Understanding BlockDAGs and GHOSTDAG
My WebsiteSupport My Work
  • Welcome!
  • Preface
  • Introduction
  • Part 1: BlockChains and BlockDAGs
    • Introduction
    • Chapter 1: From BFT to PoW
      • Byzantine Fault Tolerance
      • Proof-of-Work (PoW)
      • How PoW Works*
      • PoS Vs. PoW
      • Exercises
    • Chapter 2: the Block Chain Paradigm
      • A Graph Theory Primer
      • The Paradigm
      • Honesty and Rationality
      • Three Chain Selection Rules
      • Security Notions
      • A Security Model for Blockchain Consensus
      • Selfish Mining in Bitcoin
      • Safety
      • Liveness
      • Confirmation Times
      • Proving Bitcoin's Security*
      • Exercises
  • Part 2: The GHOSTDAG Protocol
    • Page 2
  • Supplementary Material
    • Math
      • Stuff You Should Know
        • Asymptotics, Growth, and Decay
        • Binomial Coefficients
        • The Binomial Formula
        • Geometric Sums and Series
      • Probability Theory
        • Probability Spaces
        • Random Variables
        • The Math of Block Creation
    • Computer Science
      • Stuff you Should Know
        • Asymptotic Notation
        • Negligible Functions
      • Cryptography
        • Random Oracles
        • Merkle Trees
        • One Time Pads
Powered by GitBook
On this page
  1. Part 1: BlockChains and BlockDAGs
  2. Chapter 2: the Block Chain Paradigm

Exercises

  1. Prove that a (simple undirected graph) is a DAG if and only if there are no two vertices AAA and BBB such that AAA is reachable from BBB and BBB is reachable from AAA

  2. Prove that a rooted DAG has only one root

  3. Show that a rooted DAG is a tree if and only if for any block BBB that is not the root, there is a single path from BBB to the root

  4. Is the following a good tie-breaking rule? Given a tie between AAA and BBB, mine over the block that has an earlier timestamp.

  5. Recall that a satoshi is one hundred millionth of a bitcoin. Assuming that Bitcoin stops coin emission when the reward drops below satoshi, how long will it take for all rewards to be emitted since the network started? By how much the total supply was decreased by discarding sub-satoshi block rewards?

  6. * Show that if we apply the Eyal-Sirer strategy to a miner with more than half of the hash rate we recover the standard double-spending attack.

PreviousProving Bitcoin's Security*NextPage 2

Last updated 3 months ago