I. Introduction

Modular blockchain is an innovative blockchain design paradigm that aims to improve the efficiency and scalability of the system through specialization and division of labor. Before the advent of modular blockchain, a single (Monolithic) chain needed to handle all tasks, including the execution layer, data availability layer, consensus layer, and settlement layer. Modular blockchain solves these problems by treating these tasks as freely combinable modules, each focusing on a specific function.

Execution layer: responsible for processing and verifying all transactions and managing blockchain state changes.

Consensus layer: reach agreement on the order of transactions.

Settlement layer: used to complete transactions, verify proofs, and build bridges between different execution layers.

Data Availability Layer: Responsible for ensuring that all necessary data is available to participants in the network for verification.

The trend of modular blockchain is not only a technological change, but also an important strategy to promote the entire blockchain ecosystem to meet future challenges. GeekCartel will analyze the concept of modular blockchain and related projects, aiming to provide a comprehensive and practical interpretation of modular blockchain knowledge to help readers better understand modular blockchain and look forward to future development trends. Note: The content of this article does not constitute investment advice.

2. Celestia, the pioneer of modular blockchain

In 2018, Mustafa Albasan and Vitalik Buterin published a groundbreaking article that provided new ideas for solving the scalability problem of blockchain. "Data Availability Sampling and Fraud Proofs" introduced a method by which the blockchain can automatically expand storage space as the network nodes increase. In 2019, Mustafa Albasan further researched and wrote "Lazy Ledger", proposing a concept for a blockchain system that only deals with data availability.

Based on these concepts, Celestia was born as the first data availability (DA) network with a modular structure. It is built using CometBFT and Cosmos SDK and is a proof-of-stake (PoS) blockchain that effectively improves scalability while maintaining decentralization.

The DA layer is critical to the security of any blockchain because it ensures that anyone can inspect the transaction ledger and verify it. If a block producer proposes a block without all the data available, the block can reach finality but contain invalid transactions. Even if the block is valid, block data that cannot be fully verified will negatively impact users and the functioning of the network.

Celestia implements two key features, Data Availability Sampling (DAS) and Namespace Merkle Tree (NMT). DAS enables light nodes to verify data availability without downloading the entire block. NMTs allow block data to be partitioned into separate namespaces for different applications, which means that applications only need to download and process data relevant to them, greatly reducing data processing requirements. Importantly, DAS allows Celestia to scale as the number of users (light nodes) increases without compromising the security of end users.

Modular blockchains are making it possible to build new chains in an unprecedented way. Different types of modular blockchains can work together for different purposes and in different architectural ways. Celestia officially proposed several ideas and examples of modular architecture design, showing us the flexibility and composability of modular blockchains:

Figure 1 Layer 1 and Layer 2 architecture

Layer 1 and Layer 2: Celestia calls it naive modularity, originally built for scalability of Ethereum as a monolithic Layer 1, with Layer 2 focused on execution and Layer 1 providing other key functions.

  • Celestia supports chains built on the Arbitrum Orbit, Optimism Stack, and Polygon CDK (coming soon) technology stacks to use Celestia as the DA layer. Existing Layer 2 can use Rollup technology to switch its data from being published on Ethereum to being published on Celestia. Commitments to blocks are published on Celestia, which is more scalable than the traditional method of publishing data on a single chain.

  • Celestia supports RollApp (a chain dedicated to applications) constructed based on Dymension technology components as the execution layer. Similar to the concepts of Ethereum’s Layer 1 and Layer 2, the settlement layer of RollApps relies on the Dymension Hub (which will be explained later), and the DA layer uses Celestia. Chains interact through the IBC protocol (IBC is based on the Cosmos SDK, a protocol that allows blockchains to communicate with each other. Chains using IBC can share any type of data as long as it is encoded in bytes).

Figure 2: Execution, Settlement and DA Layer Architecture

Execution, Settlement, and Data Availability: Optimized modular blockchains, such as decoupling the execution, settlement, and data availability layers between specialized modular blockchains.

Figure 3: Execution and DA layer architecture

Execution and DA: Since the purpose of implementing a modular blockchain is to be flexible, the execution layer is not limited to publishing its blocks to the settlement layer. For example, it is possible to create a modular stack that does not involve a settlement layer, but only an execution layer on top of the consensus layer and the data availability layer.

