Blockchains Meet Distributed Hash Tables: Decoupling Validation from State Storage

The first obstacle that regular users encounter when setting up a node for a public blockchain is the time taken for downloading all the data needed for the node to start operating correctly. In fact, this may last from hours to weeks for the major networks. Our contribution is twofold. Firstly, we show a design that enables mining and validation of new blocks keeping only a very small state. Secondly, we show that it is possible to store the state of the blockchain in a distributed hash table obtaining a wide spectrum of trade-offs between storage committed by the nodes and replication factor. Our proposal is independent from the consensus algorithm adopted, and copes well with transactions that involve smart contracts.

[1]  Roberto Tamassia,et al.  Efficient Content Authentication over Distributed Hash Tables , 2006 .

[2]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[3]  Anamika Chauhan,et al.  Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[4]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[5]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[6]  Moritz Steiner,et al.  Evaluating and improving the content access in KAD , 2010, Peer Peer Netw. Appl..

[7]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[8]  Michael Gertz,et al.  A General Model for Authenticated Data Structures , 2004, Algorithmica.

[9]  Petar Popovski,et al.  Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices , 2017, 2018 IEEE International Conference on Communications (ICC).

[10]  Philipp Jovanovic,et al.  OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[11]  Roberto Tamassia,et al.  Authenticated Data Structures , 2003, ESA.