Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 33 tok/s
Gemini 2.5 Pro 51 tok/s Pro
GPT-5 Medium 24 tok/s Pro
GPT-5 High 26 tok/s Pro
GPT-4o 74 tok/s Pro
Kimi K2 188 tok/s Pro
GPT OSS 120B 362 tok/s Pro
Claude Sonnet 4.5 34 tok/s Pro
2000 character limit reached

Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements (2306.11456v1)

Published 20 Jun 2023 in cs.NI and cs.CR

Abstract: Despite their increasing popularity, blockchains still suffer from severe scalability limitations. Recently, Ethereum proposed a novel approach to block validation based on Data Availability Sampling (DAS), that has the potential to improve its transaction per second rate by more than two orders of magnitude. DAS should also significantly reduce per-transaction validation costs. At the same time, DAS introduces new communication patterns in the Ethereum Peer-to-Peer (P2P) network. These drastically increase the amount of exchanged data and impose stringent latency objectives. In this paper, we review the new requirements for P2P networking associated with DAS, discuss open challenges, and identify new research directions.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. The merge: Ethereum switch to proof-of-stake. https://ethereum.org/en/upgrades/merge/. Accessed on February 14, 2023.
  2. TERA: topic-based event routing for peer-to-peer architectures. In Inaugural international conference on Distributed event-based systems, DEBS, 2007.
  3. The generals’ scuttlebutt: Byzantine-resilient gossip protocols. In 29th ACM SIGSAC Conference on Computer and Communications Security, CCS, page 595–608, 2022.
  4. Gossip-based peer sampling. ACM Transactions on Computer Systems (TOCS), 25(3):8–es, 2007.
  5. Constant-size commitments to polynomials and their applications. In International conference on the theory and application of cryptology and information security, ASIACRYPT, pages 177–194. Springer, 2010.
  6. Under the hood of the ethereum gossip protocol. In Nikita Borisov and Claudia Diaz, editors, Financial Cryptography and Data Security, pages 437–456, Berlin, Heidelberg, 2021. Springer Berlin Heidelberg.
  7. Kademlia: A peer-to-peer information system based on the XOR metric. In International Workshop on Peer-to-Peer Systems, IPTPS, pages 53–65. Springer, 2002.
  8. Joachim Neu. Data availability sampling: From basics to open problems. Technical report, Paradigm, 2022. Accessed on February 17, 2023.
  9. Riccardo Pecori. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Computer Networks, 94:205–218, 2016.
  10. Performance analysis of ethereum transactions in private blockchain. In 8th International Conference on Software Engineering and Service Science, ICSESS, pages 70–74. IEEE, 2017.
  11. Layer 2 blockchain scaling: A survey. arXiv preprint arXiv:2107.10881, 2021.
  12. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking, 11(1):17–32, 2003.
  13. Gossipsub: Attack-resilient message propagation in the filecoin and eth2. 0 networks. arXiv preprint arXiv:2007.02754, 2020.
  14. Reed-Solomon codes and their applications. John Wiley & Sons, 1999.
  15. Blockchain use cases and their feasibility. Applied Computer Systems, 23(1):12–20, 2018.
Citations (3)

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.