{"id":10429,"date":"2025-03-30T10:01:36","date_gmt":"2025-03-30T08:01:36","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=10429"},"modified":"2025-03-30T10:01:36","modified_gmt":"2025-03-30T08:01:36","slug":"unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/","title":{"rendered":"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions"},"content":{"rendered":"<p><\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\"><em class=\"chakra-text css-0\">Sincere appreciation to Vlad Zamfir, Chris Barnett, and Dominic Williams for concepts and motivation<!-- --><\/em><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In a <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/09\/17\/scalability-part-1-building-top\">recent blog article<!-- --><\/a>, I detailed some provisional solutions for scalability, all of which fall under the umbrella of Ethereum 1.0 in its current form. Tailored micropayment protocols like channels and probabilistic payment systems could facilitate minor payments, utilizing the blockchain solely for eventual settlement, or merely probabilistically. For certain computation-intensive applications, computation can be performed by one entity by default, but in a manner that can be &#8220;pulled down&#8221; for auditing by the entire network if any party suspects wrongdoing. Nonetheless, these strategies are inherently application-specific and far from optimal. In this article, I present a more all-encompassing solution, which, although it does come with some &#8220;fragility&#8221; issues, offers a resolution that is significantly closer to universal applicability.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"understanding-the-objective\">Grasping the Aim<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">To begin with, before delving into the specifics, we must attain a much deeper comprehension of our actual goals. What do we mean by scalability, especially in the context of Ethereum? In relation to a Bitcoin-like currency, the explanation is fairly straightforward; our objectives are to:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\">Handle tens of thousands of transactions each second<!-- --><\/li>\n<li class=\"css-cvpopp\">Ensure a transaction fee of under $0.001<!-- --><\/li>\n<li class=\"css-cvpopp\">Achieve all this while preserving security against threats of at least 25% and avoiding heavily centralized full nodes<!-- --><\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The initial goal alone is simple; we merely eliminate the block size limit and allow the blockchain to naturally expand until it reaches that scale, and the market self-regulates to compel smaller full nodes to continue exiting until the only three remaining are operated by GHash.io, Coinbase, and Circle. At that stage, a balance will arise between fees and size, as excessive size induces greater centralization, which in turn results in increased fees due to monopolistic pricing. To achieve the second aim, we can simply introduce numerous altcoins. However, to realize all three collectively, we must transcend a fundamental obstacle posed by Bitcoin and every other current cryptocurrency, and devise a system that operates without the requirement for any &#8220;full nodes&#8221; that must process every transaction.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In an Ethereum context, the notion of scalability becomes slightly more complex. Ethereum is, at its core, a platform for &#8220;dapps,&#8221; and within that framework, there exist two types of scalability that are pertinent:<!-- --><\/p>\n<p><!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\">Enable a multitude of individuals to create dapps while keeping transaction fees minimal<!-- --><\/li>\n<li class=\"css-cvpopp\">Allow each distinct dapp to achieve scalability in a manner akin to that for Bitcoin<!-- --><\/li>\n<\/ul>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The first is inherently less challenging than the second. The only characteristic that the &#8220;develop numerous alt-Etherea&#8221; approach lacks is that each individual alt-Ethereum has relatively fragile security; at a scale of 1000 alt-Etherea, each one would be susceptible to a 0.1% attack from the perspective of the total system (that 0.1% pertains to externally-sourced assaults; internally-sourced offenses, such as collusion between GHash.io and Discus Fish, would necessitate only 0.05%). If we could devise a method for all alt-Etherea to share consensus strength, e.g., some variation of merged mining that allows each chain to harness the strength of the entire group without necessitating the existence of miners simultaneously aware of all chains, we would reach our goal.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The second presents more challenges, as it leads to the same fragility characteristic that emerges from scaling Bitcoin as a currency: if every node perceives only a limited portion of the state, and arbitrary amounts of BTC can legitimately emerge in any part of the state deriving from any section of the state (such fungibility is part of a currency&#8217;s definition), one can intuitively discern how forgery assaults might propagate through the blockchain unnoticed until it is too late to reverse all without causing significant disruption to the system via a global rollback.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"reinventing-the-wheel\">Reinventing the Wheel<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">We&#8217;ll commence by outlining a relatively straightforward model that does provide both types of scalability, but delivers the latter only in a very limited and expensive manner; effectively, we possess just enough intra-dapp scalability to guarantee asset fungibility, but not much beyond that. The model functions as follows:<!-- --><\/p>\n<p><!-- --><center> <!