2021
DOI: 10.1109/access.2021.3101717
|View full text |Cite
|
Sign up to set email alerts
|

Adventures of a Light Blockchain Protocol in a Forest of Transactions: A Subset of a Story

Abstract: The Ethereum blockchain is one of the most popular permissionless blockchains. A consequence of its popularity has been the growth of processing and data storage requirements for any node participating in the Ethereum blockchain network. For constrained devices such requirements are often infeasible to meet. To cater for such nodes, a so-called light protocol has been proposed for Ethereum where the responsibility of maintaining a correct state representation is delegated to light protocol servers. Previous re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…These nodes have more storage than a typical light node but significantly less than a full node. In [10], a scheme for an Ethereum light node called a subset node is proposed. The subset node is an extension of the light node protocol, with the difference that the node locally computes the state of the entire distributed network account.…”
Section: Subset Nodesmentioning
confidence: 99%
See 1 more Smart Citation
“…These nodes have more storage than a typical light node but significantly less than a full node. In [10], a scheme for an Ethereum light node called a subset node is proposed. The subset node is an extension of the light node protocol, with the difference that the node locally computes the state of the entire distributed network account.…”
Section: Subset Nodesmentioning
confidence: 99%
“…To enhance the security of light nodes and mitigate attacks, various approaches have been proposed, such as Fraud Proof [17,18], Super-light clients [11,12,13], block-specific secure light node schemes [9,10], and block compression schemes [14,15,16]. Among them, Fraud Proof plays a pivotal role in securing transactions.…”
Section: Introductionmentioning
confidence: 99%