Symbiosis: A cross-chain revolution
Symbiosis is a revolutionary decentralised exchange that bridges the gap between various blockchains, enhancing interoperability within the crypto ecosystem.
XingChiAt the beginning of 2020, Ethereum's fees were still friendly to most DeFi users. However, with the rapid development of the Ethereum ecosystem in DeFi Summer, the rapid growth of TVL and new users has also led to an increase in the gas fee for contract interaction, which discourages new users with less capital. Ethereum's limited transaction speed and block generation speed also limit the efficiency of interaction. This has also led investors and developers to start looking for cheaper and faster Ethereum alternatives to undertake value spillovers. From the data in Figure 1, we can intuitively see that the proportion of Ethereum's TVL in the TVL of the entire market continues to decline (excluding the impact of the Terra crash in mid-May).
Figure 1: All public chain TVL data sources Defilama
According to the data of Blockchain-Comparison.com, as of May 14, 2022, there are already 115 Layer 1 public chains in the market. For some users, low transaction fees are the most important consideration, and decentralization is not necessarily important. This gives the Layer1 public chain an opportunity to support EVM. According to Defillma's data, BSC, Avalanche, and Fantom are the top-ranked major EVM public chains, with a large amount of funds locked. As far as the EVM public chain market is concerned, the EVM Layer1 public chain other than Ethereum will grab about 25% of Ethereum's share between January and May 2021. However, it can be seen from Figure 2 that Ethereum's market share has remained at around 75% since May 2021, and its leading position in the market is solid.
Figure 2: Comparison of Ethereum TVL and EVM Layer 1 TVL. Data source Defilama
According to defillama data, the ratio of Non EVM Layer1 TVL/(Ethererum's TVL+ Non EVM Layer1 TVL) rose from 24% in February 2022 to 30% on May 3, 2022 (due to the collapse of Terra's algorithmic stable currency , according to data on May 14, the proportion fell to 16.8%). Non EVM chains such as Solana, Near, etc. have seen significant TVL growth with capital support, and low Gas fees have attracted a large number of new users outside the circle and old Ethereum users who cannot afford high fees.
According to data from l2beat, Layer2's TVL has increased 6.7 times from $890 million on May 3, 2021 to $5.99 billion on May 2, 2022. Ethereum's TVL only increased from $90 billion to $110 billion over the same period. With the continuous improvement of Optimism's Token incentive plan, Arbitrum, Zksync and StarkNet ecology, the TVL of Layer 2 will continue to increase.
Figure 3 Layer 2 TVL data source: L2beat
From the above data, it can be seen that due to the pain points of high Ethereum Gas fee and slow speed that cannot be solved in the short term, the major Layer1 public chains and Layer2 have gained value overflow. Ethereum's biggest moat is its TVL of 110 billion US dollars. Important native lending platforms stick to their base camps. The status of large liquidity pools cannot be shaken in the short term. Ethereum will still be the first choice for outstanding developers. For a long time Li will still be the largest public chain, taking on the role of the blockchain world data settlement layer and consensus layer. Other public chains will seize this opportunity, combine their own mechanisms, and develop into unique application-specific blockchains to seize part of the market share. For example, Terra and Kava have developed into financial chains, Avalanche and WAX are deeply involved in games, Flow and Immutable focus on the NFT field, and Aztec and Oasis provide privacy options. The huge demand of users for Metaverse has provided a large enough market, and the future will be a multi-chain pattern where a hundred flowers bloom.
Due to their high valuation ceiling, the major public chains have been competing for investment from major institutions, and the ecology has achieved great development in the past year. However, due to technical and competitive reasons, most public chains cannot directly communicate with each other, making users, assets, data and Dapp scattered in their respective ecosystems, like a stand-alone computer, forming an island effect. This is contrary to the spirit of blockchain interoperability and scalability.
Under such circumstances, the cross-chain needs of blockchain aborigines began to awaken, thinking about the feasibility of interaction between blockchains.
We must first clarify the definition and difference between cross-chain and cross-layer.
Cross-chain refers to the transfer of messages between different blockchains. Different chains have different ledgers and accounting units. The accounts recorded by the side chain will not be reported to the main chain. The side chain only communicates with the main chain when a cross-chain occurs.
Cross-layer means that information is passed between Layer1 and Layer2. Cross-layer refers to the change of the accounting place under the same set of ledgers. Layer2 is the same as its Layer1 accounting unit, and the account will be regularly notified to the main chain.
