions:
- get an object
- put an object
- list a box
- add a hash (or envelope) to a box
- remove a hash from a box
The store may be running on top of a raw disk, a file system, a database, or a large scale storage system.
Condensation uses end-to-end encryption. Public data is signed, while private data and messages are are encrypted and signed by the actor producing that data.
For that, each actor generates a RSA 2048 key pair:
While the private key is kept in a safe place on the device, the public key is serialized as object and uploaded onto all stores the actor uses. The hash of the public key object serves as unique identifier of the actor and its accounts.
Condensation objects may be symmetrically encrypted as follows:
The data section is thereby encrypted using AES 256 in CTR mode with a random 256-bit key. The CTR counter starts at 0, and is incremented by 1 for each AES block (16 bytes). The last block may be truncated.
The hash list remains unencrypted, so that stores can determine which objects are in use.
Tree encryption and signing
Trees are encrypted and signed as follows:
The root object is an envelope with a content hash and a corresponding AES key encrypted for each recipient actor. In addition, envelopes contain the sender's signature of the content hash, and – if the content is located elsewhere – a store URL.
All objects below the root store the AES keys of their children within the encrypted data part.
Hence, any recipient can parse the envelope, verify its signature, decrypt the AES key of the content object, and then work its way down to read the whole tree.
Announcing the public card
On each account, an actor publishes and updates public information:
The public card links the actor's public key. This allows others to send messages to this actor, or verify signatures of messages received from this actor.
In addition, the public card may contain other public information. A person may publish their name and profession — just like they would do on a business card — and a shop may link a tree with their product list.
An actor may update this information at any time by creating a new public card, and removing the old one.
Sending a message
To send a message, an actor (sender) prepares a message tree with the desired content:
The envelope is then submitted to the recipient's in-queue, while the rest of the tree is uploaded onto a publicly accessible store of the sender:
Updating a message
The sender, or any recipient may remove a message from the in-queue. To share some data, for example, a sender may post a first message, and replace it whenever the data changes:
The actual data is transferred only when the recipient reads the message.
An actor reads messages by listing its in-queue(s), and processing message by message.
For each message, the actor first downloads the envelope from its own store, verifies the signature and the indicated store, and decrypts the AES key. If anything goes wrong, the message is silently discarded. Depending on the application, an actor may allow messages from known senders or known stores only.
The actor then downloads the actual message object(s) from the sender's store, and merges the received information into his private data. Once the private data has been saved, the message is removed from the in-queue.
Sender and receiver on the envelope are the same.
To modify that data (e.g. while processing messages U and V), the actor merges (⊗) all information, constructs a new tree, and adds it to the private box:
There are now two versions of the data: the previous version A, and the new version B. Merging them would yield the new version:
A ⊗ B = B and A ⊗ B ⊗ U ⊗ V = B
Hence, version A and the messages U and V can be removed:
An actor may entrust other actors. Entrusted actors have full read access to all data of the actor. This is achieved by adding the entrusted actor as recipient to all envelopes. Entrusted accounts are published on the public card.
Every actor of the group announces the other group members on this public card, and encrypts its private data for all members. Actors usually first read their own private data and messages, and then merge the private data and messages of other groups members.
When sending a message to a group, the actor reads all public cards (actor group discovery), encrypts the message for all groups members, and posts it on the in-queue of the most recent account.
With actor groups, a user can use the same data on multiple devices. Each device uses its own RSA key pair and accounts, potentially on different stores.
In addition, actor groups may rotate their keys regularly by creating and adding a new actor (key pair), and removing an existing one.
Actors often use two stores:
- A highly available and fast local store on the device they are running.
- A slower and less reliable remote store to exchange messages other actors, and back up the private data.