Orderbook as a Verifiable Serviceο
This guide walks through transforming a simple centralized orderbook into a fully decentralized and verifiable service using the Zellular Sequencer.
We follow a progressive enhancement model, starting from a basic session-based FastAPI service, and incrementally evolving it into a replicated and cryptographically verifiable system.
Each step corresponds to a real implementation in the Zellular examples/orderbook directory.
Step 1: Centralized Orderbook Serviceο
In this stage, we implement a basic in-memory orderbook service using FastAPI and session-based authentication. Users log in with a username and password, and can place buy/sell orders if they have sufficient balance. Submitted orders are either matched immediately or added to the orderbook.
π File: 01_centralized_orderbook_service.py
Key Conceptsο
Session-based login using SessionMiddleware
In-memory user balances per token (e.g., USDT, ETH)
Buy/sell order schema with immediate price-based matching
Orders are stored using OrderWrapper and sorted by price
Partially filled or unmatched orders are added to the book
Endpointsο
POST /login: Log in with a username and password
GET /balance: Check a userβs token balance
GET /orders: Retrieve all open orders
POST /order: Submit a new buy or sell order
Order Schemaο
Orders are submitted in the following format:
{
"order_type": "buy", // or "sell"
"base_token": "ETH",
"quote_token": "USDT",
"quantity": 1.5,
"price": 2000.0
}
Only authenticated users can place orders.
Order Matching Logicο
When an order is submitted:
The service checks that the user has sufficient balance: - For buy: quote_token β₯ price Γ quantity - For sell: base_token β₯ quantity
The order is passed to the match() function: - Buy orders match with the lowest-priced sell orders - Sell orders match with the highest-priced buy orders
Trades update both usersβ balances (quote and base tokens)
If the order is only partially filled, the remainder is added to the book
The orderbook is maintained using Pythonβs bisect.insort for efficient price-based sorting.
Example Usageο
Login
curl -X POST http://localhost:5001/login \
-H "Content-Type: application/json" \
-d '{"username": "user1", "password": "pass1"}' \
-c cookies.txt
Place an order
curl -X POST http://localhost:5001/order \
-H "Content-Type: application/json" \
-d '{
"order_type": "buy",
"base_token": "ETH",
"quote_token": "USDT",
"quantity": 1,
"price": 2000
}' \
-b cookies.txt
View all open orders
curl http://localhost:5001/orders
Testing with Scriptο
A helper script is provided for testing this centralized version of the orderbook:
π 01_place_order.py
This script:
Logs in with a username/password
Submits a sample order using the session cookie
Prints the server response
To run it:
python examples/orderbook/01_place_order.py
Limitationsο
Order matching is basic and does not use time-priority
State (balances and orderbook) is stored in-memory only
No cryptographic authentication or verifiability
Service is centralized and not fault-tolerant
Next, weβll remove session-based login and introduce signature-based authentication using Ethereum-style keys.
Step 2: Signature-Based Orderbook Serviceο
In this step, we remove session-based login and introduce stateless authentication using Ethereum-style signatures. Users now sign order messages off-chain using their walletβs private key. The backend verifies the signature and uses the recovered address as the sender.
π File: 02_signature_based_orderbook_service.py
Key Conceptsο
Stateless authentication using ECDSA signatures
Each order includes a signed message
The backend verifies the signature and derives the sender
Orders are matched immediately upon submission
Message Format for Signingο
Users must sign the following message string off-chain:
Order {order_type} {quantity} {base_token} at {price} {quote_token}
Example:
Order buy 1.5 ETH at 2000 USDT
Backend Verificationο
The server reconstructs the message and verifies the signature:
message = f"Order {order.order_type} {order.quantity} {order.base_token} at {order.price} {order.quote_token}"
encoded = encode_defunct(text=message)
recovered = Account.recover_message(encoded, signature=order.signature)
if recovered.lower() != order.sender.lower():
raise HTTPException(status_code=401, detail="Invalid signature")
Order Request Formatο
{
"sender": "0xYourAddress",
"order_type": "buy",
"base_token": "ETH",
"quote_token": "USDT",
"quantity": 1.5,
"price": 2000,
"signature": "0x..."
