skip to content
PSYCHO VIRTUAL

Notes on Bridge Design

/ 6 min read

Bridges are tools used to replicate state transition functions between blockchains. In the most common form these state transitions are token transfers. The central challenge of bridge design comes from reconcilling differing blockchain archicture while maintaining an acceptable level of decentralization.

My goal with this post is to formalize some of the core concepts related to bridge design. Currently there is so much jargon and terminology in the field that the core concepts often become lost. While the mathematical concepts are very rough, I find this level of detail and notation very useful for working with the concepts and defining exactly what is happening during a bridge operation. The math in this paper will be far to high-level and abstract for most mathematicians, while the computer science will be too hand-wavy and conceptual for the computer scientists but it works for me and that is all that matters!

Definitions

Blockchain

A blockchain is a sequence of blocks B=(B0,B1,B2,...,Bn)B = (B_0, B_1, B_2, ..., B_n)

where each block contains the following properties:

Bi=(Hi,Ti,Ni,Hi1)B_i = (H_i, T_i, N_i, H_{i-1})

  • BiB_i represents the ii-th block
  • HiH_i is the cryptographic hash of block BiB_i
  • Ti={t1,t2,...,tm}T_i = \{t_1, t_2, ..., t_m\} is the set of transactions in block BiB_i
  • NiN_i is a nonce value used in proof-of-work systems
  • Hi1H_{i-1} is the hash of the previous block (creating the chain), with H1=0H_{-1} = 0 for the genesis block

The blockchain is considered valid if and only if:

i{1,2,...,n}:Hi1 in Bi=Hi1 computed from Bi1\forall i \in \{1,2,...,n\}: H_{i-1} \text{ in } B_i = H_{i-1} \text{ computed from } B_{i-1}

Blockchain State

Let Σ\Sigma denote the state space of the blockchain. At any block height ii, the blockchain has state σiΣ\sigma_i \in \Sigma.

A transaction tt can be defined as: t=(s,r,v,d,g,p,sig)t = (s, r, v, d, g, p, \text{sig})

Where:

  • ss is the sender address
  • rr is the recipient address
  • vv is the value being transferred
  • dd is the transaction data (for contract interactions)
  • gg is the gas limit
  • pp is the gas price
  • sig\text{sig} is the cryptographic signature to authenticate the transaction

State Transition Function

The state transition function Γ\Gamma maps the current state and a block of transactions to a new state:

σi+1=Γ(σi,Bi)\sigma_{i+1} = \Gamma(\sigma_i, B_i)

Where BiB_i is the block containing transactions Ti={t1,t2,...,tm}T_i = \{t_1, t_2, ..., t_m\}.

This can be decomposed into transaction-level state transitions:

σi,j+1=δ(σi,j,tj)\sigma_{i,j+1} = \delta(\sigma_{i,j}, t_j)

Where:

  • σi,0=σi\sigma_{i,0} = \sigma_i (the state before any transaction in block ii is applied)
  • σi,m=σi+1\sigma_{i,m} = \sigma_{i+1} (the state after all transactions in block ii are applied)
  • δ\delta is the transaction-level state transition function

State Storage and Light Clients

The blockchain state σ\sigma is stored in a Merkle Patricia Trie structure T\mathcal{T}:

T:KV\mathcal{T}: \mathcal{K} \rightarrow \mathcal{V}

Where:

  • K\mathcal{K} is the key space (typically account addresses)
  • V\mathcal{V} is the value space (account states including balances, nonces, etc.)

The root hash of this trie provides a cryptographic commitment to the entire state:

StateRoot=H(T)\text{StateRoot} = \mathcal{H}(\mathcal{T})

Where H\mathcal{H} is a cryptographic hash function.

Merkle Proofs

For any key-value pair (k,v)(k, v) in the state, a Merkle proof π\pi can be constructed:

πk,v={sibling hashes along path from leaf to root}\pi_{k,v} = \{\text{sibling hashes along path from leaf to root}\}

The validity of a proof can be verified by:

VerifyProof(StateRoot,k,v,πk,v)=true\text{VerifyProof}(\text{StateRoot}, k, v, \pi_{k,v}) = \text{true}

If and only if (k,v)(k, v) is indeed in the state trie with root StateRoot\text{StateRoot}.

Light Clients

A light client maintains only block headers rather than the full state:

LC={H0,H1,...,Hn}LC = \{H_0, H_1, ..., H_n\}

Where each header HiH_i contains:

Hi=(StateRooti,TxRooti,ReceiptRooti,...)H_i = (\text{StateRoot}_i, \text{TxRoot}_i, \text{ReceiptRoot}_i, ...)

Light Client Verification

To verify that a transaction tt is included in block ii:

  1. Verify that header HiH_i is valid in the chain
  2. Request Merkle proof πt\pi_t for transaction tt
  3. Verify VerifyProof(TxRooti,index(t),t,πt)=true\text{VerifyProof}(\text{TxRoot}_i, \text{index}(t), t, \pi_t) = \text{true}

To verify a state query for key kk with value vv at block ii:

  1. Request Merkle proof πk,v\pi_{k,v} for (k,v)(k, v) at block ii
  2. Verify VerifyProof(StateRooti,k,v,πk,v)=true\text{VerifyProof}(\text{StateRoot}_i, k, v, \pi_{k,v}) = \text{true}

Bridges as Functors

At the highest level we can think of a blockchain bridge as a functor F:B1B2F: \mathcal{B}_1 \rightarrow \mathcal{B}_2 such that:

  1. For each state σiObj(B1)\sigma_i \in \text{Obj}(\mathcal{B}_1), there exists a mapping F(σi)Obj(B2)F(\sigma_i) \in \text{Obj}(\mathcal{B}_2)

  2. For each valid transition f:σiσjf: \sigma_i \rightarrow \sigma_j in B1\mathcal{B}_1, there exists a corresponding valid transition F(f):F(σi)F(σj)F(f): F(\sigma_i) \rightarrow F(\sigma_j) in B2\mathcal{B}_2

  3. The functor preserves composition: F(gf)=F(g)F(f)F(g \circ f) = F(g) \circ F(f)

  4. The functor preserves identity: F(idσi)=idF(σi)F(\text{id}_{\sigma_i}) = \text{id}_{F(\sigma_i)}

We evaluate bridges on two primary axis Security Properties and Trust Assumptions.