-- --><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Assume that the global Ethereum state (i.e., all accounts, contracts, and balances) is divided into N segments (&#8220;substates&#8221;) (consider 10 <span class=\"chakra-text css-ons8vw\">[dest_substate, address, value, data]<\/span>. Secondly, there exists an opcode <!-- --><span class=\"chakra-text css-ons8vw\">CROSS_SEND<\/span>, which takes those four parameters as inputs, and sends such a unidirectional message to the designated substate.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Miners mine blocks on a particular substate <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span>, and each block on <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span> concurrently acts as a block in the hub chain. Each block on <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span> has dependencies on the preceding block on <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span> and the preceding block on the hub chain. For instance, with <!-- --><span class=\"chakra-text css-ons8vw\">N = 2<\/span>, the chain would appear somewhat like this:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/hubchain.png\" class=\"chakra-image css-hw6q2r\"\/> <!-- --><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The block-level state transition function, while mining on substate <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span>, accomplishes three tasks:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">Manages state transitions within <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span><\/li>\n<li class=\"css-cvpopp\">If any of those state transitions generates a <!-- --><span class=\"chakra-text css-ons8vw\">CROSS_SEND<\/span>, incorporates that message into the hub chain<!-- --><\/li>\n<li class=\"css-cvpopp\">If any messages exist on the hub chain with <!-- --><span class=\"chakra-text css-ons8vw\">dest_substate = j<\/span>, eliminates the messages from the hub chain, sends them to their corresponding destination addresses on <!-- --><span class=\"chakra-text css-ons8vw\">s[j]<\/span>, and processes all resulting state transitions<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">From a scalability viewpoint, this yields a considerable enhancement. All miners only need to be aware of two out of the total <!-- --><span class=\"chakra-text css-ons8vw\">N + 1<\/span> substates: their own substate, and the hub substate. Dapps that are small and self-sufficient will operate on a single substate, while dapps that wish to operate across multiple substates will need to relay messages through the hub. For instance, a cross-substate currency dapp would maintain a contract on all substates, and each contract would feature an API.that enables an individual to eliminate currency units within a specific substate in return for the contract transmitting a notification that would result in the user receiving an equivalent amount on a different substate.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Messages traversing the hub must be acknowledged by every node, making these transactions costly; nevertheless, in the scenario of ether or sub-currencies, we only require the transfer mechanism to be utilized occasionally for settlement, managing off-chain inter-substate exchanges for the majority of transfers.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"attacks-challenges-and-responses\">Attacks, Challenges, and Responses<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, let&#8217;s take this straightforward framework and evaluate its security features (for illustrative purposes, we&#8217;re using N = 100). Firstly, the framework is resilient against double-spending attacks up to 50% of the total hashpower; this is because each sub-chain is essentially merge-mined with all other sub-chains, with every block fortifying the security of all sub-chains at once.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">However, there exist more perilous types of attacks. Suppose a malicious attacker possessing 4% hashpower infiltrates one of the substates, thereby gaining control of 80% of the mining capacity on it. At this point, that attacker generates blocks that are invalid\u2014for instance, the attacker includes a state transition that generates messages that give out 1000000 ETH to every other substate without basis. Other miners within the same substate will identify the malicious miner&#8217;s blocks as invalid, but this is inconsequential; they only represent a minuscule portion of the total network, constituting just 20% of that substate. The miners on alternate substates remain unaware that the attacker&#8217;s blocks are invalid, as they lack information regarding the status of the &#8220;compromised substate,&#8221; leading them to potentially accept the blocks without scrutiny.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Fortunately, the solution is more intricate but remains well within the capabilities of our current understanding: as soon as one of the few legitimate miners on the compromised substate handles the invalid block, they will recognize its invalidity, identifying the specific fault. Consequently, they can produce a light-client Merkle tree proof which demonstrates that a particular segment of the state transition was invalid. To elaborate on how this functions, a light client proof comprises three components:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">The initial state root from which the state transition commenced<!-- --><\/li>\n<li class=\"css-cvpopp\">The concluding state root that the state transition arrived at<!-- --><\/li>\n<li class=\"css-cvpopp\">The portion of Patricia tree nodes that are accessed or altered during the execution of the state transition<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The first two &#8220;initial state roots&#8221; correspond to the roots of the Ethereum <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/easythereentropy.wordpress.com\/2014\/06\/04\/understanding-the-ethereum-trie\/\">Patricia state tree<!-- --><\/a> prior to and following the execution of the transaction; the Ethereum protocol mandates that both must be included in every block. The specified Patricia state tree nodes are essential for the verifier to follow along the computation and verify that the identical outcome is reached at the conclusion. For instance, if a transaction alters the state of three accounts, the collection of tree nodes that require provision might resemble the following:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/lightproof.png\" class=\"chakra-image css-hw6q2r\"\/><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Technically, the proof should encompass the array of Patricia tree nodes required to access the initial state roots and the transaction also, but that&#8217;s a relatively minor aspect. Overall, the proof can be perceived as comprising the minimal set of data from the blockchain necessary to facilitate that specific transaction, along with some additional nodes to establish that those portions of the blockchain are indeed part of the current state. Once the whistleblower constructs this proof, it will be disseminated throughout the network, and all other miners will view the proof and reject the invalid block.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Nevertheless, the most formidable class of attack is identified as a &#8220;data unavailability attack.&#8221; In this scenario, envision that the miner disseminates solely the block header to the network, along with the list of messages intended for addition to the hub, but fails to provide any of the transactions, intermediate state roots, or any additional data. This leads to an issue. Theoretically, it is entirely conceivable that the block is wholly legitimate; the block <!-- --><em class=\"chakra-text css-0\">could<!-- --><\/em> have been properly constructed by collating transactions from a few affluent individuals who happened to be exceptionally generous. In actuality, however, this is not the case, and the block is fraudulent, but the unavailability of the data completely obstructs the construction of a definitive proof of the fraud. The 20% honest miners on the compromised substate may raise alarms, but they possess no evidence whatsoever, and any protocol that heeds their claims would inevitably succumb to a 0.2% denial-of-service attack where the miner seizes 20% of a substate and asserts that the other 80% of miners on that substate are colluding against him.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">To tackle this challenge, we need what is referred to as a <!-- --><strong>challenge-response protocol<!-- --><\/strong>. Fundamentally, the mechanism operates as follows:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">Honest miners on the compromised substate observe the block that only includes the header.<!-- --><\/li>\n<li class=\"css-cvpopp\">A legitimate miner issues a &#8220;challenge&#8221; in the form of an index (i.e., a number).<!-- --><\/li>\n<li class=\"css-cvpopp\">If the block producer can furnish a &#8220;response&#8221; to the challenge, consisting of a light-client proof that the transaction execution at the specified index was carried out authentically (or a proof confirming that the specified index exceeds the count of transactions in the block), then the challenge is regarded as addressed.<!-- --><\/li>\n<li class=\"css-cvpopp\">If a challenge remains unanswered for several seconds, miners on different substates consider the block dubious and refuse to mine on it (the game-theoretic rationale for this is consistent: they suspect that others will adopt the same strategy, and there is no benefit in mining on a substate that is likely to be orphaned soon)<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Be aware that the mechanism entails a few additional complexities to function effectively. If a block is released alongside all its transactions with the exception of a few, then the challenge-response protocol could efficiently evaluate them all and dismiss the block. However, if a block was genuinely published as headers-only, then if it contained hundreds of transactions, a multitude of challenges would be necessary. One heuristic method to resolve the issue is that miners receiving a block should privately select some random nonces, send out a few challenges for those nonces to certain known miners on the potentially compromised substate, and if responses to all challenges do not arrive promptly, treat the block as suspect. Note that the miner does NOT publicly broadcast the challenge &#8211; this would provide an opportunity for an attacker to swiftly fill in the missing data.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The second issue is that the protocol is susceptible to a denial-of-service attack wherein attackers publish an overwhelming number of challenges to legitimate&#8230;blocks. To address this issue, creating a challenge ought to incur some expense &#8211; nonetheless, if this expense is excessively high, then the act of issuing a challenge will demand an extremely substantial &#8220;altruism delta,&#8221; perhaps so elevated that an assault will eventually occur and no individual will contest it. While some might lean towards resolving this with a market-oriented approach that assigns the obligation of generating the challenge to any parties who get defrauded by the erroneous state transition, it is important to recognize that it&#8217;s feasible to devise a state transition that fabricates new resources from nothing, marginally pilfering from everyone through inflation, and also favors affluent coin holders, resulting in a heist where there is no concentrated motivation to contest it.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">For a currency, one &#8220;simple remedy&#8221; is limiting the worth of a transaction, thus rendering the entire issue to have only very restricted ramifications. For a Turing-complete protocol, the remedy is more intricate; the optimal strategies probably involve both making challenges costly and introducing a mining incentive to them. There will be a niche group of &#8220;challenge miners,&#8221; and the hypothesis is that they will be neutral regarding which challenges to undertake, so even the smallest altruism delta, enforced by software standards, will prompt them to execute correct challenges. One might even consider analyzing the duration it takes for challenges to receive responses, offering higher rewards for those that require more time.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"the-twelve-dimensional-hypercube\">The Twelve-Dimensional Hypercube<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\"><em class=\"chakra-text css-0\">Note: this is NOT identical to the erasure-coding Borg cube. For additional details on that topic, refer here: <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/08\/16\/secret-sharing-erasure-coding-guide-aspiring-dropbox-decentralizer\"\/><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/08\/16\/secret-sharing-erasure-coding-guide-aspiring-dropbox-decentralizer\/\">https:\/\/blog.ethereum.org\/2014\/08\/16\/secret-sharing-erasure-coding-guide-aspiring-dropbox-decentralizer\/<!-- --><\/a><\/em><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">We can identify two weaknesses in the aforementioned framework. First, the justification that the challenge-response protocol will be effective is quite tenuous at best, exhibiting inadequate degenerate-case performance: a substate takeover assault paired with a denial of service strike that obstructs challenges could potentially compel an invalid block into a chain, necessitating a future day-long roll-back of the entire chain when (if?) the situation stabilizes. Furthermore, there is a vulnerability aspect here: an invalid block in any substate will nullify all subsequent blocks across all substates. Second, messages crossing substates must still be accessible by all nodes. We&#8217;ll begin by addressing the second issue, then go on to illustrate a possible defense to ameliorate the first issue slightly, and finally resolve it entirely while simultaneously abolishing proof of work.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The second issue, the costly nature of cross-substate messages, is resolved by transitioning the blockchain model from this:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/hubspoke.png\" class=\"chakra-image css-hw6q2r\"\/><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">To this:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/cube.png\" class=\"chakra-image css-hw6q2r\"\/><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Except the cube should feature twelve dimensions rather than three. Now, the protocol appears as follows:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">There exist 2<!-- --><sup>N<!-- --><\/sup> substates, each identified by a binary string of length N (e.g., <!-- --><span class=\"chakra-text css-ons8vw\">0010111111101<\/span>). We define the Hamming distance <!-- --><span class=\"chakra-text css-ons8vw\">H(S1, S2)<\/span> as the count of digits that differ between the IDs of substates <!-- --><span class=\"chakra-text css-ons8vw\">S1<\/span> and <!-- --><span class=\"chakra-text css-ons8vw\">S2<\/span> (e.g., <!-- --><span class=\"chakra-text css-ons8vw\">HD(00110, 00111) = 1<\/span>, <!-- --><span class=\"chakra-text css-ons8vw\">HD(00110, 10010) = 2<\/span>, etc.).<!-- --><\/li>\n<li class=\"css-cvpopp\">The state of each substate retains the ordinary state tree as before, but also includes an outbox.<!-- --><\/li>\n<li class=\"css-cvpopp\">An opcode exists, <!-- --><span class=\"chakra-text css-ons8vw\">CROSS_SEND<\/span>, taking 4 arguments <!-- --><span class=\"chakra-text css-ons8vw\">[dest_substate, to_address, value, data]<\/span>, and records a message with those parameters in the outbox of <!-- --><span class=\"chakra-text css-ons8vw\">S_from<\/span> where <!-- --><span class=\"chakra-text css-ons8vw\">S_from<\/span> is the substate from which the opcode was invoked.<!-- --><\/li>\n<li class=\"css-cvpopp\">All miners must &#8220;mine an edge&#8221;; that is, valid blocks alter two adjacent substates <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> and <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span>, and can incorporate transactions for either substate. The block-level state transition function is as follows:<br \/>\n<!-- --><\/p>\n<ul role=\"list\" class=\"css-1onhfjo\">\n<li class=\"css-cvpopp\">Process all transactions sequentially, applying the state transitions to <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> or <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span> as required.<!-- --><\/li>\n<li class=\"css-cvpopp\">Process all messages present in the outboxes of <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> and <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span> sequentially. If the message is located in the outbox of <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> and has a final destination of <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span>, implement the state transitions, and likewise for messages traveling from <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span> to <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span>. Otherwise, if a message resides in <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> and there is <!-- --><span class=\"chakra-text css-ons8vw\">HD(S_b, msg.dest)<\/span>, transfer the message from the outbox of <!-- --><span class=\"chakra-text css-ons8vw\">S_a<\/span> to the outbox of <!