Bct-Unit 2
Bct-Unit 2
sure that every blockchain transaction is genuine. This helps the blockchain remain
secure since each user is confident that their funds are safe. Therefore, the most
Though there are differences, yet the basic process is all the same.
Consensus mechanisms basically need to make sure that the distributed
ledger of a blockchain stays true. This is done through the following
steps:
2. Dogecoin
3. Ethereum Classic
The working of Proof of Stake is similar to Proof of Work but there is no need to
perform complex calculations in the Proof of Stake consensus mechanism.
1. Ethereum
2. Algorand
3. Avalanche
1. Tron
2. EOS
Proof of History cannot work alone and it needs another blockchain consensus to
verify individual transactions, which is in the case of Solana is Proof of Stake.
These blockchain consensus has a dual layer of protection and is very effective
against Replay Attacks.
VeChain uses this consensus mechanism to select its 101 blockchain validators
which are called as Masternode Operators. This helps VeChain operate its
blockchain in an energy efficient way. As per its claims VeChain uses only 0.04%
of energy as compared to other blockchains.
In Proof of Burn, the validators are required to burn the native coins to be able
to verify transactions. The greater the number of tokens burnt, the higher will be
their share in validating transactions. Tokens are sent to a dead irrecoverable
wallet for burning.
Tokens are mostly sold to validators during ICOs or can be bought from the
market.
Since, after buying tokens, the validators already have a stake in securing the
blockchain, it creates a mental barrier against any ill thought plan to sabotage
the blockchain.
Slimcoin
In this type of consensus mechanism, local hard drive of the validator is used to
store a list of possible solutions to the function that is run for validation. If there
is a large space on the computer, a larger list of solutions can be stored and
therefore a larger probability of discovering the right solutions and add it to
blocks.
Signum
Chia
Spacemint
10. Proof of Contribution (PoCo)
Here, the contribution of users and their behavior is recorded and those with the
highest contributions in a consensus round are rewarded a block. The benefit is
that it does not rely on a cryptocurrency to become a validator unlike Ethereum.
In my experience, if you prefer safety, Proof of Work is the best. If you prefer
centralization, permissioned mechanisms like Proof of Authority is best. If you
prefer a lean consensus mechanism with safety, Proof of Stake works best.
Yes, Bitcoin was the first blockchain which had established the practical usage
of a consensus mechanism which was Proof of Work on which it is based.
Ripple uses the Federated Byzantine Agreement Model for its consensus and it is
called as RPCA (Ripple Protocol Consensus Algorithm).
The fastest consensus protocol as far as I have seen is possible with Proof of
Authority since it requires much lesser number of confirmations than other
consensus protocols.
One can’t answer “What is blockchain scalability?” without talking about the Blockchain
Scalability Trilemma. The scalability of the blockchain is one of the biggest obstacles for
cryptocurrencies is the trilemma. It claims that you can only concurrently achieve two
of decentralization, scalability, or security—never all three. Trade-offs are therefore
unavoidable.
Vitalik Buterin, the creator of Ethereum, originally came up with the term “trilemma,” which
he used in reference to this challenge of blockchain technology. Trilemma is not a rigorous
mathematical proof, merely an observation. Even though the trilemma is challenging, unless
it has been demonstrated that it cannot be solved, an algorithm that can do so may exist.
Directions of Blockchain Scalability Trilemma
1. Decentralization
2. Security
3. Scalability
1. Decentralization
3. Scalability
The network’s capacity is determined by scalability, which also affects the number of
network nodes, the amount of transactions the network can handle, how quickly the
network can handle transactions, and other factors. Because Bitcoin’s blockchain is
scalable as additional users join the network, the term “scalability” is ambiguous. The
PoW algorithm will automatically alter the level of difficulty, and the network may
support any quantity of nodes.
Blockchain Scalability: Execution,
Storage, and Consensus:
DEFINITION
Blockchain scalability is the ability of a blockchain to process transactions, store data, and
reach consensus as additional users are added to the network.
of cryptographic truth .