However, in practice, many users ignore the conceptual distinction and classify cross-layers as cross-chains.
User cross-chain behavior can be divided into narrow cross-chain behavior and broad cross-chain behavior. Narrowly defined cross-chain behavior refers to token cross-chain (token exchange, token transfer), and broadly defined cross-chain behavior refers to message cross-chain.
Narrow cross-chain behavior
-Token exchange
Each public chain has a native token as a value carrier, and users can exchange tokens within the chain. Before the birth of the cross-chain bridge, users could only exchange cross-chain tokens through a centralized trading platform. For example, if Alice wants to exchange BTC for ETH, she needs to recharge BTC to the centralized trading platform, convert it into ETH, and then mention it on the Ethereum chain.
With the atomic swap technology of the hash time lock, Alice can directly perform a decentralized token exchange on the chain, exchanging BTC for ETH. Inter-chain token exchange is an important prerequisite for blockchain to realize the Internet of Value.
- pass pass
The public chains are closed, and the original assets on one chain cannot be directly transferred to another chain. With the help of cross-chain bridge technology, users lock the original assets on the source chain, and issue equivalent mapping assets on the target chain to realize the transfer of tokens. A typical example is the wrapped BTC on Ethereum.
Both token exchange and token transfer solve the pain point that value cannot be exchanged between chains. In addition, token transfer makes DeFi more open. For example, encapsulated BTC implements DeFi applications on other public chains, transfers DAI to a faster, cheaper, and higher-yielding Venus for mining, and transfers ETH to the Oasis chain to seek transaction privacy.
Generalized cross-chain behavior
Message cross-chain
The message here refers to any complex cross-chain requirements raised by users.
The essence of cross-chain behavior is a combination of a series of message passing. Through cross-chain information transfer, chain A can read the state and information of chain B, and use the state and information of chain B as the trigger condition for execution. For example, token transfer is completed by two cross-chain messages. The first is to lock the warehouse on the A chain and transmit the locked warehouse information to the B chain. After the B chain verifies the authenticity of the message, it casts the mapped token, and then feeds this state information back to the A chain.
Through cross-chain information transmission, chains are no longer closed, and one chain can read and verify the information and status of another chain, realizing cross-chain lending, cross-chain NFT, cross-chain aggregation, cross-chain governance, and cross-chain derivatives And other combinations, making the vision of the blockchain as a value Internet possible.
In the previous chapter, we learned that the essence of cross-chain behavior is message transmission between chains. In this chapter, we will learn more about how several important cross-chain information transmission protocols in the market realize information transmission.
If we say that Ethereum is a supercomputer, then Cosmos is a blockchain Internet that connects independent servers into a network. Cosmos itself is not a blockchain, but an underlying protocol for designing application-specific blockchains (called Zones).
Cosmos consists of three major components: the Tendermint consensus protocol, the Cosmos SDK, and The Inter-Blockchain Communication protocol (IBC).
Cosmos SDK (Software Development Kit) provides basic functional modules of the blockchain such as pledge, governance, and Token distribution, which reduces the cost of repeated development for users and focuses on the development of application-specific chains.
Figure 4 Cosmos SDK module
As can be seen from the figure above, IBC is actually an important module of the SDK. Each chain in the Cosmos ecosystem can perform interchain interoperability through IBC for reliable and orderly transfer of tokens, proof of cross-chain data availability, and shared security. As shown in Figure 5, between Hub1 and Hub2, the Hub communicates with the application-specific blockchain (Zone) through the IBC protocol.
Figure 5 Structure of Cosmos Hub and Zone
It should be pointed out that the blockchain must have fast finality (transactions are quickly packaged and tampered with) in order to be compatible with IBC. The Bitcoin and Ethereum proof-of-work chains are not suitable for the IBC communication protocol. Such blockchains communicate between chains through Peg-Zones and Cosmos. This article is limited by length and will not be expanded.
The specific working mode of IBC. The blockchains that communicate with each other run lightweight clients to receive the block header of the other chain and track the verification set of the other chain. When blockchain A transfers tokens to blockchain B, it must be pledged in blockchain A first, and the pledge certificate must be sent to blockchain B. Blockchain B verifies the proof based on the block header of blockchain A. After confirmation, the token on chain A will be locked, and a mapping token will be established on chain B. When the pass is returned to blockchain A, a similar mechanism is used to unlock the pass.
LayerZero wants to solve the pain points of the intermediate chain and IBC, connecting every smart contract on each chain.
The intermediate chain has the signature authorization of all information between the chains, and it is only a matter of time before it is attacked by a single point. Cross-chain fees are cheap but not secure.
Although it is safer than the intermediate chain to connect Ethereum and other EVM-based blockchains through the Cosmos IBC transport layer, the cost is relatively high, which limits the use of the IBC transport layer. In addition, it has been mentioned above that the IBC transport layer only allows direct communication between blockchains with fast finality.
LayerZero is a message transmission layer for smart contracts to communicate between blockchains. It uses oracles (Oracles) and relays (Relayers) to complete asset transfers and ensure security. It can be used with deterministic and probabilistic transactions. Seamless collaboration allows applications to have a community-driven cheaper and faster full-chain communication standard.
So, how does LayerZero realize this vision?
LayerZero introduces an ultra-light node (hereinafter referred to as ULN), by performing the same verification method as the light node on the chain (to ensure security), the block header is changed to be streamed on-demand by a decentralized oracle machine (rather than sequentially) Keep all block headers and reduce fees) to achieve both safe and cheap effects. LayerZero is an on-chain terminal configurable by user programs, that is, a communication point deployed on each chain (equivalent to a broadcast station in each village). It relies on independent oracles and relays for inter-chain information transfer.
When the user program wants to send information from blockchain A to blockchain B, the information is sent by the terminal of blockchain A (LayerZero), and the oracle (notifying part of the information) and repeater (notifying all information) of the user program are notified. ). The oracle machine forwards the block header to the terminal of blockchain B (ie, LayerZero), and the relayer then submits the transaction proof. After the transaction proof is verified in the blockchain B chain, the information is forwarded to the destination address.
Figure 6 LayerZero message transmission process
Adding an independent repeater system on the basis of the existing oracle machine increases the safety factor (because the repeater can make blockchain B verify what happened in blockchain A again). It is not easy to beat Chainlink DON. Even if the oracle is compromised, there is still repeater verification. The worst case is that oracle A and repeater A collude, and all risks are only borne by user programs that receive oracle A and repeater A, and user programs that use other repeaters or oracle machines will not be affected. Influence. (The entire system will collapse after the intermediate chain solution is attacked by a single point) Applications can choose their own trusted oracle machines and establish their own repeaters. Currently, chainlink is used as an oracle by default.
Figure 7 LazyZero's multi-point configuration and intermediate chain's single-point configuration
The Celer Inter-chain Message framework (Celer Inter-chain Message, hereinafter referred to as Celer IM), which was launched at the end of April, is a cross-chain infrastructure and a cross-chain application development framework for developers. Celer IM SDK is developer friendly, plug and play. For applications that have been independently deployed on multiple chains, a simple contract plug-in can be used to transform the original DApp into a native cross-chain DApp. For all applications inserted into Celer IM, users can stay on one chain to achieve cross-chain interoperability with one click, eliminating the need for complex blockchain switching jumps.
The overall structure of Celer IM mainly has two parts, one part is the Message Bus smart contract on the chain, which acts as a "receiver box", and the other part is the State Guardian Network (hereinafter referred to as SGN), which links each chain and transmits The "messenger" of information. SGN itself is a POS chain based on Cosmos tendermint. Nodes need to pledge CELR Token to join this POS chain as part of the consensus process.
In Celer IM, users no longer directly interact with dApp's existing smart contracts, but interact with new dApp Plug-in contracts (marked A in Figure 8) to express the cross-chain logic they want to execute. This is also usually the only transaction issued by a user to interact with this cross-chain dApp. This dApp Plug-in becomes part of the entire dApp business logic and interacts with the existing smart contracts of the dApp on the source chain. The dApp Plug-in sends the user's cross-chain request to the "outbox" smart contract Messeage Bus on the source chain in the form of a message. This "outbox" smart contract will be monitored by SGN, and all verification nodes will reach a consensus on "whether the message exists" and generate a weighted multi-signature certificate at the same time. Then, this proof is stored on the SGN chain, waiting for the Executor subscribing to the message to be relayed to the Message Bus on the target chain. This "inbox" contract will verify the validity of the message, and deliver the message to the recipient contract of the dApp in the target chain on the target chain, and the dApp that receives the message will execute the corresponding logic or task according to the message.
Figure 8 Celer IM message transmission process
The security of Celer message cross-chain framework depends on SGN. The security model provided by SGN is similar to Cosmos, Polygon and other Tendermint-based L1 blockchains. As long as there is a node doing evil, this node will be eliminated by the de-cross-chain consensus protocol that has been verified countless times in actual combat, and it will suffer huge loss of deposit. This is more secure than other multi-signature solutions such as LayerZero because there are no financial penalties for malicious behavior in multi-signature solutions. Celer IM's SGN-based security model is the most lightweight security model, running fast, and the consensus algorithm that SGN relies on has already guarded hundreds of billions of assets in other blockchains today.
What if the majority of pledged nodes do evil? The probability of this event itself is relatively small. Celer IM also uses a second security model similar to the Optimistic Rollup design to prevent black swan events in extreme cases. This mechanism enforces a period of "quarantine" for each cross-chain message. When a cross-chain message reaches the target chain through SGN, the message will not be immediately sent to the relevant application to execute the corresponding logic, but will be isolated for a period of time. During the isolation period, the developer of the application, as well as the operator of each SGN node, can go to the source chain for verification. This mode uses additional isolation delays to achieve a stronger trust-any security model. As long as one of all SGN nodes and monitoring nodes running applications is still running normally, the entire system is still safe. In practical applications, Celer's cross-chain bridge cBridge combines the use of two security models. For small transfers, it relies on SGN to execute immediately, and for large transfers, it executes through this mandatory isolation period. We will introduce the technical principles of Cbridge in detail below.
From the above introduction, we can know that layerZero is a simple message cross-chain layer, which crosses messages from A chain to B chain. Celer IM has an intelligent message delivery layer. In the process of sending a message from chain A to chain B, it will pass through the SGN chain. SGN performs comprehensive calculation and conversion based on information on itself and other chains, and puts it into the target chain. perform more complex operations. For example, in ChainHop, a cross-chain decentralized trading platform based on Celer IM, the price function for calculating prices occurs entirely on SGN. Because SGN has the most direct real-time grasp of the liquidity available on each chain, SGN can monitor and adjust it to achieve more powerful applications than simple cross-chain messaging.
The above are three more important cross-chain message transmission protocols. We mentioned above that the essence of cross-chain behavior is a combination of a series of message passing. Next, let’s talk about how to realize the token cross-chain that is often carried out in the cross-chain process.
-Centralized trading platform , which is the most secure cross-chain solution, no worries after the cross-chain is completed. However, there will be problems such as centralized management, exposure of user privacy, limited number of supported public chains, and cumbersome operations.
-Official cross-chain bridges , such as Avalanche's Avalanche-Ethereum Bridge (AEB), Solana's Wormhole, and NEAR's Rainbow Bridge, these bridges are relatively safe under the protection of relevant security mechanisms, but they are more expensive than third-party cross-chain bridges Expensive and not so convenient to use. For example, if Arbitrum's assets are returned to Ethereum, it will take a seven-day waiting period if the official bridge is used.
-The bridge of special asset type , which cross-chains the native Token (such as BTC, Dogecoin, Zcash) of the public chain without smart contract function or smart contract compatibility to the public chain with smart contract function to realize DeFi application. Protocols that focus on this aspect include BitGo, Ren Protocol, Keep Network, etc., but such cross-chain bridges have the risk of centralized management.
-Third-party cross-chain bridge , which specializes in providing token cross-chain services, with low handling fees, fast speed, and many tokens supported. But the level of security they offer varies. The projects on this track include Celer Network, Hop Protocol, Multichain, Synapse Protocol, etc.
-Cross-chain bridge aggregator , aggregates mainstream cross-chain bridges, and helps users recommend the best cross-chain bridge solution according to user needs. (defieye's cross-chain tool can help users find the lowest-cost cross-chain solution among mainstream cross-chain bridge projects)
The third-party cross-chain bridge token cross-chain solution is the most capital-focused segment, and it is also the most used tool by users. Let's take a look at the main types of third-party cross-chain bridges.
Atomic Swap Based on Hash Timelock
Hash time lock is a cryptographic method, and users use hash locks to realize the atomicity of transactions. The steps are as follows:
1. User A generates a random password r, and calculates the hash value m=hash(r) of r, and sends the m value to user B.
At the same time, user A initiates a transaction to transfer 1 BTC to user B. The condition for the success of the transaction is that user B needs to present the password r within the preset time, otherwise the transaction will automatically fail.
2. After user B sees the transaction initiated by A, he transfers 10 ETH to user A. The condition for the success of the transaction is that user A needs to present r within the preset time to succeed, otherwise the transaction will automatically fail.
Note: Hash operation is irreversible, knowing m cannot deduce r. But user B only needs to know m, and can create a transaction that presents the r value as a success condition. After user A presents the value, the contract calculates whether the hash value matches m, which can verify whether A really has the r value.
3. After user A sees the transaction initiated by B, he presents the r value, making the transaction initiated by B successful, and obtains 10 ETH transferred by B, and the r value is disclosed.
4. User B also gets the r value presented by A in the previous step, making the transaction initiated by A successful and obtaining 1 BTC transferred by A.
So far, the transactions on the two different chains have been integrated into one event, either succeeding as a whole or failing as a whole. This is considered the safest and most trustless method of token transfer.
But this approach has four disadvantages.
- If you cannot find a peer-to-peer counterparty, you have to wait, which is less efficient.
-In the actual transaction, the counterparty can choose whether to complete the transaction according to whether the exchange rate is beneficial to itself, which is not suitable for large-value transactions.
- Due to the complexity of the low-level mechanism, the handling fee is high.
- Only cross-chain token exchange can be realized, but token transfer cannot be realized.
cBridge1.0 uses this method.
liquidity aggregation
This type of cross-chain bridge will deploy smart contracts on multiple blockchains, incentivize users to provide liquidity in these smart contracts, and then deploy funds according to actual needs.
This type of cross-chain bridge avoids the disadvantages of liquidity fragmentation under the atomic swap method, with low capital costs and high cross-chain efficiency. The key factors for its success are: decentralization of asset management rights, efficient balance of funds in each chain, and sufficient liquidity.
Its potential risks lie in whether the cross-chain bridge can always maintain control over assets, and whether there will be loopholes in the smart contracts on each chain.
lock + cast
After the original token is locked in the designated smart contract of the source chain, the synthetic Token is minted on the target chain. This cross-chain bridge method is mainly used for token transfer. Examples of applications include $WBTC and $WETH.
Let’s take a look at the pass pass process in detail:
1. The user sends the token to the contract of the cross-chain bridge on the source chain, and informs the contract of its receiving address on the target chain.
2. After the verifier on the target chain verifies this information, the token is minted at the receiving address on the user's target chain to complete the transfer of the token.
3. To send the passed pass from the target chain back to the source chain, the user will send the mapped pass to the contract of the cross-chain bridge on the target chain, and inform the wallet address of the source chain.
4. The verifier on the target chain destroys the mapped pass, the cross-chain bridge unlocks the locked pass on the source chain, and sends it to the user's wallet address.
The security of this model relies on network verification nodes. If the verification node is malicious or too centralized to be controlled by hackers, it will cause serious economic losses.
Gravity Bridge
Specifically built for the Cosmos ecology, the neutral bridge connecting Ethereum and the Cosmos SDK-based blockchain fills the gap that the Cosmos ecology cannot communicate with the POW chain. Gravity Bridge creates non-upgradeable Solidity contracts that cannot be tampered with by any malicious actor. The user locks the pass in Ethereum, uses the validator set to sign the transaction, and mints the mapping pass on any blockchain in the Cosmos ecosystem (such as Cosmos, Osmosis, Stargaze, etc.), such as $wBTC, $wETH, $DAI, $USDC. These tokens can be used on Cosmos dapps, such as Akash Network, Sentinel, Regen, Osmosis. Similarly, tokens in the Cosmos ecosystem can also be transferred to Ethereum for DeFi mining.
Why use Gravity Bridge?
-Safety. An advanced slashing mechanism ensures that validators cannot sign or submit bridged messages that have not been agreed upon by consensus. The Cosmos ecology has active validator nodes, and each validator must pledge valuable collateral, and any malicious node will be punished financially. Anyone can slash validators by submitting signature proofs via non-protocol messages. Node staking is permissionless and uncensorable. Every validator attests to every deposit event that happens in Ethereum.
- Unmanaged. There is no third-party manager to manage the funds. When the token crosses the chain, you only need to trust the security of Ethereum and Cosmos, and the security of the two is beyond doubt.
- Interoperable. For a long time, BNB was the only token that existed in both Ethereum and Cosmos ecology. It was not until the opening of Gravity Bridge that applications on Cosmos ecology were opened to users on Ethereum.
-neutral. The validator set controls the bridge, and the focus of the Gravity community is to ensure the safety and efficiency of the cross-chain bridge, rather than the DeFi application of the local chain, which brings together multiple blockchains and liquidity.
- Low fees. Gravity fetches transactions in batches, combining multiple messages in a single batch, reducing gas costs by 96%.
Stargate
Stargate is the first protocol built on LayerZero, which enables users to quickly transfer and exchange native tokens between blockchains safely and conveniently.
At present, most of the cross-chain bridges that map tokens on the market cannot support inter-chain interoperability and cannot interact with the smart contracts of the target chain. The transaction costs are high and the cross-chain time is long, resulting in poor user experience.
Stargate innovatively solves the impossible triangle problem of cross-chain transfer:
- Instant transaction confirmation: Instantly confirm the pass of the source chain and the target chain.
- Unified liquidity: For the same currency, different blockchains share one liquidity.
-Cross-chain of native tokens: There is no mapped token, and all interactive tokens are native tokens.
LayerZero helps Stargate realize cross-chain message transmission, completes instant transaction confirmation with one click, and has a good user experience. The specific principles have been mentioned above.
Stargate uses its own Delta algorithm to solve the problems of unified liquidity and native token cross-chain. For the same token, all chains use a unified liquidity pool, and each chain can access the liquidity of other chains. The Delta algorithm is a balance algorithm that supports the native Token pool, manages liquidity with a "soft partition" method, and prevents multiple simultaneous transactions from running on the liquidity pool. For example, in a network consisting of chains X, Y, and Z, $100 of liquidity available on chain X is simulated split into $50 for chain Y and $50 for chain Z. The Delta algorithm monitors the "virtual balance sheet" of each chain, allowing users to borrow and repay on different chains as long as liquidity is not overdrawn. However, when the partition balance drops below the initial value, "arrears" occur. When a transfer request from source chain A to target chain B occurs, the tokens deposited in source chain A will first fill the "arrears" on A, and the remaining funds will be distributed among all pools according to the weight.
Stargate is a star project in the cross-chain bridge, and has received investment from many first-tier institutions such as FTX, A16Z, Sequoia, Binance, and Coinbase. Within 10 days of going online, there are nearly 4 billion TVL, ranking 11th among all protocols. (ranked 18th on May 14th)
It should be noted that Stargate uses a 2/3 multi-signature mechanism with fewer verification nodes, which may encounter the risk of management key attacks similar to Ronin Network.
cBridge 2.0
cBridge is a cross-chain bridge built on Celer IM. The State Guardian Network (SGN) is the core component of Celer IM. It is a PoS chain based on Tendermint and is used to monitor events on the chain. It has high security For multi-signature or private key sharding.
SGN acts as the arbitrator of the cBridge node gateway
In 1.0, cBridge uses a centralized gateway to quickly learn the operation experience of various scheduling strategies, and provides users with "for reference only" suggestions to use cBridge nodes. However, if the node goes offline before the cross-chain is completed, the node will not be punished, and the user will not be compensated for waiting.
Version 2.0 uses SGN for decentralization and efficient cBridge node scheduling to solve the problems of 1.0. The cBridge node registers with SGN according to its fee preference, available liquidity, etc., and no longer registers with the centralized gateway service.
The process when the user makes a cross-chain request:
-Users query the current status of SGN, get estimated transaction fees and available liquidity.
- If the user accepts the estimated fee, send the first half of the hashed timelock contract transfer and limit the maximum acceptable fee.
-SGN monitors and receives transactions. It assigns one or more cBridge registered nodes for transactions according to node scheduling rules. This transaction allocation is recorded on the SGN chain and in the user's hash time lock contract transfer.
- Assigned nodes accept the assignment and respond by completing the remaining conditional transfers.
- SGN continues to monitor and track the transaction until the transaction is completed, and the state related to this transaction will be cleared from the SGN chain. If the node goes offline without completing the transfer, SGN can confiscate its deposit as compensation for the decline in user experience and the opportunity cost of liquidity.
In addition, cBridge 2.0 also constructs a "node quality score" formula, which refers to factors such as node cost, response time, and success rate. Based on this score, nodes are prioritized to improve user experience.
The above is the design solution provided by cBridge2.0 for self-hosted LP running nodes.
SGN as shared liquidity pool manager
Most LPs and users want to provide liquidity but don't want to run cBridge nodes themselves. In cBridge 2.0, the decentralized SGN manages shared liquidity pool contracts on multiple chains. LP regards SGN and the liquidity it manages as a single node, and provides it with liquidity acquisition fees without running the node itself.
