2. Cross-Chain Solutions
2.1 Why Is Cross-Chain So Difficult?
As mentioned earlier, the goal of Agglayer aligns with that of cross-chain protocols. But which one is superior? Before comparing, we need to understand two questions: 1. Why is cross-chain so difficult? 2. What are the common cross-chain solutions?
Like the famous blockchain trilemma, cross-chain protocols also face an interoperability trilemma. Due to the fundamental premise of decentralization, blockchains are essentially state machines that cannot receive external information. Although AMMs and oracles have filled some gaps in DeFi, cross-chain protocols face much more complex challenges. In some ways, we can never truly extract any real tokens from the original chain, leading to various wrapped tokens like xxBTC and xxETH. However, this approach is risky and centralized because real BTC and ETH must be locked in cross-chain bridge contracts on the original chain, while the entire cross-chain design might face issues such as asset disparity, protocol incompatibility due to different VMs, trust issues, double-spending problems, and latency issues. To be efficient and cost-effective, most cross-chain solutions still rely on multi-signature wallets. This is why we still frequently hear about cross-chain bridge failures today.
Now, let’s take a closer look at the issue from a lower level. According to Connext founder Arjun Bhuptani, cross-chain protocols can only optimize two out of the following three key attributes:
Trustlessness: No reliance on any centralized trust entities, providing the same level of security as the underlying blockchain. Users and participants do not need to trust any intermediaries or third parties to ensure the security and correct execution of transactions.
Extensibility: The protocol can easily be applied to any blockchain platform or network, without being limited by specific technical architectures or rules. This allows interoperability solutions to support a wide range of blockchain ecosystems, not just a few specific networks.
Generalizability: The protocol can handle any type of cross-domain data or asset transfer, not limited to specific transaction types or assets. This means different blockchains can exchange various types of information and value, including but not limited to cryptocurrencies, smart contract calls, and other arbitrary data through the bridge.
Early classifications of cross-chain bridges were often based on figures like Vitalik Buterin, who categorized cross-chain technologies into three types: hash time locks, witness validation, and relay validation (light client validation). Later, Arjun Bhuptani reclassified cross-chain solutions into native validation (trustlessness + extensibility), external validation (extensibility + generalizability), and native validation (trustlessness + generalizability). These validation methods are based on different trust models and technical implementations to meet various security and interoperability needs.
Natively Verified Bridges:
Natively verified bridges rely on the consensus mechanisms of the source and target chains themselves to directly validate the transaction’s validity. This method does not require additional validation layers or intermediaries. For example, some bridges may use smart contracts to create verification logic directly between two blockchains, allowing them to confirm transactions through their own consensus mechanisms. This approach enhances security as it directly relies on the inherent security mechanisms of the participating chains. However, it can be more technically complex to implement and not all blockchains support direct native verification.
Externally Verified Bridges:
Externally verified bridges use third-party validators or validator clusters to confirm the transaction’s validity. These validators may be independent nodes, consortium members, or other types of participants operating outside the source and target chains. This method typically involves cross-chain message passing and verification logic executed by external entities rather than directly handled by the participating blockchains. External validation allows broader interoperability and flexibility because it is not limited by specific chains but introduces an additional layer of trust and potential security risks. Despite its centralization risks, external validation is the most mainstream cross-chain method, as it is efficient, flexible, and cost-effective.
Locally Verified Bridges:
Locally verified bridges involve the target chain verifying the source chain’s state to confirm transactions and execute subsequent transactions locally. This usually involves running a light client of the target chain’s virtual machine on the source chain or in parallel. Local verification requires an honest minority or synchronous assumption, where at least one honest relayer exists in the committee (honest minority) or if the committee fails, users must transmit transactions themselves (synchronous assumption). Local verification is the most trust-minimized cross-chain communication method but is also costly, less flexible in development, and more suitable for blockchains with high state machine similarity, such as between Ethereum and L2 networks or blockchains developed based on the Cosmos SDK.
Current Cross-Chain Solutions [1]
The compromises made in different areas have led to various types of cross-chain solutions. Besides verification methods, current cross-chain solutions can be categorized in multiple ways, each adopting unique approaches to achieve asset exchange, transfer, and contract invocation.