Blockchains vs. Traditional Computing
The blocks submitted by block producers are then accepted or rejected by full
nodes
Entities that independently store a full copy of the chain’s ledger and
continually validate new blocks but are not required to participate in block
production.
Full nodes are run by most block producers but also include end-users and
key economic actors such as exchanges, RPC providers, and stablecoin
issuers.
Ultimately, full nodes keep block producers honest by rejecting invalid blocks,
even in a situation where the majority of block producers are malicious.
This makes the creation of invalid blocks a waste of time and money,
assuming a sufficient number of honest full nodes exist.
LIMITATIONS/DRAWBACKS:
1. Execution
2. Storage
3. consensus.
Blockchain Execution
Blockchain Storage
Historical data encompasses all the raw transactions and block data.
Transaction data includes the origin and destination addresses, the
amount sent, and the signature of every individual transaction.
Block data includes the list of transactions and metadata from a specific
block, such as its Merkle root, nonce, previous block hash, etc.
Historical data doesn’t typically require quick access, and there only needs
to be at least one honest entity making it available for download.
Global state is a snapshot of all the data that smart contracts can read
from or write to, such as account balances and the variables within all
smart contracts.
Global state can be generally thought of as the database of a blockchain,
which is required to validate incoming transactions.
State is commonly stored within tree structures (e.g. Merkle trees) where
access and modifications can be easily and quickly made by a full node.
Blockchain Consensus
When scaling the consensus layer, the main problem to solve is how to
reach finality faster, cheaper, and with more trust minimization—all in a
predictable, stable, and accurate manner.
Below are five different approaches currently being taken to scale the
execution layer of blockchains along with the advantages and tradeoffs of
each. In practice, some of these approaches are combined for even
greater execution capacity.
Advantages:
Tradeoffs:
Advantages:
Tradeoffs:
Advantages:
1. All execution shards pull from the same pool of nodes, so there’s no
need to bootstrap security on new shards. Assuming there is a large
pool of nodes, every execution environment can achieve the same
level of security.
2. Execution sharding also doesn’t require raising the hardware
requirements for nodes, as nodes only perform execution on one
shard at a time. Shards can also operate with the same VM or use
different configurations to meet the unique requirements of certain
use cases.
Tradeoffs:
1. Each shard is limited in flexibility given that all nodes must be able
to support the computation of every shard.
2. There is also generally a limit to the number of shards one
blockchain can support due to the increasing computation
requirements put on the main chain and the risk of having too few
nodes per shard.
3. Furthermore, there are frictions when it comes to load balancing as
well as implementation risk given that shared security models mean
that all shards may be subject to the same vulnerability.
Multi-chain ecosystems generally do not share security across blockchains
while execution sharding distributes security across shards from one pool of
node operators.
Advantages:
Rollups can also support escape hatches for trust minimization; i.e.,
if a rollup network is not working properly, users can withdraw their
crypto and submit it to the baselayer blockchain.
Many modular networks can also amortize user costs; i.e., there are
fixed costs for verifying the proof of a zk-rollup on the baselayer
blockchain, meaning consensus costs can be reduced as usage
increases since they are shared amongst a larger number of users.
Furthermore, rollups have a 1-of-n trust model—only one honest
node is required to ensure the correctness and liveness of the
computation.
Tradeoffs:
1. Modular blockchains may not be as fast or as cheap as sidechains
or standalone chains since most approaches leverage the use of a
baselayer blockchain’s limited and sometimes expensive block
space for security.
2. Current approaches to modular networks also commonly carry
upgradability risks that require governance intervention (outside
immutable enshrined rollups) and may result in liquidity
fragmentation and composability challenges if some dApps remain
on a baselayer blockchain while others run across different off-
chain execution layers.
3. Finally, implementing a rollup or other modular blockchain designs
is a newer and more complex process than launching a new
standalone blockchain.
Advantages:
Tradeoffs:
Below are six different approaches currently being taken to scale the
storage layer of blockchains. In practice, some of these approaches are
combined for even greater storage improvements.
