Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 153 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 20 tok/s Pro
GPT-5 High 28 tok/s Pro
GPT-4o 79 tok/s Pro
Kimi K2 198 tok/s Pro
GPT OSS 120B 428 tok/s Pro
Claude Sonnet 4.5 38 tok/s Pro
2000 character limit reached

NANDA: Decentralized AI Agent Architecture

Updated 29 October 2025
  • NANDA Unified Architecture is a decentralized, federated system that enables secure, scalable interoperability among autonomous AI agents using DID-based registries and verifiable credentials.
  • It features a minimalist, horizontally scalable agent registry with adaptive resolution layers that support sub-second global resolution and privacy-preserving discovery.
  • The system integrates atomic micropayments and dynamic trust computation, ensuring fine-grained policy compliance, operational governance, and economic coordination.

The Nanda Unified Architecture is a decentralized, federated system for enabling secure, scalable, and economic interoperability among autonomous AI agents across Internet, enterprise, and Web3 environments. By leveraging a quilt-like mesh of DID-based registries, semantic agent metadata and cryptographic verifiable credentials, it delivers foundational discoverability, capability attestation, trust computation, granular policy compliance, and operational governance for large-scale heterogeneous agent deployments. NANDA addresses core limitations of DNS and traditional web infrastructure by supporting sub-second global resolution, schema-validated dynamic capability updates, privacy-preserving discovery, atomic micropayments, and multi-layered active security, thus establishing a trust-anchored substrate for next-generation autonomous intelligent agent systems.

1. Architectural Foundation and Core Components

At the heart of the Nanda Unified Architecture (“NANDA”) is a minimalist, horizontally scalable agent registry called the NANDA Index, designed to overcome the limitations of conventional DNS-centric models for an agent-rich Internet (Raskar et al., 18 Jul 2025). The index acts as a global directory where each AI agent is assigned an immutable Decentralized Identifier (DID) and associated with an AgentAddr record. Each record (≤120 bytes) encodes: agent_id (DID), agent_name (URN), pointers to verifiable AgentFacts metadata, adaptive resolvers for endpoint churn, TTLs for cache management, privacy routing paths, and cryptographic signatures. This structure enables the following:

  • Quilt federation: A mesh of semi-autonomous registries (enterprise, Web3, government, SaaS, etc.), cross-validated and globally cacheable.
  • Rapid onboarding: Agents become resolvable worldwide in <1s after registration.
  • Extensible, backward-compatible integration: The system works natively with current Web transport (HTTPS, CDNs), as well as decentralized storage (IPFS) and privacy overlays (Tor).

The NANDA Index is complemented by two complementary metadata artifacts:

  1. AgentFacts: These are JSON-LD, W3C Verifiable Credential (VC) v2 signed documents encoding dynamic, schema-validated capabilities (“skills”), endpoints (static and adaptive), compliance badges, telemetry, provenance, and trust signals.
  2. Adaptive Resolution Layer: Programmable endpoints (adaptive_resolver_url) issue ephemeral, signed connection URIs for geo-aware, load balanced, threat-mitigated, or capability-matched routing.

The following table summarizes the primary index record fields (Raskar et al., 18 Jul 2025):

Field Example Value Purpose
agent_id nanda:550e8400-e29b-41d4-a716-4466554400 Globally unique DID
agent_name agent:Company:TranslationAssistant Human-readable URN/name
primary_facts_url https://host/.agent-facts Capability metadata
private_facts_url https://privhost/uuid Privacy-preserving lookup
adaptive_resolver_url https://resolver/dispatch Dynamic endpoint selection
ttl 3600 Record expiry
signature cryptographic hash Integrity/authenticity

2. Agent Discoverability, Identifiability, and Schema Validation

NANDA enables fine-grained agent discoverability and identifiability independent of network location or service provider. Each agent is referenced by a DID and resolved to a current set of metadata and operational endpoints using the index. The AgentFacts schema comprises:

  • Capabilities: Self-describing skillset (e.g., "translation", "summarisation"), each optionally certified (e.g., "HIPAA-verified").
  • Endpoints: Static (long-lived) or adaptive (ephemeral/resolver-issued) connection URLs.
  • Compliance and trust: Certifications, badges, reputation, and performance telemetry, each cryptographically attested via W3C VC v2 signatures.
  • Dynamic fields: Encoded evaluations, historical telemetry, provider attribution; newly attested facts can be integrated asynchronously using CRDT-based conflict-free updates.

All attributes and claims in AgentFacts are schema-validated and cryptographically signed, supporting global auditability, automated trust synthesis, and regulatory policy enforcement. Revocation of credentials or key material propagates in sub-second timeframes via VC Status Lists and TTL expiry mechanisms.

3. Decentralized Interoperability, Cross-Protocol Adaptation, and Discovery Protocols

NANDA supports seamless interoperability across previously incompatible agent ecosystems—Anthropic’s MCP, Google’s A2A (Agent-to-Agent), Microsoft’s NLWeb, and legacy Web APIs (HTTPS)—using a mediation/adaptor layer. Unified discovery is provided by the NANDA Index, which maps agent names/IDs to protocols and metadata, enabling:

  • Static and adaptive resolution: Routing and endpoint selection using both long-lived and live-issued (resolver-mediated) connection URIs, with programmable policies for load balancing, geo-fencing, and DDoS protection (Raskar et al., 18 Jul 2025).
  • Semantic search and ranking: Queries are processed using semantic embedding and learning-to-rank models, integrating compliance, reputation, and behavioral attestation scores to filter and order candidate agents (Balija et al., 10 Jul 2025).
  • Dual-resolution paths: Both direct (primary_facts_url) and privacy-preserving anonymous lookups (private_facts_url) are supported, preventing accessor exposure and enabling organizational split-horizon policies.

