<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Game-Theoretic View on Decentralized Proof Generation in zk-SNARK-based Sidechains</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuri Bespalov</string-name>
          <email>yu.n.bespalov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Garoffolo</string-name>
          <email>alberto@horizen.global</email>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lyudmila Kovalchuk</string-name>
          <email>lusi.kovalchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanna Nelasa</string-name>
          <email>annanelasa@gmail.com</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Oliynykov</string-name>
          <email>roliynykov@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bogolyubov Institute for Theoretical Physics</institution>
          ,
          <addr-line>14b, Metrolohichna str., Kyiv, 03143</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,
          <addr-line>37 Peremohy ave., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Input Output HK, Tesbury Centre</institution>
          ,
          <addr-line>Queen's Road East, 24-32</addr-line>
          ,
          <country country="HK">Hong Kong</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody sq., Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Zaporizhzhia Polytechnic National University</institution>
          ,
          <addr-line>64 Zhukovskogo str., Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Zen Blockchain Foundation</institution>
          ,
          <addr-line>701 Gervais str, Columbia, South Carolina, 29201</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>47</fpage>
      <lpage>59</lpage>
      <abstract>
        <p>In this paper, we investigate the behavior of provers in decentralized proof generation for zk-SNARK Based Sidechains, specifically, Latus consensus protocol. We obtained results that give necessary and sufficient conditions for the existence of the Nash equilibrium, and the value of the relevant utility function, for various parameters of the sidechain and various price policies. These results allow picking a price policy to ensure the stable operation of the sidechain.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Blockchain</kwd>
        <kwd>sidechain</kwd>
        <kwd>game theory</kwd>
        <kwd>Nash equilibrium</kwd>
        <kwd>Latus</kwd>
        <kwd>Ouroboros Praos</kwd>
        <kwd>Merkle tree</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In an SC, the entity that creates the block, the block forger, shares a list of transactions, which he
intends to include into the block, with other entities, called provers. The provers construct
SNARKproofs for these transactions and also for each node of the corresponding Merkle tree. Each prover
sets prices for his proofs, according to the price policy of the current epoch that was set at the end of
the previous one. If there are a few proofs for a certain node, the block forger chooses the cheapest
one.</p>
      <p>The results of this paper continue a series on combinatorial, stochastic, and game-theoretic aspects
of distributed proof generation for zk-SNARK-based blockchains started in [10].</p>
      <p>In what follows, we will describe the operation of SCs, and, first of all, provers’ behavior, from the
game-theoretical point of view. We will show that the optimal provers’ behavior, i.e. Nash
equilibrium in the corresponding symmetric game, is fully determined by the price policy and by such
parameters as the number of proofs and the number of provers.</p>
      <p>We obtained necessary and sufficient conditions for the existence of the Nash equilibrium, for
various models, price policies, and parameters, both in pure and mixed strategies. Such results allow
modeling and sometimes prediction of the provers’ behavior, proof prices, and block forgers’ rewards,
and help the inadequate setting of the price policy, to provide stable operation of SC.</p>
      <p>The paper is organized as follows. In Chapter 2, we recall some basic definitions from game
theory and general results on the existence of the Nash equilibrium. Then, in Chapter 3, we:
 Give the mathematical model of a one-step game, that we will use to describe distributed
proof generation.
 Obtain some auxiliary results which we need to find Nash equilibrium for different price
policies and other parameters.
 Obtain necessary and sufficient conditions for the Nash equilibrium existence.
 Describe these Nash equilibriums and corresponding utility functions.</p>
      <p>In Chapter 4 we study the natural continuation and development of the one-step game, described in
Definition 1, and formulate new Definition 5. This new game that is also a one-step game, deals with
the creation of a sequence of blocks, rather than the creation of only one block. We investigate
provers’ behavior, allowing them to choose proofs from different blocks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>Let us recall some basic definitions from game theory. More details can be found in one of the
textbooks, in particular [11].</p>
      <p>Definition 1. A strategic form game consists of
the set of players  = {1,2, … ,  };
and for each player 
the non-empty set of pure strategies   ;
the utility (payment) function   : ∏   →  .</p>
      <p>A strategy profile is a combination of strategies of each player, i.e. an element of the Cartesian
product ∏   .</p>
      <p>Definition 2. A game is called symmetric if all strategy sets   are the same and for each
permutation  of strategies</p>
      <p>
        ( )( 1, … ,   ) =   (  (
        <xref ref-type="bibr" rid="ref1 ref2">1</xref>
        ), … ,   ( )).
      </p>
      <p>In this case,   is a symmetric function of all its arguments except for the  th.</p>
      <p>Note that replacement of the left action of the symmetric group by the right action leads to a
stronger notion of fully symmetric game [12].</p>
      <p>Definition 3. If the sets of strategies are equipped with a topology, one can consider the
corresponding Borel σ-algebra.</p>
      <p>A mixed (randomized) strategy   is a Borel probability measure on the set of strategies   .</p>
      <p>The utility for mixed strategy   on the  th place is the expectation calculated via Lebesgue
integral:
each  ∈  ,
  (… ,   , … ) = ∫   (… ,   , … ) (  ).</p>
      <p>Definition 4. A pure strategy Nash equilibrium is a strategy profile (  ) ∈  ∈ ∏ ∈    , where for
  ( 1 … ,   −1,   ,   +1, … ,   ) ≥   ( 1 … ,   −1,  
′
,   +1, … ,   )for all ′ ∈   .</p>
      <p>A mixed strategy Nash equilibrium is a mixed strategy profile (  ) ∈  , where for each  ∈ 
  ( 1 … ,   −1,   ,   +1, … ,   ) ≥   ( 1 … ,   −1,  
′
,   +1, … ,   )
for all mixed strategies  ′ on   .</p>
      <p>In this paper, we consider a symmetric game and are looking for a symmetric Nash equilibrium
given by the same probability measure  ∗ repeated 
times. In this case, we can formulate an
equivalent Nash equilibrium criterion by making comparisons only with pure strategies:</p>
      <p>Lemma 1. For any symmetric game, a symmetric Nash equilibrium is given by a probability
measure  ∗ iff the utility
satisfies the condition
  −1
 1∈
 1( 1,  ∗, … ,  ∗) = ∫</p>
      <p>1( 1, … ,   )∏   ∗(  ).
where supp  ∗ is the support of the measure  ∗.</p>
      <p>In this case, the game price is</p>
      <p>
        1∈
 ∗ = max 1( 1,  ∗ … ,  ∗).
(
        <xref ref-type="bibr" rid="ref1 ref2">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">3</xref>
        )
3. The Case of One-Step Game of Distributed Proof Generations
3.1
      </p>
    </sec>
    <sec id="sec-3">
      <title>Description of the Game</title>
      <p>In what follows, under a one-step game, we will mean a symmetric strategic game corresponding
to one step of provers’ work for a distributed proof generation.</p>
      <sec id="sec-3-1">
        <title>Definition 5. (One-step game).</title>
        <p>Each  th prover (≡ player), i ∈ {1,2, … , m}, randomly selects and builds one of  proofs according
to the function g: {1,2, … , m} → {1,2, … , n} and quote a price (≡strategy)   ∈  ⊂ ℝ&gt;0 for his work.</p>
        <p>Let  ⊆ {1,2, … ,  },  ≠ ∅. For the function  ∋  ↦   , consider the set</p>
        <p>′∈
argmin(  ′) ≔ { ′′ ∈  ∣   ′′ = 
 ′∈
  ′}.</p>
        <p>
          A block-forger, for every built  -th proof, allocates a subset argmin(  ′)of provers, who asked
the allocated subset and pays him the declared price.
the minimal price   ′, among the set  −1( ) of all provers who built it, randomly selects a prover from
For the subset (
          <xref ref-type="bibr" rid="ref4">3</xref>
          ) in {1,2, … , m}, consider the corresponding δ-function
 ′∈ −1( )
 ′∈
 argmin(  ′): {1,2, … ,  } → ℝ,  → {# argmin(  ′)
 ′∈
1
, if  ∈ argmin(  ′);
        </p>
        <p>′∈
0, otherwise.
has the binomial distribution (as a sum of independent Bernoulli random variables):
. The number   of other provers, which select the same proof as to the  th prover,
For a fixed  th prover and for a fixed set  −1( ( )) of other provers that select the same proof after
averaging
overall
selections
of the
block-forger, the
payment for
this
prover
will
be
  ⋅  argmin(  ′)( ). Each subset  ⊆ {1,2, … ,  } with  ∈  appeared as  −1( ( )) with probability
 (  =  ) = (
) ( ) (


)
= (

)</p>
        <p>
          Lemma 2. The utility (
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) for a one-step game admits the expression
Below we formulate and prove some auxiliary results that were helpful in obtaining the main
The following Lemma adopts the general case of the utility function for the Nash equilibrium for
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Then the utility of the  -th prover is</title>
        <p>For example, in the case of two provers
  ( 1, … ,   ) =
∑
 ∈
 ⊆{1,2,…, }
( − 1) −| |
∙   ⋅  argmin(  ′)( )⋅</p>
        <p>′∈ −1( ( ))


 1
 −1
 =0
 1( 1,  ∗ … ,  ∗) =
   −1 ∑ ( ∗( ≥ 1)+  − 1) ( ∗( ≥ 1)+  − 1)

where  ≥ 1 = { ∈  |  ≥  1} and  &gt; 1 = { ∈  |  &gt;  1}.</p>
        <p>In particular, when  ∗( 1) = 0
 1( 1,  ∗ … ,  ∗) =</p>
        <p>1
  −1 ( ∗( ≥ 1)+  − 1)
 −1
.</p>
        <p>
          Proof. Substitution of (
          <xref ref-type="bibr" rid="ref5">4</xref>
          ) into (
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) and then grouping together of the summands with the same
cardinality of  yields
 1( 1,  ∗ … ,  ∗) =
=
        </p>
        <p>
          1
use of the Fubini’s theorem and the binomial identity to get (
          <xref ref-type="bibr" rid="ref8">7</xref>
          )
        </p>
        <p>
          If  ∗( 1) = 0, one can ignore in (
          <xref ref-type="bibr" rid="ref9">8</xref>
          ) the set of zero measure, where  1 =   for some  ≠ 1, then
        </p>
        <p>)( − 1) − −1 ∗( ≥ 1)
 1
=   −1 ( ∗( ≥ 1)+  − 1) −1
Then we need the identity</p>
        <p>In the case  +  = 1, this is the expectation of 1/( + 1) with respect to the binomial
distribution.</p>
        <p>
          If  ∗( 1)&gt; 0, one can rewrite (
          <xref ref-type="bibr" rid="ref9">8</xref>
          ) using (
          <xref ref-type="bibr" rid="ref10">9</xref>
          ) three times:
 1( 1,  ∗ … ,  ∗)=   −1 ∑ (
        </p>
        <p>1
For  ∈ ℤ&gt;0 , consider the following homogeneous polynomials
Lemma 3.
=</p>
        <p>( ,  )  ( ,  )−    −1  ( ,  ).
1. The following polynomial identity is true
  ( ,  )=
  −  
 − 
 −1
 =0
= ∑     − ,
 
( ,  ,  )≔  
( ,  )</p>
        <p>( ,  )−   ( ,  )  ( ,  )=
  ( ,  ,  )= ∑   −1−   − ( ,  )(  −   )(  −   ) =
= 2( ,  ,  )= ∑ =−11   −1−   − ( ,  )  ( ,  )  ( ,  ),</p>
      </sec>
      <sec id="sec-3-3">
        <title>Proof. Parts of (10) equals to</title>
        <p>
          For positive  ,  ,  , if  2( ,  ,  )= ( −  )( −  )&gt; 0 then   ( ,  ,  )&gt; 0 for all  ≥ 2.
 −1
 =0
 −1
 =1
(
          <xref ref-type="bibr" rid="ref11">10</xref>
          )
 −1
∑
 =1
∑
 , ≥0
 + = −1−
        </p>
        <p>(  −1+     +   −1−   +   + −   −1    + −   −1  +   )
equilibriums.</p>
        <p>The expression   and the interval from the following lemma appears in the description of Nash
The utility on the symmetric profile of pure strategies has the form
  ( , … ,  ) =   
The endpoints and length of the above interval admit the asymptotics</p>
        <p>
          lim 
 , →∞ 
 ⁄ →
−   −1
Proof. The identity (
          <xref ref-type="bibr" rid="ref12">11</xref>
          ) can be obtained directly or as the special case of (
          <xref ref-type="bibr" rid="ref7">6</xref>
          ).
        </p>
        <p>Asymptotic formulas come from easy calculation with the Maclaurin series.</p>
        <p>
          between endpoints of (
          <xref ref-type="bibr" rid="ref13">12</xref>
          ) is equivalent to the positivity of
        </p>
        <p>Here we obtain the main results are obtained on the Nash equilibrium for a game from Definition 5
in pure strategies for the general case (Proposition 1) and a particular case (Corollary 1) with only two
strategies. We also provide numerical examples are given, built using these statements.</p>
        <p>Proposition 1. Let  be the set of pure strategies and  ∗ ∈  . The profile (  =  ∗)1≤ ≤ is a
symmetric Nash equilibrium iff for all  ∈  the following two conditions hold</p>
        <p>Lemma 4.
 l, im→∞
 ⁄ →</p>
        <p>(</p>
        <p>)1≤ ≤ is a symmetric Nash equilibrium iff  
)1≤ ≤ is a symmetric Nash equilibrium iff  
}.</p>
        <p>)1≤ ≤ and (  =  
)1≤ ≤ are symmetric Nash equilibria iff  
≤</p>
        <p>.
≥   −1 ( −1) −1

.


If</p>
        <p>&lt;  ∗ then 
If  &gt;  ∗ then  ( −1) −1
≤  

 ∗. (I.e.</p>
        <p>⋂( 
≤    ∗.</p>
        <p>∗,  ∗) = ∅. )
Proof. Note that
 1( ,  ∗, … ,  ∗) =</p>
        <p>{
(
 − 1  −1</p>
        <p>)
 , if  1 &lt;  ∗,
 , if  1 =  ∗,
, if  1 &gt;  ∗.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Example 1 (Numerical).</title>
        <p>Then  1( ∗,  ∗, … ,  ∗) ≥  1( ,  ∗, … ,  ∗) yields the conditions 1 and 2 from the proposition.</p>
        <p>Let</p>
        <p>m = 50, n = 10 S = {1, 2, … ,10}. Then only one Nash equilibrium exists in pure
symmetric strategies with s∗ = 1.
symmetric strategies with s∗ = 10.
exists in pure symmetric strategies with s∗ = 9.</p>
        <p>Let m = 100, n = 10000S = {1, 2, … ,10}. Then only one Nash equilibrium exists in pure
Let m = n = 200 S = {1, 2, 3, 4, 5, 9, 9.1, 9.2, 9.3, … ,10}. Then only one Nash equilibrium
Corollary 1. Suppose that  consists of two strategies { 
&lt; 

The profile (  =  
The profile (  =</p>
        <p>Both profiles(  =  
lies in the interval [  −( −1)
,
strategies with s∗ = smax.</p>
        <p>smax
strategies with s∗ = smin.</p>
        <p>1⁄( −1)
3.4</p>
        <p>Mixed Strategies Absolutely Continuous in an Interval</p>
        <p>Here we obtain the main results on the Nash equilibrium for the game from Definition 5 in mixed
strategies that are considered as absolutely continuous measures on some intervals. Numerical
examples are provided to illustrate the results obtained.</p>
        <p>Proposition 2. Suppose that the set of strategies is an interval  = [ 
,  
].</p>
        <p>A symmetric Nash equilibrium is given by the probability measure  ∗ absolutely continuous with
respect to the Lebesgue measure exists iff  
support of the measure are


≤ ( −1) −1

. In this case, the game price and the
and the density of the measure  ∗ is
 ∗ =</p>
        <p>smin . Then if b = 0.1 and n ≥ m, the Nash equilibrium exists in pure symmetric
If m = 10 and n = 2, or m = 50 and n = 10, or m = 200 and n = 50, or m = 500 and n = 100,
two Nash equilibria exist in pure symmetric strategies with s∗ = smin and s∗ = smax.</p>
        <p>For all other values of m, n from the set ranges, Nash equilibrium exists in pure symmetric
(13)
(14)
(15)
,</p>
        <p>
          )and the formula (
          <xref ref-type="bibr" rid="ref8">7</xref>
          ) for the game price  ∗ is
Proof. The support of the measure  ∗ should be a subinterval supp  ∗ = [ ′
,  
],  ′
∈
 1
  −1 ( ∗( ≥ 1) +  − 1)
 −1
=  ∗,  ′
≤  1 ≤
        </p>
        <p>.
and  1 =  ′
in (15) yield  ′
=  ∗ =</p>
        <p>( −1) −1
Substitutions of  1 =</p>
      </sec>
      <sec id="sec-3-5">
        <title>Then (15) can be rewritten as</title>
        <p>∗( {≥ 1}) = ∫
  ∗ ( ) = ( − 1) 
1
1⁄ −1 −1⁄ −1 −  + 1.</p>
        <p>Taking derivative in  ∈ supp  ∗ = [ ′
Remark 1. Note that in the previous proposition
,</p>
        <p>], we obtain the formula for the density.


 1
  ∗( )
  ∗( )
 =  


 l, i→m∞
 /
→ 
So, for large  /</p>
      </sec>
      <sec id="sec-3-6">
        <title>Example 3 (Numerical).</title>
        <p>Let parameters  , 
=  ,li→m∞ (1 −
 / →

1 
)
=  −
1</p>
        <p>=
the measure  ∗ is closed to uniform.</p>
        <p>take the same values as in Numerical example 2,  = [ 
,  
= 0.1. Then the existence of the Nash equilibrium in mixed strategy (20), (21) is described
by the following Table 1, where “+” stands for the existence of the Nash equilibrium for given
parameters, “-” stands for its absence.
 −1
 =0
 −1
 =0
10
+
+
+
+
+
+
+
+
+



number of proofs is bigger than the number of provers.</p>
        <p>It also should be noted that, though the case of a continuous set of strategies seems unreal, we may
use some approximations of these results in the case when prices may change in very small steps.
3.5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The Cases of Discreet Measures</title>
      <p>
        other parameters.
interval from (
        <xref ref-type="bibr" rid="ref13">12</xref>
        ):
      </p>
      <p>Here we obtain conditions of the Nash equilibrium for the game from Definition 5 in mixed
strategies that are considered as discrete measures on some intervals, for various sets of strategies and
Proposition 3. Suppose that the set of strategies  = {</p>
      <p>Then the symmetric Nash equilibrium in mixed strategies  ∗ exists iff the value
lies on the
In this case,  −  ∗(</p>
      <p>)is the a root of the polynomial
and the game price is
 ( − 1) −1   − ( − 1)
− ( − 1) ,</p>
      <p>,  ∗, … ,  ∗) =
 1( 
,  ∗, … ,  ∗) =</p>
      <p>−1 ∑ ( − 1) ( −  ∗( 


   −1 ∑   ( −  ∗( 
))
 − −1
.</p>
      <sec id="sec-4-1">
        <title>Proof. As special cases of (6), we get</title>
        <p>The
equality
between
two
expressions
from
(19)
takes
the
form
ℎ( − 1 +  ∗(</p>
        <p>)) = 0 for the polynomial ℎ( ) from (17).
(  − ( − 1) )−</p>
        <p>( − 1) −1 &gt; 0 iff  
(  − ( − 1) ) &lt; 0 iff  


&lt;   .</p>
        <p>&gt; ( −1) −1

 −1
) the Bolzano’s theorem implies the existence of  ∈


−  
,
,
3 2−3 +1):
3 2
 ∗( 
) =
(3 − 2) 
− (3 − 3) 
+ √
 = −3 2 2
+ (6 2 − 6 + 4) 
2( 
−  


)
− 3( − 1)2  2
.</p>
        <p>
          Remark 2. In the case of a two-element set  = { 
belongs to the interval from (
          <xref ref-type="bibr" rid="ref13">12</xref>
          ) appeared in both
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Corollary 1. about pure strategies and in</title>
        <p>Proposition 3 on mixed strategies. The first is the limit case of the second.
 − 1. So for small</p>
        <p>Example 4 ( = { 
&lt;</p>
        <p>}). Note that the degree of the polynomial ℎ( ) from (17) equals to
one can calculate the equilibrium measure  ∗ and the game price  ∗ explicitly.</p>
        <p>In the case of two provers,  = 2, for  


∈ (</p>
        <p>This expression comes from the largest root of the square polynomial (17) (the smallest root is
always outside the interval ( − 1,  )).</p>
        <p>Substitution of  ∗(</p>
        <p>)into (18) yields the game price.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Proposition 4. Suppose that there are two provers</title>
        <p>
          = 2 and the set of strategies is  = { (0) &gt;
 (
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) &gt; ⋯ &gt;  ( )}.
        </p>
        <p>Note that ℎ( − 1) =  
and ℎ( ) =  
So for  


∈ ( −1 ( −1) −1
mixed strategy  ∗.
 −1 ( −1) −1</p>
        <p>.



( − 1,  )which is a root of ℎ( ), and the corresponding probability  =  −  + 1 =  ∗( 
inequality implies ℎ( ) &gt; 0 when</p>
        <p>. The second inequality implies ℎ( ) &lt; 0 when  
Let  ∈ ( − 1,  ). By Lemma 3 we have   ( ,  − 1,  ) &gt; 0 and   ( − 1,  ,  ) &gt; 0. The first


⁄ 
) of</p>
        <p>&lt;
(20)
 ∗ =  ,
(21)
(22)
then the game price and probabilities are</p>
        <p>,  = 1 + (1 + (−1) )( − 1).
 ∗( (ℓ)) = 2  ∗(  −   −1)− (−1)ℓ(2 − 2) = 
 
  −   −1 − (−1)ℓ(2 − 2), 0 ≤  ≤  .</p>
        <p />
        <p>
          Denote   : = ∑ ′=0  ( − ′) for  = 0,1, … ,  ; and for convenience put  −1 = 0. Then  ( ) are
restored as 1⁄(  +  −1). In this case, a one-to-one correspondence is obtained between ( +
1)tuples  (0) &gt;  (
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) &gt; ⋯ &gt;  ( ) &gt; 0 and ( + 1)-tuples of (  )0≤ ≤ such that
        </p>
        <p>0 &lt;  0 &lt;  2 &lt;  4 &lt; ⋯ , 0 &lt;  1 &lt;  3 &lt;  5 &lt; ⋯ .</p>
        <p>If the symmetric Nash equilibrium is given by a probability measure  ∗ with 
(−1) ′</p>
        <p>2</p>
        <p>Such Nash equilibrium exists iff (  )0≤ ≤ satisfy the inequalities (20) and (22)</p>
        <p>
          &gt;    −1 + (−1) (2 − 2)  , 0 ≤  ≤  ,
The set of all such (  )0≤ ≤ is a nonempty interior of convex ( + 1) is dimensional polytope.
Proof. The formula (
          <xref ref-type="bibr" rid="ref7">6</xref>
          ) for the game price  ∗ =  1( 1,  ∗) takes the form
 ∗
        </p>
        <p>Then we prove simultaneously by induction in  = 0,1, … ,  the formulas for probabilities (21) and
The equation  ∗ ( ≥ ( )) = 1 yields the formula for the game price  ∗.</p>
        <p>For (  )0≤l≤ satisfying (20), an above Nash equilibrium exists iff all values of probabilities in
(21) are positive, that is equivalent to (22).
 
 0 &gt; 2 −2 and then select   ∈ (  −1 − 2 −2
2 −1   ,   +1 − 2 −2
2 −1   )for all odd  .</p>
        <p>
          Suitable (  )0≤l≤ can be obtained algorithmically depending on the parity of  : In the case when
 is odd, one can select arbitrarily   with odd  satisfying 0 &lt;  1 &lt;  3 &lt; ⋯ &lt;   and then select
  ∈ ((2 − 2)  +   −1, (2 − 2) 
select arbitrarily  
with even 
+   +1)for all even  . In the case when  is even, one can
satisfying 0 &lt;  0 &lt;  2 &lt; ⋯ &lt;   and additional condition
Proposition 5. Suppose that there are two provers 
= 2. Then each symmetric Nash equilibrium
is given by a probability measure  ∗ with 
 ∗ = 
on the countable set of strategies is
0 =  −1 &lt;  1 &lt;  3 &lt; ⋯ is strongly increasing and bounded and for each even  ≥ 0
 = { (0) &gt;  (
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) &gt; ⋯ } [bounded below by a positive constant] is described as follows: Consider an
arbitrary sequence  −1 &lt;  0 &lt;  1, …, where the subsequence of elements with odd indexes
  ∈ ((2 − 2) lim 2 +1 +   −1, (2 − 2) lim 2 +1 +   +1).
        </p>
        <p>→∞
In this case the subsequence of elements with even indices is strongly increasing  0 &lt;  2 &lt; ⋯ and
 2 +1; the game price is</p>
        <p>→∞
strategies and probabilities are
 (ℓ) =</p>
        <p>1
  +   −1</p>
        <p>,  ∗( (ℓ)) = 2  ∗(  −   −1)− (−1)ℓ(2 − 2), ℓ = 0,1, …
Proof. This Proposition can be proved similarly to the previous one.</p>
        <p>Example 5. According to the previous proposition, one can select   =
and   = 2 − 2 +   −1+  +1 = 2 − 2 +
2
(ℓ+1)(ℓ+3)
ℓ2+3ℓ+1 for even ℓ = 0,2,4, ⋯
Then
 +2
 +1 for odd  = −1,1,3, …
 (ℓ) =
 ( (ℓ)}) =
1
1
2 −
2ℓ + 1
ℓ(ℓ + 2)
{
2 −</p>
        <p>2ℓ + 5
(ℓ + 1)(ℓ + 3)
, if ℓ = 1,3,5, ⋯</p>
        <p>, if ℓ = 0,2,4, …
1
1
ℓ(ℓ + 2)
{(ℓ + 1)(ℓ + 3)
, if ℓ = 1,3,5, ⋯
, if ℓ = 0,2,4, …</p>
        <p>Note that though the results of this paragraph were obtained under some artificial restrictions on
the set of strategies and number of provers, they also help to understand the equilibrium existence for
some exotic and extreme cases.</p>
        <p>Here we obtain conditions of the Nash equilibrium for the game from Definition 5 in mixed
strategies, which are considered as measures with discrete and continuous parts, on suitable sets of
strategies.</p>
        <p>Proposition 6. Suppose that = { 
} ⋃[ ′,  
] ,  
&lt;  ′ &lt;</p>
        <p>Then there exists a
symmetric Nash equilibrium given by the probability measure  ∗ absolutely continuous with respect
to the Lebesgue measure on [ ′,</p>
        <p>] iff
∈ (
( − 1) −1  ( − 1) −1</p>
        <p>,   − ( − 1) ).</p>
        <p>In this case, the game price  ∗, the discrete part  ∗( 
given by the formulas
) and the density  ∗( ) of the measure is
,</p>
        <p>
          Substitution of the expression for game price into (
          <xref ref-type="bibr" rid="ref7">6</xref>
          ) for  1 =  
yields
ℎ1( ∗( 
)) =  
∑   ( −  ∗( 
))
        </p>
        <p>
          In this case, the game price  ∗, the continuous part  ∗([ 
measure are given by the formulas
,  ′]) and the density  ∗( ) of the
 =0
iff
(23)
(24)
(25)
(26)
(27)
of (
          <xref ref-type="bibr" rid="ref8">7</xref>
          ) yields (24).
        </p>
        <p>Proof. Substitution of</p>
      </sec>
      <sec id="sec-4-4">
        <title>Note</title>
        <p>that ℎ1(0) ≥ 0
If  
solution of equation (25).</p>
        <p>Proposition 7. Suppose that 
Lebesgue measure on [</p>
        <p>,  ′] iff
( −1) −1  ( −1) −1
∈ [  −1
,   −( −1) ] we have a symmetric Nash equilibrium with  ∗( 

and
symmetric Nash equilibrium given by probability measure  ∗ absolutely continuous with respect to
 ∗ = [ 
,  ′] ∪ { 
&lt;  ′ &lt;</p>
        <p>
          . Then there exists
( − 1) −1   −( − 1)
∈ (
,
and  ′ into the formula for the game price (
          <xref ref-type="bibr" rid="ref7">6</xref>
          ) yields (29). Derivation
},
        </p>
        <p>).
=</p>
        <p>.</p>
        <p>,  ′]
 −1
 =0
Proof. Substitution of  
 ∗ =  
and  ′ yields</p>
        <p>( −  ∗([ 
=  ′   −1
,  ′, ])) −1
.</p>
      </sec>
      <sec id="sec-4-5">
        <title>The formula for density coincides with (14).</title>
        <p>
          Substitution of the expression for game price in (
          <xref ref-type="bibr" rid="ref7">6</xref>
          ) for  1 =  
yields
ℎ2( ∗([ 
,  ′, ])) =  
∑ ( − 1) ( −  ∗([ 
,  ′, ])) −1 −  
 −1 = 0.
        </p>
        <p>
          (28)
Note that h2(0) ≥ 0 iff
smin ≤ nm−(n−1)m−1
smax mnm−1
and
h2(
          <xref ref-type="bibr" rid="ref1 ref2">1</xref>
          ) ≤ 0 iff
ssmmainx ≥ (n−nm1)−m1−1. If
(n−1)m−1 nm−(n−1)m
smin ∈ [nm−1 , mnm−1 ] we have symmetric Nash equilibrium with μ∗([smin, s′, ]) given by the
smax
solution of equation (28).
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Prover Migration Game</title>
      <p>Here we are going to study another game describing the behavior of provers when choosing proofs
for the next step from different blocks. This game may be considered as some further development
and generalization of the game from Definition 5.</p>
      <p>
        Definition 6. One-step game. We have  provers (= players) and  blocks under construction
with   accessible proof-candidates in  th block for 1 ≤  ≤  . The strategy of  th prover is the block
number 1 ≤   ≤  he selects for the next step. In this case, the utility is defined as
  ( 1, … ,   ) = (
        <xref ref-type="bibr" rid="ref1 ref2">1 −
1</xref>
        )
#{1≤ ′≤ | ′≠ ⋀   ′=  }
      </p>
      <p>.</p>
      <p />
      <p>Remark 3. The utility given by (29) comes as the price of the game on the interval described
by (13).</p>
      <p>Proposition 8. The symmetric Nash equilibrium for the game from Definition 6 is given by the
measure
 ∗( ) =</p>
      <p>1 +  2 ⋯ +  
,  = 1,2, … ,  .</p>
      <p>
        (29)
(30)
Proof. The utility  1( 1,  ∗, … ,  ∗)from (
        <xref ref-type="bibr" rid="ref1 ref2">1</xref>
        ) for (29) is given by the binomial formula
 −1
      </p>
      <p>− 1
∑ (  ′ ) ∗( ) ′(1 −  ∗( 1)) − ′−1 (1 −
1
  
)
 ′
= (1 −
 ∗( 1))
  
 −1
.</p>
      <p>′=0</p>
      <sec id="sec-5-1">
        <title>Then the condition (2) for Nash equilibrium yields (30). The formula (30) means that the “best” strategy for provers to choose the block is to choose randomly one of the proofs-candidates among all proposed ones from different blocks. After that, proof selection completely defines the corresponding block selection.</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions</title>
      <p>We described necessary and sufficient conditions of Nash equilibrium existence for two one-step
games, which describe provers’ behavior in the process of distributed proof generation in sidechains.
All results proposed are strictly formulated and proved using game-theoretical apparatus. Though we
used rather complicated theoretical constructions, all results obtained are of significant practical
value. They are expected to be used when building price policy in Latus Consensus in sidechains.</p>
      <p>The direction for our further research, related to Latus Consensus and decentralized proof
generation, is an investigation of sidechain functioning as a whole, taking into account both multilevel
distributed proof generation in each block and provers’ simultaneous work with proofs from few
different blocks.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Acknowledgments</title>
    </sec>
    <sec id="sec-8">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <article-title>This work was supported in part by the National Research Foundation of Ukraine under Grant</article-title>
          <year>2020</year>
          .
          <volume>01</volume>
          /0351.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Rootstock</surname>
          </string-name>
          <article-title>: smart contracts on bitcoin network, 2018</article-title>
          . URL: https://www.rsk.co.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Back</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Corallo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Dashjr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Friedenbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Maxwell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poelstra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Timón</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wuille</surname>
          </string-name>
          ,
          <article-title>Enabling blockchain innovations with pegged sidechains</article-title>
          ,
          <year>2014</year>
          . URL: https://blockstream.com/sidechains.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Garoffolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Viglione</surname>
          </string-name>
          , Sidechains: Decoupled consensus between chains,
          <year>2018</year>
          . URL: https://arxiv.org/abs/
          <year>1812</year>
          .05441.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiayias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zindros</surname>
          </string-name>
          ,
          <article-title>Proof-of-work sidechains</article-title>
          ,
          <source>Cryptology ePrint Archive, Report 2018/1048</source>
          ,
          <year>2018</year>
          . URL: https://eprint.iacr.org/
          <year>2018</year>
          /1048.pdf
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Garoffolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kaidalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          ,
          <article-title>Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled</article-title>
          and
          <string-name>
            <given-names>Decentralized</given-names>
            <surname>Sidechains</surname>
          </string-name>
          .
          <year>2020</year>
          . URL: https://arxiv.org/pdf/
          <year>2002</year>
          .
          <year>01847</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiayias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>David</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          ,
          <article-title>Ouroboros: A provably secure proof-of-stake blockchain protocol</article-title>
          ,
          <source>CRYPTO</source>
          <year>2017</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>I</given-names>
          </string-name>
          , volume
          <volume>10401</volume>
          of Lecture Notes in Computer Science, Springer, Heidelberg,
          <year>2017</year>
          , pp.
          <fpage>357</fpage>
          -
          <lpage>388</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Garay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiayias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Leonardos</surname>
          </string-name>
          ,
          <article-title>The bitcoin backbone protocol: Analysis and applications</article-title>
          ,
          <source>Advances in Cryptology - EURO-CRYPT</source>
          <year>2015</year>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          , volume
          <volume>9057</volume>
          of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg,
          <year>2015</year>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>310</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ben-Sasson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chiesa</surname>
          </string-name>
          , E.Trómer,
          <string-name>
            <given-names>M.</given-names>
            <surname>Virza</surname>
          </string-name>
          ,
          <article-title>Succinct non-interactive zero knowledge for a von Neumann architecture</article-title>
          ,
          <source>Cryptology ePrint Archive, Report 2013/879</source>
          ,
          <year>2013</year>
          . URL: https://eprint.iacr.org/
          <year>2013</year>
          /879.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bowe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gabizon</surname>
          </string-name>
          .
          <article-title>Making Groth's zk-SNARK simulation extractable in the random oracle model</article-title>
          ,
          <source>Cryptology ePrint Archive, Report 2018/187</source>
          ,
          <year>2018</year>
          . URL: https://eprint.iacr.org/
          <year>2018</year>
          /187.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bespalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garofolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nelasa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          ,
          <article-title>Models of distributed proof generation for zk-SNARK-based blockchains</article-title>
          ,
          <source>Theoretical and Applied Cryptography</source>
          , Belarusian State University, Minsk, Belarus,
          <year>2020</year>
          , pp.
          <fpage>112</fpage>
          -
          <lpage>120</lpage>
          . URL: http://conf.bsu.by/data/theoreticalandappliedcrypto/doc/TAC_2020_Proceedings.pdf,
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <surname>R. B. Myerson</surname>
          </string-name>
          ,
          <article-title>Game theory: Analysis of conflict</article-title>
          , Harvard University Press,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ham</surname>
          </string-name>
          ,
          <article-title>Notions of symmetry for finite strategic-form games</article-title>
          ,
          <year>2013</year>
          . URL: https://arxiv.org/abs/1311.4766.pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>