[Cryptography] Prime-based proof-of-work and cooperative mining (paper for comments)
oovanes at midlincoln.com
oovanes at midlincoln.com
Mon Dec 8 10:10:59 EST 2025
Dear Christoph, Peter, and members of the list,
Thank you for the detailed and thoughtful feedback.
The draft I shared is an early conceptual exploration, and several of
your critiques correctly highlight areas where clarification or revision
is needed. Posting here was intentional: to obtain exactly this kind of
scrutiny from people with strong backgrounds in number theory and
cryptographic protocol design.
Below I address the main technical points raised and outline changes for
the next revision.
1. Scope of the paper
The current version is not intended as a complete cryptocurrency
specification.
Its purpose is to explore:
• deterministic prime discovery as a proof-of-work,
• cooperative composite submissions,
• a mathematically indexed asset structure, and
• incentive mechanisms inspired loosely by Nash’s principles.
A fully cryptographic specification (hash formats, signatures, block
encodings, adversary models) was not included because the architecture
itself is what I hoped to evaluate first. The next draft will clearly
separate:
• conceptual architecture, and
• protocol specification components (with concrete cryptographic
primitives).
2. Scaling of prime sizes and feasibility of primality proofs
Christoph raised concerns about the feasibility of primality
certificates for very large primes (beyond 10¹⁰⁰⁰ digits). Some of the
numbers cited in the review reflect older benchmarks. Modern ECPP
implementations have certified primes significantly larger than 50,000
digits; recent records exceed 100,000 digits, and certificates above
200,000 digits have been constructed in practice. Verification remains
extremely fast compared to certificate generation.
It is also important to emphasize that the blockchain will never reach
primes anywhere near those sizes.
The index of the first 1024-bit prime is approximately:
π(2^1024)≈10^306.
Even assuming an unrealistically fast rate of one prime per microsecond,
the chain would still require:10^291 years to reach 1024-bit primes —
vastly exceeding the age of the universe. At more realistic block rates
(seconds or minutes), the gap becomes even more extreme.
Therefore the chain remains permanently in a range where modern
primality certificates (ECPP, APR-CL) are fast and practical.
Verification remains cheap relative to mining.
This will be spelled out more clearly in the next revision.
3. Wallet representation — sparse model, not global vectors
Both Christoph and Peter interpreted the wallet state as an ever-growing
vector of dimension equal to the number of mined primes. That was an
error in the way the draft presented the model. Section 4.3 included a
brief note, but I should have emphasized:
Wallets store only coefficients for primes they actually own.
The headline integer H encodes which primes appear.
Example:
• If H=2⋅3⋅7,
• The wallet stores coefficients only for (2,3,7), e.g.
(0.4,0.1,1.0).
Wallets do not hold vectors with entries for all mined primes; they hold
a sparse vector aligned to the factorization of their own H.
This makes storage compact and scalable.
The next draft will make the sparse model the canonical one.
4. Composite proof front-running and gossip timing
Christoph correctly notes that in an asynchronous gossip network, “first
seen” does not reliably define ordering. The paper’s treatment of this
was incomplete.
The intended mechanism is a commit–reveal protocol:
1. Miner submits
commit=H(m∥t∥address).
2. Commitments are timestamped upon receipt.
3. Later, the miner reveals m,t.
4. Only reveals matching prior commitments are valid.
5. The earliest commitment wins.
This prevents front-running and does not require global synchronization.
Commit–reveal is widely used in decentralized protocols and adapts
cleanly here.
The next draft will specify this protocol in detail.
5. Number-theoretic domain extensions
Christoph’s criticism about non-UFD rings is valid. Rings like Z[−5] do
not support unique factorization, and therefore cannot sustain a
divisibility-based ownership model.
Clarification:
• Mining irreducibles in ANY ring is possible as a PoW puzzle.
• Ownership accounting based on divisibility requires a UFD or
Euclidean domain.
• Therefore, extension chains must be restricted to such rings.
• The main chain is always over Z, the canonical UFD.
The earlier version did not sufficiently separate “mining puzzles” from
“ledger semantics.”
This will be corrected.
6. Quantum considerations
A few points are worth distinguishing:
6.1 Signatures
Yes—ECDSA or RSA fail under Shor. The protocol will adopt NIST-standard
post-quantum signatures (e.g., Dilithium).
6.2 Composite proofs
Quantum algorithms accelerate factoring, but the protocol does not rely
on factoring hardness. Composite proofs only require miners to exhibit
one divisor, not to hide factorization.
Quantum ability to find divisors faster simply alters mining difficulty,
much like ASICs affect Bitcoin.
6.3 Prime search
Shor does not accelerate prime search.
Grover provides at most a quadratic speedup, which can be offset through
difficulty adjustment.
Conclusion:
The mining layer is far more quantum-resilient than Bitcoin PoW.
Only the signature layer needs a PQ upgrade.
This distinction will be clearer in the next draft.
7. Incentive model and Nash terminology
The current text uses “Nashian” in an informal sense (cooperative
stability), not as a formal definition of Nash equilibrium. Christoph is
right that an actual equilibrium analysis requires:
• utility functions,
• strategy spaces,
• deviation analysis, and
• explicit proofs.
I will replace “Nashian” with “cooperative incentive structure” unless a
formal game-theoretic appendix is added.
On proof withholding: with commit–reveal the incentive to withhold
vanishes because:
• withholding commits delays reward collection,
• simultaneous reveals cannot displace earlier commitments.
I agree that the current incentive description needs a formal treatment,
which I will work on.
8. Economic framing
The current paper does not argue that fractional prime ownership is a
superior currency.
Its intent is to explore:
• deterministic mathematical issuance,
• provable scarcity,
• cooperative computation,
• and a novel ledger structure.
Value attribution (or non-value) is orthogonal to the construction.
The revised draft will make this clearer.
9. On Peter’s comments
Peter, thank you for taking the time to review the draft. Several of the
concerns you raise appear to come from assumptions that do not match how
the system is actually defined, so I appreciate the opportunity to
clarify these points and revise the exposition in the next version.
(1) On fungibility and currency value
The draft did not make this sufficiently explicit:
all prime-indexed units have equal monetary value.
A wallet holding 0.1 of prime 3 and another holding 0.1 of prime 5
possess the same currency amount.
Thus: There is no conversion problem between Px and Py
“Swapping” fractional ownership of different primes has no effect on
value;
A user sending 0.1 of 3 and receiving 0.1 of 5 has simply exchanged
denominations, not changed wealth.
The fungibility is intentional: the protocol treats all 0.1-denomination
units as interchangeable, regardless of prime label. This also means
that ownership vectors need not grow unbounded; they only include
entries for primes a wallet actually holds.
(2) On wallet size and factorization storage
The critique assumes that:
wallets must store factorizations for all integers up to 2^N
balances must be full-length vectors listing fractional ownership of
every mined prime.
Neither is part of the protocol.
A wallet stores only:
its headline integer H, encoding which primes it holds;
its nonzero fractional coefficients.
A wallet that owns only fractions of primes
{p3,p5,p7} stores only those three entries. There is no global dense
vector per wallet, and no storage of factorization tables for arbitrary
integers.
All factorization work is performed during mining, on candidate
composite proofs. Wallets and nodes do not retain factorizations after
validation.
(3) On “Nash-stability” and Sybil behavior
Your concern about withholding composite proofs or submitting under
multiple pseudonyms is valid. The intention is not to claim that the
current mechanism is fully Sybil-resistant, but rather that the reward
function can be constructed so that honest participation is at least
competitive with strategic deviation.
I will rewrite this section to avoid the impression of a completed
game-theoretic treatment. A more formal analysis (utility functions,
adversary models, etc.) will appear in the next draft.
(4) On transparency and privacy
You correctly point out that a public ledger is traceable, as in
Bitcoin. That is by design: the base system is pseudonymous and
transparent, not anonymous.
However, the fungibility of prime fractions does introduce a mild form
of obfuscation: balances change prime composition over time, breaking a
simple “linear” asset history. This is not presented as a privacy
feature, but it does make heuristic chain analysis less direct than in
UTXO-based ledgers.
That said, the design can absolutely incorporate stronger,
well-established privacy mechanisms
I will add a short section discussing possible privacy extensions and
their implications.
(5) On scalability
Many of the scaling issues mentioned (global vectors, storing
factorizations, etc.) stem from assumptions that do not match the
described data structures. With the sparse representation actually used,
wallet size grows only with the number of assets a wallet holds, not
with the total number of mined primes.
The chain itself does not rely on storing composite proofs long-term;
they are verified and discarded.
The economic model does not require exploding ledger state.
(6) On the tone of the critique
Although I disagree with several assumptions underlying your technical
objections, I appreciate the candid feedback. I will improve the clarity
of the specification to avoid similar misunderstandings, and I will make
the system's intended transparency, fungibility, and design goals more
explicit.
Next steps
I am preparing a significantly revised draft that will:
• clearly separate architecture from protocol specification;
• introduce commit–reveal for composite ordering;
• adopt PQ-safe signature schemes;
• restrict extension rings to UFDs;
• formalize sparse wallet semantics;
• add an explicit adversary model;
• include a more developed incentive theory or remove Nash
terminology;
I have also appended a new Section 9 to the draft that compares this
proposal with Primecoin and with Factor blockchain designs, clarifying
both similarities and substantive differences in proof-of-work
philosophy, scalability, and verification cost.
https://midlincoln.com/pdfs/primenumberblockchain.pdf
Thank you again for the thoughtful critiques. They have been extremely
valuable, and I welcome further comments as the next revision becomes
available.
Best regards,
Ovanes Oganisian
oovanes at midlincoln.com
More information about the cryptography
mailing list