Interpretation of Trust Minimization Middleware by Distributed Capital Researcher: Consensus Verification and Bridging

Distributed Capital researcher's view on Trust Minimization Middleware: verifying consensus and bridging.

Researcher BallsyAlchemist from Distributed Capital wrote an article analyzing the meaning of trust minimization, why zkBridge has not yet implemented trust minimization, and how to achieve complete consensus verification through ZK light clients.

Succinct, Celer Network, Polymer Labs, LayerZero Labs, and Wormhole have all built zkBridges in different ways, but they have different views on interoperability. For example, Succinct, Celer, and Wormhole rely on ZK light client consensus proof to verify the consensus of origin chain A on destination chain B, while Polymer tries to establish a zkIBC center to achieve a similar IBC experience on any chain. However, most of the security assumptions of zkBridge are based on light clients, which means that the security of zkBridge is equivalent to that of light clients, but far less than L1 security.

How secure is a light client based on synchronous committees? I think synchronous committees are not secure for several reasons: 1) validator distribution bias among node operators: if a node operator is running validators A, B, C, and D, and finds that A is compromised, the probability of collusion between B, C, and D will increase, so it is not independent or uniformly distributed; 2) coordination risk without time limit: 27 hours is long enough for synchronous validators to collude; 3) lack of replicability of consensus =>N security is not high.

So how do we solve this problem? My suggestion is to perform full consensus verification by verifying every signature of all validators, and with the abstract of on-chain verification of BLS signatures by ZKP, we can establish a ZK light client that truly executes complete consensus verification in a trust-minimized manner. In addition, there are three possible methods to effectively generate consensus proof for about 600,000 validator signatures, including recursive composition method, commitment-based method, and folding-based method.

Reference: https://twitter.com/ballsyalchemist/status/1664270746506637312

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Contract exchange seeks compliance: as low as 1,500 knives for high NFA licenses

Editor's Note: This article has been deleted without changing the author's original intention. The number o...

Opinion

Wall Street Journal Binance Empire on the Verge of Collapse

After the collapse of FTX, the largest cryptocurrency exchange in the world seems to be Binance. However, less than a...

News

Exclusive speech by Li Xiaojia, the Hong Kong Stock Exchange: In the 5G era, technologies such as blockchain will give birth to new exchanges and trading models.

On March 31, Li Xiaojia, Chief Executive Officer of the Hong Kong Stock Exchange Group, delivered a speech entitled &...

Blockchain

Data Analysis | Exchange Risk, Exchange Capital Reserve and Platform Coin Valuation Geometry

Analyst | Carol Editor | Bi Tongtong | PANews The FCoin thunderstorm event caused widespread concern. In the last par...

Blockchain

Who is the information of the user who sells the coin? What have the leaked information been taken?

While enjoying the convenience of the Internet, it also makes privacy data a step closer to streaking. Recently, many...

Blockchain

Starting to decentralize the game platform: Is it a good day to break the monopoly?

On May 31 , Xiao Xiao invited the founding partner of Xingyao Capital, Liu Jiang, founder of Xingheng Education, Chen...