Under this modular stack, the execution layer would be sovereign, posting its transactions to another blockchain, typically for ordering and data availability, but handling its own settlement. In the context of the modular stack, the sovereign Rollup is responsible for execution and settlement, while the DA layer handles consensus and data availability.

The difference between sovereign Rollup and smart contract Rollup is:

  • Smart Contract Rollup transactions are verified by the settlement layer’s smart contracts. Sovereign Rollup transactions are verified by sovereign Rollup nodes.

  • Compared to smart contract Rollup, sovereign Rollu's nodes have autonomy. In sovereign Rollup, the ordering and validity of transactions are managed by the Rollup's own network without relying on a separate settlement layer.

Currently, Rollkit and Sovereign SDK provide a framework for deploying sovereign Rollup testnets on Celestia.

3. Explore modular solutions in the blockchain ecosystem

1. Modularization of the execution layer

Before introducing the modularization of the execution layer, we should understand what Rollup technology is.

Currently, the execution layer modularization technology mainly relies on Rollup, which is a scaling solution that runs outside the Layer 1 chain. This solution executes transactions outside the chain, which means it takes up less block space and is also one of Ethereum's important scaling solutions. After the transaction is executed, it will send a batch of transaction data or execution proof to Layer 1 and settle it on Layer 1. Rollup technology provides a scalability solution for the Layer 1 network while maintaining decentralization and security.

Figure 4: Rollup technical architecture

Taking Ethereum as an example, Rollup technology can further improve performance and privacy by using ZK-Rollup or Optimistic Rollup.

  • ZK-Rollup uses zero-knowledge proofs to verify the correctness of packaged transactions, thereby ensuring the security and privacy of transactions.

  • Optimistic Rollup first assumes that these transactions are valid before submitting the transaction status to the Ethereum main chain. During the challenge period, anyone can calculate fraud proofs to verify the transactions.

1.1 Ethereum Layer 2: Building Future Scaling Solutions

Ethereum initially adopted sidechain and sharding technology for expansion, but the sidechain sacrificed some decentralization and security to achieve high throughput; Layer 2 Rollups have developed much faster than expected and have already provided a lot of expansion, and will provide more after Proto-Danksharding is implemented. This means that "shard chains" are no longer needed and have been removed from Ethereum's roadmap.

Ethereum outsources the execution layer to Layer 2 s based on Rollup technology to reduce the burden on the main chain. EVM provides a standardized and secure execution environment for smart contracts executed on the Rollup layer. Some Rollup solutions are designed with compatibility with EVM in mind, so that smart contracts executed on the Rollup layer can still take advantage of the features and functions of EVM, such as OP Mainnet, Arbitrum One, and Polygon zkEVM.

Figure 5: Ethereum’s Layer 2 Scaling Solutions

These Layer 2 s execute smart contracts and process transactions, but still rely on Ethereum to:

Settlement: All Rollup transactions are finalized on the Ethereum mainnet. Users of Optimistic Rollups must wait for the challenge period to pass or for the transaction to be deemed valid after anti-fraud calculations. Users of ZK Rollups must wait until validity is proven.

Consensus and Data Availability: Rollups publish transaction data to the Ethereum mainnet in the form of CallData, allowing anyone to execute a Rollup transaction and reconstruct its state if necessary. Optimistic Rollups require a large amount of block space and a 7-day challenge period before being confirmed on the Ethereum mainchain. ZK Rollups provide instant finality and store data available for verification for 30 days, but require a lot of computing power to create proofs.

1.2 B² Network: Creating Bitcoin ZK-Rollup

B² Network is the first ZK-Rollup on Bitcoin, which increases transaction speed without sacrificing security. Using Rollup technology, B² Network provides a platform capable of running Turing-complete smart contracts for off-chain transactions, thereby improving transaction efficiency and minimizing costs.

Figure 6: B² Network Architecture

As shown in the figure, B² Network's ZK-Rollup Layer adopts the zkEVM solution, which is responsible for the execution of user transactions within the Layer 2 network and the output of related proofs.

