Algorithm for Cross-shard Cross-EE Atomic User-level ETH Transfer in Ethereum 2

02/19/2021
by   Raghavendra Ramesh, et al.
0

We address the problem of atomic cross shard value transfer in Ethereum 2. We leverage on Ethereum 2 architecture, more specifically on Beacon chain and crosslinks, and propose a solution on top of the netted-balance approach that was proposed for EE-level atomic ETH transfers. We split a cross-shard transfer into two transactions: a debit and a credit. First, the debit transaction is processed at the source shard. The corresponding credit transaction is processed at the destination shard in a subsequent block. We use netted shard states as channels to communicate pending credits and pending reverts. We discuss various scenarios of debit failures and credit failures, and show our approach ensures atomicity even in the presence of a Byzantine Block proposer. The benefits of our approach are that we do not use any locks nor impose any constraints on the Block Proposer to select specific transactions. However we inherit the limitation of an expensive operation from the netted-balance approach of querying partial states from all other shards.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/26/2019

Atomic Crosschain Transactions for Ethereum Private Sidechains

Public blockchains such as Ethereum and Bitcoin do not give enterprises ...
research
02/06/2020

BatPay: a gas efficient protocol for the recurrent micropayment of ERC20 tokens

BatPay is a proxy scaling solution for the transfer of ERC20 tokens. It ...
research
03/06/2020

Balance Transfers and Bailouts in Credit Networks using Blockchains

In this paper, we propose a technique for rebalancing link weights in de...
research
05/19/2020

Performance Overhead of Atomic Crosschain Transactions

Atomic Crosschain Transaction technology allows composable programming a...
research
02/28/2020

Atomic Crosschain Transactions White Paper

Atomic Crosschain Transaction technology allows composable programming a...
research
09/25/2019

Novel method for handling Ethereum attack

Block-chain world is very dynamic and there is need for strong governanc...
research
09/25/2020

Investigation of 3-D Secure's Model for Fraud Detection

Background. 3-D Secure 2.0 (3DS 2.0) is an identity federation protocol ...

Please sign up or login with your details

Forgot password? Click here to reset