Outline
Assumptions
↑ Back to Outline As part of a modular ABCI application, CCV interacts with both the consensus engine (via ABCI) and other application modules (e.g, the Staking module). As an IBC application, CCV interacts with external relayers (defined in ICS 18). In this section we specify what we assume about these other components. A more thorough discussion of the environment in which CCV operates is given in the section Placing CCV within an ABCI Application.Intuition: CCV safety relies on the Safe Blockchain assumption, i.e., neither Live Blockchain and Correct Relayer are required for safety. Note though that CCV liveness relies on both Live Blockchain and Correct Relayer assumptions; furthermore, the Correct Relayer assumption relies on both Safe Blockchain and Live Blockchain assumptions. The Validator Update Provision, Unbonding Safety, Slashing Warranty, and Distribution Warranty assumptions define what is needed from the ABCI application of the provider chain. The Evidence Provision assumptions defines what is needed from the ABCI application of the consumer chains.
- Safe Blockchain: Both the provider and the consumer chains are safe. This means that, for every chain, the underlying consensus engine satisfies safety (e.g., the chain does not fork) and the execution of the state machine follows the described protocol.
-
Live Blockchain: Both the provider and the consumer chains are live. This means that, for every chain, the underlying consensus engine satisfies liveness (i.e., new blocks are eventually added to the chain).
Note: Both Safe Blockchain and Live Blockchain assumptions require the consensus engine’s assumptions to hold, e.g., less than a third of the voting power is Byzantine. For an example, take a look at the Tendermint Paper.
-
Correct Relayer: There is at least one correct, live relayer between the provider and consumer chains. This assumption has the following implications.
- The opening handshake messages on the CCV channel are relayed before the Channel Initialization subprotocol times out (see
initTimeout). - Every packet sent on the CCV channel is relayed to the receiving end before the packet timeout elapses (see both
vscTimeoutandccvTimeoutTimestamp). - A correct relayer will eventually relay packets on the token transfer channel.
Clearly, the CCV protocol is responsible of setting the timeouts (see
ccvTimeoutTimestamp,vscTimeout,initTimeoutin the CCV State), such that the Correct Relayer assumption is feasible.
Discussion: IBC relies on timeouts to signal that a sent packet is not going to be received on the other end. Once an ordered IBC channel timeouts, the channel is closed (see ICS 4). The Correct Relayer assumption is necessary to ensure that the CCV channel cannot ever timeout and, as a result, cannot transit to the closed state. In practice, the Correct Relayer assumption is realistic since any validator could play the role of the relayer and it is in the best interest of correct validators to successfully relay packets. The following strategy is a practical example of how to ensure the Correct Relayer assumption holds. Let S denote the sending chain and D the destination chain; and let
drift(S,D)be the time drift between S and D, i.e.,drift(S,D) = S.currentTimestamp() - D.currentTimestamp()(drift(S,D) > 0means that S is “ahead” of D). For every packet, S only setstimeoutTimestamp = S.currentTimestamp() + to, withtoan application-level parameter. ThetimeoutTimestampindicates a timestamp on the destination chain after which the packet will no longer be processed (cf. ICS 4). Therefore, the packet MUST be relayed within a time period ofto - drift(S,D), i.e.,to - drift(S,D) > RTmax, whereRTmaxis the maximum relaying time across all packet. Theoretically, choosing the value oftorequires knowing the value ofdrift(S,D)(i.e.,to > drift(S,D)); yet,drift(S,D)is not known at a chain level. In practice, choosingtosuch thatto >> drift(S,D)andto >> RTmax, e.g.,to = 4 weeks, makes the Correct Relayer assumption feasible. - The opening handshake messages on the CCV channel are relayed before the Channel Initialization subprotocol times out (see
-
Validator Update Provision: Let
{U1, U2, ..., Ui}be a batch of validator updates applied (by the provider Staking module) to the validator set of the provider chain at block heighth. Then, the batch of validator updates obtained (by the provider CCV module) from the provider Staking module at heighthMUST be exactly the batch{U1, U2, ..., Ui}. -
Unbonding Safety: Let
uobe any unbonding operation that starts with an unbonding transaction being executed and completes with the event that returns the corresponding stake; letU(uo)be the validator update caused by initiatinguo; letvsc(uo)be the VSC that containsU(uo). Then,- (unbonding initiation) the provider CCV module MUST be notified of
uo’s initiation before receivingU(uo); - (unbonding completion)
uoMUST NOT complete on the provider chain before the provider chain registers notifications ofvsc(uo)’s maturity from all consumer chains.
Note: Depending on the implementation, the (unbonding initiation) part of the Unbonding Safety MAY NOT be necessary for validator unbonding operations.