-- --><span class=\"chakra-text css-ons8vw\">S_b<\/span>, and similarly for the opposite.<!-- --><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"css-cvpopp\">A header chain exists that monitors all headers, thereby allowing all these blocks to be merged mined, and maintaining a centralized repository where the roots of each state are housed.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Essentially, rather than traversing through the hub, messages navigate their way around the substates along edges, and the continually decreasing Hamming distance guarantees that each message ultimately reaches its specified destination.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The crucial design choice here is the configuration of all substates into a hypercube. Why was the cube selected? The optimal way to conceptualize the cube is as a balance between two extreme alternatives: on one side the circle, and on the other, the simplex (essentially, a 2<!-- --><sup>N<!-- --><\/sup>-dimensional analog of a tetrahedron). In a circle, a message would need to traverse, on average, a quarter of the distance around the circle before arriving at its target, implying that we gain no efficiency over the classic hub-and-spoke structure.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In a simplex, every pair of substates is connected by an edge, thus a cross-substate message would be transmitted as soon as a block connecting those two substates is generated. However, with miners selecting random edges, it would take a significant amount of time for a block on the correct edge to be created, andmore significantly, participants observing a specific substate must function as at least light clients across all other substates in order to authenticate blocks pertinent to their interests. The hypercube offers an ideal equilibrium &#8211; each substate boasts a logarithmically increasing number of adjacent states, the length of the longest route expands logarithmically, and the block duration of any given connection also increases logarithmically.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">It is essential to note that this algorithm shares most of the shortcomings related to the hub-and-spoke model &#8211; particularly, its poor performance in degenerate cases and the unclear economic implications surrounding challenge-response protocols. To enhance stability, one potential method is to adjust the header chain somewhat.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Currently, the header chain enforces very stringent validity criteria &#8211; if any block at any point in the header chain is found to be invalid, all blocks in every substate built upon it are also deemed invalid and must be redone. To address this issue, we could modify the header chain to merely track headers, allowing it to encompass both invalid headers and even multiple forks of the same substate chain. To incorporate a merge-mining protocol, we instantiate <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/10\/03\/slasher-ghost-developments-proof-stake\">exponential subjective scoring<!-- --><\/a> while utilizing the header chain as an absolute common timekeeper. We select a lower base (for instance, 0.75 versus 0.99) and impose a maximum penalty factor of 1 \/ 2<!-- --><sup>N<!-- --><\/sup> to eliminate the advantages of forking the header chain; for those unacquainted with the mechanics of ESS, this simply implies &#8220;permit the header chain to include all headers, but utilize the header chain&#8217;s order to penalize blocks arriving later without rendering this penalty excessively severe.&#8221; Furthermore, we introduce a delay for cross-substate communications, ensuring that a message in an outbox only becomes &#8220;eligible&#8221; when the originating block is a few dozen blocks deep.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"proof-of-stake\">Proof of Stake<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, let&#8217;s focus on adapting the protocol to a nearly-pure proof of stake system. For the moment, we will set aside concerns related to nothing-at-stake; Slasher-like protocols combined with exponential subjective scoring can address those issues, which will be discussed in later sections. Our initial goal is to illustrate how the hypercube operates without mining while also partially resolving the fragility problem. We will commence with a <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/eprint.iacr.org\/2014\/452.pdf\">proof of activity<!-- --><\/a> implementation for multichain. The protocol functions as follows:<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">There exists 2<!-- --><sup>N<!-- --><\/sup> substates represented by binary strings, similar to before, alongside a header chain (which also monitors the latest state root of each substate).<!-- --><\/li>\n<li class=\"css-cvpopp\">Anyone can mine an edge, just like previously, but with reduced difficulty. However, once a block is mined, it is required to be published with the complete set of Merkle tree proofs, enabling a node with no previous information to fully verify all state transitions within the block.<!-- --><\/li>\n<li class=\"css-cvpopp\">There exists a bonding protocol whereby an address can declare itself as a potential signer by providing a bond of size <!-- --><span class=\"chakra-text css-ons8vw\">B<\/span> (wealthier addresses will need to establish multiple sub-accounts). Possible signers are recorded in a specialized contract <!-- --><span class=\"chakra-text css-ons8vw\">C[s]<\/span> on each substate <!-- --><span class=\"chakra-text css-ons8vw\">s<\/span>.<!-- --><\/li>\n<li class=\"css-cvpopp\">According to the block hash, a random selection of 200 substates <!-- --><span class=\"chakra-text css-ons8vw\">s[i]<\/span> is made, and a search index <!-- --><span class=\"chakra-text css-ons8vw\">ind[i]<\/span> is selected for each substate. Define <!-- --><span class=\"chakra-text css-ons8vw\">signer[i]<\/span> as the holder of the first address in <!-- --><span class=\"chakra-text css-ons8vw\">C[s[i]]<\/span> following index <!-- --><span class=\"chakra-text css-ons8vw\">ind[i]<\/span>. For the block to be considered valid, it must be endorsed by at least 133 members from the set <!-- --><span class=\"chakra-text css-ons8vw\">signer[0] &#8230; signer[199]<\/span>.<!-- --><\/span><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">To verify the validity of a block, members of the consensus group must take two actions. First, they would verify that the initial state roots listed in the block correspond with the relevant state roots in the header chain. Second, they would process the transactions to ensure that the final state roots align with those provided in the header chain, and that all trie nodes necessary for computing the update are present somewhere in the network. If both validations succeed, they sign the block, and if the block receives signatures from a sufficient number of consensus group members, it becomes incorporated into the header chain, updating the state roots for the two impacted blocks within the header chain.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">And that encompasses everything. The critical attribute here is that each block is associated with a randomly chosen consensus group, selected <!-- --><em class=\"chakra-text css-0\">from the overall state of all account holders<!-- --><\/em>. Thus, unless an adversary controls at least 33% of the stake within the entire system, it will be nearly impossible (specifically, a 2<!-- --><sup>-70<!-- --><\/sup> probability, which, given 2<!-- --><sup>30<!-- --><\/sup> proof of work, falls comfortably within the domain of cryptographic impossibility) for the attacker to secure a block signature. Furthermore, without a stake of at least 33%, an attacker will not be able to hinder legitimate miners from creating blocks and obtaining signatures for them.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">This methodology presents the advantage of exhibiting favorable degenerate-case behavior; should a denial-of-service attack occur, it is likely that very few or no blocks will be produced, or at least the production rate will be extremely slow, but no harm will result.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Now, the challenge becomes how to further lessen dependence on proof of work while incorporating blockmaker and Slasher-based methods? A straightforward strategy is to implement a distinct blockmaker protocol for every edge, mirroring the single-chain approach. To motivate blockmakers to act with integrity and avoid double-signing, Slasher can also be implemented here: if a signer endorses a block that ultimately isn&#8217;t included in the main chain, they receive a penalty. Schelling point dynamics ensure that every participant is incentivized to adhere to the protocol, as they assume that others will do the same (along with a minor pseudo-incentive of <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2014\/09\/02\/software-bounded-rationality\">software defaults<!-- --><\/a> which strengthen the equilibrium).<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"a-full-evm\">A full EVM<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">These protocols enable us to transmit one-way messages from one substate to another. Yet, one-way communications have limitations in functionality (or rather, they possess as much capability as we wish them to have because everything is Turing-complete, but they can prove cumbersome). What if we could enable the hypercube to simulate a complete cross-substate EVM, allowing for the invocation of functions across different substates?<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Surprisingly, this is feasible. The crux lies in appending a data structure termed a <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/en.wikipedia.org\/wiki\/Continuation\">continuation<!-- --><\/a> to the messages. For instance, let&#8217;s consider that we are in the midst of a computation where a contract calls acontract that establishes a contract, and we are presently executing the code that generates the inner contract. Therefore, the current stage of our computation resembles the following:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/executionpath.png\" class=\"chakra-image css-hw6q2r\"\/><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">What is the present &#8220;state&#8221; of this computation? In other words, what is the collection of all the data necessary to pause the computation, and later use that data to resume it? Within a single instance of the EVM, this comprises solely the program counter (i.e., our position within the code), the memory, and the stack. In scenarios where contracts invoke each other, we require that data for the entire &#8220;computational tree&#8221;, covering our current scope, the parent scope, the ancestor of that, and so on back to the original transaction:<!-- --><\/p>\n<p><!-- --><center> <!-- --><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/2014\/10\/stacktrace.png\" class=\"chakra-image css-hw6q2r\"\/><\/center><br \/>\n<!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">This is referred to as a &#8220;continuation&#8221;. To resume execution from this continuation, we merely reactivate each computation and execute it to completion in reverse sequence (i.e., conclude with the innermost first, insert its output into the designated area of its parent, then finalize the parent, and so forth). Now, to achieve a fully scalable EVM, we simply substitute the idea of a one-way message with a continuation, and there we have it.