Forward the Original Title‘TeleportDAO:数据验证安全与效率之弈 —— 轻节点设计最新实践’
TeleportDAO and Eigen Labs recently jointly published a paper focusing on the security and efficiency challenges faced by light nodes when accessing and verifying on-chain data in proof-of-stake (PoS) blockchains. This paper proposes a new solution to ensure the security and efficiency of light nodes in PoS blockchains through a series of measures such as economic incentives and insured pre-security mechanisms, as well as customized “programmable security” and cost-effectiveness. It is very forward-looking and worthy of in-depth study.
Note: Eigen Labs is the developer behind the Restaking protocols EigenLayer and EigenDA. Eigen Labs has currently raised more than 150 million US dollars from well-known venture capital institutions such as a16z, Polychain, and Blockchain Capital.
TeleportDAO is located in Vancouver, Canada. It is a cross-chain communication infrastructure project focusing on the Bitcoin and EVM public chains. The protocol has successfully raised $9 million in a round of public sales and financing through Coinlist. This round of financing received participation from multiple investors including Appworks, OIG Capital, DefinanceX, Oak Grove Ventures, Candaq Ventures, TON, Across and bitSmiley.
Currently, in PoS blockchains, validators participate in the consensus network by locking a certain amount of stake (such as 32 ETH in Ethereum) to ensure network security. Therefore, the essence of PoS blockchain security is protected by economics, that is, the larger the total stake, the greater the cost or loss required to attack the consensus network. The implementation of this slashing mechanism relies on a feature called “accountability safety”, that is, if the validator signs a conflicting state, the stake can be slashed.
Full nodes play a vital role in maintaining the integrity of the PoS blockchain. They store all block transaction information, verify consensus signatures, replicate a complete copy of transaction history, and perform state updates. These processes require a lot of computing resources and complex hardware. For example, running a full Ethereum node requires at least 2 TB of SSD storage. In contrast, light nodes reduce computing resource requirements and only store block headers, so they are only suitable for scenarios where specific transactions/statuses are verified, such as mobile wallets and cross-chain bridges. In addition, light nodes rely on full nodes to provide block information when verifying transactions, but the current market share of node service providers is relatively concentrated, so security, independence and immediacy cannot be fully guaranteed. Therefore, this paper explores the trade-off between data acquisition cost and latency for light nodes to achieve optimal security.
Bitcoin introduced Simple Payment Verification (SPV) as its light node protocol. SPV enables light nodes to use Merkle Proof and block headers to verify whether a transaction is included in a specific block. Therefore, light nodes only need to download the block header of the blockchain to verify the finality of the transaction by checking the depth of the block. In this case, the computational cost of verifying consensus by light nodes in Bitcoin is relatively low. However, in PoS blockchains such as Ethereum, the design of consensus checking is inherently more complex. It involves maintaining the entire set of validators, tracking their stake changes, and performing many signature checks for the consensus network. On the other hand, the security of PoW light nodes relies on the assumption that most full nodes are honest. To address the limitations of SPV, FlyClient and Non-Interactive Proof of Work (NiPoPoW) prove these blocks to clients at a sublinear cost. However, their applicability to the PoS consensus model is weak.
In contrast, PoS blockchains gain security through slashing mechanisms. The system relies on consensus participants being rational and not attacking the network if the cost of an attack exceeds any potential profit. To reduce verification costs, Ethereum’s current light node protocol relies on a sync committee consisting of 512 randomly selected Ethereum validators, each of which stakes 32 Ethereum, but the signing process will not be fined. This unslashable design has a major security flaw, and dishonest signatures in the synchronization committee can mislead light nodes into accepting invalid data without being punished. Even with the introduction of slashing mechanisms, the total stake of the Sync Committee is still small compared to the huge Ethereum validator pool (as of March 2024, the number of Ethereum validators has exceeded 1 million). Therefore, this approach cannot provide light nodes with security equivalent to the Ethereum validator set. This model represents a special variant of multi-party computation in a rational setting, but fails to provide economic-based guarantees or address the threats posed by malicious, irrational data providers.
To address the security and efficiency challenges in the PoS bootstrap process, PoPoS introduces a segmentation game to effectively challenge the adversarial Merkle tree of PoS timing. While they achieve minimal footprint and avoid requiring clients to always be online and staked, the problem of enabling clients to go offline without incurring significant costs to rejoin the network remains unsolved.
Another research approach focuses on using zero-knowledge proofs to create concise proofs. For example, Mina and Plumo effectively facilitate lightweight consensus verification by using recursive SNARK composition and SNARK-based state transition proofs. However, these approaches impose a considerable computational burden on block producers to generate proofs, and they do not address the issue of compensating light nodes for potential losses. In the context of other PoS protocols, such as the Tendermint protocol used in Cosmos, the role of light nodes is explored in their Inter-Blockchain Communication (IBC) protocol. However, these implementations are specific to their respective ecosystems and are not directly applicable to Ethereum or various other PoS blockchains.
