System Architecture
How Rudra Works
A visual breakdown of the three core pillars: The Presentation Layer, the Off-Chain Prover, and the On-Chain Verifier.
1. Next.js Dashboard
Presentation layer. Orchestrates demo beats and visualizes protocol state.
2. Node.js Prover
Off-chain SDK. Handles WOTS signature generation and Merkle proofs.
3. Solana Verifier
On-chain BPF program. Executes WOTS verification & CPI upgrades.
Deep Dive: The Cryptographic Core
WOTS+ (Winternitz One-Time Signatures)
To survive the quantum threat, Rudra discards Ed25519 in favor of hash-based signatures. The Node SDK generates ephemeral WOTS+ keys, meaning every signature is purely derived from quantum-resistant cryptographic hashes (SHA-256).
Merkle Trees
Because WOTS keys can only be used once, Rudra aggregates thousands of single-use public keys into a single Merkle Root stored on-chain, dramatically saving rent costs.
On-Chain CPI
Upon successful verification, the Rust program executes a secure Cross-Program Invocation (CPI) to the BPF Loader, deploying the new bytecode safely.
Root Rotation
When the tree is exhausted or an engineer's laptop is compromised, the consortium uses a specialized rotate_root instruction to seamlessly migrate to a new Merkle tree without breaking the upgrade authority.