Merkle trees vs. Verkle trees, Explained
What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.
rn”,”seo_description”:”What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.”},”words_count”:760,”description”:”This article helps you to understand the importance of and differences between Merkle vs. Verkle trees in blockchain”,”author”:{“id”:1415,”title”:”Jagjit Singh”,”url”:”jagjit-singh”,”twitter”:””,”google_plus”:””,”photo”:””,”gender”:”male”,”description”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”facebook”:””,”email”:””,”linkedin”:””,”created_at”:”2021-11-03 12:47:28″,”updated_at”:”2022-06-02 09:53:58″,”deleted_at”:null,”avatar”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2phZ2ppdC1zaW5naA==”,”relativeUrl”:”https://cointelegraph.com/authors/jagjit-singh”,”user_id”:1415,”language_id”:1,”name”:”Jagjit Singh”,”desc”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”seo_title”:””,”seo_description”:””,”enabled”:1,”show_in_authors”:0,”show_in_experts”:0},”category_id”:65,”audio”:”https://s3.cointelegraph.com/audio/91891.84e16ee1-5075-4c2a-8392-2a78b21fd4dc.mp3″,”tags”:[{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”},{“name”:”Ethereum”,”uri”:”/tags/ethereum”,”super”:1,”page_title”:”Ethereum News”},{“name”:”Cryptography”,”uri”:”/tags/cryptography”,”super”:0,”page_title”:”Cryptography News”}],”tag_title”:”Blockchain”,”date”:”45 MINUTES AGO”,”badge”:{“title”:”Explained”,”label”:”default”},”qty”:2,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=91891®ionId=1″,”shares”:46,”infographic”:false,”sponsored”:false,”explained”:true,”press_release”:false,”show_referral”:false,”social_description”:”Merkle and Verkle trees are employed in cryptocurrencies to more effectively and securely encrypt blockchain data. But how exactly do they do that and which one is right for you?”,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”:91891,”post_url”:”https://cointelegraph.com/explained/merkle-trees-vs-verkle-trees-explained”,”post_titles”:{“normal”:”Merkle trees vs. Verkle trees, Explained”,”twitter”:”Merkle trees vs. Verkle trees, Explained”},”post_text”:{“normal”:”Merkle trees vs. Verkle trees, Explained”,”twitter”:”Merkle trees vs. Verkle trees, Explained https://cointelegraph.com/explained/merkle-trees-vs-verkle-trees-explained via @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained”,”count”:null,”short”:”fb”,”fa”:”facebook”},”twitter”:{“url”:”https://twitter.com/intent/tweet?text=Merkle+trees+vs.+Verkle+trees%2C+Explained https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained via @cointelegraph”,”count”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained &text=Merkle+trees+vs.+Verkle+trees%2C+Explained”,”count”:null,”short”:”tg”,”fa”:”paper-plane”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=Merkle+trees+vs.+Verkle+trees%2C+Explained&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained”,”count”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained”,”count”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/submit?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained&title=Merkle+trees+vs.+Verkle+trees%2C+Explained”,”count”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fmerkle-trees-vs-verkle-trees-explained&title=Merkle+trees+vs.+Verkle+trees%2C+Explained”,”count”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:false,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://images.cointelegraph.com/images/528_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_x1″:”https://images.cointelegraph.com/images/260_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_svg”:false,”content”:[{“id”:3626,”post_id”:91891,”title”:”What are Merkle trees and how do they work?”,”content”:”
A binary tree that uses cryptographic hash algorithms is called a Merkle tree.
nn
A hash tree also referred to as a Merkle tree, has labeled leaf nodes with the cryptographic hash of a data block. In addition, it has labeled non-leaf nodes with the cryptographic hash of the labels of its child nodes.
nn
Each node generates a digest that recursively relies on all of the characteristics in its subtree, and one or more attributes are added to the leaves. In a Merkle tree structure, leaves compute their own attributes’ hash, and parents calculate the digests of their children’s concatenated left-to-right digests.
nn
nn
But who invented Merkle trees? Ralph Merkle developed Merkle trees in 1988 to create stronger digital signatures. Merkle trees efficiently verify the correctness and integrity of data while reducing the verification’s memory requirements. Also, compared to other data structures, Merkle trees take up less disc space, which is one of the significant advantages of Merkle trees.
