Search

Search for projects by name

Ethereum logoEthereum

  • Type
    Public blockchain
  • TVS
    $46.61 B
  • Economic security
    $75.68 B

  • Duration of storage
    18 days
  • DA Bridge
    Enshrined Bridge
  • Used by
    + 43 more
  • Enshrined Bridge
    Unlike non-enshrined DA bridges, it does not place any honesty assumption on an external committee that provides data availability attestations to the DA bridge. From the rollup perspective, Ethereum's canonical chain cannot contain unavailable data commitments as full nodes self-verify the data availability of each block, discarding blocks with unavailable data. The rollup state validating bridge has access to all the data, as it is posted on chain.

    Risk analysis

    Ethereum is a Proof of Stake (PoS) network that enables the creation and execution of smart contracts and decentralized applications (dApps) using its native cryptocurrency, Ether (ETH). EIP-4844 allows for blob-carrying transactions containing large amounts of data on the consensus layer, and whose commitment can be accessed by the EVM on the execution layer.

    DA Layer
    Self-verify

    Full nodes download the full data for both transactions on the execution layer, and data blobs on the consensus layer. For a block to be considered valid, all data must be available and pass the is_data_available() check. From the rollup perspective, Ethereum’s canonical chain cannot contain unavailable data commitments as full nodes self-verify the data availability of each block, discarding blocks with unavailable data.

    DA Bridge
    Enshrined

    Rollup users have access to all the data, as it is posted onchain on the consensus layer. On the execution layer, the rollup relies on blob data commitment (versioned hashes), which are accessible through the BLOBHASH opcode. The rollup smart contracts can use these blob commitments during state transition validation to reference blobs during proof verification, without requiring direct access to the raw blob data.

    Technology

    Consensus

    Ethereum’s consensus protocol combines two separate consensus protocols, LMD GHOST and Casper FFG. LMD GHOST is a fork choice rule that ensures the liveness of the chain by selecting the Greedy Heaviest-Observed Sub-Tree (GHOST), and considering only the validators most recent vote (Latest Message Driven, LMD). The weight of a branch is calculated by summing the votes for its root block and those for all child branches, acknowledging that a vote for a block inherently supports all its ancestors.

    GHOST fork choice

    This mechanism ensures that the branch with the greatest validator support is favored when making fork choices.

    On the other hand, Casper FFG provides finality to the chain by modifying the fork choice rule. It ensures that once certain blocks are finalized, they are protected from being reverted, effectively pruning branches from the block tree. This finality mechanism prevents deep chain reorganizations. The Ethereum consensus protocol is organized around two key time intervals: the slot and the epoch. A slot lasts 12 seconds, and an epoch comprises 32 slots, totaling 6.4 minutes. Validators provide attestations once per epoch. Attesters are divided into 32 committees, and each one of them votes on one slot during an epoch. Each attestation contains votes for the head of the chain, which LMD GHOST uses, and votes for checkpoints, which are utilized by Casper FFG. The weight of a vote corresponds to the validator’s effective balance which contributes to the overall weight of a branch in the chain. Moreover, in each slot one validator is chosen to propose a block which includes updates to the beacon state, attestations, and the execution payload containing Ethereum user transactions.

    Finality

    To ensure consistency among validators voting at different times within an epoch, they are required to vote for a common checkpoint, specifically the first slot of the epoch. Casper FFG achieves finality through a two-round process. In the first round, each validator proposes what they believe is the best checkpoint and collects attestation from the network about other validators’ views. If 2/3 of the validators agree on the same checkpoint, it becomes justified. In the second round, validators share the justified checkpoint from the first round. If again 2/3 of the validators agree, the checkpoint is finalized. Casper finality Finalization is achieved when confirmation is received from over 2/3 of the validators, indicating that they have observed commitments from more than 2/3 of the validators agreeing not to revert the checkpoint. A finalized checkpoint becomes irreversible unless at least 1/3 of the validators change their stance, which would lead to their stake being slashed. Equivocating (expressing two conflicting views) over blocks or attestations by a validator results in their stake being slashed.

    Blobs (EIP-4844)

    EIP-4844 introduces “blob-carrying transactions,” a new transaction type under EIP-2718 that allows for the inclusion of large data payloads, or blobs, within transactions. EIP-4844 introduces “blob-carrying transactions,” a new transaction type under EIP-2718 that allows for the inclusion of large data payloads, or blobs, within transactions. These blobs are not directly accessible during EVM execution but can be verified through commitments. The EIP sets a target of 3 blobs of 128kb each, with a maximum of 6 blobs per block, equating to ~0.375 MB to ~0.75 MB of data. On the consensus layer, blobs are referenced in the beacon block and propagated separately as “sidecars,” enabling forward compatibility with future data scaling methods like data-availability sampling (DAS). EIP-4844 also creates a new blob gas market, which operates similarly to EIP-1559’s fee mechanism. EIP-4844 also creates a new blob gas market, which operates similarly to EIP-1559’s fee mechanism.
    The blob base fee adjusts dynamically based on the number of blobs included in each block relative to the target. If a block contains more blobs than the target (3 blobs), the blob base fee increases, discouraging additional blob usage in subsequent blocks. Conversely, if a block contains fewer blobs than the target, the blob base fee decreases, encouraging more blob usage. If the number of blobs in a block matches the target, the blob base fee remains unchanged.

    L2s Data Availability

    L2s can post data a Ethereum by submitting a type-3 transaction, which includes the standard transaction fields along with commitments (versioned hashes) to one or more blobs. Any unused space within a blob still incurs full costs, as gas is charged per blob. To retrieve blobs, users have a limited window of 4096 epochs (~18 days) during which they can access them directly from the consensus client using the getBlobSidecars() API call. This API retrieves blobs associated with a specific block rather than a specific transaction. If blobs older than the pruning window need to be accessed, they can be retrieved from an indexer or archiver via API. For transaction-specific blob retrieval, users must fetch all sidecar blobs from a block and identify the one corresponding to the desired versioned hash.

    Optimistic rollups use blob data primarily during the process of submitting fraud proofs. When a dispute arises, the rollup must provide the underlying data from a blob as part of the calldata. The blob verification precompile is used to verify that the provided blob data corresponds to the versioned hash that was initially committed in the transaction. This ensures that the data being used for fraud-proof verification is accurate and consistent with what was originally submitted.
    ZK rollups, on the other hand, use the point evaluation precompile to verify that specific points in the polynomial (represented by the blob) match the expected values. This method allows ZK rollups to prove that the data used in their validity proof is consistent with the blob data committed to Ethereum.

    Enshrined Bridge

    The DA bridge on Ethereum is enshrined, meaning that blob data is directly accessible on the consensus layer, with data availability guaranteed by the network’s inherent consensus rules. If a block contains unavailable data, full nodes will reject it, causing the chain to fork away from that block. This ensures data availability without requiring additional trust assumptions. In contrast, external DA providers must rely on data availability attestations from the external validator set, introducing an extra layer of trust on the majority of validators.

    1. EIP-4844
    2. Ethereum Technical Handbook