This report provides a detailed description of the v2-prime protocol—an idealized variant of Cryptarchia v2-minus with unbounded window referencing—and develops a framework for defining security properties (safety/persistence and liveness) for DAG-based ledgers. We analyze these properties in the spirit of the GKL and PSS frameworks, and propose generalizations of chain growth and common prefix for the DAG setting.


1. The v2-prime Protocol: Idealized DAG Consensus

1.1. Protocol Overview

The v2-prime protocol is an idealized DAG-based consensus protocol, directly inspired by Cryptarchia v2-minus but with the following key modifications:

  1. Unbounded Reference Window: Each new block can reference any prior block in the DAG (i.e., the window size is infinite). This eliminates the possibility of "stranded" blocks and ensures that all honest blocks can always be referenced, regardless of age.
  2. Idealized Block Generation and Idealized Network: There is no network delay; in each round, a randomized process (e.g., a public-coin/Bernoulli process) determines which validators are eligible to generate blocks. Each eligible validator independently produces a block that references previous blocks. Once a block is referenced, it cannot be referenced again by future blocks. More discussions can be found in Idealized Block Generation and Idealized Network: Refined Model
  3. Ordering Decision Mechanism: When conflicts arise (e.g., double-spends or conflicting transactions), nodes resolve the order using the closest common ancestor (CCA) rule as defined in v2/v2-minus, or, alternatively, an idealized ordering process that decides the canonical order of conflicting transactions.

1.2. Detailed Protocol Steps

Block Production

Referencing Rule

Conflict Resolution and Ordering