Unlike other Rollups, B² Network ZK-Rollup consists of multiple components, including Account Abstraction Module, RPC Service, Mempool, Sequencers, zkEVM, Aggregators, Synchronizers, and Prover. The Account Abstraction Module implements native account abstraction, which allows users to flexibly program higher security and better user experience into their accounts. zkEVM is compatible with EVM, and it can also help developers migrate DApps from other EVM-compatible chains to B² Network.

Synchronizers ensure that information is synchronized from the B² node to the Rollup layer, including details such as sequence information, Bitcoin transaction data, etc. B² nodes act as off-chain validators and are the executors of multiple unique functions in the B² network. The Bitcoin Committer module in the B² node builds a data structure to record the B² Rollup data and generates a Tapscript called a "B² inscription". The Bitcoin Committer then sends a UTXO of one satoshi to a Taproot address containing a $B^{ 2 }$ inscription, and the Rollup data will be written to Bitcoin.

In addition, the Bitcoin committer sets a time-locked challenge, allowing the challenger to question the commitment verified by the zk proof. If there is no challenger during the time lock or the challenge fails, the Rollup is finally confirmed on Bitcoin; if the challenge succeeds, the Rollup will be rolled back.

Whether it is Ethereum or Bitcoin, Layer 1 is essentially a single chain that receives extended data from Layer 2. In most cases, the capacity of Layer 2 also depends on the capacity of Layer 1. Therefore, the implementation of the Layer 1 and Layer 2 stack is not ideal for scalability. When Layer 1 reaches its throughput limit, Layer 2 will also be affected, which may lead to higher transaction fees and longer confirmation times, affecting the efficiency of the entire system and user experience.

2. DA layer modularization

In addition to Celestia's DA solution being favored by Layer 2s, other innovative solutions focusing on DA have emerged one after another, playing a key role in the entire blockchain ecosystem.

2.1 EigenDA: Empowering Rollup Technology

EigenDA is a secure, high-throughput, and decentralized DA service inspired by Danksharding. Rollup is able to publish data to EigenDA to achieve lower transaction costs, higher transaction throughput, and secure composability across the EigenLayer ecosystem.

When building decentralized temporary data storage on Ethereum Rollup, data storage can be handled directly by EigenDA operators. Operators are responsible for processing, verifying and storing data, and EigenDA can scale horizontally with the growth of stake and operators.

EigenDA combines Rollup technology and transfers the DA part to off-chain processing to achieve scalability. Therefore, the actual transaction data no longer needs to be copied and stored on each node, reducing the demand for bandwidth and storage. Only metadata and accountability mechanisms related to data availability are processed on-chain (accountability enables data to be stored off-chain and its integrity and authenticity can be verified when necessary).

Figure 7: Basic data flow of EigenDA

As shown in the figure, Rollup writes transaction batches to the DA layer. Unlike systems that use fraud proofs to detect malicious data, EigenDA splits data into blocks and generates KZG commitments and multi-reveal proofs. EigenDA requires nodes to download only a small amount of data [O (1/n)] instead of downloading the entire blob. Rollup's fraud arbitration protocol is also able to verify whether the blob data matches the KZG commitment provided in the EigenDA proof. When performing this verification, the Layer 2 chain ensures that the transaction data of the Rollup state root is not manipulated by the sorter/proposer.

2.2 Nubit: The first modular DA solution on Bitcoin

Nubit is a scalable, Bitcoin-native DA layer. Nubit is pioneering the Bitcoin-native future, aiming to increase data throughput and availability services to meet the growing needs of the ecosystem. Their vision is to bring the vast developer community into the Bitcoin ecosystem and provide them with scalable, secure, and decentralized tools.

Nubit's team members are professors and doctoral students from UCSB (University of California, Santa Barbara), with outstanding academic reputation and global influence. They are not only proficient in academic research, but also have rich experience in blockchain engineering implementation. The team wrote a paper on modular indexers with domo (the creator of Brc 20), added the design of the DA layer to the indexer structure of the Bitcoin meta protocol, and participated in the establishment and formulation of industry standards.