nn
So, is Ethereum a Merkle tree? The Ethereum blockchain uses a Merkle tree called the Merkle Patricia trie, which offers a data structure that may be used to store all (key, value) bindings and is authenticated cryptographically.
nn
Additionally, all of the Merkle tries in the Ethereum execution layer use a Merkle Patricia Trie. The state trie updates over time as there is one global state trie. All contract data is kept in storage trie. Every block has its own transactions trie that stores (key, value) pairs. Each block contains a separate Receipts trie that is never updated.
nnn”,”created_at”:”2022-08-19 09:19:11″,”updated_at”:”2022-08-19 09:25:52″,”sort”:1,”translations”:{“id”:3619,”explained_post_id”:3626,”title_en”:”What are Merkle trees and how do they work?”,”content_en”:”
A binary tree that uses cryptographic hash algorithms is called a Merkle tree.
nn
A hash tree also referred to as a Merkle tree, has labeled leaf nodes with the cryptographic hash of a data block. In addition, it has labeled non-leaf nodes with the cryptographic hash of the labels of its child nodes.
nn
Each node generates a digest that recursively relies on all of the characteristics in its subtree, and one or more attributes are added to the leaves. In a Merkle tree structure, leaves compute their own attributes’ hash, and parents calculate the digests of their children’s concatenated left-to-right digests.
nn
nn
But who invented Merkle trees? Ralph Merkle developed Merkle trees in 1988 to create stronger digital signatures. Merkle trees efficiently verify the correctness and integrity of data while reducing the verification’s memory requirements. Also, compared to other data structures, Merkle trees take up less disc space, which is one of the significant advantages of Merkle trees.
nn
So, is Ethereum a Merkle tree? The Ethereum blockchain uses a Merkle tree called the Merkle Patricia trie, which offers a data structure that may be used to store all (key, value) bindings and is authenticated cryptographically.
nn
Additionally, all of the Merkle tries in the Ethereum execution layer use a Merkle Patricia Trie. The state trie updates over time as there is one global state trie. All contract data is kept in storage trie. Every block has its own transactions trie that stores (key, value) pairs. Each block contains a separate Receipts trie that is never updated.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-19 09:19:12″,”updated_at”:”2022-08-19 09:25:52″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3627,”post_id”:91891,”title”:”What are Verkle trees and how do they work?”,”content”:”
Similar to Merkle trees, Verkle trees allow you to organize a considerable quantity of data and create a brief “witness” of each item of data or group of related pieces that can be confirmed by someone who has access to the tree’s root.
nn
However, Verkle trees’ most important feature is their proof-size efficiency. A Verkle tree would require less than 150 bytes to produce a proof for a tree with a billion data points, compared to a typical binary Merkle tree’s around 1 kilobyte. Verkle trees utilize a proving system called Polynomial Commitments, relying upon polynomial functions to describe data.
nn
But who invented Verkle trees? In 2018, John Kuszmaul introduced Verkle trees, which are still not as well known as many other significant new cryptographic structures. A Verkle tree structure resembles Ethereum’s current Merkle Patricia tree. In essence, each node has one of three properties:
nn
- nt
- It is empty.
- It is a leaf node with a key and value.
- It is an intermediate node with a defined number of children (the “width” of the tree).
nt
nt
nt
n
nn
A hash of the values of a node’s children is used to calculate the value of an intermediate node. However, Verkle trees are more expansive than Merkle Patricia trees, which is one of the distinct advantages of Verkle trees and the only substantial distinction between their structural components. The sole restriction is that if the width increases too much, proofs begin to take too long to produce. As a result, the proofs get shorter and shorter as the width increases.
nnn”,”created_at”:”2022-08-19 09:20:28″,”updated_at”:”2022-08-19 09:25:48″,”sort”:2,”translations”:{“id”:3620,”explained_post_id”:3627,”title_en”:”What are Verkle trees and how do they work?”,”content_en”:”
Similar to Merkle trees, Verkle trees allow you to organize a considerable quantity of data and create a brief “witness” of each item of data or group of related pieces that can be confirmed by someone who has access to the tree’s root.
nn
However, Verkle trees’ most important feature is their proof-size efficiency. A Verkle tree would require less than 150 bytes to produce a proof for a tree with a billion data points, compared to a typical binary Merkle tree’s around 1 kilobyte. Verkle trees utilize a proving system called Polynomial Commitments, relying upon polynomial functions to describe data.
nn
But who invented Verkle trees? In 2018, John Kuszmaul introduced Verkle trees, which are still not as well known as many other significant new cryptographic structures. A Verkle tree structure resembles Ethereum’s current Merkle Patricia tree. In essence, each node has one of three properties:
nn
- nt
- It is empty.