Security Properties

The security of a bridge can be expressed as preservation of certain invariants across the functor FF:

  1. Conservation of Assets: For any state σiB1\sigma_i \in \mathcal{B}_1, the total value of assets in Asset1(σi)\text{Asset}_1(\sigma_i) equals the total value of assets in Asset2(F(σi))\text{Asset}_2(F(\sigma_i)) (modulo locked assets)

  2. Finality Preservation: If f:σiσjf: \sigma_i \rightarrow \sigma_j is a finalized transition in B1\mathcal{B}_1, then F(f):F(σi)F(σj)F(f): F(\sigma_i) \rightarrow F(\sigma_j) must also be finalized in B2\mathcal{B}_2

  3. Consistency: For any states σi,σjB1\sigma_i, \sigma_j \in \mathcal{B}_1, if HomB1(σi,σj)=\text{Hom}_{\mathcal{B}_1}(\sigma_i, \sigma_j) = \emptyset, then HomB2(F(σi),F(σj))=\text{Hom}_{\mathcal{B}_2}(F(\sigma_i), F(\sigma_j)) = \emptyset

Trust Assumptions

  1. Light-Client Bridge: FF is equipped with a verification functor V:B1LV: \mathcal{B}_1 \rightarrow \mathcal{L} where L\mathcal{L} is a subcategory of B2\mathcal{B}_2 containing lightweight verification objects (block headers, Merkle proofs) F(σi)={σjB2σj is consistent with V(σi)}F(\sigma_i) = \{\sigma_j \in \mathcal{B}_2 \mid \sigma_j \text{ is consistent with } V(\sigma_i)\}

  2. Validity-Proof Bridge (ZK Bridge): FF is associated with a proof system π:B1×B2{true,false}\pi: \mathcal{B}_1 \times \mathcal{B}_2 \rightarrow \{\text{true}, \text{false}\} such that: π(σi,F(σi))=true    F correctly maps σi\pi(\sigma_i, F(\sigma_i)) = \text{true} \iff F \text{ correctly maps } \sigma_i where π\pi is efficiently verifiable in B2\mathcal{B}_2 without knowledge of the full state of B1\mathcal{B}_1

  3. Optimistic Bridge: FF is paired with a challenge functor C:B1×B2B2C: \mathcal{B}_1 \times \mathcal{B}_2 \rightarrow \mathcal{B}_2 where: Ft(σi)={F(σi)if no valid challenge C(σi,F(σi)) within time trejectotherwiseF_t(\sigma_i) = \begin{cases} F(\sigma_i) & \text{if no valid challenge } C(\sigma_i, F(\sigma_i)) \text{ within time } t \\ \text{reject} & \text{otherwise} \end{cases}

  4. Multi-Signature Bridge: FF is factored through an adjudication category A\mathcal{A} with a consensus functor G:AB2G: \mathcal{A} \rightarrow \mathcal{B}_2 such that: F=GHF = G \circ H where H:B1AH: \mathcal{B}_1 \rightarrow \mathcal{A} maps blockchain states to adjudication states requiring mm-of-nn consensus

Interoperability Trilemma

Let B\mathcal{B} be the set of all blockchains. For any blockchain bridge system F\mathcal{F}, we define three properties:

  1. Trustlessness (TT): The security of the bridge approaches the minimum security of the connected chains. T(F)=min(Bi,Bj)Dom(F){Sec(Bi),Sec(Bj)}T(\mathcal{F}) = \min_{(B_i, B_j) \in \text{Dom}(\mathcal{F})} \{\text{Sec}(B_i), \text{Sec}(B_j)\} where Sec(B)\text{Sec}(B) represents the security level of blockchain BB.

  2. Extensibility (EE): The ability to connect any pair of blockchains from the set B\mathcal{B}. E(F)={(Bi,Bj)B×B:(Bi,Bj)Dom(F)}B2E(\mathcal{F}) = \frac{|\{(B_i, B_j) \in \mathcal{B} \times \mathcal{B} : (B_i, B_j) \in \text{Dom}(\mathcal{F})\}|}{|\mathcal{B}|^2} where E(F)=1E(\mathcal{F}) = 1 means complete extensibility.

  3. Generalizability (GG): The ability to transfer arbitrary data across chains. G(F)=M(F)MtotalG(\mathcal{F}) = \frac{|\mathcal{M}(\mathcal{F})|}{|\mathcal{M}_{total}|} where M(F)\mathcal{M}(\mathcal{F}) is the set of message types supported by F\mathcal{F} and Mtotal\mathcal{M}_{total} is the set of all possible message types.

The Trilemma Formalization

The Interoperability Trilemma states that for any bridge system F\mathcal{F}:

T(F)E(F)G(F)kT(\mathcal{F}) \cdot E(\mathcal{F}) \cdot G(\mathcal{F}) \leq k

Where kk is a constant significantly less than 1, representing the fundamental trade-off limit.

References

https://medium.com/connext/the-interoperability-trilemma-657c2cf69f17

https://ethereum.org/en/developers/docs/bridges/

https://arxiv.org/pdf/1801.09515

https://arxiv.org/pdf/2210.0026o4

https://eprint.iacr.org/2019/1128.pdf