Generally speaking, the new solution introduces an economic security module to achieve “programmable security”, and light nodes can decide on different solution designs based on their own security needs. The security assumption is basically 1/N + 1/M, that is, as long as there is an honest and valid node in the full node and the prosecutor network, the normal operation of the network can be guaranteed.
Option 1 mainly achieves data credibility through the introduction of a challenge period and a prosecutor network. Simply put, after the light node receives the data signed by the provider, it sends this part of the data to the prosecutor network for review. Within a certain period, if there is data fraud, the prosecutor will remind the light node that the data is not credible, and the penalty module of the smart contract will penalize the provider’s pledged tokens. Conversely, the light node can trust the credibility of these data.
Specific process of light node requesting data:
Other points:
Evaluate:
Solution 2 realizes rapid data confirmation by proposing an insurance mechanism based on Solution 1. In simple terms, after the light node determines the insurance according to the policy amount and duration, part/all of the pledge of the data provider can be reimbursed for the subsequent losses of the light node due to data malice. Therefore, after the light node receives and verifies the data signature provided by the provider, it can determine the initial credibility of the data.
Specific process of light node requesting data:
Other points:
Evaluate:
First, in terms of light node computing efficiency, both light node solutions demonstrate millisecond-level verification efficiency (light nodes only need to verify the data once).
Second, in terms of light node latency, in different scenarios of experimental configuration (see the figure below), the latency is at the millisecond level. It is worth noting that the latency increases linearly with the number of data providers, but the latency is always at the millisecond level. In addition, in Solution 1, since the light node needs to wait for the challenge period results, the latency is 5 hours. If the inspector network is reliable and efficient enough, this 5-hour latency can also be significantly reduced.
Third, in terms of light node costs, in reality, there are two costs for light nodes: gas fee and insurance premium, both of which will increase as the insurance policy amount increases. In addition, for inspectors, the gas involved in submitting data will be repaid with the fine amount to ensure sufficient participation incentives.
The light node solution proposed in this article provides “programmable security” to meet the security requirements in different situations. Option 1 trades higher latency for high security, while Option 2 provides “instant confirmation” services for light nodes by introducing an insurance mechanism. These solutions can be used in scenarios where the finality of transactions needs to be confirmed, such as atomic transactions and cross-chain.
Forward the Original Title‘TeleportDAO:数据验证安全与效率之弈 —— 轻节点设计最新实践’
TeleportDAO and Eigen Labs recently jointly published a paper focusing on the security and efficiency challenges faced by light nodes when accessing and verifying on-chain data in proof-of-stake (PoS) blockchains. This paper proposes a new solution to ensure the security and efficiency of light nodes in PoS blockchains through a series of measures such as economic incentives and insured pre-security mechanisms, as well as customized “programmable security” and cost-effectiveness. It is very forward-looking and worthy of in-depth study.
Note: Eigen Labs is the developer behind the Restaking protocols EigenLayer and EigenDA. Eigen Labs has currently raised more than 150 million US dollars from well-known venture capital institutions such as a16z, Polychain, and Blockchain Capital.
TeleportDAO is located in Vancouver, Canada. It is a cross-chain communication infrastructure project focusing on the Bitcoin and EVM public chains. The protocol has successfully raised $9 million in a round of public sales and financing through Coinlist. This round of financing received participation from multiple investors including Appworks, OIG Capital, DefinanceX, Oak Grove Ventures, Candaq Ventures, TON, Across and bitSmiley.
Currently, in PoS blockchains, validators participate in the consensus network by locking a certain amount of stake (such as 32 ETH in Ethereum) to ensure network security. Therefore, the essence of PoS blockchain security is protected by economics, that is, the larger the total stake, the greater the cost or loss required to attack the consensus network. The implementation of this slashing mechanism relies on a feature called “accountability safety”, that is, if the validator signs a conflicting state, the stake can be slashed.
Full nodes play a vital role in maintaining the integrity of the PoS blockchain. They store all block transaction information, verify consensus signatures, replicate a complete copy of transaction history, and perform state updates. These processes require a lot of computing resources and complex hardware. For example, running a full Ethereum node requires at least 2 TB of SSD storage. In contrast, light nodes reduce computing resource requirements and only store block headers, so they are only suitable for scenarios where specific transactions/statuses are verified, such as mobile wallets and cross-chain bridges. In addition, light nodes rely on full nodes to provide block information when verifying transactions, but the current market share of node service providers is relatively concentrated, so security, independence and immediacy cannot be fully guaranteed. Therefore, this paper explores the trade-off between data acquisition cost and latency for light nodes to achieve optimal security.
Bitcoin introduced Simple Payment Verification (SPV) as its light node protocol. SPV enables light nodes to use Merkle Proof and block headers to verify whether a transaction is included in a specific block. Therefore, light nodes only need to download the block header of the blockchain to verify the finality of the transaction by checking the depth of the block. In this case, the computational cost of verifying consensus by light nodes in Bitcoin is relatively low. However, in PoS blockchains such as Ethereum, the design of consensus checking is inherently more complex. It involves maintaining the entire set of validators, tracking their stake changes, and performing many signature checks for the consensus network. On the other hand, the security of PoW light nodes relies on the assumption that most full nodes are honest. To address the limitations of SPV, FlyClient and Non-Interactive Proof of Work (NiPoPoW) prove these blocks to clients at a sublinear cost. However, their applicability to the PoS consensus model is weak.
In contrast, PoS blockchains gain security through slashing mechanisms. The system relies on consensus participants being rational and not attacking the network if the cost of an attack exceeds any potential profit. To reduce verification costs, Ethereum’s current light node protocol relies on a sync committee consisting of 512 randomly selected Ethereum validators, each of which stakes 32 Ethereum, but the signing process will not be fined. This unslashable design has a major security flaw, and dishonest signatures in the synchronization committee can mislead light nodes into accepting invalid data without being punished. Even with the introduction of slashing mechanisms, the total stake of the Sync Committee is still small compared to the huge Ethereum validator pool (as of March 2024, the number of Ethereum validators has exceeded 1 million). Therefore, this approach cannot provide light nodes with security equivalent to the Ethereum validator set. This model represents a special variant of multi-party computation in a rational setting, but fails to provide economic-based guarantees or address the threats posed by malicious, irrational data providers.
To address the security and efficiency challenges in the PoS bootstrap process, PoPoS introduces a segmentation game to effectively challenge the adversarial Merkle tree of PoS timing. While they achieve minimal footprint and avoid requiring clients to always be online and staked, the problem of enabling clients to go offline without incurring significant costs to rejoin the network remains unsolved.
Another research approach focuses on using zero-knowledge proofs to create concise proofs. For example, Mina and Plumo effectively facilitate lightweight consensus verification by using recursive SNARK composition and SNARK-based state transition proofs. However, these approaches impose a considerable computational burden on block producers to generate proofs, and they do not address the issue of compensating light nodes for potential losses. In the context of other PoS protocols, such as the Tendermint protocol used in Cosmos, the role of light nodes is explored in their Inter-Blockchain Communication (IBC) protocol. However, these implementations are specific to their respective ecosystems and are not directly applicable to Ethereum or various other PoS blockchains.
Generally speaking, the new solution introduces an economic security module to achieve “programmable security”, and light nodes can decide on different solution designs based on their own security needs. The security assumption is basically 1/N + 1/M, that is, as long as there is an honest and valid node in the full node and the prosecutor network, the normal operation of the network can be guaranteed.
Option 1 mainly achieves data credibility through the introduction of a challenge period and a prosecutor network. Simply put, after the light node receives the data signed by the provider, it sends this part of the data to the prosecutor network for review. Within a certain period, if there is data fraud, the prosecutor will remind the light node that the data is not credible, and the penalty module of the smart contract will penalize the provider’s pledged tokens. Conversely, the light node can trust the credibility of these data.
Specific process of light node requesting data:
Other points:
Evaluate:
Solution 2 realizes rapid data confirmation by proposing an insurance mechanism based on Solution 1. In simple terms, after the light node determines the insurance according to the policy amount and duration, part/all of the pledge of the data provider can be reimbursed for the subsequent losses of the light node due to data malice. Therefore, after the light node receives and verifies the data signature provided by the provider, it can determine the initial credibility of the data.
Specific process of light node requesting data:
Other points:
Evaluate:
First, in terms of light node computing efficiency, both light node solutions demonstrate millisecond-level verification efficiency (light nodes only need to verify the data once).
Second, in terms of light node latency, in different scenarios of experimental configuration (see the figure below), the latency is at the millisecond level. It is worth noting that the latency increases linearly with the number of data providers, but the latency is always at the millisecond level. In addition, in Solution 1, since the light node needs to wait for the challenge period results, the latency is 5 hours. If the inspector network is reliable and efficient enough, this 5-hour latency can also be significantly reduced.
Third, in terms of light node costs, in reality, there are two costs for light nodes: gas fee and insurance premium, both of which will increase as the insurance policy amount increases. In addition, for inspectors, the gas involved in submitting data will be repaid with the fine amount to ensure sufficient participation incentives.
The light node solution proposed in this article provides “programmable security” to meet the security requirements in different situations. Option 1 trades higher latency for high security, while Option 2 provides “instant confirmation” services for light nodes by introducing an insurance mechanism. These solutions can be used in scenarios where the finality of transactions needs to be confirmed, such as atomic transactions and cross-chain.