Nubit's core innovations: consensus mechanism, trustless bridging and data availability. It uses innovative consensus algorithms and lightning networks to inherit Bitcoin's fully censorship-resistant features and uses DAS to improve efficiency:

  • Consensus mechanism: Nubit explores an efficient consensus based on PBFT (Practical Byzantine Fault Tolerance) powered by SNARK for signature aggregation. The combination of the PBFT scheme and zkSNARK technology significantly reduces the communication complexity of verifying signatures between verifiers, and verifies the correctness of transactions without accessing the entire data set.

  • DAS: Nubit’s DAS is implemented by performing multiple rounds of random sampling of small portions of the block data. Each successful round of sampling increases the probability that the data is fully available. Once a predetermined confidence level is reached, the block data is considered accessible.

  • Trustless Bridge: Nubit uses a Trustless Bridge that leverages the Lightning Network’s payment channels. This approach is consistent with native Bitcoin payment methods without adding additional trust requirements. It provides lower risk to users compared to existing bridge solutions.

Figure 8: Basic components of Nubit

We further use a specific use case to review the complete system life cycle shown in Figure 8. Assume that Alice wants to use Nubit's DA service to complete a transaction (Nubit supports multiple data types, including but not limited to inscriptions, Rollup data, etc.).

  • Step 1.1: Alice first needs to pay the gas fee through Nubit’s trustless bridge to continue the service. In particular, Alice needs to get a public challenge from the trustless bridge, denoted as X(h) (X is the cryptographic hash function from the hash range of the Verifiable Delay Function (VDF) to the challenge domain, and h is the hash value of a block at some height).

  • Step 1.2 and Step 2: Alice must obtain the evaluation result R of the VDF related to the current round, submit R along with her data and transaction metadata (such as address and nonce) to the validator so that it can be merged into the memory pool.

  • Step 3: The process by which validators propose a block and its header after reaching consensus. The block header includes a commitment to the data and its associated Reed-Solomon Coding (RS Code), while the block itself contains the original data, the corresponding RS Code, and basic transaction details.

  • Step 4: The lifecycle ends with Alice’s data retrieval. The light client downloads the block header, while the full node fetches the block and its header.

Light clients undertake the DAS process to verify data availability. Additionally, after a threshold number of blocks are proposed, a checkpoint of that history is recorded on the Bitcoin blockchain via a Bitcoin timestamp. This ensures that the validator set can prevent potential remote attacks and support fast unbinding.

3. Other solutions

In addition to chains that focus on modularizing specific layers, decentralized storage services can provide long-term support for the DA layer. There are also some protocols and chains that provide developers with customized and full-stack solutions that allow users to easily build their own chains without even having to build code.

3.1 EthStorage - Dynamic decentralized storage

EthStorage is the first modular Layer 2 that implements dynamic decentralized storage, providing programmable key-value (KV) storage driven by DA, scaling programmable storage to hundreds of TB or even PB at 1/100 to 1/1000 of the cost. It provides a long-term DA solution for Rollups and opens up new possibilities for fully on-chain applications such as games, social networks, AI, etc.

Figure 9: Application scenarios of EthStorage

Qi Zhou, the founder of EthStorage, has devoted himself to the Web3 industry since 2018. He holds a Ph.D. from Georgia Institute of Technology and has worked as an engineer for top companies such as Google and Facebook. His team has also received support from the Ethereum Foundation.

As one of the core features of Ethereum's Cancun upgrade, EIP-4844 (also known as Proto-dank sharding), temporary data blocks (blobs) for Layer 2 Rollup storage are introduced, improving the scalability and security of the network. Instead of verifying every transaction in a block, the network only needs to confirm that the blob attached to the block carries the correct data, which greatly reduces the cost of Rollup. However, the Blob data is only available temporarily, which means it will be discarded within a few weeks. This has a significant impact: Layer 2 cannot unconditionally derive the latest state from Layer 1. If a piece of data can no longer be retrieved from Layer 1, it may not be possible to synchronize the chain through Rollup.

With EthStorage as a long-term DA storage solution, Layer 2 s can get complete data from their DA layer at any time.

Technical features:

  • EthStorage can realize decentralized dynamic storage: existing decentralized storage solutions can support the upload of large amounts of data, but they cannot be modified or deleted, and new data can only be re-uploaded. EthStorage implements CRUD functions through the original key-value storage paradigm, that is, creating, updating, reading and deleting stored data, thereby significantly enhancing the flexibility of data management.

