A newly-proposed relay protocol could reduce the “transaction bandwidth” used up by bitcoin nodes by up to 75%.
Called Erlay, the proposed protocol alters the way transactions are relayed so that they use significantly less bandwidth, an important resource for the nodes that make up the network. The authors include The University of British Columbia researcher Gleb Naumenko as well as two bitcoin development heavy-weights: Greg Maxwell and Pieter Wuille.
The way bitcoin works is that nodes across the world tie together to form a network. Under the hood, once a transaction is broadcast, it ripples through this vast network of hardware.
Erlay changes up how the announcement of these transactions is performed. As Naumenko described in a bitcoin dev email announcing the new proposal:
“The main idea is that instead of announcing every transaction to every peer, announcements are only sent directly over a small number of connections (only 8 outgoing ones). Further relay is achieved by periodically running a set reconciliation protocol over every connection between the sets of withheld announcements in both directions.”
The results, according to Naumenko: “We save half of the bandwidth a node consumes, allow increasing connectivity almost for free, and, as a side effect, better withstand timing attacks. If outbound peer count were increased to 32, Erlay saves around 75% overall bandwidth compared to the current protocol.”
One important result of this new protocol, the researchers argue, is that by reducing how much bandwidth this process takes, nodes can increase the number of connections they hold with other nodes.
Eclipse attack
As low-level and technical as it sounds, it’s important research, particularly as it relates to the security of the network itself.
The security of bitcoin depends at least partly on connections between nodes. This new protocol could make room for more connections, and the more connected a node is, the more “hardened” it is against network attacks.
Naumenko described one such attack to CoinDesk: “The most trivial example is Eclipse attack, when a target node gets isolated from the longest chain, because all its connections are established with an attacker. In this case, an attacker, for example, can make a target node believe that they paid that target node (show shorter chain with that [transaction] in), without actually submitting transactions to the longest chain.”
How this attack could impact bitcoin is described in more detail in a 2015 research paper.
So, if the protocol is so important for the security of bitcoin, what’s next? Will it be added to Bitcoin Core, the most-popular software implementation of bitcoin?
“A couple weeks ago I chatted with several Bitcoin Core contributors and the feedback was generally positive, although they requested more experiments. Now, as those experiments are added, I would give more time for everybody to familiarize themselves with new technical bits,” Naumenko told CoinDesk.
As a rule, new technology isn’t added to bitcoin unless the most active contributors to the software, as well as the wider ecosystem that actually operates the nodes (and, unlike miners, don’t receive any kind of built-in subsidy or compensation), agrees with it.
“We received positive signals from the community, which encourages us to continue working on the implementation,” he added. If the community continues to like it, then: “The protocol should become part of one of the future major releases (hopefully, the next one).”
Fiber optics image via Shutterstock
Credit: Source link