So, is it safe to use SGN as a single-point shared liquidity pool manager? First of all, SGN adopts the PoS consensus, and the transfer of tokens requires CELR pledge-weighted multi-signatures. Only when more than two-thirds of the total equity nodes are malicious, the fund pool will be at risk. With the increase in the number of cBridge cross-chain transactions and the growth of the cBridge network value, the cost and value of nodes doing evil will increase accordingly, which is one of the highest level security solutions at present. This is fundamentally different from other solutions that use multi-signature or private key sharding in terms of security, because multi-signature verifiers and private key shard holders do not bind Token pledges, and their security cannot grow with the value of the network. In the face of huge economic benefits, multi-signature verifiers or private key fragment holders have the potential risk of private collusion. SGN allows new validators to be elected and join the set of validators through the pledge governance process, no special coordination process is required. However, when the pledged asset is in a market depression, its Token price may drop severely. At this time, the pledged value may be far lower than the liquidity on the cross-chain bridge. Users and project parties should be alert to the potential risk of validators doing evil. However, as mentioned in the Celer IM chapter above, the "test isolation" security model similar to Optimistic Rollup design, for small transfers, it relies on SGN to execute immediately, and for large transfers, it is implemented through this mandatory isolation period. Make sure to double check.
Some existing cross-chain bridge solutions require LPs to put Token liquidity into the AMM pool on the chain together with settlement Token controlled by another protocol, such as Thorchain and Hop Protocol. Under this model, liquidity providers still face additional operating costs when adding, removing and rebalancing liquidity across multiple chains. Thorchain requires LP to use the unstable settlement Token Rune, and the liquidity provider has the risk of impermanent loss. Hop Protocol needs the bonder to provide liquidity, and the liquidity efficiency is low, because the actual demand for liquidity for cross-chain transfers is twice the necessary liquidity.
When cBridge 2.0 processes cross-chain requests, SGN uses the liquidity of the entire pool to calculate slippage and pricing, and then SGN regards LPs as "virtual cBridge nodes" and distributes cross-chain requests based on LP's liquidity. At this point, the LP liquidity balance of the target chain will decrease proportionally to its available liquidity, while the liquidity balance on the source chain will increase. In addition, 2.0 also uses methods such as random sampling and approximation algorithms to minimize state changes and costs, and maintain statistical fairness among LPs. This design allows each LP to clearly see how their liquidity is distributed at any given time. This allows them to fully understand what is going on when they choose to remove or add liquidity to any chain.
In cBridge 2.0, LP directly uses native Token liquidity to avoid impermanent losses. Compared with Hop Protocol, cBridge does not require any additional bonder liquidity locking requirements, and obtains the highest liquidity efficiency.
From the above content in this section, it can be seen that cBridge2.0 relies on the security of the SGN public chain level to monitor the message transfer in the cross-chain process, and provides ""SGN as the cBridge node gateway arbitrator"" self-custody mode and "SGN as shared liquidity "Pool Manager" mode, taking into account different needs of user groups.
cBridge is used as the default bridge of BAS in BNBChain's side chain BAS. If there are game items connected to BAS, cBridge is used by default, which reflects Binance's recognition of Celer technology.
The cross-chain message transmission protocol, in addition to being applied to the well-known cross-chain bridge for token cross-chain, has many other interoperability scenarios between chains.
Help users filter out cross-chain solutions with lower fees and faster speeds. Such services are provided by Bridge Eye, Bungee, and XY Finance developed by the defieye community
-ChainHop supports users to exchange Arbitrum's ETH into BNB on the BNB chain with one click.
-Join Ethereum's Yearn smart pool on public chains such as Solana and Avalanche for revenue farming.
- Aperture, a community-driven DeFi strategy marketplace, enables users of any blockchain to access supported DeFi strategies with one click
-SynFutures enables multi-chain futures trading.
- Mortgage assets on Ethereum's Compound, and lend DAI on Polygon.
- The results of AAVE's governance in Ethereum, through the AAVE cross-chain governance bridge, the bridge executor transmits proposal data to achieve the feasibility of Aave Ethereum governance being able to control the Aave Polygon market, replacing the original multi-signature solution.
-FutureSwap, an AMM-based decentralized trading protocol, completes cross-chain governance through Celer IM.
-Send NBA Top Shots (NFTs) on the Flow chain from NFTfi, Ethereum's NFT mortgage marketplace, for mortgage lending
-ENS name service for blockchains other than Ethereum
On January 8, 2022, Vitalik Buterin posted on Reddit that he was optimistic about the future of multi-chain, but pessimistic about cross-chain. He believes that even if the blockchain is attacked by 51%, the original certificate will not be affected. Based on the rules of the protocol, even if 99% of the hashing power wants to take away your native tokens, it cannot do so. Every running node follows the 1% of blocks that obey the rules of the protocol. However, if Ethereum is attacked by 51%, the Solana-WETH contract will no longer be 100% guaranteed by the locked tokens on Ethereum, and originally 1 WETH cannot be exchanged for 1 ETH in full.
Vitalik is right on this point. The cross-chain method of "locking + casting" has its inevitable risks. At present, the cross-chain ecology is still in an incremental market stage. As the number of blockchains connected by cross-chain bridges increases, the systemic risks that may be brought about by 51% attacks are also increasing. The underlying protocol of cross-chain messaging should pay attention to the security of the connected chain, continuously develop the core code, and increase the mechanism of preventing problems before they happen. Users should try to use bridges that can cross native assets.
Vitalik also mentioned that when the cross-chain bridge has huge liquidity, hackers have the motivation to launch attacks to obtain huge economic benefits. Therefore, liquidity providers should assess risks when providing liquidity, and users should develop the habit of canceling authorization after using cross-chain bridges. There was a loophole in the Multichain contract, and the assets of users who did not cancel the contract in time were stolen.
In 2021, the major public chains will compete with each other under the support of capital and the construction of developers. In the next step, each public chain will carry out deep cultivation in the dedicated field according to the mechanism designed by itself to gain a firm foothold. The multi-chain pattern has been established and is difficult to reverse. Although it may be potentially risky, the cross-chain messaging protocol that connects closed blockchains is an indispensable underlying infrastructure in a multi-chain structure. Users have a strong demand for good cross-chain solutions. In the future, we will see more cross-chain applications built on this basis. I believe that the interoperability and composability between blockchains will bring us new surprises. Let us look forward to the infinite blockchain possibility!
Reference article:
Blockchain Bridges: Building Networks of Cryptonetworks
https://medium.com/1kxnetwork/blockchain-bridges-5db6afac44f8
The Interblockchain Communication Protocol: An Overview
https://ibcprotocol.org/documentation/
What is Cosmos?
https://v1.cosmos.network/intro
Cross-Chain Bridges Explored
https://medium.com/momentum6/cross-chain-bridges-explored-929e6b68dcd1
Everything You Need to Know About the Gravity Bridge Chain
Layer Zero - An Omnichain Interoperability Protocol
https://medium.com/layerzero-official/layerzero-an-omnichain-interoperability-protocol-b43d2ae975b6
Why is it said that Cosmos is the future of the multi-chain universe?
https://www.panewslab.com/zh/articledetails/N9262086.html
Cross-chain technology and application form panorama
https://www.theblockbeats.info/news/26317?search=1
cBridge 2.0: A Universal Cross-Chain Platform Based on Celer State Guardian Network
https://www.theblockbeats.info/news/26703?search=1
Defieye AMA series Celer message cross-chain text record
https://medium.com/@defieye/ama series of celernetwork text record-f6943d1cfb57
Symbiosis is a revolutionary decentralised exchange that bridges the gap between various blockchains, enhancing interoperability within the crypto ecosystem.
XingChiBecause Bitlayer is BTC's Layer2, it only supports BTC wallets. Currently, Bitlayer cooperates with BTC wallets including OKX, Bitget, and Unisat. This article will take the OKX wallet as an example.
JinseFinanceAxelar is a cross-chain interoperability project based on cross-chain technology. On top of the concepts of cross-chain and multi-chain, it also proposes an inter-chain concept and is committed to providing a unified development environment for all Web3 applications. .
JinseFinanceThe firm behind LINK hopes to close the gap between traditional banks using their oracle system and other blockchains.
cryptopotatoCross-chain innovation is being propelled by solutions such as Connext.
BeincryptoNansen Query is a product that provides programmable access blockchain datasets for analytics and is built on the Google Cloud platform.
TheBlockThe hacker exploited a vulnerability in the IAVL TREE to forge a malicious withdrawal message.
Numen Cyber LabsBlockchain interoperability becomes a make-or-break feature in enabling seamless transactions and, therefore, widespread adoption.
CointelegraphVIA is trying to solve one of the most critical problems in Web3: poor cross-chain experience.
FtftxRecently, the rise of "cross-chain NFT" led by Gh0stly Gh0sts and tiny dinos has attracted attention.
链向资讯