article

Foundations of Private Shared State: The TACEO Network

11 min read

Welcome. Private Shared State is here to define the next era of digital collaboration, a way to compute together without compromising privacy or trust.

As this is a relatively new area, it’s worth taking a moment to tour around and become familiar with what it is. So, what do we know so far?

Intuitively, it encapsulates some semblance of privacy, on some data that’s shared and accessible, and, given that it’s state, we should be able to do something with it. At its core, this post argues that PSS is the solution to a problem that has plagued internet progress for decades.

To understand a bit more, let’s take a look at some examples where we’ve seen the need for this.

Tales from Web2

In the trad-tech world, vast amounts of potential economic and social value are left on the table because organizations cannot compute together on sensitive data. Over the years big tech players competed to collect as much data from every corner of your life as possible. But still, they couldn’t get everything. Competition, data-is-the-new-oil mantras, and later, regulation, meant that the most valuable, high-stakes data remained locked away in private silos, ultimately forcing a trade-off between massive utility and basic human trust. The simplest solution, centralizing the data, would be a major failure of trust and privacy. You just can’t ask a bank and a credit card company to dump their raw user data into one shared server with e.g., Google. It’s too dangerous, legally complex, and simply, wrong.

This led to efforts to see if there could be a way to share data, not the raw data itself, but the ability to compute on it. If it could be done in a way where no single party ever sees the inputs, but everyone can trust the output, then we could unlock that massive potential value.

This is exactly what happened in a reported collaboration between Google and Mastercard to measure the effectiveness of online advertising in driving in-store purchases. Both companies desperately wanted to learn a shared, aggregate insight (e.g., campaign ROI) from their combined, private datasets. They needed a privacy-preserving mechanism to compute on their joint, encrypted state, without either party ever seeing the other’s user data.

The problem isn’t just commercial. There’s also a major social aspect. Consider the Boston Wage Study, which aimed to analyze the gender pay gap. To conduct fair and accurate research, they needed confidential, individual-level employee salary data from numerous competing firms. Companies were, rightly, unwilling to share proprietary pay lists.

In both of these landmark cases, the teams used early forms of Multiparty Computation (MPC) protocols to conduct their statistics. But here’s the kicker: these attempts were incredibly hard to replicate. Efficiency at the time and the lack of an established, MPC network made this tech largely inaccessible. Moreover, the results were not publicly verifiable - there was still an element of “trust me, bro” in the outputs, since you had to trust the entities running the MPC.

Meanwhile, trust in big tech and government entities was declining, and the decentralized approach started to gain serious traction. People were looking for a computational layer that was not only private but provably trustworthy.


Cryptographic Ancestry & The God Protocols

If the centralized Web2 world is defined by a crisis of trust, the answer, naturally, lies in decentralization. But even here, the quest for Private Shared State is a deep, historical one.

The idea of a perfectly secure, collaborative computation protocol has been around for over twenty-five years, predating modern crypto and the invention of Bitcoin itself.

Around the turn of the millennium, cryptographer Nick Szabo wrote about what he called “God Protocols”. While Szabo first described smart contracts in 1996 (which gained life with Ethereum), his God Protocols (1999) went further. He envisioned a cryptographic engine, a distributed computation layer that would perform a task (like an auction, a contract execution, or a complex financial settlement) with perfect integrity and perfect privacy. That is, a system that acts as a trustworthy, invisible, decentralized authority.

We would much rather have a computer than God… we don’t want to pray for correct answers, nor trust in human organizations to get them, when we can have software that simply computes them correctly.” — Nick Szabo, on “God Protocols

In some way, Private Shared State is the modern realization of Nick Szabo’s God Protocol. It is the perfect blend of cryptography and distributed consensus to achieve a decentralized, private, collaborative computation.


What We’re Seeing in Web3

When Bitcoin was created, it successfully solved the core problem of shared state in a decentralized way. But to achieve this, it had to make a compromise that violated the “God Protocol” ideal: everything is public.

The inventors of decentralized ledgers knew this was a flaw.

Today’s Web3 architecture, the Public Shared State of Ethereum and its counterparts, delivers verifiability and collaboration, but at the cost of a catastrophic privacy failure. Every balance, every transaction, every identity-linked interaction is a matter of public record.

