executor
Bribing attacker model
Coordinated choice
Uncoordinated majority
Honest majority
security
scalability
decentralizaton
Light node
Single-shard node
Top-level node
Super-full node
archival node
notary
Collation header C1_2
(shard id, period index)
C3_2
C5_4
Cn_m
collator
proposers
prolators
validators
(150)
client
block
collation
collation1
c2
c3
sharding
VMC
Block
B5
B6
B7
B8
B9
B0
B1
B2
B3
B4
shard chain 100
shard chain 1
shard chain 0
challanges
Single-shard takeover attacks
Fraud detection
Cross shard communication
The data availability problem
nodes