Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements (2306.11456v1)
Abstract: Despite their increasing popularity, blockchains still suffer from severe scalability limitations. Recently, Ethereum proposed a novel approach to block validation based on Data Availability Sampling (DAS), that has the potential to improve its transaction per second rate by more than two orders of magnitude. DAS should also significantly reduce per-transaction validation costs. At the same time, DAS introduces new communication patterns in the Ethereum Peer-to-Peer (P2P) network. These drastically increase the amount of exchanged data and impose stringent latency objectives. In this paper, we review the new requirements for P2P networking associated with DAS, discuss open challenges, and identify new research directions.
- The merge: Ethereum switch to proof-of-stake. https://ethereum.org/en/upgrades/merge/. Accessed on February 14, 2023.
- TERA: topic-based event routing for peer-to-peer architectures. In Inaugural international conference on Distributed event-based systems, DEBS, 2007.
- The generals’ scuttlebutt: Byzantine-resilient gossip protocols. In 29th ACM SIGSAC Conference on Computer and Communications Security, CCS, page 595–608, 2022.
- Gossip-based peer sampling. ACM Transactions on Computer Systems (TOCS), 25(3):8–es, 2007.
- Constant-size commitments to polynomials and their applications. In International conference on the theory and application of cryptology and information security, ASIACRYPT, pages 177–194. Springer, 2010.
- Under the hood of the ethereum gossip protocol. In Nikita Borisov and Claudia Diaz, editors, Financial Cryptography and Data Security, pages 437–456, Berlin, Heidelberg, 2021. Springer Berlin Heidelberg.
- Kademlia: A peer-to-peer information system based on the XOR metric. In International Workshop on Peer-to-Peer Systems, IPTPS, pages 53–65. Springer, 2002.
- Joachim Neu. Data availability sampling: From basics to open problems. Technical report, Paradigm, 2022. Accessed on February 17, 2023.
- Riccardo Pecori. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Computer Networks, 94:205–218, 2016.
- Performance analysis of ethereum transactions in private blockchain. In 8th International Conference on Software Engineering and Service Science, ICSESS, pages 70–74. IEEE, 2017.
- Layer 2 blockchain scaling: A survey. arXiv preprint arXiv:2107.10881, 2021.
- Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking, 11(1):17–32, 2003.
- Gossipsub: Attack-resilient message propagation in the filecoin and eth2. 0 networks. arXiv preprint arXiv:2007.02754, 2020.
- Reed-Solomon codes and their applications. John Wiley & Sons, 1999.
- Blockchain use cases and their feasibility. Applied Computer Systems, 23(1):12–20, 2018.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.