Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider tokenomics of multichain, design a reward system #327

Open
Tracked by #326
DavidM-D opened this issue Oct 19, 2023 · 4 comments
Open
Tracked by #326

Consider tokenomics of multichain, design a reward system #327

DavidM-D opened this issue Oct 19, 2023 · 4 comments
Assignees

Comments

@DavidM-D
Copy link
Contributor

DavidM-D commented Oct 19, 2023

Currently working on this.
Should the discussion/documentation of this live in the MPC repo @volovyks ?

@DavidM-D DavidM-D self-assigned this Oct 19, 2023
@volovyks
Copy link
Collaborator

@DavidM-D I think yes. Once it's finalized - we can mirror it in docs.

@itegulov
Copy link
Contributor

FYI I briefly discussed tokenomics with Michel (the WIP design with slashable pots) and he said there might be some we could do with forward-secure signatures to have better security invariants against past validators. Nothing specific yet, but he said he is going to explore this.

@DavidM-D
Copy link
Contributor Author

That'd be super helpful, although I have no idea how it'd be possible...

@itegulov
Copy link
Contributor

Here is a document written by Michel on forward security: https://docs.google.com/document/d/1a1ilRVGkDYoKn3WxAhTDUAy15XfbE9XWvr_zMJ_ai84/edit#heading=h.bqupaxg6kupz

Unfortunately, there is no clear way of enforcing this behavior since there is no way of distinguishing a server that behaves honestly from a server that updates their secret key material without deleting their old one. But this can potentially be useful for nodes that want to protect their own key which is a completely different problem.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants