CCRP security

How to secure cross-chain data communication?

Usually, Cross-chain protocols such as bridges operate separate validator nodes by applying middle-chain solutions. However, since this method operates many nodes, there is a problem that the transaction processing speed is significantly lowered, the cost of validator node’s operation is passed on to the user as a fee, and the security of the chain is significantly lower than that of L1.

However, PLEXUS Cross-chain routing protocol uses a relayer node and a decentralized oracle to ensure the stability of cross-chain communication. Relayer node of PLEXUS delivers the transaction proof of Chain A to the Validator Contract in Chain B. At the same time, the decentralized oracle also transfers the data from chain A to the validator contract of chain B. The validator contract verifies the validity of the transaction by checking whether the transaction proof received from the relayer node and the oracle matches.

Since this protocol design method does not operate as many validator nodes as in the middle chain, the transaction processing speed is fast and the operating cost is low. In addition, since the data is double-validated through a decentralized oracle, its security is also safe.

Last updated