Cysic Auction Mechanism
1. Motivation
Efficient task assignment in decentralized computation requires a fair, incentive-compatible, and penalty-enforced bidding system. The auction mechanism ensures that tasks are allocated to provers with sufficient computational resources, while maintaining economic alignment between requesters, provers, and verifiers.
2. Design Goals
- Fairness: Guarantee that tasks are allocated based on competitive bidding under a capped maximum price.
- Efficiency: Encourage timely completion by rewarding faster provers with higher payouts.
- Security: Ensure that dishonest or underperforming provers are penalized through slashing.
- Incentive Alignment: Incorporate token reserves into the reward distribution, aligning long-term commitment with higher earnings.
3. Task Definition
A task is published by the Requester with the following parameters:
- Task Difficulty (task_difficulty): Expressed in cycles.
- Maximum Acceptable Bid (bid_max): The upper bound of unit price, in CYS per million cycles.
- Task Deadline (task_ddl): The maximum allowable computation time.
4. Prover Requirements
- Token Reservation: Each prover must lock a minimum amount of tokens to be eligible.
- Bidding Configuration: Provers specify their bidding price in the configuration file, which serves as the reference for subsequent auctions.
- Performance Evaluation: By running the client software, a prover’s computational capacity is automatically benchmarked.
5. Auction Flow
- Task Broadcast: The requester publishes the task, which is propagated to all registered provers.
- Capability Assessment: Each prover determines whether it can complete the task within task_ddl.
- Bid Submission: Provers submit bids reflecting their desired compensation.
- Bids exceeding bid_max are automatically discarded.
- Bid Selection: Upon bidding closure, the system sorts valid bids by price.
- The two winning provers are chosen starting from the second-lowest bid.
- If two provers submit the same price, the more reserved one will be chosen.
- The selected bid price (bid_select) is the lowest bid among these winners.
6. Reward Distribution
6.1 Prover Rewards
The total reward pool for provers is defined as:
This reward is distributed among the three winning provers based on the verification results from verifiers.
6.2 Failure and Slashing
- If a prover fails to meet the deadline, the task is reassigned to a backup prover.
-
The failing prover incurs a penalty:
\[ slash = \beta \times bid\_max \times task\_difficulty \]where \(\beta = 1\).
6.3 Verifier Rewards
- 20 verifiers are randomly selected to validate the proof. The selection is determined by the block hash at task creation time, ensuring unpredictable and tamper-resistant randomness.
-
The verification task concludes once 60% of the selected verifiers (i.e., at least 12) have submitted their results. Only those who successfully submit before the task closes will share the reward:
\[ verifier\_reward = \frac{bid\_select \times task\_difficulty \times 20\%}{n_{submitted}} \]where \(n_{submitted}\) is the number of verifiers who submitted in time.
-
Note: Since rewards are distributed only among verifiers who submit before task closure, maintaining low-latency network connectivity is essential for maximizing earnings.
7. Reserve-Weighted Incentives
To strengthen long-term commitment and discourage opportunistic behavior, prover rewards are further adjusted by token reserves:
Where:
- \(\gamma\): Initially set to 0.25, but subject to adjustment in the future depending on the overall reserve distribution.
- \(R = \frac{reserve\_token}{total\_reserve\_token}\): relative reserve ratio.
This ensures that provers with larger token commitments receive proportionally higher rewards.
8. Security Considerations
- Sybil Resistance: Token reservation reduces the risk of Sybil attacks by requiring economic commitment.
- Collusion Prevention: Pricing determined by the second-lowest bid mitigates collusion among provers.
- Reliability Enforcement: Slashing enforces accountability, ensuring underperforming provers bear economic costs.
- Verifier Integrity: Distributing rewards among multiple verifiers enhances the robustness of proof validation.