  • Layer 2 decentralized solution based on DA layer: EthStorage is a modular storage layer. As long as there is EVM and DA to reduce storage costs, it can be run on any blockchain (but currently many Layer 1s do not have a DA layer), even on Layer 2.

  • Highly integrated with ETH: The EthStorage client is a superset of the Ethereum client Geth, which means that when running an EthStorage node, you can still participate in any Ethereum process normally. A node can be an Ethereum validator node and an EthStorage data node at the same time.

EthStorage’s workflow:

  • Users upload their data to the application contract, which then interacts with the EthStorage contract to store the data.

  • In the EthStorage Layer 2 network, storage providers are notified about data waiting to be stored.

  • Storage providers download data from the Ethereum Data Availability Network.

  • Storage providers submit storage proofs to Layer 1, proving that there are a large number of copies in the Layer 2 network.

  • The EthStorage contract rewards storage providers who successfully submit storage proofs.

3.2 AltLayer - Modular Customization Service

AltLayer provides a versatile, code-free Rollups-as-a-Service (RaaS) service. The RaaS product is designed for a multi-chain and multi-VM world, supporting EVM and WASM. It also supports different Rollup SDKs, such as OP Stack, Arbitrum Orbit, Polygon zkEVM, ZKSync's ZKStack and Starkware, different shared sorting services (such as Espresso and Radius), and different DA layers (such as Celestia, EigenLayer) and many other modular services at different layers of the Rollup stack.

AltLayer enables a versatile Rollup stack, for example, a Rollup designed for an application can be built using Arbitrum Orbit, using Arbitrum One as the DA and settlement layer, while another Rollup designed for general purpose can be built using ZK Stack, using Celestia as the DA layer and Ethereum as the settlement layer.

Note: You may be wondering why the settlement layer can be implemented by OP and Arbitrum? In fact, the current Rollup stacks of these Layer 2 s are implementing the "interchain" work proposed by Cosmos to achieve interconnection: OP proposed Superchain, and OP Stack, as a standardized development stack supporting Optimism technology, integrates different Layer 2 networks and promotes interoperability between these networks; Arbitrum proposed the Orbitchain strategy, which allows the creation and deployment of Layer 3, also known as application chain, on the Arbitrum mainnet based on Arbitrum Nitro (technology stack). Orbit Chains can settle directly to Layer 2 s or directly to Ethereum.

3.3 Dymension - Full stack modularization

Dymension is a modular blockchain network based on the Cosmos SDK that aims to ensure the security and interoperability of RollApps by using the IBC standard.

Dymension divides blockchain functions into multiple layers. Dymension Hub acts as the settlement layer and consensus layer to provide security, interoperability and liquidity for RollApp, and RollApp acts as the execution layer. The data availability layer is the DA provider supported by the Dymension protocol. Developers can choose the appropriate data availability provider according to their needs.

The settlement layer (Dymension Hub) maintains the RollApps registry and corresponding important information, such as status, sequencer list, currently active sequencer, execution module checksum, etc. The Rollup service logic is fixed in the settlement layer, forming a center of native interoperability. Dymension Hub has the following characteristics as a settlement layer:

  • Providing Rollups services natively on the settlement layer: Provides the same trust and security assumptions as the base layer, but with a simpler, more secure, and more efficient design space.

  • Communication and Transactions: Dymension’s RollApp enables Inter-RollApp communication and transactions on the settlement layer through embedded modules, providing a trust-minimized bridge. In addition, RollApps can communicate with other IBC-enabled chains through the Hub.

  • RVM (RollApp Virtual Machine): The Dymension settlement layer launches the RVM in the event of a fraud dispute. The RVM is able to resolve disputes in various execution environments (such as the EVM), expanding the power and flexibility of the RollApp execution range.

  • Censorship resistance: Users who have undergone Sequencer review can issue a special transaction to the settlement layer. This transaction is forwarded to the Sequencer and requested to be executed within a specified time frame. If the transaction is not processed within the specified time, the Sequencer will be penalized.

  • AMM (Automated Market Maker): Dymension introduces an embedded AMM in the settlement center, creating a core financial center. Providing shared liquidity for the entire ecosystem.