1. Blockchains with higher storage limits for full nodes can offer a
large volume of cheap storage; i.e., full nodes can store more
historical data and larger amounts of state.
2. Direct full node storage enables easier access to on-chain data
given that there are no additional storage layers or external
dependencies.
Tradeoffs:
1. Since there is more and more data to store over time, the
decentralization of the blockchain becomes increasingly at risk as
the costs of running a full node increase.
2. With less decentralization, fewer trust-minimized assurances can
be provided to users that data will be available and correct.
3. State bloat can also lead to slower execution of blocks over time,
increasing the strain on the network as a whole.
1) Another approach to scaling the data storage of blockchains is data sharding. Data
sharding splits the storage of the ledger and/or the data used to recreate the ledger
across many shards, reducing an individual node’s storage requirements at any given
time to that of a single shard or small set of shards.
Advantages:
Data sharding allows blockchains to increase their capacity to store data cheaply
without increasing the hardware requirements for individual nodes.
Such an approach is beneficial for maintaining decentralization since it increases the
ability of users to run their own nodes.
Data sharding also provides greater storage capacity for rollups that store transaction
data on baselayer blockchains—a requirement to rebuild the rollup’s state.
Moreover, approaches such as Danksharding allow for a merged fee market for better
load-balancing and inclusion of data.
Tradeoffs:
There may be limits on the number of shards one blockchain can support due to the
increased load on the main chain.
There is also a need for data availability sampling (DAS), which proves that
historical data needed to reconstruct part of the ledger was available at one point (i.e.
when the block was produced) without nodes actually having to download all the data
themselves.
Additionally, data sharding requires communication overhead to pass storage between
nodes when rotating nodes to different shards. It also requires a large number of nodes
to maintain high security—there must be a certain level of decentralization per shard,
so the total pool of nodes needs to be large since it’s split out amongst all shards.
Modular blockchains perform computation off-chain and then store transaction data or
state differences either on-chain or off-chain.
The data allows other nodes or users to rebuild the current or historical state of the
ledger.
When rollups employ on-chain data storage, transaction data is often compressed off-
chain prior to being stored on-chain.
Advantages:
1. Compressed on-chain data storage is the most secure form of data storage for
modular blockchains because data is stored by all full nodes on the network.
2. It also reduces the cost of storing data on the layer-1 blockchain.
3. When combined with data sharding, rollups are provided access to a more
efficient and cheaper on-chain storage environment for transaction data that
scales better with increased usage.
Tradeoffs:
1. On-chain storage availability is more expensive than off-chain storage, which may
inhibit the ability of modular blockchains to match the scalability of less decentralized
storage options.
2. Compressing data may also drop parts of the data that are not strictly required for
validation, potentially inhibiting a more granular analysis of chain activity based on
that data.
Modular blockchains can store transaction data off-chain to further reduce on-chain
storage requirements.
This includes “validiums,” which publish zero-knowledge proofs on-chain while
storing data off-chain.
There are four main approaches to off-chain data storage by modular blockchains:
Centralized storage consists of off-chain storage on a centralized platform. While it’s the
cheapest way to store data, it can be subject to data withholding and security issues such as
the centralized storage platform modifying data or going offline.
Permissioned DACs store data off-chain but provide on-chain attestations of that data being
published correctly using a signature scheme from a small committee of trusted nodes,
referred to as a data availability committee (DAC). The advantages and tradeoffs are similar
to centralized storage solutions but with slightly better trust assumptions on availability.
Permissionless DACs store data off-chain but provide on-chain proofs using permissionless
DACs with cryptoeconomic incentives to act honestly. Permissionless DACs are cheaper than
on-chain storage solutions while being more secure than other off-chain solutions. The
tradeoffs are that this is still less secure than on-chain storage and has yet to be achieved in
production at scale with sustainable economics.
