Summary

This report presents an initial examination of the “New Cryptarchia” (Cryptarchia v2) proposal. We outline its core mechanics, place it in context with Bitcoin, PHANTOM, and Praos, and then sketch a roadmap for completing its security analysis.


Core Protocol Mechanics

  1. Multi-Proposer DAG Construction
  2. Conflict Resolution & Finality

A Unified Three-Step Comparison

We juxtapose four protocols—Bitcoin, PHANTOM, Ouroboros Praos, and Cryptarchia v2—each in the same three-step format, to highlight how Cryptarchia v2 generalizes Praos just as PHANTOM generalizes Bitcoin.

Protocol 1. Mempool / Setup 2. Mining / Election 3. Broadcast & Selection
Bitcoin (PoW chain) Collect pending transactions PoW mining: hash(parent ∥ MerkleRoot ∥ nonce) Gossip block; adopt longest-(most-work) chain
PHANTOM (PoW DAG) Gather transactions; identify all tips PoW mining on multi-parent header (tips ∥ MerkleRoot ∥ nonce) Gossip block; run GHOSTDAG “blue-set” to totally order the DAG
Ouroboros Praos (PoS chain) Snapshot stakes; derive fresh epoch randomness VRF_evaluate(seed ∥ slot) < φ ⇒ slot-win; one leader per slot Extend best chain with VRF proof; use weight-based fork choice
Cryptarchia v2 (PoS DAG) UTXO-lock registration; compute each validator’s φ Up-front Bernoulli draw (per-validator, per-slot) ⇒ eligible slots Gather txns; select max-antichain refs; assemble block; DAG update


Security Analysis: Roadmap

Instantiating the Ideal Coin-Flip

The notebook currently uses rng.binomial() as a stand-in for an ideal public-coin. To make this provably secure, we must choose and specify one of: