Mining in Logarithmic Space

Blockchains maintain two types of data: Application data and consensus data. Towards long-term blockchain scalability, both of these must be pruned. While a large body of literature has explored the pruning of application data (UTXOs, account balances, and contract state), little has been said about the permanent pruning of consensus data (block headers). We present a protocol which allows pruning the blockchain by garbage collecting old blocks as they become unnecessary. These blocks can simply be discarded and are no longer stored by any miner. We show that all miners can be light miners with no harm to security. Our protocol is based on the notion of superblocks, blocks that have achieved an unusually high difficulty. We leverage them to represent underlying proof-of-work without ever illustrating it, storing it, or transmitting it. After our pruning is applied, the storage and communication requirements for consensus data are reduced exponentially. We develop new probabilistic mathematical methods to analyze our protocol in the random oracle model. We prove our protocol is both secure and succinct under an uninterrupted honest majority assumption for 1/3 adversaries. Our protocol is the first to achieve always secure, always succinct, and online Non-Interactive Proofs of Proof-of-Work, all necessary components for a logarithmic space mining scheme. Our work has applications beyond mining and also constitutes an improvement in state-of-the-art superlight clients and cross-chain bridges.

[1]  Charalampos Papamanthou,et al.  Edrax: A Cryptocurrency with Stateless Transaction Validation , 2018, IACR Cryptol. ePrint Arch..

[2]  Edgar R. Weippl,et al.  (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice , 2018, IACR Cryptol. ePrint Arch..

[3]  Thaddeus Dryja,et al.  Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set , 2019, IACR Cryptol. ePrint Arch..

[4]  Roger Wattenhofer,et al.  Divide and Scale: Formalization of Distributed Ledger Sharding Protocols , 2019, ArXiv.

[5]  Aggelos Kiayias,et al.  Proof-of-Stake Sidechains , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[6]  William Pugh,et al.  Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.

[7]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[8]  Joseph Bonneau,et al.  Coda: Decentralized Cryptocurrency at Scale , 2020, IACR Cryptol. ePrint Arch..

[9]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[10]  Aggelos Kiayias,et al.  Compact Storage of Superblocks for NIPoPoW Applications , 2019, IACR Cryptol. ePrint Arch..

[11]  Roger Wattenhofer,et al.  Cerberus Channels: Incentivizing Watchtowers for Bitcoin , 2020, IACR Cryptol. ePrint Arch..

[12]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[13]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[14]  Dan Boneh,et al.  Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[15]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.

[16]  Arthur Gervais,et al.  Ethereum Eclipse Attacks , 2016 .

[17]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[18]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[19]  Aggelos Kiayias,et al.  Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy , 2020, IACR Cryptol. ePrint Arch..

[20]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[21]  Aggelos Kiayias,et al.  Proofs of Proofs of Work with Sublinear Complexity , 2016, Financial Cryptography Workshops.

[22]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[23]  Joseph Poon,et al.  Plasma : Scalable Autonomous Smart Contracts , 2017 .

[24]  Klaus Wehrle,et al.  How to Securely Prune Bitcoin’s Blockchain , 2020, 2020 IFIP Networking Conference (Networking).

[25]  Eli Ben-Sasson,et al.  Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..

[26]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[27]  Loi Luu,et al.  FlyClient: Super-Light Clients for Cryptocurrencies , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[28]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[29]  Aggelos Kiayias,et al.  Proof-of-Work Sidechains , 2019, IACR Cryptol. ePrint Arch..

[30]  Aggelos Kiayias,et al.  A Composable Security Treatment of the Lightning Network , 2020, 2020 IEEE 33rd Computer Security Foundations Symposium (CSF).

[31]  Roger Wattenhofer,et al.  Brick: Asynchronous Incentive-Compatible Payment Channels , 2021, Financial Cryptography.

[32]  Kostis Karantias,et al.  SoK: A Taxonomy of Cryptocurrency Wallets , 2020, IACR Cryptol. ePrint Arch..

[33]  Roger Wattenhofer,et al.  Bitcoin Security under Temporary Dishonest Majority , 2019, Financial Cryptography.

[34]  Jason Teutsch,et al.  A scalable verification solution for blockchains , 2019, ArXiv.

[35]  Aggelos Kiayias,et al.  Non-Interactive Proofs of Proof-of-Work , 2020, IACR Cryptol. ePrint Arch..

[36]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[37]  Mario Larangeira,et al.  Rollerchain, a Blockchain With Safely Pruneable Full Blocks , 2016 .

[38]  Aggelos Kiayias,et al.  The velvet path to superlight blockchain clients , 2021, IACR Cryptol. ePrint Arch..

[39]  Dionysis Zindros,et al.  Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks , 2021, IACR Cryptol. ePrint Arch..