What Sets Cycle Apart? 🚀
Cycle uses Verifiable State Aggregation (VSA) & On-Chain State Channel Indexer (OSCI) for a full-state solution! 🔥
Our framework has 3 layers:
1. Security Layer 🔒
2. Extend Layer 📈
3. Cycle Layer 🌟
✨Security Layer
This layer inherits security and stability from Ethereum. The consensus mechanism guarantees state security so that two nodes will not present conflicting results. It also provides the finality guarantee that the transactions will be finalized within the bounded time.
✨Extend Layer
Extend layer consists of the source chains and destination chains, such as Layer 2 and appchains. Cycle Network establishes an endpoint on each chain, which validates that the received message constitutes a comprehensive set, so that the Omni Decentralized Indexer can achieve extended DA for those chains.
✨Cycle Layer
All transactions in the Cycle Network, including the cross-chain transactions across Security Layer and Extended Layers, as well as internal transactions within Cycle Layer, collectively generate the aggregate Cycle state. The root state of Cycle is generated by a zkEVM, which is submitted to chains on Extend Layer for validation.
Thanks to the verifiable and trustless design of Cycle Layer, Chain Virtualization is seamlessly achieved through the Rollin and Rollout interfaces, which takes only 30 minutes for developers to integrate. This streamlined process not only enhances development efficiency but also offers bridgeless access to comprehensive cross-chain liquidity, empowering developers with unparalleled capabilities in their projects.