#dusk $DUSK @Dusk In Dusk, the generation process starts with the Proof of Blind Bid mechanism, where each Dusk participant privately calculates a cryptographic score using their bid and secret.

If the score meets the threshold set by Dusk, the participant is allowed to forge a candidate block.

This block is created together with a zero-knowledge proof, ensuring Dusk can verify correctness without revealing private data.

The candidate block is then propagated across the Dusk Network, allowing Dusk to move forward in consensus with fairness, privacy, and cryptographic trust built into every step.

On Dusk Network, leader selection is driven by cryptography rather than transparency. In every consensus round, each participant calculates a private cryptographic score using their hidden bid and secret.

This process relies on the Poseidon hash, combining the bid commitment, secret, round, and step into a single score. Based on this value, the network determines whether a participant becomes the leader, without revealing identities or stake amounts. If the score crosses a predefined threshold, the participant is probabilistically selected as leader.

This design ensures fairness, unpredictability, and strong privacy, while preventing manipulation, front-running, and stake-based targeting within the consensus process.