Seite zuletzt aktualisiert: 30. Juni 2022
One of the primary strengths of Ethereum is that an active research and engineering community are constantly improving it. Many enthusiastic, skilled people worldwide would like to apply themselves to outstanding issues in Ethereum, but it is not always easy to find out what those issues are. This page outlines key active research areas as a rough guide to Ethereum's cutting edge.
Ethereum research is open and transparent. Ethereum's research culture produces tools and other outputs that are as open and interactive as possible, for example, through executable notebooks. Ethereum research moves quickly, with new findings posted and discussed in the open on forums such as ethresear.ch rather than reaching the community through traditional publications after rounds of peer review.
Regardless of the specific topic, there is a wealth of information on Ethereum research to be found at ethresear.ch and the Eth R&D Discord channel. These are the primary places where Ethereum researchers discuss the latest ideas and development opportunities.
This report published in May 2022 by DelphiDigital provides a good overview of the Ethereum roadmap.
Protocol research is concerned with Ethereum's base layer - the set of rules defining how nodes connect, communicate, exchange and store Ethereum data and come to consensus about the state of the blockchain. Protocol research gets divided into two top-level categories: consensus and execution.
Consensus research is concerned with Ethereum's proof-of-stake mechanism. Some example consensus research topics are:
- identifying and patching vulnerabilities;
- quantifying cryptoeconomic security;
- increasing the security or performance of client implementations;
- and developing light clients.
As well as forward-looking research, some fundamental redesigns of the protocol, such as single slot finality, are being researched to allow for significant improvements to Ethereum. Furthermore, the efficiency, safety, and monitoring of peer-to-peer networking between consensus clients are also important research topics.
The execution layer is concerned with executing transactions, running the Ethereum virtual machine (EVM) and generating execution payloads to pass to the consensus layer. There are many active areas of research, especially as execution clients are getting updated in anticipation of The Merge. Active areas of research include:
- building out light client support;
- researching gas limits;
- and incorporating new data structures (e.g. Verkle Tries).
- Database optimizations
- State expiry
- Paths to state expiry
- Verkel and state expiry proposal
- History management
- Verkle Trees
- Data availability sampling
Ethereum clients are implementations of the Ethereum protocol. Client development makes the outcomes from protocol research into reality by building them into these clients. Client development includes updating the client specifications as well as building specific implementations.
An Ethereum node is required to run two pieces of software:
- a consensus client to keep track of the head of the blockchain, gossip blocks and handle consensus logic
- an execution client to support the Ethereum Virtual Machine and execute transactions.
Scaling Ethereum is a large area of focus for Ethereum researchers. Current approaches include sharding the blockchain, danksharding, and using rollups. Introductory information on scaling Ethereum is available on our scaling page.
There are now several Layer 2 protocols that scale Ethereum using different techniques for batching transactions and securing them on Ethereum layer 1. This is a very rapidly growing topic with a lot of research and development potential.
One particular area of layer 2 that requires more research and development is safe and performant bridges. This includes bridges between various Layer 2s and bridges between Layer 1 and Layer 2. This is a particularly important area of research because bridges are commonly targeted by hackers.
- Introduction to blockchain bridges
- Vitalik on bridges
- Blockchain bridges article
- Value locked in bridges
Sharding Ethereum's blockchain has long been part of the development roadmap. However, new scaling solutions such as "Danksharding" are currently taking center stage.
- Introduction to Ethereum sharding
- Proto-Danksharding notes
- Bankless Danksharding video
- Ethereum Sharding Research Compendium
- Danksharding (Polynya)
Running nodes on modest hardware is fundamental to keeping Ethereum decentralized. Therefore, active research into minimizing the hardware requirements to run nodes is an important area of research.
Security is a broad topic that might include spam/scam prevention, wallet security, hardware security, crypto-economic security, bug hunting and testing of applications and client software and key-management. Contributing to knowledge in these areas will help stimulate mainstream adoption.
Zero-knowledge proofs (ZKP) and cryptography are critical for building privacy and security into Ethereum and its applications. Zero-knowledge is a relatively young but fast-moving space with many open research and development opportunities. Some possibilities include developing more efficient implementations of the Keccak hashing algorithm, finding better polynomial commitments than currently exist or reducing the cost of ecdsa public key generation and signature verification circuits.
Ethereum wallets can be browser extensions, desktop and mobile apps or smart contracts on Ethereum. There is active research into social recovery wallets that reduce some of the risk associated with individual-user key management. Associated with development of wallets is research into alternative forms of account abstraction, which is an important area of nascent research.
- Introduction to wallets
- Introduction to wallet security
- ethresear.ch Security
- EIP-2938 Account Abstraction
- EIP-4337 Account Abstraction
- Validation focused smart contract wallets
- The future of accounts
- EIP-3074 AUTH and AUTHCALL Opcodes
- Publishing code at an EOA address
Onboarding new users onto Ethereum requires new educational resources and approaches to outreach. This might include blog posts and articles, books, podcasts, memes, teaching resources events and anything else that builds communities, welcomes new starters and educates people about Ethereum.
To onboard more people onto Ethereum, the ecosystem must improve the UX/UI. This will require designers and product experts to re-examine the design of wallets and apps.
There are complex crypto-economic factors relating to Ethereum's native asset (ether) and the tokens built on top of it (for example NFTs and ERC20 tokens).
- Empirical analysis of EIP1559
- MEV auctions
- Circulating supply equilibrium
- Quantifying MEV: How dark is the forest?
- EIP 1559: One month later
When Ethereum transitions to proof-of-stake, validators will use its native asset (ether) as collateral. The cryptoeconomics of this determines the security of the network. Sophisticated validators may be able to exploit the nuances of the incentive layer to their own advantage by extracting MEV or launching explicit attacks.
Liquid staking allows users with less than 32 ETH to receive staking yields by swapping ether for a token representing staked ether that can be used in DeFi. However, the incentives and market dynamics associated with liquid staking are still being discovered, as well as its effect on Ethereum's security (e.g. centralization risks).
Ethereum transaction fees protect the network from spam, denial-of-service attacks and bad smart-contract code. However, it also affects the end-user by influencing the cost of interacting with Ethereum. Balancing network security with end-user experience is an ongoing challenge that requires further research and development.
Formal verification is writing code to verify that Ethereum's consensus specifications are correct and bug-free. There is an executable version of the specification written in Python that requires maintenance and development. Further research can help to improve the Python implementation of the specification and add tools that can more robustly verify correctness and identify issues.
There is a need for more data analysis tools and dashboards that give detailed information about activity on Ethereum and the health of the network.
The application layer supports a diverse ecosystem of programs that settle transactions on Ethereum's base layer. Development teams are constantly finding new ways to leverage Ethereum to create composable, permissionless and censorship-resistant versions of important Web2 apps or create completely new Web3-native concepts. At the same time, new tooling is being developed that makes building dapps on Ethereum less complex.
Decentralized finance (DeFi) is one of the primary classes of application built on top of Ethereum. DeFi aims to create composable "money legos" that allow users to store, transfer, lend, borrow and invest crypto-assets using smart contracts. DeFi is a fast-moving space that is constantly updating. Research into secure, efficient and accessible protocols is continuously needed.
An impactful use case for Ethereum is the ability to organize in a decentralized manner through the use of DAOs. There is a lot of active research into how DAOs on Ethereum can be developed and utilized to execute improved forms of governance, as a trust-minimized coordination tool, greatly expanding peoples options beyond traditional corporations and organizations.
Tools for Ethereum developers are rapidly improving. There is lots of active research and development to do in this general area.
- Tooling by programming language
- Developer Frameworks
- Consensus developer tools list
- Token standards
- Biastek: Ethereum tools
- CryptoDevHub: EVM Tools
Oracles import off-chain data onto the blockchain in a permissionless and decentralized way. Getting this data on-chain enables dapps to be reactive to real-world phenomena such as price fluctuations in real-world assets, events in off-chain apps, or even changes in the weather.
Hacks on Ethereum generally exploit vulnerabilities in individual applications rather than in the protocol itself. Hackers and app developers are locked in an arms race to develop new attacks and defenses. This means there is always important research and development required to keep apps safe from hacks.
Decentralizing the entire Ethereum tech stack is an important research area. Currently, dapps on Ethereum commonly have some points of centralization because they rely on centralized tooling or infrastructure.
- Ethereum stack -Coinbase: Intro to Web3 Stack
- Introduction to smart contracts
- Introduction to decentralized storage
You can get involved with Ethereum research and get paid for it! For example, the Ethereum Foundation recently ran an Academic Grants funding round. You can find information on active and upcoming funding opportunities on the Ethereum grants page.