}
Testing with Scriptο
π 02_place_order.py
This script:
Signs an order off-chain using a private key
Sends it to the /order endpoint
Demonstrates stateless interaction using a wallet-like client
Run it with:
python examples/orderbook/02_place_order.py
Why This Mattersο
The service no longer requires login or session state
Any node can independently verify the sender of an order
Clients and servers interact in a stateless, cryptographically secure way
This lays the foundation for distributed, multi-node replication
Next, weβll replicate the orderbook across nodes using the Zellular Sequencer to ensure all participants observe the same transaction order.
Step 3: Replicated Orderbook Serviceο
In this step, we replicate the orderbook across a network of nodes using the Zellular Sequencer. Instead of applying new orders immediately upon submission, each order is sent to the sequencer, which assigns it a global order and broadcasts it to all replicas.
Each node independently pulls the ordered sequence of operations and applies them locally, ensuring that the orderbook and balances remain consistent across all nodes.
π File: 03_replicated_orderbook_service.py
Key Conceptsο
Orders are sent to the Zellular Sequencer via the SDK
All nodes fetch and apply the same ordered batch of operations
Order matching logic is executed identically on every node
Ensures deterministic and consistent state replication
Order Submissionο
Orders are received at the /order endpoint. After signature verification and basic balance check, they are submitted to the sequencer:
@app.post("/order")
def place_order(order: OrderRequest):
message = f"Order {order.order_type} {order.quantity} {order.base_token} at {order.price} {order.quote_token}"
if not verify_signature(order.sender, message, order.signature):
raise HTTPException(status_code=401, detail="Invalid signature")
order_payload = {
"id": str(uuid4()),
"user": order.sender,
"order_type": order.order_type,
"base_token": order.base_token,
"quote_token": order.quote_token,
"quantity": order.quantity,
"price": order.price,
"signature": order.signature
}
# Send to Zellular for consensus-based processing
zellular.send([order_payload], blocking=False)
return JSONResponse({"message": "Order sent to consensus layer"})
This means the order will be processed once it appears in a sequenced batch.
Order Processing Loopο
Each node runs a background thread to pull and apply new batches from Zellular:
for batch, _ in zellular.batches():
for order in json.loads(batch):
__place_order(order)
This ensures that all replicas receive and apply the same operations in the same order.
Why This Mattersο
Introduces true multi-node replication
Guarantees consistent order matching and state across all nodes
Enables fault-tolerant execution β any node can recover from sequenced history
Prevents divergence even when nodes join or restart at different times
In the next step, we will introduce verifiable reads by having each node sign its /balance response, making it possible to verify what data was returned and by whom.
Step 4: Verifiable Balance Readsο
In this step, we enhance the orderbook service by making balance queries verifiable. When a client queries /balance, the response is signed using the nodeβs BLS private key.
π File: 04_verifiable_orderbook_service.py
Key Conceptsο
Each node has a unique BLS private key
The /balance endpoint returns a signed message
The signature proves that the node confirmed this balance
No authentication or sessions are required for reading balances
Why Verifiable Balances?ο
When external systems β such as blockchains or other verifiable services β rely on the orderbook, they must be able to independently confirm user balances without trusting any single node.
By signing balance responses, the service provides cryptographic proof that a node attested to a specific value. This is essential for secure withdrawals, cross-chain communication, and trustless integration between decentralized services.
Balance Endpointο
The /balance endpoint now accepts both an address and token:
@app.get("/balance")
def get_balance(address: str, token: str):
balance = balances.get(address, {}).get(token, 0)
message = f"Address: {address}, Balance: {balance}".encode("utf-8")
signature = PopSchemeMPL.sign(sk, message)
return {
"address": address,
"balance": balance,
"signature": str(signature)
}
The message is signed using the BLS POP (Proof of Possession) scheme from the blspy library and the resulting signature is included in the API response.
For now, this step ensures that every balance query is individually signed and verifiable. In the Signature Aggregation and Verification section, weβll explore how an aggregator can collect signed responses from multiple nodes, combine them into a single BLS signature, and how clients or external services can verify that a quorum of replicas attested to the same value.