Summary
This report presents an initial examination of the “New Cryptarchia” (Cryptarchia v2) proposal. We outline its core mechanics, place it in context with Bitcoin, PHANTOM, and Praos, and then sketch a roadmap for completing its security analysis.
We juxtapose four protocols—Bitcoin, PHANTOM, Ouroboros Praos, and Cryptarchia v2—each in the same three-step format, to highlight how Cryptarchia v2 generalizes Praos just as PHANTOM generalizes Bitcoin.
Protocol | 1. Mempool / Setup | 2. Mining / Election | 3. Broadcast & Selection |
---|---|---|---|
Bitcoin (PoW chain) | Collect pending transactions | PoW mining: hash(parent ∥ MerkleRoot ∥ nonce) | Gossip block; adopt longest-(most-work) chain |
PHANTOM (PoW DAG) | Gather transactions; identify all tips | PoW mining on multi-parent header (tips ∥ MerkleRoot ∥ nonce) | Gossip block; run GHOSTDAG “blue-set” to totally order the DAG |
Ouroboros Praos (PoS chain) | Snapshot stakes; derive fresh epoch randomness | VRF_evaluate(seed ∥ slot) < φ ⇒ slot-win; one leader per slot | Extend best chain with VRF proof; use weight-based fork choice |
Cryptarchia v2 (PoS DAG) | UTXO-lock registration; compute each validator’s φ | Up-front Bernoulli draw (per-validator, per-slot) ⇒ eligible slots | Gather txns; select max-antichain refs; assemble block; DAG update |
The notebook currently uses rng.binomial()
as a stand-in for an ideal public-coin. To make this provably secure, we must choose and specify one of:
(epoch_seed ∥ slot ∥ validator_ID)
Hash(π) < φ(f,σ)
.