You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+42-13Lines changed: 42 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -7,27 +7,31 @@ Distributed Validators (DV) are a technique for distributing the job of an Ether
7
7
### Motivation
8
8
9
9
#### Traditional Validator Client Setup
10
+
10
11
Ethereum validators participate in the [proof-of-stake (PoS) protocol](https://github.com/ethereum/consensus-specs) by signing messages (such as blocks or attestations) using their staking private key. The staking key is accessible only by the validator client software, which schedules the creation & signing of messages according to the duties assigned to the validator. Some risks involved in a traditional validator client setup are:
12
+
11
13
- The staking private key resides in one location. If an adversary gains access to this key, it can create conflicting messages that result in slashing of the validator's deposit.
12
-
- Stakers who do not operate their own validator need to hand over their staking private key to the operator. They must trust the operator for the security of their staking private key.
14
+
- Stakers who do not operate their own validator need to hand over their staking private key to the operator. They must trust the operator for the security of their staking private key.
13
15
- If the validator client software is unable to create timely messages to perform validator duties, the validator suffers an inactivity leak that reduces its balance.
14
-
- This could happen due to causes such as software crashes, loss of network connection, hardware faults, etc.
16
+
- This could happen due to causes such as software crashes, loss of network connection, hardware faults, etc.
15
17
- If the Beacon Node to which the validator client is connected has a fault, a validator may end up following a minority fork resulting it appearing to be offline to the rest of the PoS protocol.
16
18
17
19
#### Distributed Validator Protocol
20
+
18
21
The Distributed Validator protocol presents a solution to mitigate the risks & concerns associated with traditional, single Validator Client setups. In addition, this protocol can be used to enable advanced staking setups such as decentralized staking pools.
19
22
20
23
### Basic Concepts
21
24
22
25
**Note**: Refer to the [glossary](glossary.md) for an explanation of new terms introduced in the Distributed Validator specifications.
23
26
24
27
The two fundamental concepts behind Distributed Validators are:
28
+
25
29
-**consensus**: the responsibilities of a single validator are split among several co-validators, who must work together to reach agreement on how to vote before signing any message.
26
-
-***M-of-N* threshold signatures**: the validator's staking key is split into *N* pieces and each of the co-validators holds a share. When at least *M* of the co-validators reach consensus on how to vote, they each sign the message with their share and a combined signature can be reconstructed from the shares.
30
+
-**_M-of-N_ threshold signatures**: the validator's staking key is split into _N_ pieces and each of the co-validators holds a share. When at least _M_ of the co-validators reach consensus on how to vote, they each sign the message with their share and a combined signature can be reconstructed from the shares.
27
31
28
-
Ethereum proof-of-stake uses the BLS signature scheme, in which the private keys can be *M-of-N* secret-shared (using Shamir secret sharing) to implement *M-of-N* threshold signatures.
32
+
Ethereum proof-of-stake uses the BLS signature scheme, in which the private keys can be _M-of-N_ secret-shared (using Shamir secret sharing) to implement _M-of-N_ threshold signatures.
29
33
30
-
By combining a suitable (safety-favouring) consensus algorithm with an *M-of-N* threshold signature scheme, the DV protocol ensures that agreement is backed up by cryptography and at least *M* co-validators agree about any decision.
34
+
By combining a suitable (safety-favouring) consensus algorithm with an _M-of-N_ threshold signature scheme, the DV protocol ensures that agreement is backed up by cryptography and at least _M_ co-validators agree about any decision.
31
35
32
36
### Resources
33
37
@@ -37,33 +41,58 @@ The following are existing implementations of Distributed Validator technology (
37
41
38
42
-[`python-ssv`](https://github.com/dankrad/python-ssv): A proof-of-concept implementation of the distributed validator protocol in Python that interacts with the [Prysm Ethereum client](https://github.com/prysmaticlabs/prysm).
39
43
-[`ssv`](https://github.com/bloxapp/ssv): An implementation of the distributed validator protocol in Go that interacts with the [Prysm Ethereum client](https://github.com/prysmaticlabs/prysm).