- It is a leaf node with a key and value.
- It is an intermediate node with a defined number of children (the “width” of the tree).
nt
nt
nt
n
nn
A hash of the values of a node’s children is used to calculate the value of an intermediate node. However, Verkle trees are more expansive than Merkle Patricia trees, which is one of the distinct advantages of Verkle trees and the only substantial distinction between their structural components. The sole restriction is that if the width increases too much, proofs begin to take too long to produce. As a result, the proofs get shorter and shorter as the width increases.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-19 09:20:28″,”updated_at”:”2022-08-19 09:25:48″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3628,”post_id”:91891,”title”:”What is the importance of Merkle and Verkle trees in blockchain?”,”content”:”
Merkle trees are employed in Bitcoin (BTC) and other cryptocurrencies to more effectively and securely encrypt blockchain data. Verkle trees allow for smaller proof sizes, particularly important for Ethereum’s upcoming scaling upgrades.
nn
But, how do you identify a Merkle tree? Leaf nodes, non-leaf nodes and the Merkle root are the three essential parts of a Merkle tree in the context of blockchains. Transaction hashes or transaction IDs (TXIDs) reside in leaf nodes, which can be viewed on a block explorer. Then, above the leaf nodes, a layer of non-leaf nodes is hashed together in pairs. Non-leaf nodes keep the hash of the two leaf nodes they represent below them.
nn
Related: What is blockchain technology? How does it work?
nn
As the tree narrows as it ascends, half as many nodes per layer are formed when non-leaf node levels continue to be hashed together in pairs. Two nodes will be present in the final non-leaf node layer, which establishes the Merkle root (used to verify the leaf nodes) and is the location of the last hashing in a Merkle tree.
nn
The Merkle root stored in the data portion of a block can be compared to the Merkle root stored in the header, allowing the miner to identify any manipulation quickly. A Merkle proof combines the value being proved and the hashing values needed to recover the Merkle root. In addition, they support simple Payment Verification (SPV), which can be used to authenticate a transaction without downloading a complete block or blockchain. This allows using a crypto wallet or light-client node to send and receive transactions.
nn
Verkle trees enable significantly reduced proof sizes for a large amount of data compared to Merkel trees. The proof length, typically logarithmic in the state size, impacts network communication. But, what is a Verkle proof? A Verkle proof is evidence of a large amount of data stored, which could easily be verified by anyone with the tree’s root.
nn
nThe prover must offer a single proof demonstrating all parent-child links between all commitments along the paths from each leaf node to the root instead of presenting all “sister nodes” at every level in Verkle trees. Compared to ideal Merkle trees, proof sizes can be reduced by a factor of six–eight and by a factor of more than 20–30 compared to Ethereum’s current hexary Patricia trees.
nnn”,”created_at”:”2022-08-19 09:24:00″,”updated_at”:”2022-08-19 09:25:48″,”sort”:3,”translations”:{“id”:3621,”explained_post_id”:3628,”title_en”:”What is the importance of Merkle and Verkle trees in blockchain?”,”content_en”:”
Merkle trees are employed in Bitcoin (BTC) and other cryptocurrencies to more effectively and securely encrypt blockchain data. Verkle trees allow for smaller proof sizes, particularly important for Ethereum’s upcoming scaling upgrades.
nn
But, how do you identify a Merkle tree? Leaf nodes, non-leaf nodes and the Merkle root are the three essential parts of a Merkle tree in the context of blockchains. Transaction hashes or transaction IDs (TXIDs) reside in leaf nodes, which can be viewed on a block explorer. Then, above the leaf nodes, a layer of non-leaf nodes is hashed together in pairs. Non-leaf nodes keep the hash of the two leaf nodes they represent below them.
nn
Related: What is blockchain technology? How does it work?
nn
As the tree narrows as it ascends, half as many nodes per layer are formed when non-leaf node levels continue to be hashed together in pairs. Two nodes will be present in the final non-leaf node layer, which establishes the Merkle root (used to verify the leaf nodes) and is the location of the last hashing in a Merkle tree.
