作者:YBB Capital Researcher Ac-Core

TL;DR

● CryptoEconomic DVN Framework The framework combines LayerZero’s cross-chain messaging with EigenLayer’s economic security and incentives;

● The DVN framework operates through a structured process with three main stages: verification, rejection and punishment;

● LayerZero chose to work with EigenLayer to further deepen the decentralization of its DVN, accepting ETH, ZRO, and EIGEN as collateral assets while also bringing new growth flywheels to both tokens;

● CryptoEconomic DVN Framework may help improve the security of the entire chain in the future.

1. Understanding the narrative background: Iterative upgrades of EigenLayer and LayerZero

Image source: LayerZero Official

According to a news release on October 2, 2024, LayerZero Labs and Eigen Labs have jointly launched a crypto-economic decentralized verification network (DVN) framework, which aims to provide crypto-economic security for full-chain messaging. Under this framework, developers can not only deploy their own DVN on EigenLayer, but also enhance the security and reliability of cross-chain messaging by introducing incentive mechanisms.

To quickly summarize in one sentence, the CoyptoEconomicDVN framework combines the cross-chain security mechanism of LayerZero with the dual protection of EigenLayer's re-staking encryption. Its core purpose is to use EigenLayer's crypto-economic model to provide higher security and incentives for the decentralized verification network (DVN).

1.1 Step 1: CryptoEconomic DVN’s cross-chain mechanism paves the way for LayerZero V2

LayerZero is not only an asset cross-chain but also a trustless cross-chain communication protocol. It separates the ultimate trust link through repeaters and oracles, that is, it realizes cross-chain messages through a super light node mechanism.

The core design of the LayerZero V2 architecture can be divided into three categories: protocols, standards, and infrastructure.

1. Protocol

LayerZero 的协议部分在所有支持的区块链上保持一致,并具有不可更改和无需许可的特性,确保了抗审查性和长期稳定性。这一部分由两个主要组件构成:

● Endpoints: These are immutable, non-upgradeable smart contracts on each blockchain and are at the heart of the LayerZero protocol. Endpoints provide a standardized interface for applications to manage security configurations and send/receive messages across chains. Due to the immutability of endpoints, once they are deployed, no entity can modify them;

● MessageLibs: Message libraries are connected to endpoints and are responsible for handling cross-chain message verification and communication. Each message library update is additive and does not replace the old version, so that even if the protocol needs to be upgraded, developers can still choose to use the old message library to ensure backward compatibility. This is similar to different versions of smart contracts on the blockchain, and users can choose different versions to use as needed.

Image source: LayerZero endpoint description

2. Standards

The standards provided by LayerZero allow developers to build applications and tokens that run consistently across multiple blockchains, achieving cross-chain “unified semantics”, meaning that applications or tokens behave the same across different blockchains. These standards help simplify the development process and ensure consistency and scalability of cross-chain applications.

● Contract Standards: LayerZero provides standards such as OApp (Omnichain Application) and OFT (Omnichain Token), which extend existing smart contract standards (for example, OFT is an extension of the ERC-20 standard), allowing developers to quickly create applications and tokens that can run on all LayerZero-supported blockchains;

● Message Packets: used to transfer data and commands between blockchains. Message packets contain elements to prevent replay attacks and incorrect routing (such as Nonce, source/target chain ID, unique identifier), and contain the actual command or data payload to be executed on the target chain. This message format can adapt to various blockchain environments (including EVM and non-EVM chains, public chains and private chains), ensuring the accuracy and security of cross-chain information transmission;

● Design Patterns: LayerZero provides a series of design patterns (such as AB, ABA, and combined AB) that provide developers with the basic building blocks for cross-chain applications and simplify the process of developing complex cross-chain interactions. These patterns can help developers create a simpler and more efficient user experience, such as completing cross-chain bridging and exchange of tokens in one transaction.

Image source: Combinatorial ABA design pattern

3. Infrastructure

LayerZero's infrastructure layer is fully open and modular, and any entity can join the LayerZero network to verify and execute transactions. This design enables applications to choose different verification and execution methods according to their needs to achieve the optimal balance in terms of security, cost, speed, etc.

