Affiliation:
1. Sun Yat-Sen University, China
2. University of Wollongong, Australia
3. Zhongyuan University of Technology, China
4. Columbia University, USA
Abstract
A fundamental issue in blockchain systems is their scalability in terms of data storage, computation, communication, and security. To resolve this issue, a promising research direction is coding theory, which is widely used for distributed storage, recovery from erasures or channel errors and/or to reduce communication cost. To this end, this article provides the
first
comprehensive survey of approaches that employ coding theory to scale blockchain systems. It shows how the use of coded symbols or shards allow participants to only store a fraction of the total blockchain, protect against malicious nodes or erasures, ensure data availability in order to promote transparency, and scale the security of sharded blockchains. Further, coded symbols help reduce communication cost when disseminating blocks, which help bootstrap new nodes and speed up consensus of blocks. For each category of solutions, we highlight problems and issues that motivated their designs and use of coding. Moreover, we provide a qualitative analysis of their storage, communication, and computation costs.
Funder
National Key R&D Program of China
National Natural Science Foundation of China
Natural Science Foundation of Guangdong Province
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference137 articles.
1. Network information flow;Ahlswede Rudolf;IEEE Trans. Inf. Theory,2000
2. Fraud and data availability proofs: Maximising light client security and scaling blockchains with dishonest majorities;Al-Bassam Mustafa;arXiv preprint arXiv:1809.09044,2018
3. Throughput-efficient Lagrange coded private blockchain for secured IoT systems;Asheralieva Alia;IEEE Internet Things J.,2021
4. Adam Back Matt Corallo Luke Dashjr Mark Friedenbach Gregory Maxwell Andrew Miller Andrew Poelstra Jorge Timón and Pieter Wuille. 2022. Enabling Blockchain Innovations with Pegged Sidechains. http://www.blockstream.com/sidechains.pdf. (2022). Accessed: 2022-07-26.
5. A data availability attack on a blockchain protocol based on LDPC codes;Battaglioni Massimo;arXiv preprint arXiv:2202.07265,2022
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献