2019
DOI: 10.48550/arxiv.1910.01247
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains

Abstract: In this paper, we propose coded Merkle tree (CMT), a novel hash accumulator that offers a constant-cost protection against data availability attacks in blockchains, even if the majority of the network nodes are malicious. A CMT is constructed using a family of sparse erasure codes on each layer, and is recovered by iteratively applying a peeling-decoding technique that enables a compact proof for data availability attack on any layer. Our algorithm enables any node to verify the full availability of any data b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…Similar to the Merkle tree introduced in [2], a CMT is constructed by applying an LDPC code to each layer of the Merkle tree before hashing the layer to generate its parent layer. While we focus on the relevant issues of the CMT, specific details regarding the CMT can be found in [1]. We consider a blockchain network with full nodes and light nodes, where only full nodes can produce new blocks.…”
Section: Preliminaries and System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…Similar to the Merkle tree introduced in [2], a CMT is constructed by applying an LDPC code to each layer of the Merkle tree before hashing the layer to generate its parent layer. While we focus on the relevant issues of the CMT, specific details regarding the CMT can be found in [1]. We consider a blockchain network with full nodes and light nodes, where only full nodes can produce new blocks.…”
Section: Preliminaries and System Modelmentioning
confidence: 99%
“…Networks in which light nodes are connected to a majority of malicious full nodes are susceptible to data availability (DA) attacks [1], [3] where a malicious full node generates a block with invalid transactions, publishes a Merkle root that satisfies the Merkle proof (thus allowing light nodes to successfully verify the inclusion of the transactions in the block), and hides the invalid portion of the block so that honest full nodes are unable to validate the block and notify the light nodes of the malicious behaviour. Light nodes can independently detect a DA attack if an anonymous request for a portion of the block is rejected by the full node that generates the block.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations