English
Back
Completed
2022/10/04 → 2023/07/16, 04:00

Hacker Dōjo|Project Research: Mempool Protocol Narwhal and Consensus Protocol Tusk

200USDT
  • Writing / Translation
  • Narwhal
  • Tusk
  • MOVE
  • Sui
  • Byzantine Fault Tolerance
  • Research
  • Details
  • Activities
Hunter’s Guide
How to earn crypto as a bounty hunter?
View Guide ↗
Payment network
Funder
Hacker Dōjō
Organization
contact
Hacker Dōjo
@hackerdojo
Send Mail
participants
 
Single-winner bounty
details

Introduction: The mempool protocol Narwhal and consensus protocol Tusk were first introduced by Mysten Labs in 2019, both of which have since constituted an important consensus engine of the Sui. In this Hacker Dōjo Research Bounty, we hope that you can focus on the above info, study and clarify the background, operation mechanism and technical advantages of Narwhal and Tusk, and finally share your research results with the Dōjo community in the form of live sharing sessions and written manuscripts. Bounty rewards will be issued AFTER the live sharing session and the manuscript submission.

Sign-up process

  1. Please click Participate on the left side of this page for registration ;
  2. Before starting the research, hunters are required to undergo the initial screening. Please contact @DoraDojo0 via Telegram.
  3. The hunter who passes the initial screening will be granted the right to claim Bounty and proceed to start the research;
  4. After confirming the research progress is ready, the Dōjo team will arrange a live sharing session for you to showcase your research results;
  5. Bounty reward will be issued after completing the live sharing session and manuscript. Please claim the bonus on this page. (Hunter Rewards Claiming Guide: https://dorahacks.io/blog/guides/bounty-hunter/)

Specific details ⬇️

Subjects:

Narwhal, A DAG-based Mempool and Tusk, Efficient BFT Consensus

References:

(Must Read) Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus

(Must Read)Narwhal, Bullshark, and Tusk, Sui's Consensus Engine

(Optional) HotStuff: BFT Consensus in the Lens of Blockchain

You are welcome to search for relevant data on your own; If other data sources were referenced in the research results, please indicate them.

Language requirements: English

Bounty requirements:

  1. Live Sharing Session ($200 bonus):
    1. Present with referenced materials, clarify the background, operation mechanism and technical advantages of Narwhal and Tusk;
    2. Your audience may be beginners who have some technical foundation but are completely unfamiliar with MOVE language/Sui blockchain, so please make sure your explanation is straightforward, simple, and engaging.
  2. Summary manuscript ($50 bonus): Based on the content of the sharing session, summarize the research results into a written manuscript, and illustrate the mechanism if necessary.

What is Hacker Dōjo?

Hacker Dōjo is an open source community for Frontier Web3 knowledge contributors and learners built by hackers. Dōjo organizes regular open-source knowledge sessions via Livestream/Twitter Space/blog posts, the topics including interpretation of Web3 cutting-edge technology papers, workshops, seminars with crypto tech leaders and so on.

By joining Dōjo, hackers can suggest personal learning expectations, or take the initiative to propose topics that they are skilled at and have Dōjo team organize sharing sessions. At the same time, the Hacker Dōjo Web3 Research Program offers subjects regularly for hackers to study and share their insights. Contributors will be rewarded in the form of a bounty.

Contact:

E-mail: hackerdojo0@gmail.com

Telegram: @DoraDojo0

Activities