Consensus Mechanism
Arichain utilizes a Delegated Proof-of-Stake (DPoS) consensus mechanism with a unique multi-VM validation approach that ensures security and performance across all supported virtual machine environments.
Delegated Proof-of-Stake Overview
Validator Set Configuration Arichain operates with a carefully balanced validator set designed for optimal performance and decentralization:
Active Validators: TBD block-producing validators ensuring fast block times
Total Validator Set: TBD validators providing security and redundancy
Byzantine Fault Tolerance: Network remains secure with up to 1/3 malicious validators
Geographic Distribution: Validators distributed globally for network resilience
Performance Characteristics The consensus mechanism is optimized for Multi-VM operations:
Block Time: TBD seconds for fast transaction finality
Transaction Throughput: TBD TPS with TBD active validators
Finality: Immediate finality without probabilistic confirmation delays
Multi-VM Validation: Parallel validation of EVM and SVM transactions
Authority-Based Initial Operation
To ensure network stability during the initial launch phase, Arichain implements an authority-based operation model:
Phase 1: Authority-Based (Current)
Pre-selected trusted validators ensure network stability
Deterministic block production schedule prevents initial chaos
Focus on performance optimization and ecosystem development
Phase 2: Community DPoS (Future)
Gradual transition to community-selected validators
Stake-based validator selection with democratic governance
Full decentralization while maintaining performance standards
Multi-VM Block Validation
Arichain's consensus mechanism includes specialized features for Multi-VM environments:
Combined Transaction Processing
Validators receive transaction bundles from both EVM and SVM mempools
Parallel execution of VM-specific transactions
Multi-VM state reconciliation before block commitment
Enhanced Security Model
Multi-signature validation requiring consensus from validator majority
Multi-VM state verification through cryptographic proofs
Automatic rollback mechanisms for failed Multi-VM operations
Economic Incentives and Failure Protection
Validator Rewards
Block rewards paid in native ARI tokens
Transaction fee distribution among active validators
Network Security
Economic security through validator stake requirements
Slashing mechanisms for malicious behavior
Progressive penalty system for different violation types
Last updated