TeleportDAO and Eigen Labs recently published a paper focusing on the security and efficiency challenges faced by light nodes in Proof of Stake (PoS) blockchains when accessing and verifying on-chain data. The paper proposes a new solution to ensure the security and efficiency of light nodes in PoS blockchains through economic incentives, insured pre-security mechanisms, customizable “programmable security,” and cost-effectiveness. This innovative approach is worth further research. Note: Eigen Labs, the developer behind the Restaking protocol EigenLayer and EigenDA, has raised over $150 million from renowned venture capital firms such as a16z, Polychain, and Blockchain Capital. TeleportDAO, based in Vancouver, Canada, focuses on cross-chain communication infrastructure between Bitcoin and EVM public chains. The protocol successfully raised $9 million through a public sale on Coinlist, with investors including Appworks, OIG Capital, DefinanceX, Oak Grove Ventures, Candaq Ventures, TON, Across, and bitSmiley.
Currently, in PoS (Proof of Stake) blockchains, validators ensure network security by locking a certain amount of stake (like 32 ETH in Ethereum) to participate in the consensus network. This means that the security of PoS blockchains is economically safeguarded: the greater the total stake, the higher the cost or potential loss for anyone attempting to attack the network. This forfeiture mechanism depends on a feature known as “accountability security,” which allows for the forfeiture of a validator’s stake if they sign conflicting states. Full nodes are vital in maintaining the integrity of PoS blockchains. They store all transaction data, verify consensus signatures, maintain a complete transaction history, and execute state updates. These tasks demand significant computing resources and advanced hardware; for instance, running a full Ethereum node requires at least 2 TB of SSD storage. On the other hand, light nodes reduce computing resource demands by only storing block headers, making them suitable for verifying specific transactions/states in applications like mobile wallets and cross-chain bridges. However, light nodes depend on full nodes for block information during transaction verification. Currently, the market share of node service providers is quite concentrated, which compromises security, independence, and immediacy. This article explores solutions to balance data acquisition costs and latency to achieve optimal security for light nodes.
Bitcoin introduced Simple Payment Verification (SPV) as a protocol for light nodes. SPV allows light nodes to verify if a transaction is included in a specific block using Merkle Proof and block headers. This means light nodes only need to download the block headers to verify transaction finality by checking the block’s depth. Consequently, the computational cost for light node consensus verification in Bitcoin is relatively low. However, in PoS blockchains like Ethereum, consensus checks are inherently more complex. They involve maintaining the entire set of validators, tracking their stake changes, and performing numerous signature checks for the consensus network. Additionally, PoW light node security relies on the assumption that most full nodes are honest. To overcome SPV’s limitations, FlyClient and Non-Interactive Proofs of Proof-of-Work (NiPoPoW) offer sublinear cost proofs to clients. However, these methods are less effective for PoS consensus models.
In PoS blockchains, security is achieved through a forfeiture mechanism. This system assumes that consensus participants are rational, meaning they won’t attack the network if the cost exceeds any potential profit. To lower verification costs, Ethereum’s current light node protocol uses a sync committee of 512 randomly selected validators, each staking 32 ETH, but the signing process is not subject to forfeiture. This non-forfeiture design has major security flaws; dishonest signatures in the sync committee can mislead light nodes into accepting invalid data without any punishment. Even with a forfeiture mechanism, the total stake of the sync committee is small compared to the vast pool of Ethereum validators (over 1 million as of March 2024). Therefore, this method does not provide light nodes with security equivalent to the Ethereum validator set. This model is a special variant of multi-party computation under rational settings but lacks economic guarantees and fails to address threats from malicious, irrational data providers.
To tackle the security and efficiency challenges in the PoS bootstrapping process, PoPoS introduces a segmented game to effectively challenge the adversarial Merkle tree of PoS timing. While achieving minimal space requirements and avoiding the need for clients to always be online and maintain stakes, the issue of allowing clients to go offline and rejoin the network without incurring significant costs remains unresolved.
Another research approach uses zero-knowledge proofs to create concise proofs. For example, Mina and Plumo facilitate lightweight consensus verification using recursive SNARK combinations and SNARK-based state transition proofs. However, these methods impose significant computational burdens on block producers for generating proofs and do not address compensating light nodes for potential losses. In other PoS protocols (like the Tendermint protocol in Cosmos), the role of light nodes has been explored in their Inter-Blockchain Communication (IBC) protocol. But these implementations are tailored to their specific ecosystems and are not directly applicable to Ethereum or other PoS blockchains.
In general, the new Plan incorporates an economic security module to achieve “programmable security,” enabling light nodes to choose different designs based on their specific security requirements. The security assumptions follow the 1/N + 1/M principle, which means that as long as there is at least one honest and effective node in both the full node network and the inspector network, the network can function properly.
Plan 1 focuses on ensuring data reliability through a challenge period and an inspector network. In simple terms, after a light node receives data signed by providers, it forwards this data to the inspector network for review. If any fraudulent data is detected within a specified period, the inspector will notify the light node that the data is unreliable, and the forfeiture module of the smart contract will confiscate the staked tokens from the data provider. Otherwise, the light node can trust the data’s reliability. The specific process for light nodes to request data is as follows:
Other points:
Evaluate:
Plan 2 builds on Plan One by introducing an insurance mechanism for rapid data confirmation. In simple terms, after the light node determines the insurance based on the policy amount and duration, part or all of the data provider’s stake can be used to compensate for any subsequent losses incurred by the light node due to malicious data. This allows the light node to establish the initial credibility of the data as soon as it receives and verifies the data signature from the provider. The specific process for the light node to request data is as follows:
Other points:
Evaluation:
First, regarding light node computation efficiency, both plans for light nodes show millisecond-level verification efficiency (light nodes only need to verify the data once). Second, concerning light node latency, under different experimental configurations (as shown in the figure below), the latency is also at the millisecond level. It’s important to note that latency increases linearly with the number of data providers but always remains at the millisecond level. Additionally, in Plan One, because the light node needs to wait for the challenge period results, the latency is 5 hours. If the inspector network is reliable and efficient enough, this 5-hour delay can be greatly reduced.
Third, in terms of light node costs, in practice, light nodes incur two main costs: gas fees and insurance premiums, both of which increase with the policy amount. Additionally, for inspectors, the gas fees involved in submitting data will be reimbursed by the forfeited amount to ensure sufficient participation incentives.
Note: Proposed blocks will eventually be finalized or become uncle blocks.
The light node scheme proposed in this paper offers “programmable security” to address security needs in various situations. Scheme One prioritizes higher security at the cost of increased latency, whereas Scheme Two uses an insurance mechanism to offer light nodes “instant confirmation” services. These schemes are applicable in scenarios that require transaction finality, such as atomic transactions and cross-chain transactions.
TeleportDAO and Eigen Labs recently published a paper focusing on the security and efficiency challenges faced by light nodes in Proof of Stake (PoS) blockchains when accessing and verifying on-chain data. The paper proposes a new solution to ensure the security and efficiency of light nodes in PoS blockchains through economic incentives, insured pre-security mechanisms, customizable “programmable security,” and cost-effectiveness. This innovative approach is worth further research. Note: Eigen Labs, the developer behind the Restaking protocol EigenLayer and EigenDA, has raised over $150 million from renowned venture capital firms such as a16z, Polychain, and Blockchain Capital. TeleportDAO, based in Vancouver, Canada, focuses on cross-chain communication infrastructure between Bitcoin and EVM public chains. The protocol successfully raised $9 million through a public sale on Coinlist, with investors including Appworks, OIG Capital, DefinanceX, Oak Grove Ventures, Candaq Ventures, TON, Across, and bitSmiley.
Currently, in PoS (Proof of Stake) blockchains, validators ensure network security by locking a certain amount of stake (like 32 ETH in Ethereum) to participate in the consensus network. This means that the security of PoS blockchains is economically safeguarded: the greater the total stake, the higher the cost or potential loss for anyone attempting to attack the network. This forfeiture mechanism depends on a feature known as “accountability security,” which allows for the forfeiture of a validator’s stake if they sign conflicting states. Full nodes are vital in maintaining the integrity of PoS blockchains. They store all transaction data, verify consensus signatures, maintain a complete transaction history, and execute state updates. These tasks demand significant computing resources and advanced hardware; for instance, running a full Ethereum node requires at least 2 TB of SSD storage. On the other hand, light nodes reduce computing resource demands by only storing block headers, making them suitable for verifying specific transactions/states in applications like mobile wallets and cross-chain bridges. However, light nodes depend on full nodes for block information during transaction verification. Currently, the market share of node service providers is quite concentrated, which compromises security, independence, and immediacy. This article explores solutions to balance data acquisition costs and latency to achieve optimal security for light nodes.
Bitcoin introduced Simple Payment Verification (SPV) as a protocol for light nodes. SPV allows light nodes to verify if a transaction is included in a specific block using Merkle Proof and block headers. This means light nodes only need to download the block headers to verify transaction finality by checking the block’s depth. Consequently, the computational cost for light node consensus verification in Bitcoin is relatively low. However, in PoS blockchains like Ethereum, consensus checks are inherently more complex. They involve maintaining the entire set of validators, tracking their stake changes, and performing numerous signature checks for the consensus network. Additionally, PoW light node security relies on the assumption that most full nodes are honest. To overcome SPV’s limitations, FlyClient and Non-Interactive Proofs of Proof-of-Work (NiPoPoW) offer sublinear cost proofs to clients. However, these methods are less effective for PoS consensus models.
In PoS blockchains, security is achieved through a forfeiture mechanism. This system assumes that consensus participants are rational, meaning they won’t attack the network if the cost exceeds any potential profit. To lower verification costs, Ethereum’s current light node protocol uses a sync committee of 512 randomly selected validators, each staking 32 ETH, but the signing process is not subject to forfeiture. This non-forfeiture design has major security flaws; dishonest signatures in the sync committee can mislead light nodes into accepting invalid data without any punishment. Even with a forfeiture mechanism, the total stake of the sync committee is small compared to the vast pool of Ethereum validators (over 1 million as of March 2024). Therefore, this method does not provide light nodes with security equivalent to the Ethereum validator set. This model is a special variant of multi-party computation under rational settings but lacks economic guarantees and fails to address threats from malicious, irrational data providers.
To tackle the security and efficiency challenges in the PoS bootstrapping process, PoPoS introduces a segmented game to effectively challenge the adversarial Merkle tree of PoS timing. While achieving minimal space requirements and avoiding the need for clients to always be online and maintain stakes, the issue of allowing clients to go offline and rejoin the network without incurring significant costs remains unresolved.
Another research approach uses zero-knowledge proofs to create concise proofs. For example, Mina and Plumo facilitate lightweight consensus verification using recursive SNARK combinations and SNARK-based state transition proofs. However, these methods impose significant computational burdens on block producers for generating proofs and do not address compensating light nodes for potential losses. In other PoS protocols (like the Tendermint protocol in Cosmos), the role of light nodes has been explored in their Inter-Blockchain Communication (IBC) protocol. But these implementations are tailored to their specific ecosystems and are not directly applicable to Ethereum or other PoS blockchains.
In general, the new Plan incorporates an economic security module to achieve “programmable security,” enabling light nodes to choose different designs based on their specific security requirements. The security assumptions follow the 1/N + 1/M principle, which means that as long as there is at least one honest and effective node in both the full node network and the inspector network, the network can function properly.
Plan 1 focuses on ensuring data reliability through a challenge period and an inspector network. In simple terms, after a light node receives data signed by providers, it forwards this data to the inspector network for review. If any fraudulent data is detected within a specified period, the inspector will notify the light node that the data is unreliable, and the forfeiture module of the smart contract will confiscate the staked tokens from the data provider. Otherwise, the light node can trust the data’s reliability. The specific process for light nodes to request data is as follows:
Other points:
Evaluate:
Plan 2 builds on Plan One by introducing an insurance mechanism for rapid data confirmation. In simple terms, after the light node determines the insurance based on the policy amount and duration, part or all of the data provider’s stake can be used to compensate for any subsequent losses incurred by the light node due to malicious data. This allows the light node to establish the initial credibility of the data as soon as it receives and verifies the data signature from the provider. The specific process for the light node to request data is as follows:
Other points:
Evaluation:
First, regarding light node computation efficiency, both plans for light nodes show millisecond-level verification efficiency (light nodes only need to verify the data once). Second, concerning light node latency, under different experimental configurations (as shown in the figure below), the latency is also at the millisecond level. It’s important to note that latency increases linearly with the number of data providers but always remains at the millisecond level. Additionally, in Plan One, because the light node needs to wait for the challenge period results, the latency is 5 hours. If the inspector network is reliable and efficient enough, this 5-hour delay can be greatly reduced.
Third, in terms of light node costs, in practice, light nodes incur two main costs: gas fees and insurance premiums, both of which increase with the policy amount. Additionally, for inspectors, the gas fees involved in submitting data will be reimbursed by the forfeited amount to ensure sufficient participation incentives.
Note: Proposed blocks will eventually be finalized or become uncle blocks.
The light node scheme proposed in this paper offers “programmable security” to address security needs in various situations. Scheme One prioritizes higher security at the cost of increased latency, whereas Scheme Two uses an insurance mechanism to offer light nodes “instant confirmation” services. These schemes are applicable in scenarios that require transaction finality, such as atomic transactions and cross-chain transactions.