- (unbonding initiation) the provider CCV module MUST be notified of
-
Slashing Warranty: If the provider ABCI application (e.g., the Slashing module) receives a request to slash a validator
valthat misbehaved at block heighth, then it slashes the amount of tokensvalhad bonded at heighthexcept the amount that has already completely unbonded. -
Evidence Provision: If the consumer ABCI application receives a valid evidence of misbehavior at block height
h, then it MUST submit it to the consumer CCV module exactly once and at the same heighth. Furthermore, the consumer ABCI application MUST NOT submit invalid evidence to the consumer CCV module.Note: What constitutes a valid evidence of misbehavior depends on the type of misbehavior and it is outside the scope of this specification.
- Distribution Warranty: The provider ABCI application (e.g., the Distribution module) distributes the tokens from the distribution module account among the validators that are part of the validator set.
Desired Properties
The following properties are concerned with one provider chain providing security to multiple consumer chains. Between the provider chain and each consumer chain, a separate (unique) CCV channel is established.Note: Except for liveness properties — Channel Liveness, Apply VSC Liveness, Register Maturity Liveness, and Distribution Liveness — none of the properties of CCV require the Correct Relayer assumption to hold. Nonetheless, the Correct Relayer assumption is necessary to guarantee the systems properties (except for Validator Set Replication) — Bond-Based Consumer Voting Power, Slashable Consumer Misbehavior, and Consumer Rewards Distribution.
System Properties
↑ Back to Outline We use the following notations:ts(h)is the timestamp of a block with heighth, i.e.,ts(h) = B.currentTimestamp(), whereBis the block at heighth;pBonded(h,val)is the number of tokens bonded by validatorvalon the provider chain at block heighth;pUnbonding(h,val)is the number of tokens a validatorvalstarts unbonding on the provider at block heighth;VP(T)is the voting power associated to a numberTof tokens;Power(c,h,val)is the voting power granted to a validatorvalon a chaincat block heighth;Token(power)is the amount of tokens necessary to be bonded (on the provider chain) by a validator to be grantedpowervoting power, i.e.,Token(VP(T)) = T;slash(val, h, hi, sf)is the amount of token slashed from a validatorvalon the provider chain (i.e.,pc) at heighthfor an infraction (with a slashing fraction ofsf) committed at (provider) heighthi, i.e.,slash(val, h, hi, sf) = sf * Token(Power(pc,hi,val)); note that the infraction can be committed also on a consumer chain, in which casehiis the corresponding height on the provider chain.
ha << hb to denote an order relation between heights, i.e., the block at height ha happens before the block at height hb.
For heights on the same chain, << is equivalent to <, i.e., ha << hb entails hb is larger than ha.
For heights on two different chains, << is establish by the packets sent over an order channel between two chains,
i.e., if a chain A sends at height ha a packet to a chain B and B receives it at height hb, then ha << hb.
Note:CCV provides the following system properties.<<is transitive, i.e.,ha << hbandhb << hcentailha << hc. Note: The block on the proposer chain that handles a governance proposal to spawn a new consumer chaincchappens before all the blocks ofcc.
- Validator Set Replication: Every validator set on any consumer chain MUST either be or have been a validator set on the provider chain.
-
Bond-Based Consumer Voting Power: Let
valbe a validator,ccbe a consumer chain, bothhcandhc'be heights oncc, and bothhpandhp'be heights on the provider chain, such thatvalhasPower(cc,hc,val)voting power onccat heighthc;hc'is the smallest height onccthat satisfiests(hc') >= ts(hc) + UnbondingPeriod, i.e.,valcannot completely unbond onccbeforehc';hpis the largest height on the provider chain that satisfieshp << hc, i.e.,Power(pc,hp,val) = Power(cc,hc,val), wherepcis the provider chain;hp'is the smallest height on the provider chain that satisfieshc' << hp', i.e.,valcannot completely unbond on the provider chain beforehp';sumUnbonding(hp, h, val)is the sum of all tokens ofvalthat start unbonding on the provider at all heightshuand are still unbonding at heighth, such thathp < hu <= hsumSlash(hp, h, val)is the sum of the slashes ofvalat all heightshsfor infractions committed athp, such thathp < hs <= h.