nn
The Merkle root stored in the data portion of a block can be compared to the Merkle root stored in the header, allowing the miner to identify any manipulation quickly. A Merkle proof combines the value being proved and the hashing values needed to recover the Merkle root. In addition, they support simple Payment Verification (SPV), which can be used to authenticate a transaction without downloading a complete block or blockchain. This allows using a crypto wallet or light-client node to send and receive transactions.
nn
Verkle trees enable significantly reduced proof sizes for a large amount of data compared to Merkel trees. The proof length, typically logarithmic in the state size, impacts network communication. But, what is a Verkle proof? A Verkle proof is evidence of a large amount of data stored, which could easily be verified by anyone with the tree’s root.
nn
nThe prover must offer a single proof demonstrating all parent-child links between all commitments along the paths from each leaf node to the root instead of presenting all “sister nodes” at every level in Verkle trees. Compared to ideal Merkle trees, proof sizes can be reduced by a factor of six–eight and by a factor of more than 20–30 compared to Ethereum’s current hexary Patricia trees.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-19 09:24:00″,”updated_at”:”2022-08-19 09:25:48″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3629,”post_id”:91891,”title”:”Merkle trees vs. Verkle trees”,”content”:”
There are many differences between both types of trees, particularly in providing Merkle proofs and Verkle proofs.
nn
The whole set of sister nodes in a Merkle tree, including Merkle Patricia trees, constitutes evidence of a value. The proof must include all nodes in the tree with any parent node in common with the node you are attempting to prove. On the other hand, in a Verkle tree, you only need to supply the path plus a tiny bit extra as proof—you don’t even need to add sister nodes.
nn
The Verkle tree’s main idea is that a Merkle tree may be created by substituting vector commitments for the cryptographic hash functions. A Verkle tree serves the same purpose as a Merkle tree. However, they are significantly more effective in size in bytes, which is the primary distinction.
nn
Due to their tree-like structure, Merkle proofs are simple to update in part while the Polynomial Commitments in Verkle trees call for a complete alteration of the entire curve, which would be challenging to calculate witnesses for.
nn
People worldwide may send, receive and verify transactions with crypto wallets that can be run efficiently and simply on a personal computer or smartphone, which is the significant Merkle tree use case, possibly due to Merkle roots formed from Merkle trees. On the contrary, one of the crucial Verkle trees use cases includes substituting a vector commitment for the hashes in a Merkle tree, increasing the effectiveness of broader branching factors.
nn
Purchase a licence for this article. Powered by SharpShark.
nnn”,”created_at”:”2022-08-19 09:24:36″,”updated_at”:”2022-08-19 09:25:47″,”sort”:4,”translations”:{“id”:3622,”explained_post_id”:3629,”title_en”:”Merkle trees vs. Verkle trees”,”content_en”:”
There are many differences between both types of trees, particularly in providing Merkle proofs and Verkle proofs.
nn
The whole set of sister nodes in a Merkle tree, including Merkle Patricia trees, constitutes evidence of a value. The proof must include all nodes in the tree with any parent node in common with the node you are attempting to prove. On the other hand, in a Verkle tree, you only need to supply the path plus a tiny bit extra as proof—you don’t even need to add sister nodes.
nn
The Verkle tree’s main idea is that a Merkle tree may be created by substituting vector commitments for the cryptographic hash functions. A Verkle tree serves the same purpose as a Merkle tree. However, they are significantly more effective in size in bytes, which is the primary distinction.
nn
Due to their tree-like structure, Merkle proofs are simple to update in part while the Polynomial Commitments in Verkle trees call for a complete alteration of the entire curve, which would be challenging to calculate witnesses for.
nn
People worldwide may send, receive and verify transactions with crypto wallets that can be run efficiently and simply on a personal computer or smartphone, which is the significant Merkle tree use case, possibly due to Merkle roots formed from Merkle trees. On the contrary, one of the crucial Verkle trees use cases includes substituting a vector commitment for the hashes in a Merkle tree, increasing the effectiveness of broader branching factors.
nn
Purchase a licence for this article. Powered by SharpShark.
nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-08-19 09:24:36″,”updated_at”:”2022-08-19 09:25:47″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}}],”is_partner_material”:false,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/merkle-trees-vs-verkle-trees-explained”,”list”:[],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Comment”,”amountPostfix”:”Comments”,”cancel”:”Cancel”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Comment text cannot be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Comment text must be at least 2 characters long”,”hideButton”:”Hide comments”,”noComments”:” “,”commentOnModeration”:”Comment on moderation”,”postComment”:”Post”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Sign in”,”update”:”Update comment”,”commentWasDeleted”:”This comment has been deleted”}},”related”:[{“id”:82700,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDMvOTM4YjgwM2UtMGM5ZC00ZTgzLWJhNjItNDI4NzY2MzE1Mjk1LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/what-is-solana-sol-pay-and-how-does-it-work”,”title”:”What is Solana (SOL) Pay, and how does it work?”,”lead”:”Solana Pay is an open protocol for developers to build on and customize, with standardized payment criteria.”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/max-moeller”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL21heC1tb2VsbGVy”,”author_title”:”Max Moeller”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”MAR 13, 2022″,”flash_date”:”MAR 13, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”How to crypto”,”label”:”default”},”published”:{“date”:”2022-03-13 13:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:23083,”rss_date”:”Sun, 13 Mar 2022 13:00:00 +0000″,”publishedW3″:”2022-03-13T13:00:00+00:00″,”show_referral”:true,”isMagazine”:false},{“id”:91454,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ZjBjOGU4N2Q0ZGVhNTFiMzFiMjg1NjQ3N2VhM2IwYy5qcGVn.jpeg”,”url”:”https://cointelegraph.com/news/this-blockchain-platform-says-its-eco-friendly-without-compromising-on-performance”,”title”:”This blockchain platform says it’s eco-friendly without compromising on performance”,”lead”:”Major blockchains have a technological problem, and an environmental one. But this crypto project says that it’s found a way to solve both.”,”leadfull”:””,”category_id”:62,”category_url”:”https://cointelegraph.com/category/sponsored”,”category_title”:”Sponsored”,”author_url”:”https://cointelegraph.com/authors/chris-jones”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2NocmlzLWpvbmVz”,”author_title”:”Chris Jones”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”AUG 11, 2022″,”flash_date”:”AUG 11, 2022″,”sponsored”:true,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Sponsored”,”label”:”default”},”published”:{“date”:”2022-08-11 12:24:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1748,”rss_date”:”Thu, 11 Aug 2022 12:24:00 +0100″,”publishedW3″:”2022-08-11T12:24:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91692,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvOGY1ZDUxMTgtM2Y0NC00MjZiLTg2OWQtMzUwMTY0YjZlMzI0LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/organizations-look-toward-multiparty-computation-to-advance-web3″,”title”:”Organizations look toward multiparty computation to advance Web3″,”lead”:”Multiparty computation is being leveraged to ensure private key security and decentralization within Web3 platforms. But why use it?”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/rachel-wolfson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3JhY2hlbC13b2xmc29u”,”author_title”:”Rachel Wolfson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81OGI2YmIyMjI0MGRjOGI5M2UxYTUxYzMzZTMzNjY2Mi5qcGc=.jpg”,”date”:”AUG 16, 2022″,”flash_date”:”AUG 16, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2022-08-16 15:47:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1797,”rss_date”:”Tue, 16 Aug 2022 15:47:00 +0100″,”publishedW3″:”2022-08-16T15:47:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91756,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvYTU5YThhNWQtNmE2Ny00YmUwLWIxYTMtOWQ4OTQwMWM5NmM2LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/ethereumpow-team-plans-to-freeze-selected-contracts-community-pushes-back”,”title”:”EthereumPoW team plans to freeze selected contracts, community pushes back”,”lead”:”A PoW hard fork of Ethereum is being propagated by a set of miners, but many experts believe that the chances of it succeeding are very low.