Siden sist oppdatert: 2. juni 2023
Active areas of Ethereum research
One of the primary strengths of Ethereum is that an active research and engineering community are constantly improving it. Many enthusiastic, skilled people worldwide would like to apply themselves to outstanding issues in Ethereum, but it is not always easy to find out what those issues are. This page outlines key active research areas as a rough guide to Ethereum's cutting edge.
How Ethereum research works
Ethereum research is open and transparent, embodying principles of Decentralized Science (DeSci)(opens in a new tab). The culture is to make research tools and outputs as open and interactive as possible, for example, through executable notebooks. Ethereum research moves quickly, with new findings posted and discussed in the open on forums such as ethresear.ch(opens in a new tab) rather than reaching the community through traditional publications after rounds of peer review.
General research resources
Regardless of the specific topic, there is a wealth of information on Ethereum research to be found at ethresear.ch(opens in a new tab) and the Eth R&D Discord channel(opens in a new tab). These are the primary places where Ethereum researchers discuss the latest ideas and development opportunities.
This report published in May 2022 by DelphiDigital(opens in a new tab) provides a good overview of the Ethereum roadmap.
Sources of Funding
You can get involved with Ethereum research and get paid for it! For example, the Ethereum Foundation recently ran an Academic Grants funding round(opens in a new tab). You can find information on active and upcoming funding opportunities on the Ethereum grants page.
Protocol research is concerned with Ethereum's base layer - the set of rules defining how nodes connect, communicate, exchange and store Ethereum data and come to consensus about the state of the blockchain. Protocol research gets divided into two top-level categories: consensus and execution.
Consensus research is concerned with Ethereum's proof-of-stake mechanism. Some example consensus research topics are:
- identifying and patching vulnerabilities;
- quantifying cryptoeconomic security;
- increasing the security or performance of client implementations;
- and developing light clients.
As well as forward-looking research, some fundamental redesigns of the protocol, such as single slot finality, are being researched to allow for significant improvements to Ethereum. Furthermore, the efficiency, safety, and monitoring of peer-to-peer networking between consensus clients are also important research topics.
- Introduction to proof-of-stake
- Casper-FFG paper(opens in a new tab)
- Casper-FFG explainer(opens in a new tab)
- Gasper paper(opens in a new tab)
- Ethresear.ch Consensus(opens in a new tab)
- Availability/Finality dilemma(opens in a new tab)
- Single slot finality(opens in a new tab)
- Proposer-builder separation(opens in a new tab)
The execution layer is concerned with executing transactions, running the Ethereum virtual machine (EVM) and generating execution payloads to pass to the consensus layer. There are many active areas of research, including:
- building out light client support;
- researching gas limits;
- and incorporating new data structures (e.g. Verkle Tries).
- Database optimizations(opens in a new tab)
- State expiry(opens in a new tab)
- Paths to state expiry(opens in a new tab)
- Verkel and state expiry proposal(opens in a new tab)
- History management(opens in a new tab)
- Verkle Trees(opens in a new tab)
- Data availability sampling(opens in a new tab)
Ethereum clients are implementations of the Ethereum protocol. Client development makes the outcomes from protocol research into reality by building them into these clients. Client development includes updating the client specifications as well as building specific implementations.
An Ethereum node is required to run two pieces of software:
- a consensus client to keep track of the head of the blockchain, gossip blocks and handle consensus logic
- an execution client to support the Ethereum Virtual Machine and execute transactions and smart contracts
See the nodes and clients page for more detail on nodes and clients and for a list of all current client implementations. You can also find a history of all Ethereum upgrades on the history page.
Scaling and performance
Scaling Ethereum is a large area of focus for Ethereum researchers. Current approaches include offloading transactions onto rollups and making them as cheap as possible using data blobs. Introductory information on scaling Ethereum is available on our scaling page.
There are now several Layer 2 protocols that scale Ethereum using different techniques for batching transactions and securing them on Ethereum layer 1. This is a very rapidly growing topic with a lot of research and development potential.
- Arbitrum's fair-ordering for sequencers(opens in a new tab)
- ethresear.ch Layer 2(opens in a new tab)
- Rollup-centric roadmap(opens in a new tab)
- L2Beat(opens in a new tab)
One particular area of layer 2 that requires more research and development is safe and performant bridges. This includes bridges between various Layer 2s and bridges between Layer 1 and Layer 2. This is a particularly important area of research because bridges are commonly targeted by hackers.
