Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

10/14/2020
by   Debarnab Mitra, et al.
0

In certain blockchain systems, light nodes are clients that download only a small portion of the block. Light nodes are vulnerable to data availability (DA) attacks where a malicious node hides an invalid portion of the block from the light nodes. Recently, a technique based on erasure codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack with high probability. The CMT is constructed using LDPC codes for fast decoding but can fail to detect a DA attack if a malicious node hides a small stopping set of the code. To combat this, Yu et al. used well-studied techniques to design random LDPC codes with high minimum stopping set size. Although effective, these codes are not necessarily optimal for this application. In this paper, we demonstrate a more specialized LDPC code design to improve the security against DA attacks. We achieve this goal by providing a deterministic LDPC code construction that focuses on concentrating stopping sets to a small group of variable nodes rather than only eliminating stopping sets. We design these codes by modifying the Progressive Edge Growth algorithm into a technique called the entropy-constrained PEG (EC-PEG) algorithm. This new method demonstrates a higher probability of detecting DA attacks and allows for good codes at short lengths.

READ FULL TEXT
research
08/30/2021

Overcoming Data Availability Attacks in Blockchain Systems: LDPC Code Design for Coded Merkle Tree

Light nodes are clients in blockchain systems that only store a small po...
research
05/12/2021

Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

A popular method of improving the throughput of blockchain systems is by...
research
01/18/2022

Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

Lights nodes are commonly used in blockchain systems to combat the stora...
research
01/19/2023

Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design

Data availability (DA) attack is a well-known problem in certain blockch...
research
10/02/2019

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains

In this paper, we propose coded Merkle tree (CMT), a novel hash accumula...
research
02/15/2022

A data availability attack on a blockchain protocol based on LDPC codes

In a blockchain Data Availability Attack (DAA), a malicious node publish...
research
01/20/2022

Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks

ASBK (named after the authors' initials) is a recent blockchain protocol...

Please sign up or login with your details

Forgot password? Click here to reset