BlockDag Network
Official Website
  • 💡Home
  • 🌐All About BlockDAG
  • 🌟Who's Behind BlockDAG?
  • 🥮How To Buy BlockDAG Coin
    • 💳Buy With MetaMask
    • 💳Buy With Trust Wallet
    • 💳Buy With Wallet Connect
    • 💳Buy With Plus Wallet
    • 💳Buy With ETH or BNB
    • 💳Buy With USDT
    • 💳Buy ETH or BNB With a Card
    • 💳Buy With BTC or Kaspa
    • 💳Buy With DOGE or SHIB
    • 💳Buy With Solana or XRP
    • 💳Buy With THE Fantom & Cardano
    • 💳 Buy With PAPARA
  • 💹Presale
    • 🌠Presale Launch
    • 📜Perks of Presale
    • 🎁Early Bird Offers
  • 🤝BlockDAG Partnerships
  • 💻Testnet Launch
    • 🖨BlockDAG's Development Toolkit
  • 🛡️BlockDAG's Halborn Audit: Security Strengthened
  • 🛡️BlockDAG CertiK Audit: Future-Ready Security
  • 🎬BlockDAG's Team Video
  • 📱Download X1 App
    • 🆕New Updates
  • 💵⬅BlockDAG’s Affiliate Program
  • 🗺️ ROADMAP
    • 🗜️Development Phases
  • 🔃 BlockDAG Background
    • ⚙️Directed Acyclic Graph (DAG) Technology
  • 📊Tokenomics
  • 🧮BlockDAG Protocol
  • 💾 Intuition
  • ⌨BlockDAG's WASM Compatability
  • 📶 BlockDAG Algorithms
    • 📌Algorithm 1
    • 📌Algorithm 2
    • 📜A Unified Approach to Decentralized Ledgers
    • 🎛️Dashboard
    • 💰Passive Earning Opportunities
  • 💰 BlockDAG Coin Vesting
  • 🔄BlockDAG Mining Overview
    • ♻️Types of BlockDAG Mining
    • 📶How to Mine BDAG?
  • 🕹️Products Overview
    • BlockDAG X1 App Miner
    • BlockDAG X10 Miner
    • BlockDAG X30 Miner
    • BlockDAG X100 Miner
    • 💳BlockDAG Crypto Card
  • 🌱BlockDAG Eco System (Future Prospects)
    • 🛠️DApps Integration
    • 💱Efficient Transactions
    • 📢Earlier Mainnet Launch
    • 📈Low code, NO code
    • ⌛Decentralized Innovation Engine
    • 🔐Robust Security For Transactions
    • 💫Keynote 1
    • 🌙Keynote 2
  • 🪐Keynote 3
  • 🎯 BDAG FAQ's
    • 🔎Discovering BlockDAG
    • 📣Presale and Launch
    • 🌌BDAG Mining
    • 📲X1 Miner App
    • 🎫BlockDAG Payment Card
    • 🔖Pricing
    • 📦Shipping & Handling
    • 💱Blockchain Basics
    • ⭕Community
    • 👨🏻‍💻Support
Powered by GitBook
On this page

💾 Intuition

Previous🧮BlockDAG ProtocolNext⌨BlockDAG's WASM Compatability

Last updated 1 year ago

In the Directed Acyclic Graph (DAG) mining protocol, accurately identifying blocks mined by cooperative nodes (referred to as honest blocks) versus those not adhering to the established guidelines (dishonest blocks) is crucial. According to the protocol, miners are expected to reference the most recent, unlinked blocks—termed the "tips" of the DAG—in each new block they introduce.

This requirement ensures that if an honest miner mines a block (let's call it Block B) at time t, it will include references to all blocks published up to a certain period before t. Moreover, if Block B's miner is adhering to protocol, Block B is released immediately, implying that it should also reference any honest block generated shortly after time t.

The protocol design aims to limit the number of honest blocks that do not directly reference each other, a group referred to as the anticone of a block, ensuring it remains small. This limitation is quantified by the probability Pr (|anticone_h(B)| > k) ∈ O(e^(-C·k)), where C is a constant greater than zero, indicating it's unlikely for an honest block to have a large anticone consisting of other honest blocks.

Nevertheless, it is possible for a malicious actor to artificially inflate the size of an honest block's anticone by producing and concealing many blocks that fail to follow the referencing rules of the protocol.

To mitigate this risk, the PHANTOM protocol incorporates a parameter, denoted as "k", designed to ensure that, barring a small fraction δ of exceptions, the set of honest blocks forms a closely interconnected cluster. This parameter k is predetermined and is crucial for maintaining the protocol's integrity. It essentially sets a cap on the number of blocks that can be simultaneously produced, based on the expectation that block creation follows a Poisson process.

Specifically, for any block B generated at time t, there is a high probability (at least 1 - δ) that no more than k(D_max, δ) additional blocks were created within the time interval [t - D_max, t + D_max]. Blocks mined by honest nodes outside this interval fall neatly into B's historical or future dataset, thus theoretically ensuring that |anticone(B)| ≤ k with a probability of at least 1 - δ. However, an attacker can challenge this by generating blocks that do not reference the latest tips, thereby attempting to inflate B's anticone size through these underhanded tactics.