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">However, the question arises: do we truly wish to proceed this far? Firstly, transitioning between substates with such a virtual machine would be exceedingly inefficient; if a transaction&#8217;s execution requires access to ten contracts, and each contract exists in a random substate, then navigating through the entirety of that execution will consume an average of six blocks per transmission, multiplied by two transmissions per sub-call, and multiplied by ten sub-calls, resulting in a total of 120 blocks. Furthermore, we encounter issues with synchronicity; if A invokes B once and then again, but in between those calls, C invokes B, then C will encounter B in a partially processed state, which may present security vulnerabilities. Lastly, integrating this mechanism with the idea of reverting transaction execution when transactions exhaust their gas is challenging. Thus, it may be more viable to forgo continuations and instead favor straightforward one-way messages; since the language is Turing-complete, continuations can always be implemented later.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Due to the inefficiency and instability of cross-chain messages regardless of their implementation, the majority of dapps will likely prefer to operate entirely within a single sub-state, and dapps or contracts that frequently interact will also want to exist within the same substate. To prevent absolutely <!-- --><em class=\"chakra-text css-0\">everyone<!-- --><\/em> from residing on the same substate, we can allow the gas limits for each substate to &#8220;spill over&#8221; into one another, striving to maintain uniformity across substates; consequently, market dynamics will naturally foster an environment where popular substates become pricier, prompting marginally indifferent users and dapps to settle in fresh territories.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"not-so-fast\">Not So Fast<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">What issues remain? First, there\u2019s the data availability dilemma: what occurs if all full nodes within a given substate vanish? If such a scenario occurs, the substate&#8217;s data will disappear indefinitely, and the blockchain will essentially need to be forked from the last block where all substate data is known. This could lead to double-spends, some malfunctioning dapps due to duplicate messages, etc. Therefore, we need to ensure that this situation never arises. This operates on a 1-of-N trust model; as long as one honest node retains the data, we are secure. Single-chain architectures also utilize this trust model, but the risk escalates as the number of nodes expected to retain each piece of data diminishes &#8211; as it does here by a factor of 2048. The concern is eased by the existence of altruistic nodes such as blockchain explorers, yet this may become problematic if the network scales so much that no single data center can accommodate the entire state. <!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Secondly, there exists a fragility issue: if any block anywhere in the system is processed incorrectly, it could result in ripple effects throughout the entire network. A cross-substate message may fail to be sent, or could be resent; coins could be double-spent, and so forth. Certainly, once a problem is discovered, it would inevitably be noticed, and it could be rectified by reverting the entire chain from that moment, but it remains unclear how often such situations may occur. One potential resolution to fragility is to maintain a separate version of ether in each substate, permitting ethers in diverse substates to interact variably with one another, and then introduce message redundancy features to higher-level languages, acknowledging that messages will be probabilistic; this would reduce the number of nodes verifying each header down to approximately 20, thereby enhancing scalability, although much of that would be offset by an increased volume of cross-substate messaging for error correction.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">A third complication is that scalability is restricted; every transaction must reside within a substate, and each substate must exist within a header that every node must monitor, thus if a node&#8217;s maximum processing capacity is N transactions, the network can handle up to N<!-- --><sup>2<!-- --><\/sup> transactions. One strategy to enhance scalability is to structure the hypercube hierarchically &#8211; envision the block headers in the header chain as transactions, and imagine the header chain itself evolving from a single-chain model to the identical hypercube model discussed here &#8211; that would yield N<!-- --><sup>3<!-- --><\/sup> scalability, and applying this recursively would yield a form reminiscent of <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/github.com\/petertodd\/tree-chains-paper\">tree chains<!-- --><\/a>, providing exponential scalability &#8211; albeit at the expense of increased complexity, and rendering transactions traversing the entire state space considerably less efficient.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Lastly, fixing the number of substates at 4096 is not optimal; ideally, this number should increase over time as the state expands. One approach is to monitor the number of transactions per substate, and once that count exceeds the number of substates, we can simply add a dimension to the cube (i.e., double the count of substates). More sophisticated methods could involve the application of <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/en.wikipedia.org\/wiki\/Minimum_cut\">minimal cut algorithms<!-- --><\/a> like the relatively straightforward <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/en.wikipedia.org\/wiki\/Karger%27s_algorithm\">Karger\u2019s algorithm<!