· Token Swaps: This method allows users to trade a certain asset on one blockchain and receive an equivalent asset on another chain. By utilizing technologies such as atomic swaps and cross-chain automated market makers (AMMs), liquidity pools can be created across different chains to facilitate the exchange of different assets.
· Asset Bridges: This method involves locking or burning assets on the source chain through smart contracts and unlocking or minting new assets on the target chain through corresponding smart contracts. This technique can be further divided into three types based on how assets are handled:
Lock/Mint Model: In this model, assets on the source chain are locked, while equivalent “bridged assets” are minted on the target chain. In the reverse operation, the bridged assets on the target chain are burned to unlock the original assets on the source chain.
Burn/Mint Model: In this model, assets on the source chain are burned, and the same amount of equivalent assets are minted on the target chain.
Lock/Unlock Model: This method involves locking assets on the source chain and unlocking equivalent assets from a liquidity pool on the target chain. These asset bridges often attract liquidity by offering incentives such as revenue sharing.
· Native Payments: This method allows applications on the source chain to trigger payment operations using native assets on the target chain. It can also trigger cross-chain payments based on data from one chain on another chain. This method is primarily used for settlement and can be based on blockchain data or external events.
· Smart Contract Interoperability: This method allows smart contracts on the source chain to invoke functions of smart contracts on the target chain based on local data, enabling complex cross-chain applications, including asset swaps and bridging operations.
· Programmable Bridges: This is an advanced interoperability solution that combines asset bridging and message passing functions. When assets are transferred from the source chain to the target chain, contract calls on the target chain can be triggered immediately, enabling various cross-chain functionalities such as staking, asset swaps, or storing assets in smart contracts on the target chain.
2.2 The Future Advantages of Agglayer
Let’s compare Agglayer with the current cross-chain protocols, taking LayerZero, the most influential cross-chain protocol, as an example. LayerZero employs an improved version of external verification by converting the trust source for verification into two independent entities — an oracle and a relayer. This minimalist approach addresses the flaws of external verification, making it a programmable bridge solution that can perform various operations. Logically, it seems to have elegantly resolved the so-called trilemma. From a grand narrative perspective, LayerZero has the potential to become the cross-chain hub of the entire Web3, addressing issues like fragmented user experience and broken liquidity caused by the chain explosion in the modular era. This is why leading VCs are heavily betting on such protocols.
However, what is the reality? Putting aside recent controversies regarding LayerZero’s airdrop operations, let’s consider its development challenges. Achieving the ideal state of connecting the entire Web3 is extremely difficult, and its decentralization is questionable. In its early V1 version, LayerZero’s oracle posed risks of being hacked and potentially malicious behavior (Wormhole, which employs industry institutions as guardian nodes, often faces similar criticisms). These concerns were only mitigated with the advent of the decentralized verification network (DVN) in V2, which required significant B-side resources.
Moreover, developing cross-chain protocols involves dealing with heterogeneous chain protocols, data formats, operational logic, and the invocation of different smart contracts. True interoperability in Web3 requires not just individual efforts but also the collaboration of various projects. Early users of LayerZero might recall that it primarily supported cross-chain interactions for EVM-based blockchains, with limited support for other ecosystems. This is also true for Agglayer, but Agglayer offers ultra-low latency and asynchronous interoperability, making it more akin to the internet we use daily.
Overall, Agglayer’s approach to aggregation for single-chain-like usage is simpler, more efficient, and aligns with the current modular trends. However, there is no absolute superiority between the two at present. Cross-chain protocols still hold the advantages of broader liquidity, a more mature ecosystem, and greater proactivity. Agglayer’s strength lies in its ability to genuinely aggregate rival Layer 1 and Layer 2 chains, breaking the zero-sum game of fragmented liquidity and users in the chain explosion era. It allows for low-latency multi-chain interactions, native chain abstraction, and shared liquidity pools without the need for wrapped tokens, presenting a significant opportunity for long-tail and application-specific chains.
In summary, Agglayer is currently the most promising cross-chain solution, with similar projects like Polkadot’s “Join-Accumulate Machine” also in development. The history of Web3 has transitioned from monolithic to modular, and the next step will be towards aggregation.