Other Essential Protocols
We are developing essential use cases built on our ZKP verification layer and leveraging BitVM2 to support and expand the growing Bitcoin ecosystem.
Last updated
We are developing essential use cases built on our ZKP verification layer and leveraging BitVM2 to support and expand the growing Bitcoin ecosystem.
Last updated
These essential protocols include but not limited to ZK-indexers, liquidity cross-chain ZK bridge, bridgeless interoperability with Bitcoin L1, etc. Please see some high-level architecture of ZK-indexers and trust-minimized ZK bridge below.
The main problem with the BRC-20 Indexer is its centralized and isolated setup, requiring users to trust an off-chain indexer. Fiamma can enable a trustless, decentralized, and unified indexer, facilitating the growth of the BRC-20 market.
Centralized indexer - the value of the BRC-20 token is secured by a centralized off-line indexer, subject to manipulation;
Separated ledger - different projects may operate different indexers, causing a wrong token value;
Secured by Bitcoin - By integrating the Fiamma, the value of the BRC-20 token is secured by Bitcoin via Babylon and BitVM2;
Separated ledger - different projects may operate different indexers, causing token loss;
Secured by Bitcoin - By integrating the Fiamma, the value of the BRC-20 token is secured by Bitcoin via Babylon and BitVM2;
Unified ledger - the same ledger, the same value;
Secured by Bitcoin - By integrating the Fiamma, the value of the BRC-20 token is secured by Bitcoin via Babylon and BitVM2;
Unified ledger - the same ledger, the same value;
We want this ZK-Bridge to be trust-minimized, ensuring the protocol's safety as long as at least one committee member is honest.
The overall flow:
Alice peg-in 100BTC a few months ago and now she wants to peg-out to Bob;
The operator delegate pays 99 BTC (assuming charging transaction fee of 1 BTC) by kicking off the peg-out transaction;
When the peg-out transaction is finalized on Bitcoin, the operator generates proof for it;
The operator sends proof to Fiamma and then Fiamma returns the result;
The operator broadcasts the Fiamma ASSERT transaction and allocates 5 BTC as staking asset;
Anyone could spend the output of Fiamma ASSERT (5 BTC) if he or she could prove the operator is malicious;
After a fixed timelock, if the output isn't spent, the operator kicks off the TAKE transaction to get 105 BTC;