The discovery and deduplication process is O(logN)O(\log N) in agent registry size, utilizing federated/gossip/CRDT synchronization for rapid convergence.

4. Trust, Capability Attestation, and Dynamic Trust Layer

Trust in NANDA is formalized as a composite metric synthesizing cryptographically attested capabilities, compliance verification, behavioral telemetry, and real-time policy conformance (Balija et al., 10 Jul 2025). The architecture employs:

  • Verifiable Credentials: Each agent’s capabilities and compliance claims are represented as signed VCs linked to issuer DIDs, supporting fully decentralized trust chains.
  • Dynamic trust scores: Computed using weighted fusion and trust-propagation algorithms. For agent ii, if wijw_{ij} represents the trust from neighbor jj,

TrustScorei=1dijN(i)wij\text{TrustScore}_i = \frac{1}{d_i} \sum_{j\in N(i)} w_{ij}

with recursive updates akin to PageRank:

T=αWT+(1α)e\mathbf{T} = \alpha \mathbf{W}\mathbf{T} + (1-\alpha)\mathbf{e}

  • Policy-as-code: Declarative policies (OPA/Rego, eBPF) are attached to AgentFacts, evaluated in real-time to enforce regulatory and operational constraints.
  • Behavioral attestation: Signed interaction, task fulfillment, and anomaly events are appended to agent provenance for audit and reputation management.
  • Granular Capability Filtering: Discovery and trust can be conditioned on any cryptographically attested combination of capabilities, certifications, and safety flags.

5. Security: Zero Trust Agentic Access (ZTAA) and MAESTRO Framework

NANDA generalizes Zero Trust from user/device access (ZTNA) to autonomous agent ecosystems (ZTAA), requiring continuous, multi-factor verification of agent identity, capabilities, and trust profile before any interaction (Wang et al., 5 Aug 2025). Key mechanisms include:

  • Strict "never trust, always verify": No agent interaction is permitted absent AgentFacts-based, cryptographically provable identity and capability claims.
  • Attack mitigations: Resistance to capability spoofing (via VC signatures), impersonation (DID+VC cross-validation), Sybil/supply-chain/traffic diversion attacks (registry/split-horizon policies), and sensitive data leakage (least-privilege sharing, DLP templates).
  • Sandboxing and risk stratification: Newly seen/low-trust agents are subject to sandboxing or denied access pending trust establishment.
  • Enterprise-grade auditing and control: Real-time access, execution, and data exchange are auditable and enforceable per organizational boundaries, regulatory constraints (e.g., GDPR, OFAC), and jurisdictional tagging.
  • MAESTRO Security Framework: Seven-layer defense, including AgentTalk protocol (quantum-resistant encryption, intra-protocol attestation), secure WASM/TEE containerization, homomorphic encryption for data, automated compliance, behavioral analytics, and decentralized verification (Balija et al., 10 Jul 2025).

6. Economic Layer: Micro-Incentives and Operational Results

Economic coordination among agents is enabled via the X42/H42 micropayment protocol, supporting atomic, auditable, and fine-grained economic transactions at protocol level (Balija et al., 10 Jul 2025):

  • In-band payments: Embedded in HTTP or native agent protocol headers (e.g., X42-Payment), supporting seamless automated remuneration and marketplace operation.
  • Ephemeral keys and audit: Minimized risk, non-repudiable receipts attached to agent transaction logs.
  • Alignment of incentive and trust: Agents earn/increment reputation and income through verifiable fulfillment.
  • Deployment metrics: In current healthcare validation, the architecture has demonstrated 99.9% policy compliance and >$250k monthly microtransaction throughput while maintaining end-to-end differential privacy and auditability (as observed in Synergetics’ deployments).

7. Operational Governance, Compliance, and Privacy-Preserving Patterns

NANDA supplies enterprise and operational controls for agent visibility, traceability, and jurisdictional compliance (Wang et al., 5 Aug 2025):

  • Auditing: Full inspection of agent DIDs, ownership and task traceability.
  • Real-time governance: Administrators can activate, pause, terminate operations and define access slices—who interacts with whom, under what policies, and what data is exchangeable.
  • Privacy-preserving discovery: Least-disclosure lookup is guaranteed via private_facts_url indirection and CN/PKI split-horizons; accessor identities are not leaked in general.
  • Immutable behavioral logs: All attestations, runtime policy checks, and dispute resolution records are maintained on cryptographically signed ledgers (e.g., blockchain-backed).
  • Compatibility: The stack is designed for seamless integration with existing infrastructure—agent metadata can be hosted under existing .well-known endpoints, CDNs, or through decentralized storage; current “AgentCard” formats migrate directly into NANDA AgentFacts.

In summary, NANDA constitutes a rigorous, cryptographically anchored architecture for a trillion-agent Internet, securing agent discoverability, authentication, and trust, while enabling fine-grained policy compliance, privacy, and economic coordination at web scale (Wang et al., 5 Aug 2025, Raskar et al., 18 Jul 2025, Balija et al., 10 Jul 2025).

Forward Email Streamline Icon: https://streamlinehq.com

Follow Topic

Get notified by email when new papers are published related to Nanda Unified Architecture.