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/prashant-jha”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3ByYXNoYW50LWpoYQ==”,”author_title”:” Prashant Jha “,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iZjk4ODk2OGFmZTBmOGU4OGEyMTdlMmEyMGM1ZmMxZS5qcGc=.jpg”,”date”:”AUG 17, 2022″,”flash_date”:”AUG 17, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2022-08-17 10:40:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3173,”rss_date”:”Wed, 17 Aug 2022 10:40:00 +0100″,”publishedW3″:”2022-08-17T10:40:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91786,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNTI4NGUyNTQtZmU3ZC00N2JjLTllOGUtYWZjNzc2NTg1NmY2LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/ethereum-foundation-clarifies-that-the-upcoming-merge-upgrade-will-not-reduce-gas-fees”,”title”:”Ethereum Foundation clarifies that the upcoming Merge upgrade will not reduce gas fees”,”lead”:”The Merge will still reduce the network’s energy consumption by an estimated 99.5%. “,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/zhiyuan-sun”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3poaXl1YW4tc3Vu”,”author_title”:” Zhiyuan Sun “,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82ZTIyODkzYzk0NDBjMGYxMTk1MDU3YzE4ZGFiMDBhYS5qcGc=.jpg”,”date”:”AUG 17, 2022″,”flash_date”:”AUG 17, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2022-08-17 17:30:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:12601,”rss_date”:”Wed, 17 Aug 2022 17:30:00 +0100″,”publishedW3″:”2022-08-17T17:30:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:91789,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvM2RiOTAxM2ItYWViNC00MWJlLTg4ZjktNzQ5OGMzNGQ1Y2I3LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/economic-design-changes-will-affect-eth-s-value-post-merge-says-consensys-exec”,”title”:”Economic design changes will affect ETH’s value post-Merge, says ConsenSys exec”,”lead”:”Lex Sokolin said that post-Merge, DeFi projects will have to compete with the returns offered by the core ETH protocol. “,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/ezra-reguerra”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2V6cmEtcmVndWVycmE=”,”author_title”:” Ezra Reguerra “,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iM2YxOTZjYTA4ZGI5MzhkNjkxZWU3NzY5OWFhZjRmZi5qcGc=.jpg”,”date”:”AUG 17, 2022″,”flash_date”:”AUG 17, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Interview”,”label”:”default”},”published”:{“date”:”2022-08-17 19:45:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:4635,”rss_date”:”Wed, 17 Aug 2022 19:45:00 +0100″,”publishedW3″:”2022-08-17T19:45:00+01:00″,”show_referral”:true,”isMagazine”:false}]}” :shares=”{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=%URL%”,”icon”:”facebook”,”title”:”Facebook”,”sizesAllowed”:[{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"position":1,"status":true},"twitter":{"url":"https://twitter.com/intent/tweet?text=%TEXT%","icon":"twitter","title":"Twitter","position":2,"status":true,"sizesAllowed":[{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&text=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”position”:3,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”position”:5,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”copy”:{“url”:”%URL%”,”icon”:”copy”,”position”:7,”title”:”Copy Link”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”status”:true},”whatsapp”:{“url”:”https://wa.me/?text=%TITLE% %URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:6,”status”:true},”reddit”:{“url”:”https://www.reddit.com/submit?url=%URL%&title=%TITLE%”,”icon”:”reddit”,”title”:”Reddit”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:4,”status”:true}}” is=”ExplainedPostPage”>
A binary tree that uses cryptographic hash algorithms is called a Merkle tree.
A hash tree also referred to as a Merkle tree, has labeled leaf nodes with the cryptographic hash of a data block. In addition, it has labeled non-leaf nodes with the cryptographic hash of the labels of its child nodes.
Each node generates a digest that recursively relies on all of the characteristics in its subtree, and one or more attributes are added to the leaves. In a Merkle tree structure, leaves compute their own attributes’ hash, and parents calculate the digests of their children’s concatenated left-to-right digests.
But who invented Merkle trees? Ralph Merkle developed Merkle trees in 1988 to create stronger digital signatures. Merkle trees efficiently verify the correctness and integrity of data while reducing the verification’s memory requirements. Also, compared to other data structures, Merkle trees take up less disc space, which is one of the significant advantages of Merkle trees.
So, is Ethereum a Merkle tree? The Ethereum blockchain uses a Merkle tree called the Merkle Patricia trie, which offers a data structure that may be used to store all (key, value) bindings and is authenticated cryptographically.
Additionally, all of the Merkle tries in the Ethereum execution layer use a Merkle Patricia Trie. The state trie updates over time as there is one global state trie. All contract data is kept in storage trie. Every block has its own transactions trie that stores (key, value) pairs. Each block contains a separate Receipts trie that is never updated.
Similar to Merkle trees, Verkle trees allow you to organize a considerable quantity of data and create a brief “witness” of each item of data or group of related pieces that can be confirmed by someone who has access to the tree’s root.
