🌉Consensus Bridge

Curve’s Official Aggregated Bridge

Most cross-chain bridges use their own messaging protocols. The existing bridges are not ideal in terms of the level of decentralization and have team-related, regulatory and management risks. It is safe to say that there is not a single bridge on the market that does not require trust. Using any single bridge exposes the entire ecosystem to the risk of a "black swan" event.

This is precisely the problem Curve DAO encountered when the Multichain bridge collapsed, leading them to decide not to trust any bridges, except for L2.

For this reason, the Eywa team, in collaboration with the Curve team is developing a trustless bridge that relies on a consensus of the most reliable messaging protocols on the market. We utilize Axelar, L0, Wormhole, Chainlink CCIP and other messaging protocols to create the most secure solution for messaging, custody and liquidity transfer.

A data validation consensus, comprising the best protocols on the market, replaces the Eywa Cross-chain Data protocol.

We combine Eywa Token Bridge smart contracts and data validation consensus, creating an Eywa Consensus Bridge whose security is independent of any team and whose liquidity is controlled entirely by the users of the bridge.

Eywa Consensus Bridge will serve as the official bridge for Curve tokens: CRV, crvUSD, Curve LPs, as well as for transferring voting data. This bridge will also provide omnichain (interchain) token creation services.

This approach has multiple benefits:

  • It lowers the risk of losing funds since a bridge can be hacked at any time; yet, the chance of several major bridges being hacked simultaneously is much lower.

  • It fosters synergy with major bridge market players, rather than competition

How does it work? Any information to be sent will be transmitted in parallel to several messaging protocols, depending on the user's choice, who can specify which bridges to use and the required quorum. The smartcontract of the bridge in the destination network accumulates the transmission results and compares them against each other until a quorum is reached. Users themselves will be able to determine the level of security they need, i.e., the number of checks. If at least one of the protocols return incorrect data, the transmission will be canceled.

Example: Imagine executing a cross-chain transfer with a substantial amount of assets. Your funds first get secured in the EYWA Consensus Bridge's smart contract. The transaction is then launched, simultaneously transmitted, and validated across multiple data transfer protocols. A dedicated smart contract in the target network assesses and compares their feedback. Successful matching data across all protocols signals the final step, completing your transfer.

Should any bridge be compromised, resulting in mismatched data, the transaction halts, allowing you to reclaim your funds from the originating network. The chance of simultaneous compromise across all protocols is nearly zero.

Last updated