44
+
-[`charon`](https://github.com/ObolNetwork/charon): An implementation of the protocol in Go that supports all clients that can validate over the [Beacon RESTful APIs](https://ethereum.github.io/beacon-APIs/#/ValidatorRequiredApi)
40
45
41
46
#### Documents
47
+
42
48
-[Distributed Validator Architecture Video Introduction](https://www.youtube.com/watch?v=awBX1SrXOhk)
This specification presents a way to implement Distributed Validator Client software as middleware between the Beacon Node (BN) and Validator Client (VC):
55
+
49
56
- all communication between the BN and VC is intercepted by the DVC in order for it to provide the additional DV functionality.
50
57
- the BN & VC are unaware of the presence of the DVC, i.e., they think they are connected to each other as usual.
51
58
52
59
### Assumptions
53
-
- We assume *N* total nodes and an *M-of-N* threshold signature scheme.
54
-
- For general compatibility with BFT consensus protocols, we assume that `M = (2 * N / 3) + 1`.
55
-
- This specification assumes [some leader-based safety-favoring consensus protocol](src/dvspec/consensus.py) for the Co-Validators to decide on signing upon the same attestation/block. We assume that the consensus protocol runs successfully with *M* correct nodes out of *N* total nodes.
60
+
61
+
- We assume _N_ total nodes and an _M-of-N_ threshold signature scheme.
62
+
- For general compatibility with BFT consensus protocols, we assume that `M = (2 * N / 3) + 1`.
63
+
- This specification assumes [some leader-based safety-favoring consensus protocol](src/dvspec/consensus.py) for the Co-Validators to decide on signing upon the same attestation/block. We assume that the consensus protocol runs successfully with _M_ correct nodes out of _N_ total nodes.
56
64
- We assume the usual prerequisites for safe operation of the Validator Client, such as an up-to-date anti-slashing database, correct system clock, etc.
57
-
- We disregard the voting on the "correct" Ethereum fork for now - this functionality will be added in a future update.
65
+
- We disregard voting on the "correct" Ethereum fork for now - this functionality will be added in a future update.
58
66
59
67
### Desired Guarantees
68
+
60
69
-**Safety (against key theft)**:
61
-
- The Validator's staking private key is secure unless security is compromised at more than *M* of the *N* Co-Validators.
62
-
-**Safety (against slashing)**:
63
-
- Under the assumption of an asynchronous network, the Validator is never slashed unless more than 1/3rd of the Co-Validators are Byzantine.
64
-
- Under the assumption of a synchronous network, the Validator is never slashed unless more than 2/3rds of the Co-Validators are Byzantine.
70
+
- The Validator's staking private key is secure unless security is compromised at more than _M_ of the _N_ Co-Validators.
71
+
-**Safety (against slashing)**:
72
+
- Under the assumption of an asynchronous network, the Validator is never slashed unless more than 1/3rd of the Co-Validators are Byzantine.
73
+
- Under the assumption of a synchronous network, the Validator is never slashed unless more than 2/3rds of the Co-Validators are Byzantine.
65
74
-**Liveness**: The protocol will eventually produce a new attestation/block under partially synchronous network unless more than 1/3rd of the Co-Validators are Byzantine.
66
75
67
76
## Specification
68
77
69
78
Technical details about the specification are described in [`src/dvspec/`](src/dvspec/).
79
+
80
+
## Developer Getting Started
81
+
82
+
This repo relies on [Python](https://www.python.org/), and uses [venv](https://docs.python.org/3/library/venv.html) to manage its dependencies.
83
+
84
+
To get started with this repo using [make](https://www.gnu.org/software/make/manual/make.html), run the following commands:
Copy file name to clipboardExpand all lines: glossary.md
+26-7Lines changed: 26 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -4,18 +4,37 @@
4
4
5
5
-**Validator**: A public key participating in proof-of-stake validation of Ethereum. In Phase 0, validators are expected to perform attestation & block proposal duties for beacon chain blocks.
6
6
-**Validator Client (VC)**: Software to perform the duties of Validators. The VC has access to the private key of the Validators.