However, Verkle trees’ most important feature is their proof-size efficiency. A Verkle tree would require less than 150 bytes to produce a proof for a tree with a billion data points, compared to a typical binary Merkle tree’s around 1 kilobyte. Verkle trees utilize a proving system called Polynomial Commitments, relying upon polynomial functions to describe data.
But who invented Verkle trees? In 2018, John Kuszmaul introduced Verkle trees, which are still not as well known as many other significant new cryptographic structures. A Verkle tree structure resembles Ethereum’s current Merkle Patricia tree. In essence, each node has one of three properties:
- It is empty.
- It is a leaf node with a key and value.
- It is an intermediate node with a defined number of children (the “width” of the tree).
A hash of the values of a node’s children is used to calculate the value of an intermediate node. However, Verkle trees are more expansive than Merkle Patricia trees, which is one of the distinct advantages of Verkle trees and the only substantial distinction between their structural components. The sole restriction is that if the width increases too much, proofs begin to take too long to produce. As a result, the proofs get shorter and shorter as the width increases.
Merkle trees are employed in Bitcoin (BTC) and other cryptocurrencies to more effectively and securely encrypt blockchain data. Verkle trees allow for smaller proof sizes, particularly important for Ethereum’s upcoming scaling upgrades.
But, how do you identify a Merkle tree? Leaf nodes, non-leaf nodes and the Merkle root are the three essential parts of a Merkle tree in the context of blockchains. Transaction hashes or transaction IDs (TXIDs) reside in leaf nodes, which can be viewed on a block explorer. Then, above the leaf nodes, a layer of non-leaf nodes is hashed together in pairs. Non-leaf nodes keep the hash of the two leaf nodes they represent below them.
Related: What is blockchain technology? How does it work?
As the tree narrows as it ascends, half as many nodes per layer are formed when non-leaf node levels continue to be hashed together in pairs. Two nodes will be present in the final non-leaf node layer, which establishes the Merkle root (used to verify the leaf nodes) and is the location of the last hashing in a Merkle tree.
The Merkle root stored in the data portion of a block can be compared to the Merkle root stored in the header, allowing the miner to identify any manipulation quickly. A Merkle proof combines the value being proved and the hashing values needed to recover the Merkle root. In addition, they support simple Payment Verification (SPV), which can be used to authenticate a transaction without downloading a complete block or blockchain. This allows using a crypto wallet or light-client node to send and receive transactions.
Verkle trees enable significantly reduced proof sizes for a large amount of data compared to Merkel trees. The proof length, typically logarithmic in the state size, impacts network communication. But, what is a Verkle proof? A Verkle proof is evidence of a large amount of data stored, which could easily be verified by anyone with the tree’s root.
The prover must offer a single proof demonstrating all parent-child links between all commitments along the paths from each leaf node to the root instead of presenting all “sister nodes” at every level in Verkle trees. Compared to ideal Merkle trees, proof sizes can be reduced by a factor of six–eight and by a factor of more than 20–30 compared to Ethereum’s current hexary Patricia trees.
There are many differences between both types of trees, particularly in providing Merkle proofs and Verkle proofs.
The whole set of sister nodes in a Merkle tree, including Merkle Patricia trees, constitutes evidence of a value. The proof must include all nodes in the tree with any parent node in common with the node you are attempting to prove. On the other hand, in a Verkle tree, you only need to supply the path plus a tiny bit extra as proof—you don’t even need to add sister nodes.
The Verkle tree’s main idea is that a Merkle tree may be created by substituting vector commitments for the cryptographic hash functions. A Verkle tree serves the same purpose as a Merkle tree. However, they are significantly more effective in size in bytes, which is the primary distinction.
Due to their tree-like structure, Merkle proofs are simple to update in part while the Polynomial Commitments in Verkle trees call for a complete alteration of the entire curve, which would be challenging to calculate witnesses for.
People worldwide may send, receive and verify transactions with crypto wallets that can be run efficiently and simply on a personal computer or smartphone, which is the significant Merkle tree use case, possibly due to Merkle roots formed from Merkle trees. On the contrary, one of the crucial Verkle trees use cases includes substituting a vector commitment for the hashes in a Merkle tree, increasing the effectiveness of broader branching factors.
Purchase a licence for this article. Powered by SharpShark.