TrustBoost: Boosting Trust among Interoperable Blockchains CCS ’23, November 26–30, 2023, Copenhagen, Denmark
chain token transfer) would take 2 seconds and cost 350K gas. Con-
cretely, with 10 Cosmos chains in a local testnet, the total gas cost
is roughly $2 with a latency of 2 minutes when using TrustBoost to
boost the security of a standard contract NameService[
33
] – here
gas fees in at are extracted from the exchange rate and the gas
price of Osmosis, a popular Cosmos Zone at the time of writing
(April 2023) and are in line with the gas fees of a high security
chain such as Bitcoin or Ethereum. Improving the eciency of the
implemented BFT protocols and IBC would make TrustBoost more
performant.
2 RELATED WORKS
In this section, we survey related works encompassing blockchain
protocols that borrow or boost trust, hierarchical consensus frame-
works, distributed computing models, and blockchain interoper-
ability.
Borrowing trust. Checkpointing is a method that allows the trust
of a highly secure blockchain to be extended to weaker or newer
blockchains [
31
,
45
,
46
]. Validators of a weaker chain periodically
submit block hashes and signatures as checkpoints to a more se-
cure chain, and the nality rule of the weaker chain is modied
to respect the checkpoints. Consequently, the weaker chain has a
slightly slower nality rule - conrming the chain up to the latest
checkpoint, which has the same latency and security level as the
secure chain. A concrete and practical instantiation of this idea in
the context of bringing Bitcoin trust to Cosmos Zones is [
50
]. A
very recent work [
49
] generalizes checkpointing approaches and
oers new insights that align with the design principles underlying
our work. The proposed protocol lets a consumer chain draw addi-
tional security from a series of provider chains through sequential
checkpointing operations. However, this approach necessitates that
all chains remain live to guarantee eventual liveness. In contrast,
our setting enhances not only the security but also the liveness of
all participating chains.
Boosting trust. An early work on robust ledger combining is [
21
];
parallel ledgers process a common set of transactions independently,
and conrmation in the combined ledger is carried out by observers
who can read from all ledgers. Similar to TrustBoost, the combine
ledger functions even if a certain fraction of underlying ledgers no
longer provide any security guarantees. However, the combined
ledger only ensures a notion of relative persistence, which is not
sucient even for a payment system, so its practical use is limited.
A detailed exploration of this limitation is discussed in Appendix
A.
Hierarchical consensus. To the best of our knowledge, Stew-
ard [
3
] was the pioneering work that proposed a concept of “con-
sensus on top of consensus”. Steward employs a BFT protocol within
each local site and a benign fault-tolerant protocol among wide
area sites. Each local site, consisting of several potentially mali-
cious replicas, is converted into a single logical trusted participant
in the global protocol. GeoBFT [
27
] further improves scalability by
introducing parallelization of consensus at the local level, and by
minimizing communication between sites. However, in comparison
to TrustBoost, both Steward and GeoBFT assume a honest superma-
jority in each local site, which signicantly simplied the problem.
Furthermore, alterations in the local consensus are needed, whereas
in TrustBoost, the global consensus is lightweight and implemented
solely through smart contracts.
The idea most closely related to ours is the “recursive Tender-
mint” [
16
] proposed by the Cosmos team, in which Tendermint is
run on multiple Cosmos chains using the IBC protocol instead of
TCP/IP in a peer-to-peer network. However, this concept was only
presented as a preliminary idea, without delving into the scientic
and engineering challenges that we addressed in TrustBoost.
Shared memory vs. message passing. The shared memory model
and message passing model are two fundamental approaches in
distributed computing [
30
]. In the shared memory model, processes
communicate by reading and writing to shared objects, whereas in
the message passing model, processes exchange messages with one
another to coordinate their actions. Consensus, a critical problem
in distributed systems, has also been extensively investigated in
both the shared memory model [
1
,
11
,
22
,
28
] and message passing
model [
8
,
18
–
20
,
36
,
37
,
37
], yielding a variety of positive and nega-
tive results. In this work, we expand the shared memory model to
enable communication between objects, an adaptation that aligns
seamlessly with today’s multi-chain framework. Furthermore, we
establish theoretical bounds in this rened model and present a
clear delineation of the interactions required to achieve combined
trust among blockchains.
Blockchain interoperability. [
57
] presents a general framework
to design and evaluate CCC protocols that facilitate blockchain
interoperability. The most signicant application of blockchain in-
teroperability is atomic cross-chain swaps [
29
,
51
], which enable
the exchange of assets across multiple distinct blockchains. How-
ever, these protocols necessitate intricate and time-consuming user
interactions with the blockchains and their peer-to-peer transac-
tion nature often results in lower liquidity compared to centralized
exchanges.
In order to facilitate general cross-chain applications, cross-
chain bridges have emerged as a signicant building block in to-
day’s multi-chain world. There are three primary categories: 1)
committee-based bridges; 2) optimistic bridges; 3) light client bridges.
Committee-based bridges (PolyNetwork [
5
], Wormhole [
53
], Lay-
erZero [
38
], CCIP [
9
], etc.) employ a trusted committee of validators
to sign o on state transfers, with security relying on the hon-
est majority assumption. Optimistic bridges (like Nomad [
43
] and
Near’s Rainbow Bridge [
42
]) require participants to deposit collat-
eral, and depend on a watchdog service to continuously monitor
the blockchain and conscate oenders’ collateral upon detect-
ing invalid updates. However, optimistic protocols fundamentally
demand long conrmation latency to ensure high probability of de-
tecting invalid updates. Light client bridges (e.g., Cosmos IBC [
15
])
are trustless, using on-chain light clients to verify state transitions
on the other blockchain. Zk-SNARKs are further leveraged to en-
hance the eciency of state verication [
34
,
54
]. While TrustBoost
can utilize all these bridge types, light-client bridges are preferred
due to their trustlessness and eciency. Further improvements in
the security and performance of bridges represent an interesting
and active research area, but it falls outside the scope of this paper.
A very recent work [
55
] proposes a cross-chain state machine
replication protocol in the passive mode, which maintains a consis-
tent state across multiple chains; indeed the security guarantees in