10.08.2024|Charlie NoyesGuru Vamsi Policharla
MEV-Boost, the current sidecar protocol for MEV extraction in Ethereum, relies heavily on centralized actors called relays.
We propose an alternative architecture that allows for direct, cryptographically private communication between builders and proposers. It is based on a novel, non-interactive form of "silent" threshold encryption that can use validators' existing BLS keypairs.
Essentially, we piggyback on the attestation committee for privacy and data availability by threshold encrypting block proposals to a fraction of attesters for the slot. Their attestations form the decryption key; once the desired threshold has attested, the block can be decrypted.
Our construction addresses privacy between builders and proposers but does not alone guarantee block validity. It can be combined with other mechanisms to fully replicate the functionalities provided by relays—both privacy and block validity. For example, proof schemes like Trusted Execution Environment (TEE) proofs or Zero-Knowledge (ZK) proofs, or cryptoeconomic mechanisms to collateralize builders.
By removing the need for relays to provide builder privacy and ensure block validity, we aim to reduce latency and improve Ethereum's decentralization and censorship resistance.
MEV-Boost is a sidecar protocol that intermediates between block builders and proposers. The main role of the relay is to provide two guarantees:
The reliance on relays, however, introduces significant centralization. Approximately 90% of blocks on Ethereum are delivered through just a handful of relays. This poses a few risks:
One of the leading proposals to replace relays is "TEE-Boost", which relies on TEEs (Trusted Execution Environments). Note that TEEs are not essential to our scheme; it's just helpful to use TEE-Boost as a pedagogical example of the problems we aim to solve.
Concretely, TEE-Boost has builders use TEEs to create proofs that demonstrate to proposers the honesty of their bids and the validity of their blocks without revealing the actual block contents to proposers. Proposers can check these proofs without running TEEs themselves on commodity hardware.
However, TEE-Boost has a data availability problem: builders only share TEE proofs and block headers with proposers, not the actual block contents,[1] and may choose not to release the block contents even after the proposer signs the header (e.g., if market conditions change unfavorably). The suggested approaches to solving this DA problem are:
Both approaches have drawbacks. The TEE-escrow solution replicates centralizing latency dynamics similar to those of existing relays.[2] Using an external DA layer introduces an extra-protocol assumption and bears the latency dynamics of that external protocol (which are also likely unfavorable).
We propose an elegant solution to TEE-Boost's DA problem: threshold encryption to the attester committee. Specifically, the builder threshold encrypts the block to a specified fraction of the attester committee for that slot. Once enough attestations are gathered, the block becomes decryptable and available.
The core enabling technology is Silent Threshold Encryption. This cryptographic technique allows threshold encryption without requiring an interactive Distributed Key Generation (DKG) setup phase, which previous constructions required. Instead, the joint public key is computed deterministically from the attester's already-existing BLS public keys plus some "hints" (discussed later).
This achieves direct single-hop communication between the builder and validator with cryptographic privacy. The validators are not required to run TEEs themselves or to manage any new key material.
Mechanics:
The performance characteristics of Silent Threshold Encryption are pretty favorable. Here
Both encryption and partial decryption are constant time. With a naive implementation, encryption takes
The ciphertext size is a constant additive factor, 768 bytes, larger than the plaintext (for any
Aggregation of partial decryptions (i.e., decryption) depends on the size of the committee. With
Importantly, encryption time is the key performance number to compare to relay latency. This is what the builder must compute in the "critical path" of block production. It's lower than the existing relay's block processing latency and avoids multi-hop communication.
Silent Threshold Encryption isn't entirely free. It does require a common reference string of the form:
Additionally, every validator with a BLS public key of the form
As of writing this post, there are approximately 1 million validators. If we set
This requirement will likely decrease substantially with the activation of MaxEB, which allows validators controlling >32 ETH to hold larger balances under the same keypair (rather than splitting them over multiple 32 ETH deposits). The reduction in the validator set that will be realized is up for debate. It seems possible that we could get down to ~1GB.
Lastly, depending on future changes to Ethereum's consensus architecture (e.g. further reductions in the validator set size, or alternative finality pipelining) the size of the hints that must be stored could further decrease.
Ethereum wants to remain live even under adverse network conditions. One issue with this scheme is the possibility of blocks that cannot be decrypted because the specified fraction of the committee is offline.
One solution is to allow the builder to decide on the acceptable fraction (𝑡) of the committee for decryption. There is a tradeoff between privacy (the possibility of unbundling and MEV-stealing) and the likelihood of the committee threshold being online. It's revenue-maximizing for builders to get their blocks included, rather than forked out, so they should figure out an optimized threshold setting.[4]
Additionally, usage of this encryption scheme should be opt-in. Under adverse network conditions, in which no acceptably-sized committee is available with any consistency, proposers and builders could fall back to using relays, self-building, or whatever other mechanism is preferable given the nature of the adverse environment.
Alternatively, the committee may be online, but a builder may be able to create a situation in which the block is either unable to be decrypted or invalid upon decryption (e.g., with fraudulent proofs).
From the protocol's perspective, it's fine to fork these blocks out. The broader validator set simply could not attest to them or to any blocks that reference them. The best way of handling this kind of error is likely to make the consensus client aware of the possibility and able to fail gracefully. Further study on exactly how would be needed.
The winning builder knows the contents of the block before others until the threshold is reached, which could create an unfair advantage in subsequent slots. However, the attester committee is supposed to act before the end of the next slot, and the majority of block value is at the end of the slot, so the effects of this advantage should be as nearly minimal as possible.
In the long term, it may be possible to replace TEE proofs with Zero-Knowledge (ZK) proofs. Currently, ZK proofs are too slow, but advancements in cryptography, software, and specialized hardware (ASICs) might eventually make ZK proof generation feasible within the necessary latency constraints. Notably, ZK proofs accompanying blocks are already a core part of Ethereum's long-term roadmap.
With the current validator set size and growth rate, this scheme may not be worth the amount of data required to be published on L1. However, Ethereum already plans to substantially reduce the validator set count with MaxEB.
The best approach would likely be an upgrade alongside or after MaxEB in which consensus clients are made aware of the possibility of encrypted block semantics and validators are encouraged to publish hints. For example, after MaxEB, it could be required that newly entering validators publish hints, and older validators could be given an incentive to upgrade.
Builders would begin to use the mechanism once a sufficient fraction of the validator set adopted it to have sufficient committee sizes (i.e., both acceptable privacy and likelihood of decryption).
If our approach does indeed have favorable latency relative to multi-hop relaying, the market should adopt it without the need for the protocol to enforce usage or enshrine a specific parameterization.
Relays are one of Ethereum's most significant sources of centralization, creating opportunities to rent-seek and distorting the protocol's geographic decentralization.
We need to remove relays and think this is a relatively elegant way to do so. It requires changes at the consensus layer, but no new hardware or key material is required on the part of validators.
The downside is that it is a complex change to the consensus layer for a mechanism that (if opt-in, as suggested) may or may not be adopted by the market. However, many potential changes to the MEV pipeline bear similar adoption and revenue-optimality questions (e.g., inclusion lists). And there may be other future use cases that depend on the validator set having threshold encryption infrastructure available.
Thanks to Dan Robinson, Georgios Konstantopolous, Frankie, Shea Ketsdever, Quintus, and Mike Neuder for feedback and review.
Copyright © 2024 Paradigm Operations LP All rights reserved. “Paradigm” is a trademark, and the triangular mobius symbol is a registered trademark of Paradigm Operations LP