⚡️ Private Alpha & Design PartnershipPartner Login
Back to Knowledge Base

Cryptography & Merkle-DAG Architecture

Deep dive into TARE's cryptographic chain of custody using native PostgreSQL UUIDs and acyclic graphs.

Modern laboratory assurance requires mathematical certainty. TARE achieves this by replacing traditional relational history tables with a cryptographically verifiable Merkle Directed Acyclic Graph (DAG).

Universal UUID Namespace

Every core data entity in TARE (such as inventory_locations, samples, and users) has been standardized to use native PostgreSQL uuid identifiers.

This absolute dimensional constraint guarantees that node collisions are statistically impossible across the entire platform. Consequently, a Sample Tube generated on a disconnected edge device can be asynchronously synced into the primary graph without risking ID overlap.

Multi-Parent Hash Arrays

Scientific workflows are often convergent (e.g. pooling multiple aliquots into a single synthesis). To accurately represent this reality, ProvenanceEdge relationships accept an array of parentHashes. By hashing the payload alongside all ancestor signatures, TARE natively weaves a resilient web of evidence that instantly invalidates if any historical node is tampered with.