There is no commentSelect some text and then click Comment, or simply add a comment to this page from below to start a discussion.
Prover Mechanism Design
Criteria
Decentralization
Liveness
Censorship Resistance
Sybil Attack Resistance
Permissionless
Transparency and Fairness
Scalability
Cost
Efficiency
Simplicity
Selection and Eligibility of Provers
How are provers selected? Is the prover selection for each proof randomized or based on a deterministic mechanism?
How are provers vetted? What prerequisites should a prover meet to be considered eligible? How frequently should provers be re-evaluated or re-vetted?
Compensation and Incentives
How are provers paid? Is the compensation for provers variable or fixed? On what basis are rewards for provers calculated? Should payment to provers be handled within the protocol or externally?
How can rewards be structured to encourage honest behavior? Should penalties be imposed for incorrect proofs or for malicious activities, and if so, how?
Workload and Network Management
How is a prover chosen to work on a given proof? How frequently are provers selected?
How many provers do we expect in the network? Should the number of provers be fixed or dynamically adjusted based on network conditions?
How many provers are selected per unit of work? Is the proof generation decentralized?
What procedures should be in place for provers wanting to exit the network?
Security and Transparency
How can transparency and verifiability of a prover's work be ensured? Is there a mechanism for the community or users to audit or scrutinize the actions of provers?
What measures are in place to mitigate potential Sybil attacks?