The modern ZK space attempts to fix this by creating Private Isolated State. It maintains verifiability and provides privacy, but it’s fundamentally siloed. This isolation stems from the design: most ZK systems are built to allow a single Prover (an individual or entity) to prove a statement about their own private data to a public Verifier. The data remains locked inside that single prover’s domain and is never mathematically shared with or composable with data from others. This prevents the kind of large-scale, cross-organizational utility seen in the Google/Mastercard or Boston Wage Study examples, which inherently require computation over multiple independent inputs.

We’re led to an interesting conclusion: The next leap isn’t necessarily just about making data private; it’s about making private data functional and collaborative.


So, where do we stand. We’ve seen that we need decentralization. We’ve seen that we need verifiability, and that ZK is a viable route. We see that we need a way to collaborate on data, and that MPC is a viable route. Previous attempts failed due to a lack of infrastructure to support and manage the complex cryptographic operations and poor efficiency.

This is the gap we are here to close.

At TACEO, we are building the TACEO Network, the decentralized cryptographic compute fabric that establishes and governs this PSS model.

From Concept to Network

Private Shared State needs an environment to live in. It needs an infrastructure that can coordinate computation, preserve confidentiality, and still provide public verifiability.

That is what we’re building with the TACEO Network.

It combines two foundational technologies, Multiparty Computation (MPC) and collaborative SNARKs (coSNARKs), to make collaborative computation over encrypted data both practical and verifiable.


Inside the TACEO Network

Under the hood, the network consists of three main layers:

Network overview

Every computation on the TACEO Network produces two outputs:

Both can then be verified by smart contracts or external systems, bridging private computation and public accountability.

How It Works

At a high level, here’s what happens when someone uses the TACEO Network:

  1. Inputs are encrypted and shared among a committee of independent compute nodes.

    No single node ever sees the full input and each holds only a mathematical fragment.

  2. Computation happens collaboratively through a secure MPC protocol.

    The nodes jointly compute the requested function (e.g., a credit score, a vote tally, or a transaction match) directly on the encrypted fragments.

  3. A succinct proof (coSNARK) is generated to attest that the computation was done correctly.

    Anyone can verify the result (on or off-chain) without rerunning the computation or accessing private data.

  4. The output is published as an updated private shared state, optionally settled on a host chain.

These steps can be traced on the graphic above. This streamlined process delivers a verifiable, updated Private Shared State ready for developers to build upon.


Programmable Cryptography

We believe in the promise of programmable cryptography, and built the network to support this.

We believe that developers shouldn’t have to understand multiparty protocols or zero-knowledge proving systems to work with Private Shared State.

Through TACEO’s DSL extensions (like coCircom and coNoir), developers can define functions that automatically compile into secure MPC + coSNARK workflows.

In other words, you write the logic and the network handles the cryptography.

This makes it possible to create verifiable, privacy-preserving smart contracts that live across both private and public chains.


What Becomes Possible

When encrypted collaboration becomes trustless, a new class of applications opens up:

All of these rely on the same underlying idea: multiple entities computing on shared, encrypted state that only the TACEO Network itself ever “sees.”

A New Foundation for Decentralized Computing

It has been clear for a long time that there is a need for verifiable encrypted compute. Since the 80’s, academia has been working towards proving without revealing (via ZK) and computing on encrypted data (via MPC). It’s only in the past couple of years that the technology has become viable for real world use. The ideas are there, the tech is ready, now the TACEO Network exists to deliver the infrastructure that allows to retires the compromises of the old internet.

Where existing systems offer transparency, TACEO brings confidentiality.

Where trust in off-chain actors was needed, TACEO offers proofs.

And where private computation was once siloed, TACEO makes it shared.

Together, these form the backbone of Private Shared State, the next paradigm in verifiable decentralized computing.


In the next post, we’ll explore how this foundation is extended through TACEO:Proof, TACEO:OPRF, and TACEO:OMap. These are the first services on the TACEO Network that make Private Shared State practical for developers and enterprises. Follow TACEO on X for the latest news.