- Introduction to blockchain bridges
- Vitalik on bridges(opens in a new tab)
- Blockchain bridges article(opens in a new tab)
- Value locked in bridges(opens in a new tab)
Sharding Ethereum's blockchain has long been part of the development roadmap. However, new scaling solutions such as "Danksharding" are currently taking center stage.
- Proto-Danksharding notes(opens in a new tab)
- Bankless Danksharding video(opens in a new tab)
- Ethereum Sharding Research Compendium(opens in a new tab)
- Danksharding (Polynya)(opens in a new tab)
- EIP-4844: Proto-Danksharding(opens in a new tab)
- Vitalik on sharding and data availability sampling(opens in a new tab)
Running nodes on modest hardware is fundamental to keeping Ethereum decentralized. Therefore, active research into minimizing the hardware requirements to run nodes is an important area of research.
Security is a broad topic that might include spam/scam prevention, wallet security, hardware security, crypto-economic security, bug hunting and testing of applications and client software and key-management. Contributing to knowledge in these areas will help stimulate mainstream adoption.
Cryptography & ZKP
Zero-knowledge proofs (ZKP) and cryptography are critical for building privacy and security into Ethereum and its applications. Zero-knowledge is a relatively young but fast-moving space with many open research and development opportunities. Some possibilities include developing more efficient implementations of the Keccak hashing algorithm(opens in a new tab), finding better polynomial commitments than currently exist or reducing the cost of ecdsa public key generation and signature verification circuits.
- 0xparc blog(opens in a new tab)
- zkp.science(opens in a new tab)
- Zero Knowledge podcast(opens in a new tab)
- Recent advance in elliptic curve cryptography(opens in a new tab)
- Ethresear.ch ZK(opens in a new tab)
Ethereum wallets can be browser extensions, desktop and mobile apps or smart contracts on Ethereum. There is active research into social recovery wallets that reduce some of the risk associated with individual-user key management. Associated with development of wallets is research into alternative forms of account abstraction, which is an important area of nascent research.
- Introduction to wallets
- Introduction to wallet security
- ethresear.ch Security(opens in a new tab)
- EIP-2938 Account Abstraction(opens in a new tab)
- EIP-4337 Account Abstraction(opens in a new tab)
- Validation focused smart contract wallets(opens in a new tab)
- The future of accounts(opens in a new tab)
- EIP-3074 AUTH and AUTHCALL Opcodes(opens in a new tab)
- Publishing code at an EOA address(opens in a new tab)
Community, education and outreach
Onboarding new users onto Ethereum requires new educational resources and approaches to outreach. This might include blog posts and articles, books, podcasts, memes, teaching resources events and anything else that builds communities, welcomes new starters and educates people about Ethereum.
To onboard more people onto Ethereum, the ecosystem must improve the UX/UI. This will require designers and product experts to re-examine the design of wallets and apps.
- Web3 Design Discord(opens in a new tab)
- Web3 Design Principles(opens in a new tab)
- Ethereum Magicians UX discussion(opens in a new tab)
Economics research in Ethereum broadly follows two approaches: validate the security of mechanisms relying on economic incentives ("microeconomics") and analyze the flows of value between protocols, applications and users ("macroeconomics"). There are complex crypto-economic factors relating to Ethereum's native asset (ether) and the tokens built on top of it (for example NFTs and ERC20 tokens).
- Empirical analysis of EIP1559(opens in a new tab)
- Circulating supply equilibrium(opens in a new tab)
- Quantifying MEV: How dark is the forest?(opens in a new tab)
Blockspace and fee markets
Blockspace markets govern the inclusion of end-user transactions, either directly on Ethereum (Layer 1) or on bridged networks, e.g., rollups (Layer 2). On Ethereum, transactions are submitted to the fee market deployed in-protocol as EIP-1559, protecting the chain from spam and pricing congestion. On both layers, transactions may produce externalities, known as Maximal Extractable Value (MEV), which induce new market structures to capture or manage these externalities.
- Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559 (Tim Roughgarden, 2020)(opens in a new tab)
- Simulations of EIP-1559 (Robust Incentives Group)(opens in a new tab)
- Rollup economics from first principles(opens in a new tab)
- Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges(opens in a new tab)
- Multidimensional EIP-1559 video presentation(opens in a new tab)
- Cross domain MEV(opens in a new tab)
- MEV auctions(opens in a new tab)
Validators use Ethereum's native asset (ether) as collateral against dishonest behavior. The cryptoeconomics of this determines the security of the network. Sophisticated validators may be able to exploit the nuances of the incentive layer to launch explicit attacks.
- Ethereum economics masterclass and economic model(opens in a new tab)
- Simulations of PoS incentives (Robust Incentives Group)(opens in a new tab)
- Increasing censorship resistance of transactions under proposer/builder separation (PBS)(opens in a new tab)
- Three Attacks on PoS Ethereum(opens in a new tab)
Liquid staking and derivatives
Liquid staking allows users with less than 32 ETH to receive staking yields by swapping ether for a token representing staked ether that can be used in DeFi. However, the incentives and market dynamics associated with liquid staking are still being discovered, as well as its effect on Ethereum's security (e.g. centralization risks).
- Ethresear.ch liquid staking(opens in a new tab)
- Lido: The road to trustless Ethereum staking(opens in a new tab)
- Rocket Pool: Staking protocol introduction(opens in a new tab)
- Handling withdrawals from Lido(opens in a new tab)
- Withdrawal credentials(opens in a new tab)
- The risks of Liquid Staking Derivatives(opens in a new tab)
Formal verification is writing code to verify that Ethereum's consensus specifications are correct and bug-free. There is an executable version of the specification written in Python that requires maintenance and development. Further research can help to improve the Python implementation of the specification and add tools that can more robustly verify correctness and identify issues.
- Introduction to formal verification(opens in a new tab)
- Formal Verification (Intel)(opens in a new tab)
- Formal verification of the deposit contract(opens in a new tab)
- Formal verification of the Beacon Chain specification(opens in a new tab)
Data science and analytics
There is a need for more data analysis tools and dashboards that give detailed information about activity on Ethereum and the health of the network.
Apps and tooling
The application layer supports a diverse ecosystem of programs that settle transactions on Ethereum's base layer. Development teams are constantly finding new ways to leverage Ethereum to create composable, permissionless and censorship-resistant versions of important Web2 apps or create completely new Web3-native concepts. At the same time, new tooling is being developed that makes building dapps on Ethereum less complex.
Decentralized finance (DeFi) is one of the primary classes of application built on top of Ethereum. DeFi aims to create composable "money legos" that allow users to store, transfer, lend, borrow and invest crypto-assets using smart contracts. DeFi is a fast-moving space that is constantly updating. Research into secure, efficient and accessible protocols is continuously needed.
- Decentralized finance, centralized ownership?(opens in a new tab)
- Optimism: The road to sub-dollar transactions(opens in a new tab)
An impactful use case for Ethereum is the ability to organize in a decentralized manner through the use of DAOs. There is a lot of active research into how DAOs on Ethereum can be developed and utilized to execute improved forms of governance, as a trust-minimized coordination tool, greatly expanding peoples options beyond traditional corporations and organizations.
Tools for Ethereum developers are rapidly improving. There is lots of active research and development to do in this general area.
- Tooling by programming language
- Developer Frameworks
- Consensus developer tools list(opens in a new tab)
- Token standards
- Biastek: Ethereum tools(opens in a new tab)
- CryptoDevHub: EVM Tools(opens in a new tab)
Oracles import off-chain data onto the blockchain in a permissionless and decentralized way. Getting this data on-chain enables dapps to be reactive to real-world phenomena such as price fluctuations in real-world assets, events in off-chain apps, or even changes in the weather.
Hacks on Ethereum generally exploit vulnerabilities in individual applications rather than in the protocol itself. Hackers and app developers are locked in an arms race to develop new attacks and defenses. This means there is always important research and development required to keep apps safe from hacks.
- Wormhole exploit report(opens in a new tab)
- List of Ethereum contract hack post-mortems(opens in a new tab)
- Rekt News(opens in a new tab)
Decentralizing the entire Ethereum tech stack is an important research area. Currently, dapps on Ethereum commonly have some points of centralization because they rely on centralized tooling or infrastructure.
- Ethereum stack
- Coinbase: Intro to Web3 Stack(opens in a new tab)
- Introduction to smart contracts
- Introduction to decentralized storage