Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks

01/20/2022
by   Paolo Santini, et al.
0

ASBK (named after the authors' initials) is a recent blockchain protocol tackling data availability attacks against light nodes, employing two-dimensional Reed-Solomon codes to encode the list of transactions and a random sampling phase where adversaries are forced to reveal information. In its original formulation, only codes with rate 1/4 are considered, and a theoretical analysis requiring computationally demanding formulas is provided. This makes ASBK difficult to optimize in situations of practical interest. In this paper, we introduce a much simpler model for such a protocol, which additionally supports the use of codes with arbitrary rate. This makes blockchains implementing ASBK much easier to design and optimize. Furthermore, disposing of a clearer view of the protocol, some general features and considerations can be derived (e.g., nodes behaviour in largely participated networks). As a concrete application of our analysis, we consider relevant blockchain parameters and find network settings that minimize the amount of data downloaded by light nodes. Our results show that the protocol benefits from the use of codes defined over large finite fields, with code rates that may be even significantly different from the originally proposed ones.

READ FULL TEXT
research
02/15/2022

A data availability attack on a blockchain protocol based on LDPC codes

In a blockchain Data Availability Attack (DAA), a malicious node publish...
research
05/12/2021

Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

A popular method of improving the throughput of blockchain systems is by...
research
08/30/2021

Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree

Light nodes are clients in blockchain systems that only store a small po...
research
12/11/2017

Achieving Private Information Retrieval Capacity in Distributed Storage Using an Arbitrary Linear Code

We propose three private information retrieval (PIR) protocols for distr...
research
10/01/2020

CoVer: Collaborative Light-Node-Only Verification and Data Availability for Blockchains

Validating a blockchain incurs heavy computation, communication, and sto...
research
10/14/2020

Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

In certain blockchain systems, light nodes are clients that download onl...
research
01/18/2022

Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

Lights nodes are commonly used in blockchain systems to combat the stora...

Please sign up or login with your details

Forgot password? Click here to reset