DeepAI AI Chat
Log In Sign Up

Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks

by   Paolo Santini, et al.

ASBK (named after the authors' initials) is a recent blockchain protocol tackling data availability attacks against light nodes, employing two-dimensional Reed-Solomon codes to encode the list of transactions and a random sampling phase where adversaries are forced to reveal information. In its original formulation, only codes with rate 1/4 are considered, and a theoretical analysis requiring computationally demanding formulas is provided. This makes ASBK difficult to optimize in situations of practical interest. In this paper, we introduce a much simpler model for such a protocol, which additionally supports the use of codes with arbitrary rate. This makes blockchains implementing ASBK much easier to design and optimize. Furthermore, disposing of a clearer view of the protocol, some general features and considerations can be derived (e.g., nodes behaviour in largely participated networks). As a concrete application of our analysis, we consider relevant blockchain parameters and find network settings that minimize the amount of data downloaded by light nodes. Our results show that the protocol benefits from the use of codes defined over large finite fields, with code rates that may be even significantly different from the originally proposed ones.


A data availability attack on a blockchain protocol based on LDPC codes

In a blockchain Data Availability Attack (DAA), a malicious node publish...

Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

A popular method of improving the throughput of blockchain systems is by...

Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree

Light nodes are clients in blockchain systems that only store a small po...

Achieving Private Information Retrieval Capacity in Distributed Storage Using an Arbitrary Linear Code

We propose three private information retrieval (PIR) protocols for distr...

CoVer: Collaborative Light-Node-Only Verification and Data Availability for Blockchains

Validating a blockchain incurs heavy computation, communication, and sto...

Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

Lights nodes are commonly used in blockchain systems to combat the stora...