Exploring Dogechain: A New Blockchain Solution
Exploring Dogechain: A New Blockchain Solution
Dogechain represents a transformative approach to enhance the utility of Dogecoin, a well-known meme cryptocurrency. This initiative seeks to address the limitations of Dogecoin by introducing smart contracts and offering scalability. By wrapping $DOGE into the Dogechain ecosystem, users unlock new avenues for decentralized finance (DeFi), NFTs, and gaming, thus enriching the overall cryptocurrency experience.
Exploring Dogechain: A New Blockchain Solution
@financepresentations1 week ago
Dogechain Whitepaper
V1.1 June 2022
- â Participating in the NFT market through minting and exchanging NFTs by paying for gas with $DOGE.
- â Partaking in lucrative GameFi opportunities and engaging with the growing blockchain gaming community.
- â Joining decentralized exchanges to swap tokens and speculate on their value.
- â Accessing advanced financial instruments such as staking, lending, borrowing, and liquidity mining.
- â Taking part in the upcoming metaverse revolution through Dogechain-powered NFTs.
- â Participating in DAOs and funding entire communities.
- â And many moreâ¦
- â IBFT Proof-of-Stake (PoS) consensus: Community users can participate in the network which ensures a permissionless and decentralized blockchain.
- â EVM-compatible : Existing Ethereum smart contracts can easily be migrated to Dogechain without requiring any further modification.
- â Decentralized Governance: Community members (token holders) can make proposals, delegate, vote on the blockchain parameters & events, and influence governance decisions.
- â Cross-chain compatibility: Dogecoin can be easily utilized on the Dogechain network by wrapping the Dogecoin via the Dogechain bridge, and sent back to the Dogecoin network as needed.
- â It is easy to compute H regardless of input data size.
- â Given any h, it is computationally infeasible to find an input x such that H(x) = h.
- â Given any x, it is also computationally infeasible to find y such that H(y) = H(x) and xâ y.
- â It is computationally infeasible to find any (x, y) such that H(x) = H(y) and xâ y.
- â Public Parameters: Let be a finite field, two parameters and define an elliptic ð¹ ð ð ð curve over , a seed which validates , a prime integer , and a point ð¶ ð¹ ð ð¶ ð > 2 255 of order where is either prime or a power of 2. ðºâ ð¶ ð ð
- â Private Key: An integer in . ð [1, ð - 1]
- â Public Key: . ð = ððº
- â Generate ðâ [1, ð - 1]
- â Compute
- â If or , try again. The signature is . ð = 0 ð = 0 (ð, ð )
- â Signature: . (ð, ð , ð )
- â Given (ð, ð ', ð ' ).
- â Verify if and are in and that for ð' ð ' [1, ð - 1] ð' = ð¥ 1 ððð ð , , and = .s' ). (ð¥ , ð¦ ) = ð¢ ðº + ð¢ ð ð¢ = ð»(ð) ððð ð ð¢ ð' ððð ð
- 4. A leader or bidder/proposer is selected.
- 5. Each proposed block goes through several stages of communication between the nodes before being added and confirmed on the blockchain.
- â Pre-Prepare, Ready, Commit: Used through ordinary consensus algorithms operations.
- â Round robin: Used to select a new block producer when the current producer is suspected of failing or when the block has not been created within a specific time frame.
- â Round-robin: This is a block producer selection strategy where a different bidder is chosen for every block producing phase.
- â Attached bidder : A new bidder is only selected whenever a malicious behavior has been detected by the current bidder.
Abstract
3
Abstract
This whitepaper proposes a full overview of the standalone Dogechain blockchain, its key concepts, and its core principles. The following text outlines several major pain points common to the original Dogecoin cryptocurrency and how Dogechain can solve these lingering issues. The text also details how Dogechain complements the existing Dogecoin ecosystem via its incorporation of smart contracts. In addition, this whitepaper examines the technicalities of bridging the Dogecoin blockchain with Dogechain and its capacity for interoperability. It also introduces the $wDOGE and $DC cryptocurrencies and thoroughly reviews their use cases within the Dogechain ecosystem. Finally, this whitepaper delves into the project's tokenomics and surveys the token's distribution, vesting periods, and release schedule.
1. Introduction
1.1 Dogecoin - The Original Meme Coin
Dogecoin was the first meme coin released to the public in 2014. The idea behind it was to veer away from the overtly- serious cryptocurrency investment narrative to provide a whimsical coin that mainstream users could identify with. Not surprisingly, the token achieved immediate and extensive success. The Dogecoin community began to grow exponentially as well, especially after crucial influencers such as Elon Musk and Snoop Dogg endorsed the native cryptocurrency. Today, Dogecoin is considered one of the most popular cryptocurrencies in existence along with Bitcoin and Ethereum. As the first successful meme crypto, Dogecoin has inspired a multitude of copycats, including Shiba Inu or Dogelon Mars.
From a technical standpoint, Dogecoin is a fork of Litecoin, the 'silver to Bitcoin's gold'. Consequently, Dogecoin is mineable, enabling more than 10,000 new coins to be released into the market every minute. Moreover, the token supply is not capped as it is with Bitcoin.
The $DOGE cryptocurrency has a single use case - to be accepted as a means of payment for exchanging goods and services online. Given its growing popularity, it seems to have achieved
this goal quite admirably. People simply love using Dogecoin and participating in the meme culture that is associated with it. Conclusively, $DOGE has gained mainstream recognition and adoption.
Having said that, Dogecoin's age is starting to catch up with it. Its fundamentals have remained stagnant relative to the multitude of tokens that have evolved with the medium.
1.2 The Unfortunate Shortcomings of Dogecoin
While $DOGE continues to excel at payments, this feature remains its sole use case. At a time when blockchain technology promises extensive utility through smart contracts, Dogecoin remains a one-trick pony. As a result, Dogecoin users cannot readily use their tokens in gaming, DeFi, or NFTs. This failure is especially egregious to DeFi fans who witness Doge-like tokens gaining traction with investors (mostly due to their passive yield opportunities). Without smart contract functionality, Dogecoin is left out of this narrative.
Moreover, as a fork of Litecoin, Dogecoin uses the proof-of-work (PoW) Scrypt mining algorithm for validating transactions and creating new coins. While Scrypt is easier to mine than Bitcoin's SHA-256, the PoW architecture remains difficult to scale for mass usage. In its current form, micro-transactions could easily create the kind of network congestion that would slow it down to a crawl.
Additionally, crypto mining is considered a notoriously wasteful process for validating blockchain transactions. A study by Digiconomist revealed that Dogecoin consumes as much as 6.54 TWh, roughly the energy needs of a small country. Unfortunately, $DOGE's increasing popularity promises to increase its carbon footprint even further.
Finally, it's worth noting that Dogecoin's PoW protocol presents insurmountable challenges to implementing smart contracts. A PoW consensus mechanism simply can't scale to meet mass demand for millions of simultaneous transactions, even if they merely fuel dApps. Even Ethereum is migrating to a more scalable PoS mechanism to alleviate this issue. Consequently, the most viable solution is to implement a complementary blockchain with a PoS token that prioritizes fast transactions and enables smart contract functionality.
2. Introducing Dogechain
Dogechain is an EVM-compatible blockchain that aims to complement the original Dogecoin cryptocurrency. As a proof-of-stake blockchain, Dogechain seeks to bring scalability, security, robustness, and utility to Dogecoin. In short, Dogechain doesn't compete with Dogecoin. Instead, it aims to harmonize with the original meme crypto and enhance it with smart contract capability.
It's important to note that the Dogechain project is a community-first blockchain that aims to empower Dogecoin holders and enthusiasts. Dogechain will ultimately provide Dogecoin users
with access to blockchain games, NFTs, and the ever-growing DeFi ecosystem, one in which they can showcase their favorite meme coin for a wide range of applications.
2.1 Solutions brought by Dogechain
The main goal of Dogechain is to increase the use cases of Dogecoin by providing it with much-needed utility. Dogecoin users can achieve this goal by merely wrapping their $DOGE into Dogechain smart contracts and receiving $wDOGE PoS tokens in return. $wDOGE tokens live on the Dogechain blockchain and will allow users to access an ecosystem of DeFi products, NFTs and GameFi, all indirectly powered by their original $DOGE tokens. Examples of potential use cases include:
3
In sum, Dogechain promises to transform the single-usage Dogecoin crypto into a DeFi powerhouse. With any luck, Dogecoin will be able to readily compete with many of the top smart contract platforms in the current blockchain environment.
2.2 Characteristics of Dogechain
Dogechain relies on the Polygon Edge framework to build its standalone, EVM-compatible blockchain. EVM stands for Ethereum Virtual Machine, which means that this smart contract-capable platform will be compatible with dApps deployed on Ethereum.