Volitions enable users to choose whether they want to store their transaction data on-chain
or off-chain. Volitions are novel because they enable data availability solution options at the
individual transaction level while allowing all transactions to share the same state root and
consensus cost. However, this method is more complex than the others listed above and has
yet to be achieved in production.
Data Pruning
Data pruning is a technique that enables blockchain full nodes to discard historical
data beyond a specific block height.
Data pruning is often paired with Proof-of-Stake checkpoints, where the transactions
in blocks beyond the checkpoint are considered final; i.e. they can’t be reversed
without major social consensus or a hard fork.
Advantages:
1. Data pruning reduces the amount of data that a node needs to store or reference when
participating in consensus—the ledger is smaller since historical data is already
validated so it is safe to be pruned.
2. Because the historical data has already been validated, it is no longer needed if the
intent of operating a full node is just to validate future blocks as opposed to also
offering historical look-backs.
Tradeoffs:
1. Data pruning relies on third parties (e.g. exchanges, block explorers, etc) to store
historical data permanently in order to rebuild state back to the genesis block.
2. However, it’s a 1-of-n trust model, so only one third party needs to store the data
honestly in order for a full node to be able to recreate all historical state.
3. With Proof-of-Stake offering checkpoints and weak subjectivity, this assumption
becomes less relevant.
4. However, such data is still important for on-chain analytics and block explorers.
There also exist methods focused around limiting the amount of state that
full nodes have to store, particularly through state expiry, statelessness,
or state rent implementations.
State expiry designs allow nodes to prune state that hasn’t been
accessed in a certain amount of time, yet utilize a type of merkle proof
(called “witnesses”) to revive expired state if needed.
Statelessness designs are where full nodes are not required to store
state. Full nodes only need to validate new blocks with the inclusion of
witnesses. Weak statelessness is when only block producers are required
to store global state while all other nodes can verify blocks without storing
state.
State rent designs require that users pay to maintain limited state
storage. State that is no longer being paid for is recycled and rented out to
new users.
Advantages:
Tradeoffs:
Permissioned Permissionless
Permissioned blockchains:
Permissioned blockchains are blockchains that are closed (i.e., not publicly
accessible) or have an access control layer.
This additional layer of security means that the blockchain can only be
accessed by users with permissions.
Permissioned users are only able to perform blockchain operations within
the strict confines of roles assigned to them by the ledger administrators
and require that they authenticate themselves through certificates or
digital identifier methods.
In addition, the roles would dictate what information a user would be able
to access.
Security
Permissioned blockchains provide the operating organization granular control
over permissions, data access, and the scope of user roles.
Lack of anonymity
Security
Flexibility of Decentralisation
Performance
These blockchain networks work faster since they have limited accessibility. With
fewer nodes in the network performance and scalability are improved.
Risk of Corruption
Being a permissioned network these blockchains fall under the purview of regulators.
This means that permissioned blockchains can be regulated or censored and a
transaction can be restricted from being executed.
Vulnerable to attacks
1. Based on the architecture of permissioned blockchains, there are several industry use cases
where they have been successfully applied.
2. These are primarily in the context of ‘B2B’, ‘B2C’ and ‘government to organisations’ setups.
3. The key feature of restricted access on permissioned blockchains has made it a popular
option for supply chain management, claim handling, payment verification between parties,
and identity verification as well.
Quorum
This blockchain platform is a permissioned network that was designed for
commercial use cases with a primary focus on the financial services industry’s
enterprises and organisations.
Corda
This particular permissioned and highly secure blockchain network is ideal for
financial markets.
Table of content:
Seven Key Design Principles of a Blockchain System
o Principle 1: Decentralization
o Principle 2: Immutability
o Principle 3: Transparency
o Principle 4: Security
o Principle 5: Scalability
o Principle 6: Privacy
o Principle 7: Flexibility
Principle 1: Decentralization
Principle 2: Immutability
Principle 3: Transparency
Principle 4: Security
Principle 5: Scalability
Principle 6: Privacy
Principle 7: Flexibility
PBFT Consensus
Federated Consenus