Layer2 Technologies

Ring VRF (Verifiable Random Function)

Using the Ring VRF scheme, a group of VRF generator nodes can be randomly selected as a dynamic, anonymous committee. Through Ring VRF, each committee member can generate a ZK proof (Zero-Knowledge Proof) representing their temporary identity, thereby participating in the consensus process, recognizing and communicating with each other while remaining anonymous. This ensures that committee members are anonymous to each other and to the outside world, ensuring the security, privacy, and verifiability of the mechanism.

TEE (Trusted Execution Environment)

The key management process of Layer2 is conducted in TEE, ensuring the confidentiality and integrity of the keys. TEE provides a computing environment that is isolated from the main operating system, enforced by hardware. Programs running in the TEE are hidden, imperceptible to the outside world, and cannot be interfered with. This protects the critical operations and data in Layer2, preventing potential threats or unauthorized access.

MPC (Multi-Party Computation)

Layer2 uses the MPC protocol to collaborate on creating accounts and handling cross-chain operations among committee members. During the cross-chain transfer process, the user transfers tokens to the proxy account in the main chain contract and sends a cross-chain transfer request to the platform. Committee members jointly threshold sign transactions on Layer2 via the MPC protocol, issuing tokens to the user's account on Layer2. This MPC-based collaborative approach ensures the security and reliability of cross-chain operations.

By combining technologies such as Ring VRF, TEE, MPC, and Zero Knowledge Proofs, X WINNER builds a Layer2 infrastructure that implements an anonymous dynamic committee, secure protection of key operations, multi-party collaboration in account creation and cross-chain operations, and anonymous communication and interaction verification between committee members. These technologies work together to achieve efficient, secure and reliable operation of Layer2.

Last updated