7
+
-**Consensus Client (CC)**: A consensus client's duty is to run the proof of stake consensus layer of Ethereum, often referred to as the beacon chain. Examples of Consensus clients include:
-**Execution Client (EC)**: An execution client (formerly known as an Eth1 client) specialises in running the EVM and managing the transaction pool for the Ethereum network. These clients provide execution payloads to consensus clients for inclusion into blocks. Examples of execution clients include:
-**Distributed Validator (DV)**: A group of participants collboratively performing the duties of a Validator. The Validator's private key is secret-shared among the participants so that a complete signature cannot be formed without some majority threshold of participants.
11
-
-**Co-Validator**: A threshold BLS public key participating in the DV protocol for a *particular* Validator.
12
-
-**Distributed Validator Client (DVC)**: Software to participate as a Co-Validator by running the DV protocol (or, to participate as multiple Co-Validators that are each associated with a different Validator). The DVC has access to the private key(s) of the Co-Validator(s), which is(are) the secret-shared threshold private key of the respective Validator(s).
23
+
-**Distributed Validator (DV)**: A group of participants collboratively performing the duties of a single Validator on the Ethereum network. The Validator's private key is secret-shared among the participants so that a complete signature cannot be formed without some majority threshold of participants.
24
+
-**Co-Validator**: A threshold BLS public key participating in the DV protocol for a _particular_ Validator.
25
+
-**Distributed Validator Client (DVC)**: Software to participate as a Co-Validator by running the DV protocol (or, to participate as multiple Co-Validators that are each associated with a different Validator). The DVC has access to an SECP256K1 key that serves as its authentication to its peers, along with a distributed validator client certificate, which authorises this DVC to act on behalf of a given distributed validator key share.
26
+
-**Distributed Validator Node**: A distributed validator node is the set of clients an operator needs to configure and run to fulfil the duties of a Distributed Validator Operator. An operator may also run redundant execution and consensus clients, an execution payload relayer like [mev-boost](https://github.com/flashbots/mev-boost), or other monitoring or telemetry services on the same hardware to ensure optimal performance.
27
+
-**Distributed Validator Cluster**: A distributed validator cluster is a collection of distributed validator nodes connected together to service a set of distributed validators generated during a DVK ceremony.
28
+
-**Distributed Validator Key**: A distributed validator key is one persistent BLS public key emulated by a group of distributed validator key shares completing threshold signing together.
29
+
-**Distributed Validator Key Share**: A distributed validator key share is one BLS private key that is part of the collection of shares that together can sign on behalf of the group distributed validator key.
30
+
-**Distributed Validator Key Generation Ceremony**: A distributed key generation ceremony where a number of parties can come together to trustlessly create a distributed validator key, its associated deposit and exit data, and each parties' distributed validator key share and DVC certificate.
13
31
14
32
## Example
15
33
16
34
An illustrative example for usage of terms described above:
35
+
17
36
- Ethereum Validator with pubkey `0xa5c91...` is operated as a Distributed Validator.
18
-
- 4 Co-Validators are participating in the Distributed Validator for Validator `0xa5c91...`.
19
-
- The private key associated with `0xa5c91...`is split using *3-of-4* secret-sharing among the 4 Co-Validators such that a *3-of-4* threshold signature scheme is setup.
20
-
- In simpler terms, the private key for `0xa5c91...` is split into 4 pieces, each in the custody of one of the Co-Validators such that at least 3 of them have to collaborate to produce a signature from `0xa5c91...`.
21
-
- Each Co-Validator is running the Distributed Validator Client software to participate the in the Distributed Validator.
37
+
- 4 Co-Validators are participating in the Distributed Validator for Validator `0xa5c91...`.
38
+
- The private key associated with `0xa5c91...`was generated during a distributed validator key generation ceremony using _3-of-4_ secret-sharing among the 4 Co-Validators such that a _3-of-4_ threshold signature scheme is setup.
39
+
- In simpler terms, the private key for `0xa5c91...` is split into 4 pieces, each in the custody of one of the Co-Validators such that at least 3 of them have to collaborate to produce a signature from `0xa5c91...`.
40
+
- Each Co-Validator is running the Distributed Validator Client software to participate the in the Distributed Validator.
0 commit comments