EVM is at the core of the Ethereum blockchain and plays an instrumental role in creating decentralized applications. In particular, it allows developers to build and deploy solutions and protocols much more quickly (as opposed to building them from scratch). Indeed, EVM-compatible protocols incorporate a robust and proven architecture and are thus a game-changer for DeFi product developers. And in addition to existing protocols, Dogechain will propose its own smart contracts, thus building upon the extensive DeFi ecosystem.
Bitcoin and other payment-focused / store-of-value blockchains haven't been able to invoke the same demand as smart contract-capable platforms. In contrast, Dogechain's ability to improve Web3 ecosystem productivity promises to increase blockspace demand. This event will equally play a part in increasing demand for the native cryptocurrency of Dogechain, the $DC token.
Given Dogechain's capacity for high throughput and decentralization, token users will not need to suffer the same user concerns associated with many PoW tokens (including low transactions per second, public chain congestion, centralized mining, and high transaction fees). Moreover, Dogechain will conserve a high degree of decentralization due to its PoS architecture.
Dogechain relies on a predefined number of validators to facilitate its Proof-of-Stake (PoS) consensus mechanism, a setup that leads to shorter block times and lower fees. In PoS, validator candidates with the highest number of tokens staked are allowed to become validators and produce blocks. The token also employs slashing scenarios, hence leading to security, decentralization, reliability, transparency, stability, and block finality.
2.3 Main Features of Dogechain
Dogechain relies on the following key principles:
3. Background
3.1 Cryptographic Hash Functions
An essential tool in blockchain technology is the cryptographic function that ensures transaction integrity and immutability. The hash function is the mathematical algorithm that produces a fixed size numerical output (called fingerprint or digest) consisting of input data. More specifically, a hash function can be denoted as:
H:{0,1}*â {0,1}áµ
A hash function takes on the input of any size and produces a fixed k length output. In addition, it must satisfy the following properties:
SHA-256 and Keccak-256 are widely used in several blockchains, and they produce a hash (output) of 256 bits in size.
3.2 Digital Signatures
3.3.1 Secp256k1 Curve
Note that all elliptic curves are equations defined as y 2 = x 3 + ax + b. The code Secp256k1 is an elliptic curve used by several blockchains to implement public and private key pairs. For instance, we can define Secp256k1 as a = 0 and b = 7 (i.e., secp256k1 lives on the equation y 2 = x 3 + 7).
Before a user generates a public and private key pair (pk, sk), he/she must first generate a sufficiently large random number (which is going to be sk) and use it to multiply with the private key by the generator point G as sk.G (which is going to be the pk).
We use this number to define a point on the secp256k1 curve. Due to the underlying discrete log problem (DLP), no one can derive the private key from the given public key and the generator point (as long as the key size is sufficiently large).
Note that for each value of x, the y component is squared in this equation leading to having two symmetric points across the x-axis. Hence, there are two values of y called odd and even numbers. Therefore, public keys can be identified by the x-coordinate and the parity of the y-coordinate. In the blockchain space, this feature is crucial, as it saves significant data storage.
3.3.2 ECDSA Signature Algorithm
Elliptic Curve Digital Signature Algorithm (ECDSA) is a cryptographic algorithm for creating digital signatures. More concretely,
Setup
Signature generation for a given message : ð
(ð¥ 1 , ð¦ 1 ) = ððº ð = ð¥ 1 ððð ð ð = ð»(ð) + ðð ð ððð ð
Verification:
1 1 1 2 1 ð ' 2 ð '
3.3 Ethereum Virtual Machine (EVM)
A virtual machine is a layer of abstraction between the executable code and the executing machine. This layer is necessary to improve the portability of software and to ensure that applications are separated from each other and from their hosts.
The Ethereum Virtual Machine (EVM) is a software platform that developers can use to build decentralized applications (dApps) on Ethereum. All Ethereum accounts and smart contracts live in this virtual machine.
The Ethereum virtual machine and EVM codes are designed using memory, bytes, along with blockchain concepts such as Proof-of-Work (PoW) or Proof-of-Stake (PoS), Merkle tree, and hash functions. The purpose of the EVM is to determine what the total Ethereum state will be for each block in the blockchain.
3.4 Consensus Protocols
3.4.1 Proof-of-Work (PoW) - Nakamoto Consensus
Proof-of-Work (PoW) is a decentralized consensus protocol that can be handled securely in a peer-to-peer network without requiring any trusted third party. It solves the difficulty of Byzantine general problem in an open network where miners can generate arbitrary identities (also called a Sybil attack) to compete for the next generated blocks by solving a random hash puzzle.
In order to avoid a Sybil attack, PoW is used to force the miners to have and run predefined computational resources. Additionally, PoW protects the security of the blockchain from the longest chain attacks. Unfortunately, PoW requires a large amount of energy which keeps increasing as more miners join the network.
3.4.2 Istanbul Byzantine Fault Tolerant (IBFT)
IBFT is another Byzantine fault-tolerant protocol based on Practical Byzantine Fault Tolerance (PBFT). On a high level, Byzantine consensus is achieved deterministically as follows:
There are four types of messages which are exchanged between the nodes:
Additionally, there are two approaches in the Polygon Edge framework for choosing block producers:
In these two approaches, every validator knows in advance which one of them is going to be the next block producer. This is because the decision is made through deterministic calculations based on node IDs. Similar to PBFT, IBFT also guarantees that there will be only one single bidder in each round.
Moreover, the bidder is required to get responses from the other nodes in order to continue executing its further tasks. This means that in the case of a network partition with more than n nodes (at least more than 3n+1 nodes), the protocol does not make any decisions not to break the consensus until the partition is fixed and their communication is timely synced. This also allows immediate finality where no forks are ever allowed to occur.
3.4.3 IBFT Proof of Authority (PoA)
In PoA, validators are responsible for creating blocks and adding them sequentially to the blockchain. All validators create a dynamic set of validators where validators can be added or removed from the cluster using a decentralized voting mechanism.
This means that validators can be included or excluded from a validator group if the majority (51%) of validator nodes voted to add/remove a particular validator from the set. Thus, malicious validators can be detected and removed from the network at any point in time, and new trusted validators can be added to the network.
All validators propose the next block in turn (by means of the round-robin leader selection). For a block to be validated/added to the blockchain, the overwhelming majority of the validators (i.e., more than 2/3) must approve that block. In addition to the validators, there are also non-validators who do not participate in block generation directly but take part in the block validation process. IBFT PoA is the default consensus mechanism of the Polygon Edge framework
3.4.4 IBFT Proof-of-Stake (PoS)
The Polygon Edge Proof-of-Stake (PoS) implementation is intended to be an alternative to the existing IBFT PoA implementation by giving node operators the ability to easily select between the two when starting the chain. Epochs are considered to be specific timeframes (in blocks) during which a given set of validators can generate blocks.
The epoch length can be changed, meaning that the node operators can set the length of the epoch during instance creation. At the end of each epoch, an epoch block is created, and after this event, a new epoch begins. Validator sets are updated at the end of every epoch period. Nodes request a set of validators from the staking smart contract during the creation of an epoch block and store the resulting data in local storage.
This query and saving the cycle are recurring at the end of every epoch period. Fundamentally, this allows the staking smart contract to have full control over the addresses in the validator group, leaving only one task to the nodes. Each contract query is executed only once per period to obtain the latest information about the validator set. This removes the responsibility of dealing with validator sets from individual nodes.
3.4.5 RAFT
Raft is a distributed consensus mechanism that relies on Paxos. The Raft protocol works with a node failure model where each error (e.g., missing messages, network partitions, or hardware-only failure) is considered a node failure.
Hence, it should run n ⥠2f+1 where f is the maximum number of nodes that can fail and n is the total number of nodes. The Raft protocol first selects a leader among a set of nodes and then makes the leader fully responsible for receiving transaction requests and handling the copying of logs (i.e., blocks) on other nodes.
Each node can be either a candidate, a follower, or a leader. The leader selection procedure is deterministic, so the protocol cannot run until the leader is selected by more than half of the nodes.
3.5. Comparison and Selection
IBFT protects the blockchain against various malicious attacks, while Raft only protects against node failures. If we assume that all nodes will never be corrupted, then Raft can be used without having any concern.
However, if there is an assumption of only having partial trust in the validators, then it would be better to utilize IBFT. Since Dogechain is decentralized and permissionless, it is going to run IBFT as its underlying consensus protocol.
4. Dogechain (DC) Architecture
Dogechain uses the Polygon Edge framework to build a standalone blockchain. Consequently, it doesn't use Polygon's 'security as a service' features but rather relies on its own set of validators. It's worth noting that Dogechain disables two Polygon Edge features - its checkpointing mechanism and its mainchain contracts.