-- --><\/a> to attempt to bisect each substate when a dimension is added. Nonetheless, such approaches face challenges, as they are complex and could unexpectedly elevate the costs and latency for dapps that inadvertently get bisected.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"alternative-approaches\">Alternative Approaches<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Indeed, hypercubing the blockchain is not the sole method for enhancing blockchain scalability. A notably promising alternative is the establishment of an ecosystem consisting of multiple blockchains, some tailored for specific applications and others resembling generalized Ethereum-like scripting environments, while facilitating communication among them &#8211; practically, this typically involves having all (or at least some) of the blockchains maintain &#8220;light clients&#8221; of each other within their own states. The primary challenge is determining how these chains can reach a consensus, particularly within a proof-of-stake framework. Ideally, all chains involved in such a system would provide mutual reinforcement; however, how can that be achieved when it isn\u2019t clear how to assess the value of each coin? If an aggressor holds 5% of all A-coins, 3% of all B-coins, and 80% of all C-coins, how can A-coin ascertain whether B-coin or C-coin should be accorded more weight?<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">One solution is to employ something akin to Ripple consensus among chains\u2014each chain could initially decide, upon launch or gradually through stakeholder consensus, how much it values the consensus input of other chains, and then allow transitive effects to ensure that every chain protects all others over time. Such a model is highly effective as it welcomes innovation\u2014anyone can create new chains at any moment with arbitrary rules, and all chains can still connect and reinforce each other; it is quite plausible that we will witness such an inter-chain mechanism developing among the majority of chains in the future, with some large chains, possibly even older ones like Bitcoin and frameworks such as a hypercube-based Ethereum 2.0, existing on their own simply for historical purposes. The concept here is to achieve a genuinely decentralized design: all parties support one another, rather than merely aligning with the strongest chain and hoping it doesn\u2019t succumb to an unforeseen attack.<!-- --><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2014\/10\/21\/scalability-part-2-hypercubes\">Source link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sincere appreciation to Vlad Zamfir, Chris Barnett, and Dominic Williams for concepts and motivation In a recent blog article, I detailed some provisional solutions for scalability, all of which fall under the umbrella of Ethereum 1.0 in its current form. Tailored micropayment protocols like channels and probabilistic payment systems could facilitate minor payments, utilizing the<\/p>\n","protected":false},"author":3,"featured_media":8282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[1911,1891],"class_list":{"0":"post-10429","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-part-2-hypercubes-ethereum-foundation-blog","9":"tag-return-a-list-of-comma-separated-tags-from-this-title-scalability"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"Sincere appreciation to Vlad Zamfir, Chris Barnett, and Dominic Williams for concepts and motivation In a recent blog article, I detailed some provisional solutions for scalability, all of which fall under the umbrella of Ethereum 1.0 in its current form. Tailored micropayment protocols like channels and probabilistic payment systems could facilitate minor payments, utilizing the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-30T08:01:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"26 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/\",\"name\":\"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"datePublished\":\"2025-03-30T08:01:36+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"width\":2100,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/","og_locale":"it_IT","og_type":"article","og_title":"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto","og_description":"Sincere appreciation to Vlad Zamfir, Chris Barnett, and Dominic Williams for concepts and motivation In a recent blog article, I detailed some provisional solutions for scalability, all of which fall under the umbrella of Ethereum 1.0 in its current form. Tailored micropayment protocols like channels and probabilistic payment systems could facilitate minor payments, utilizing the","og_url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/","og_site_name":"WSJ-Crypto","article_published_time":"2025-03-30T08:01:36+00:00","og_image":[{"width":2100,"height":900,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"26 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/","url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/","name":"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","datePublished":"2025-03-30T08:01:36+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","width":2100,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/30\/unlocking-new-dimensions-exploring-hypercubes-in-scalability-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Unlocking New Dimensions: Exploring Hypercubes in Scalability Solutions"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=10429"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10429\/revisions"}],"predecessor-version":[{"id":10431,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10429\/revisions\/10431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/8282"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=10429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=10429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=10429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}