4. Comparison of multi-ecological modular blockchains

In the previous article, we explored in depth the modular blockchain system and many representative projects. Now we will shift our focus to the comparative analysis between different ecosystems, aiming to objectively and comprehensively understand the modular blockchain.

V. Summary and Outlook

As we can see, the blockchain ecosystem is moving towards modularization. In the past blockchain world, each chain operated in isolation and competed with each other, which made it difficult for users, developers and assets to flow between different chains, limiting the overall development and innovation of the ecosystem. In the WEB3 world, problem discovery and solution are a process of joint efforts. At the beginning, Bitcoin and Ethereum attracted a lot of attention as single chains, but as the problems of single chains were exposed, modular chains gradually attracted attention. Therefore, the outbreak of modular chains is not accidental, but an inevitable development.

Modular blockchains improve the flexibility and efficiency of the chain by allowing each component to be independently optimized and customized. However, this architecture also faces challenges, such as communication delays and increased complexity of system interactions. In fact, the long-term benefits of modular architecture, such as improved maintainability, reusability, and flexibility, usually outweigh its short-term performance losses. In the future, as technology develops, these problems will find better solutions.

GeekCartel believes that the blockchain ecosystem has the responsibility to provide a reliable base layer and common tools throughout the modular stack to facilitate smooth direct links between chains. If the ecosystem can be more harmonious and interconnected, users will be able to use blockchain technology more easily, and more new users will be attracted to Web3.

6. Further reading: Restaking Protocol — Injecting native security into heterogeneous ecosystems

There are also some Restaking protocols that effectively aggregate scattered security resources through the re-staking mechanism to improve the overall security of the blockchain network. This process not only solves the problem of fragmented security resources, but also enhances the network's defense capabilities against potential attacks, while providing additional incentives for participants to encourage more users to participate in network security maintenance. In this way, the Restaking protocol has opened up a new way to improve network security and efficiency, and has effectively promoted the healthy development of the blockchain ecosystem.

1. EigenLayer: Decentralized Ethereum Restaking Protocol

EigenLayer is a protocol built on Ethereum that introduces the Restaking mechanism, a new primitive for cryptoeconomic security. This primitive allows ETH to be reused on the consensus layer, aggregates ETH security between all modules, and improves the security of DApps that rely on modules. Users who stake ETH natively or use Liquid Staking Tokens (LST) can choose to join the EigenLayer smart contract to re-stake their ETH or LST and extend cryptoeconomic security to other applications on the network to receive additional rewards.

When Ethereum shifted to a Rollup-centric roadmap, the applications that could be built on Ethereum expanded significantly.

However, any module that cannot be deployed or proven on the EVM cannot absorb the collective trust of Ethereum. Such modules involve processing inputs from outside Ethereum, so their processing cannot be verified in the Ethereum internal protocol. Such modules include sidechains based on new consensus protocols, data availability layers, new virtual machines, oracle networks, bridges, etc. Typically, such modules require AVS with their own distributed verification semantics to be verified. Typically, these AVS are either protected by their own native tokens or are permissioned in nature.

There are some problems with the current AVS ecosystem:

  • Security Trust Assumption. Innovators developing AVS must bootstrap a new trust network to achieve security.

  • Value leakage. As each AVS develops its own trust pool, users must pay fees to these pools in addition to paying transaction fees on Ethereum. This deviation in the flow of fees leads to value leakage from Ethereum.

  • Constituent Burden. For most AVSs operating today, the capital cost of staking is far higher than any operating costs.

  • DApp has a low trust model. The current AVS ecosystem creates a problem that, in general, any middleware dependency of a DApp may become a target of attack.

Figure 10: Comparison between current AVS services and EigenLayer

On the EigenLayer architecture, AVS is a service built on the EigenLayer protocol, leveraging Ethereum's shared security. EigenLayer introduces two novel approaches, centralized security through staking and free market governance, which help extend Ethereum's security to any system and eliminate the inefficiencies of existing rigid governance structures:

  • Providing collective security through re-staking. EigenLayer provides a new collective security mechanism by enabling re-staking of ETH rather than their own tokens to secure modules. Specifically, Ethereum validators can set their beacon chain extraction credentials to the EigenLayer smart contract and opt-in to new modules built on EigenLayer. Validators download and run any additional node software required by these modules. These modules can then impose additional slashing conditions on the staked ETH of validators who opt-in to the module.

  • Open Market Provides Rewards. EigenLayer provides an open market mechanism for managing the security provided by validators and how AVSs are consumed. EigenLayer creates an environment in the market where individual modules will need to sufficiently incentivize validators to allocate re-staked ETH to their own modules, and validators will help decide which modules are worthy of being allocated this additional collective security.

By combining these approaches, EigenLayer acts as an open market where AVS can leverage the pooled security provided by Ethereum validators, encouraging validators to make more optimal trade-offs between security and performance through reward incentives and penalties.

2. Babylon: Providing Bitcoin Security to Cosmos and Other PoS Chains

Babylon is a Layer 1 blockchain founded by Professor David Tse of Stanford University. The team consists of researchers from Stanford University and experienced developers and business consultants. Babylon proposes a Bitcoin staking protocol that is designed as a modular plugin for many different PoS consensus algorithms, providing a primitive that can re-stake the protocol.

Babylon is based on three aspects of Bitcoin - timestamp service, block space, and asset value - and is able to deliver the security of Bitcoin to all numerous PoS chains (such as Cosmos, Binance Smart Chain, Polkadot, Polygon and other blockchains that already have strong, interoperable ecosystems), creating a more powerful and unified ecosystem.

Bitcoin Timestamp solves PoS long-distance attacks:

A long-distance attack refers to the possibility of taking advantage of the fact that after the verification nodes in the PoS chain release their stakes, they return to a historical block where they were still stakers, and start a forked chain. This problem is inherent in the PoS system and cannot be completely solved simply by improving the consensus mechanism of the PoS chain itself. Both Ethereum and Cosmos and other PoS chains face this challenge.

After the introduction of Bitcoin timestamp, the on-chain data of the PoS chain will be stored on the Bitcoin chain in the form of a Bitcoin timestamp. Even if someone wants to create a fork of the PoS chain, its corresponding Bitcoin timestamp will definitely be later than the original chain, so long-distance attacks will be ineffective at this time.

Bitcoin staking protocol:

The protocol allows Bitcoin holders to stake their idle Bitcoins to increase the security of the PoS chain and earn returns in the process.

The core infrastructure of the Bitcoin staking protocol is the Control Plane between Bitcoin and the PoS chain, as shown in the figure below.

Figure 11: System architecture with Control plane and Data plane

The Control Plane is implemented in the form of a chain to ensure that it is decentralized, secure, censorship-resistant, and scalable. This control plane is responsible for various key functions, including:

• Provide Bitcoin timestamping services for PoS chains to enable them to synchronize with the Bitcoin network.

• Act as a market place, matching Bitcoin stakes with PoS chains, and tracking stake and validation information, such as registration and refresh of EOTS keys;

• Record the final signature of the PoS chain;

By staking their BTC, users can provide verification services for PoS chains, DA layers, oracles, AVS, etc. Babylon can now also provide services for Altlayer, Nubit, etc.

References

picture:

  • https://celestia.org/learn/modular-architectures/the-modular-stack/#layer-1-and-2

  • https://celestia.org/learn/modular-architectures/the-modular-stack/#execution-settlement-and-data-availability

  • https://celestia.org/learn/modular-architectures/the-modular-stack/#execution-and-data-availability

  • https://learnblockchain.cn/article/6169

  • https://celestia.org/learn/sovereign-rollups/an-introduction/#what-is-a-smart-contract-rollup

  • https://docs.bsquared.network/architecture

  • https://docs.eigenlayer.xyz/eigenda/overview#how-rollups-integrate

  • https://docs.nubit.org/#what-is-nubit

  • https://docs.ethstorage.io/#motivation

  • https://docs.eigenlayer.xyz/assets/files/EigenLayer_WhitePaper- 88 c 47923 ca 0319870 c 611 decd 6 e 562 ad .pdf

  • https://docs.babylonchain.io/assets/files/btc_staking_litepaper-32bfea0c243773f0bfac63e148387aef.pdf 

text:

  • https://arxiv.org/abs/1809.09044

  • https://arxiv.org/abs/1905.09274

  • https://celestia.org/

  • https://github.com/cometbft/cometbft

  • https://github.com/cosmos/cosmos-sdk

  • https://docs.celestia.org/learn/how-celestia-works/data-availability-layer#data-availability-sampling-das

  • https://docs.celestia.org/learn/how-celestia-works/data-availability-layer#namespaced-merkle-trees-nmts

  • https://celestia.org/learn/modular-architectures/the-modular-stack/

  • https://docs.celestia.org/developers/arbitrum-integration

  • https://docs.celestia.org/developers/optimism

  • https://docs.polygon.technology/cdk/

  • https://portal.dymension.xyz/

  • https://ibc.cosmos.network/main

  • https://celestia.org/learn/sovereign-Rollups/an-introduction/

  • https://docs.celestia.org/developers/rollkit

  • https://github.com/Sovereign-Labs/sovereign-sdk/tree/stable/examples/demo-Rollup

  • https://ethereum.org/developers/docs/scaling/sidechains

  • https://ethereum.org/roadmap#what-about-sharding

  • https://ethereum.org/roadmap/danksharding

  • https://www.optimism.io/

  • https://arbitrum.io/

  • https://polygon.technology/polygon-zkevm

  • https://ethereum.org/en/developers/docs/scaling/optimistic-Rollups

  • https://ethereum.org/en/developers/docs/scaling/zk-Rollups

  • https://docs.bsquared.network/architecture

  • https://docs.bsquared.network/architecture/Rollup_layer

  • https://ethereum.org/en/roadmap/account-abstraction/

  • https://docs.bsquared.network/architecture/Rollup_layer#synchronizer

  • https://docs.bsquared.network/architecture/da_layer/b2_nodes

  • https://docs.bsquared.network/architecture/da_layer/b2_nodes#bitcoin-committer-module

  • https://www.kraken.com/learn/what-is-taproot

  • https://docs.eigenlayer.xyz/eigenda/overview

  • https://ethereum.org/en/roadmap/danksharding/

  • https://www.eigenlayer.xyz/ecosystem?category=Operator

  • https://ethereum.org/en/roadmap/danksharding/#how-are-blobs-verified

  • https://docs.nubit.org/

  • https://www.halborn.com/blog/post/what-is-practical-byzantine-fault-tolerance-in-blockchain

  • https://www.lightspark.com/learn/lightning

  • https://twitter.com/nubit_org/status/1742735322159747242

  • https://docs.nubit.org/overview/architecture/trustless-bridge

  • https://docs.ethstorage.io/

  • https://file.w3q.w3q-g.w3link.io/0x67d0481cc9c2e9dad2987e58a365aae977dcb8da/dynamic_data_sharding_0_1_6.pdf

  • https://medium.com/@ld-capital/%E4%BB%8Eethstorage-%E5%9B%9E%E7%9C%8B%E8%A2%AB%E5%B8%82%E5%9C%BA-%E5%86%B7%E8%90%BD-%E7%9A%84%E5%8E%BB%E4%B8%AD%E5%BF%83%E5%8C%96%E5%AD%98%E5%82%A8%E8%B5%9B%E9%81%93-d0a003220362

  • https://www.eip4844.com/

  • https://lorenzo-protocol.gitbook.io/lorenzoprotocol/lorenzo-bitcoin-l2-as-a-service

  • https://zycrypto.com/lorenzo-protocol-integrates-with-babylon-to-transform-the-bitcoin-application-layer/

  • https://labs.binance.com/zh-CN

  • https://www.bnbchain.org/en

  • https://altlayer.io/

  • https://altlayer.io/raas

  • https://t.co/yxP9NTFKIv

  • https://t.co/2KibwFoIgA

  • https://docs.arbitrum.io/launch-orbit-chain/orbit-gentle-introduction

  • https://docs.arbitrum.io/for-devs/concepts/public-chains#arbitrum-one

  • https://tutorials.cosmos.network/academy/1-what-is-cosmos/

  • https://docs.dymension.xyz/

  • https://portal.dymension.xyz/dymension/metrics

Acknowledgements

There is still a lot of research and work to be done in this emerging infrastructure paradigm, and there are many areas not covered in this article. If you are interested in any related research topics, please contact Chloe.

Many thanks to Severus and Jiayi for their insightful comments and feedback on this article.

Original link