Proof-of-Archival-Storage
Last updated
Last updated
The Autonomys Network protocol, Subspace, uses the following cryptographic primitives:
Hashing provides succinct commitments to arbitrary data (blocks, transactions) that are deterministic, verifiable and cannot feasibly be reversed. The Subspace protocol uses the BLAKE2b-256 and BLAKE3 hash functions in different places.
Digital signature scheme secures different parts of consensus by providing a means of authentication.
We currently use Schnorr/Ristretto x25519 (also known as sr25519) as the key derivation and signing algorithm (with the schnorrkel library).
Non-canonical Schnorr signatures are used to sign rewards for a newly forged block (as defined in Substrate) and votes by farmers, as well as transactions and transaction bundles by domain operators.
Canonical (deterministic) signatures are used as a verifiable random function (VRF) in the slot leader election among domain operators. A canonical scheme is necessary for these cases to prevent attackers from repeatedly signing until they produce an election solution that meets the threshold (as part of a grinding attack).
An erasure code extends the given data so that the original data can be recovered from a subset and protected against loss. In Subspace, erasure code is used to encode and decode blockchain history pieces and their KZG commitments in an archived segment. Erasure coding allows for distributed storage of pieces across farmers and helps protect the data against loss in the event of any failures and network partitions. Erasure code is also used in plotting together with proofs-of-space to create unique, easily recoverable plot files for each farmer.
We currently use a Discrete Fourier Transform-based systematic Reed-Solomon code with a rate of 1/2 over the field š¹š, where š is the size of subgroup of points on the BLS12-381 curve for the piece chunks and the same approach over the subgroup of elliptic curve points for piece commitments.
KZG polynomial commitment scheme allows for *constant-*sized inclusion proofs for arbitrary-sized data sets. Specifically:
The commitment size is constant and equal to one elliptic curve point of an elliptic curve group that admits pairings.
The witness size is constant and equal to one curve point.
Verification time is constant and requires two point-scalar multiplications and two pairings regardless of the size of the committed data set.
Proving time (commitment and witness generation) is linear in the size of committed data. Subspace uses BLS12-381, which has 48 bytes for elliptic curve points (commitments and witnesses) serialized in compressed form.
The protocol uses the KZG commitment scheme to commit to the archived pieces of history and segments of pieces so that the farmers storing pieces in their plots can always succinctly prove that a particular piece is a valid part of the blockchain history and clients who request pieces can verify the proofs efficiently. The synergy between KZG and Reed-Solomon erasure code allows us to have:
succinct commitments to data of arbitrary size,
succinct witness of the inclusion of data fragments in blockchain history,
efficient verification
provably correct erasure coding
KZG requires a one-time trusted setup of the universal reference values (public parameters). In the spirit of interoperability, Subspace uses the same reference values as Ethereum, computed during a distributed multi-party computation ceremony held by the Ethereum Foundation. This choice allows cross-chain compatibility of KZG proofs between Subspace and Ethereum.
Merkle tree provides succinct commitments (Merkle roots) to arbitrary-sized data sets with efficient logarithmic-sized inclusion proofs. Current usages in Subspace include Merkle trees for:
extrinsics sets in blocks (as defined in the Substrate framework)
state of the blockchain (as defined in the Substrate framework)
execution traces for the domain blocks
Encoding provides a means to make arbitrary useful data (i.e. chunks of blockchain history) look like random data while allowing retrieval of the useful data through decoding. Subspace uses simple XOR as an encoding function.