● Decentralized Verification Networks (DVNs): These networks verify cross-chain messages, and any entity that can verify cross-chain data packets can join LayerZero as a DVN. This decentralized design allows applications to choose the right combination of validators to avoid being locked into a single validator network. Currently, there are 15+ DVNs participating in LayerZero, including the zkLight client provided by Google Cloud and Polyhedra;

● Executors: Any entity can run an executor, which is responsible for ensuring the smooth execution of cross-chain messages on the target chain. Executors simplify the user experience, allowing users to only pay gas fees on the source chain without having to perform additional operations on the target chain. Applications can choose one or more executors based on their needs, and can even build their own executors or choose to manually execute cross-chain messages;

● Security Stack: Each application can configure a unique security stack based on its needs, including selecting DVNs, executors, and other security preferences. The security stack allows applications to choose how to verify cross-chain messages and make adjustments when necessary, providing a highly customized security solution that avoids being locked into a single security model.

To better understand the CryptoEconomic DVN Framework, here is some additional information about LayerZero V2 DVN:

Decentralized verification networks (DVNs) are used to verify messages transmitted between different blockchain networks. Each application built on LayerZero can customize its security stack by choosing DVNs. The key points are: 1. DVNs: These entities are responsible for verifying cross-chain messages and ensuring their security and integrity. Developers can configure which DVNs to use as needed and set optional verification thresholds. 2. Openness: Anyone can create or develop a DVN, which provides a variety of verification options. DVNs can include validators, signers, or adopt advanced technologies such as zero-knowledge proofs (ZKP) and intermediate chains. 3. Customizable security: Applications can choose different DVNs based on their security needs. Unlike the one-size-fits-all model of other protocols, this flexibility enables applications to adjust security settings as needed, reducing costs and risks. 4. DVN combination: Through the "X of Y of N" configuration, applications can choose multiple DVNs to verify messages. For example, a “1 of 3 of 5” configuration would require one specific DVN and two other validators elected from among the five DVNs.

Image source: DVN's position in the V2 architecture

1.2 Step 2: CryptoEconomic DVN’s Cryptoeconomic Security EigenLayer

EigenLayer consists of a series of smart contracts that allow users to choose to "re-stake" their ETH or Liquidity Staking Tokens (LST) to guide new Proof of Stake (PoS) networks and services in the Ethereum ecosystem, obtain additional staking income/rewards, and provide security and decentralization properties for other modular components and blockchain networks. Simply put, its essence is to sell the security of Ethereum. EigenLayer has created five categories: native re-staking, LRT, AVS, super-large-scale Rollups, and committed applications.

1. Native re-staking

Ability to input multiple commitments for verification at the same time, measure the cryptoeconomic bandwidth consumed by each commitment, and ensure that all commitments are solvent. The essence is Ethereum's "Elastic Extension of Security" (ES2). If the conditions of each AVS are met, they can all be secure;

2. Liquidity Re-Pledge

LRT is a mechanism where Liquidity Re-staking Tokens (LRTs) are similar to Liquidity Staking Tokens (LSD) on Ethereum and are tokenized representations of assets deposited on EigenLayer, thereby unlocking the liquidity that was originally locked;

3. AVS Economy

The core of EienLayer is the collection of decentralized systems that can be built, and the ability to pair technology with a certain degree of decentralized trust architecture. The AVS-centric roadmap ensures that permissionless decentralized services can be integrated to build any application and create different categories and customized AVS on Eigenlayer;

4. Large-Scale Rollups

Most crypto application development is still limited by block space. There is no corresponding concept of cloud space, which will expand according to demand.

EigenDA, for example, is a mechanism for infinitely scaling bandwidth and enables a variety of new use cases that were not possible before: converting the cloud to encryption;

5. Have a trustworthy application

Eigenlayer was built to maximize the number of commitments. EigenLayer + Ethereum provides Ethereum-level diversity and verifiable commitments. For example: 1. Maximizing the increase effect through EigenDA; 2. Achieving diversity through open innovation in Eigenlayer AVS; 3. Introducing off-chain verifiability into the on-chain mechanism to achieve verifiable computing.

2. Token economy empowerment, LayerZero x EigenLayer dual cooperation, ZRO and EIGEN can be used as collateral assets

Image source: Explaining the process of staking, verification, veto and punishment

Long story short, CryptoEconomic Distributed Verification Networks (DVNs) improve cross-chain security in three key ways:

1. Cryptoeconomic security: DVNs introduce a penalty mechanism (Slashing). When DVN has malicious behavior or errors, its pledged assets will be punished.这种经济模式确保 DVN 有足够的经济动机去保持正确行为,因为不当行为将导致显著的经济损失,从而促进其责任感和安全性;

2. AVS-defined security: Each Active Verification Service (AVS) defines the types of assets that can be staked and their penalty conditions. This flexibility allows different types of DVNs (such as DVNs based on ZKP, Middlechain, or Proof of Authority) to enhance their security through additional staking guarantees, further increasing the economic deterrent against malicious behavior;

3. Permissionless security: Anyone can contribute to the security of DVN by staking assets, which makes the system more open and participatory. DVNs can choose any asset (such as ZRO, ETH, EIGEN) to support their network, broadening security options and enhancing decentralization.

The CryptoEconomic DVN framework is an open source system that works to enhance the security of the decentralized verification network (DVN) through economic incentives tied to tokens. It relies on LayerZero's DVN verification messages and adds an additional layer of security. Specifically, four key mechanisms are used to protect LayerZero's cross-chain messaging: staking, verification, veto, and punishment.

1. Staking: Validators (stakers) lock tokens such as ZRO, EIGEN, or ETH in the DVN’s Active Validation Set (AVS) as collateral. Staking funds encourage validators to act honestly because if they misbehave, the staked assets may be punished (slashed);

2. Verification: A user or application can trigger a cross-chain round-trip message (Ethereum → source chain → target chain → Ethereum) to verify that the hash value recorded by the DVN matches the hash value recorded on the chain. If they match, the process ends;

3. Veto: If a mismatch is found, a veto process is initiated, allowing token holders to vote on whether to penalize (slash) DVN’s stake. This step prevents erroneous slashing due to non-malicious errors such as blockchain reorganization, as the reorganization may cause a mismatch in data packets, but DVN may actually be honest;

4. Penalty: If the veto fails and DVN is confirmed to have malicious behavior or verification errors, the DVN staked assets will be cut.

The framework is divided into three phases:

● Phase 1: Verification – Messages are verified on multiple chains, using independent DVNs to ensure fairness;

● Phase 2: Veto – If a discrepancy is found, a veto contract will be triggered and holders will vote on whether to slash DVN stake;

● Phase 3: Punishment – ​​If the veto fails, DVN’s staked assets will be slashed due to malicious behavior or incorrect verification.

3. Views on CryptoEconomic DVN Framework

Today, the Ethereum infrastructure is becoming more and more complete, and the multi-chain structure has become a foregone conclusion. The communication security issue between different chains is still a challenge that cannot be ignored. The main innovation of the CryptoEconomic DVN Framework is that it provides core components for DVN through AVS, defines the pledged assets and penalty mechanism. In the long run, it may help improve the security of the entire chain, but the uncertain impact it brings is also a common problem in the industry. How to find a balance between security and flexibility is a problem that needs to be solved in the future.

毋庸置疑,CryptoEconomic DVN Framework 是 LayerZero Labs 与 Eigen Labs 的一次双向赋能合作。从技术角度看,它通过质押、惩罚机制、验证和否决机制来提供保障;但从经济效益角度分析,这背后依然是 PoS 质押收益的一次“套娃”操作。

LayerZero has chosen to work with EigenLayer to further decentralize its DVN, accepting ETH, ZRO, and EIGEN as collateral assets while also bringing new growth flywheels to both tokens. LayerZero provides technology and EigenLayer provides funding. The cooperation between the two parties allows validators to be rewarded and encourages honest behavior in this economic system.

Reference articles:

(1)LayerZero V2 Deep Dive

(2)LayerZero x EigenLayer: The CryptoEconomic DVN Framework