hon the provider chain,Note: The reason for
+ sumUnbonding(hp, h, val)in the above inequality is that tokens thatvalstart unbonding afterhphave contributed to the power granted tovalat heighthconcc(i.e.,Power(cc,hc,val)). As a result, these tokens should be available for slashing untilhp'. Note: The reason for+ sumSlash(hp, h, val)in the above inequality is that slashingvalreduces its locked tokens (i.e.,pBonded(h,val)andsumUnbonding(hp, h, val)), however it does not reduce the power already granted to it at heighthconcc(i.e.,Power(cc,hc,val)). Intuition: The Bond-Based Consumer Voting Power property ensures that validators that validate on the consumer chains have enough tokens bonded on the provider chain for a sufficient amount of time such that the security model holds. This means that if the validators misbehave on the consumer chains, their tokens bonded on the provider chain can be slashed during the unbonding period. For example, if one unit of voting power requires1.000.000bonded tokens (i.e.,VP(1.000.000)=1), then a validator that gets one unit of voting power on a consumer chain must have at least1.000.000tokens bonded on the provider chain until the unbonding period elapses on the consumer chain. Note: When an existing chain becomes a consumer chain (see Channel Initialization: Existing Chains), the existing validator set is replaced by the provider validator set. For safety, the stake bonded by the existing validator set must remain bonded until the unbonding period elapses. Thus, the existing Staking module must be kept for at least the unbonding period. -
Slashable Consumer Misbehavior: If a validator
valcommits an infraction, with a slashing fraction ofsf, on a consumer chainccat a block heighthi, then any evidence of misbehavior that is received byccat heighthe, such thatts(he) < ts(hi) + UnbondingPeriod, MUST results in exactly the amount of tokenssf*Token(Power(cc,hi,val))to be slashed on the provider chain. Furthermore,valMUST NOT be slashed more than once for the same misbehavior.Note: Unlike in single-chain validation, in CCV the tokens
sf*Token(Power(cc,hi,val))MAY be slashed even if the evidence of misbehavior is received at heighthesuch thatts(he) >= ts(hi) + UnbondingPeriod, since unbonding operations need to reach maturity on both the provider and all the consumer chains. Note: The Slashable Consumer Misbehavior property also ensures that if a delegator starts unbonding an amountxof tokens fromvalbefore heighthi, thenxwill not be slashed, sincexis not part ofToken(Power(c,hi,val)). -
Consumer Rewards Distribution: If a consumer chain sends to the provider chain an amount
Tof tokens as reward for providing security, thenT(equivalent) tokens MUST be eventually minted on the provider chain and then distributed among the validators that are part of the validator set;- the total supply of tokens MUST be preserved, i.e., the
T(original) tokens are escrowed on the consumer chain.
CCV Channel
↑ Back to Outline- Channel Uniqueness: The channel between the provider chain and a consumer chain MUST be unique.
- Channel Validity: If a packet
Pis received by one end of a CCV channel, thenPMUST have been sent by the other end of the channel. - Channel Order: If a packet
P1is sent over a CCV channel before a packetP2, thenP2MUST NOT be received by the other end of the channel beforeP1. - Channel Liveness: Every packet sent over a CCV channel MUST eventually be received by the other end of the channel.
Validator Sets, Validator Updates and VSCs
↑ Back to Outline In this section, we provide a short discussion on how the validator set, the validator updates, and the VSCs relates in the context of multiple chains. Every chain consists of a sequence of blocks. At the end of each block, validator updates (i.e., changes in the validators voting power) results in changes in the validator set of the next block. Thus, the sequence of blocks produces a sequence of validator updates and a sequence of validator sets. Furthermore, the sequence of validator updates on the provider chain results in a sequence of VSCs to all consumer chains. Ideally, this sequence of VSCs is applied by every consumer chain, resulting in a sequence of validator sets identical to the one on the provider chain. However, in general this need not be the case. The reason is twofold:- first, given any two chains
AandB, we cannot assume thatA’s rate of adding new block is the same asB’s rate (i.e., we consider the sequences of blocks of any two chains to be completely asynchronous); - and second, due to relaying delays, we cannot assume that the rate of sending VSCs matches the rate of receiving VSCs.
val, the sequence of validator updates targeting val (i.e., updates of the voting power of val) is the prefix sum of the sequence of relative changes of the voting power of val.
Thus, given a validator update U targeting val that occurs at a block height h,
U sums up all the relative changes of the voting power of val that occur until height h,
i.e., U = c_1+c_2+...+c_i, such that c_i is the last relative change that occurs by h.
Note that relative changes are integer values.
As a consequence, CCV can rely on the following property:
- Validator Update Inclusion: Let
U1andU2be two validator updates targeting the same validatorval. IfU1occurs beforeU2, thenU2sums up all the changes of the voting power ofvalthat are summed up byU1, i.e.,U1 = c_1+c_2+...+c_iandU2 = c_1+c_2+...+c_i+c_(i+1)+...+c_j.
Staking Module Interface
↑ Back to Outline The following properties define the guarantees of CCV on providing VSCs to the consumer chains as a consequence of validator updates on the provider chain.- Validator Update To VSC Validity: Every VSC provided to a consumer chain MUST contain only validator updates that were applied to the validator set of the provider chain (i.e., resulted from a change in the amount of bonded tokens on the provider chain).
- Validator Update To VSC Order: Let
U1andU2be two validator updates on the provider chain. IfU1occurs beforeU2, thenU2MUST NOT be included in a provided VSC beforeU1. Note that the order within a single VSC is not relevant. - Validator Update To VSC Liveness: Every update of a validator in the validator set of the provider chain MUST eventually be included in a VSC provided to all consumer chains.
- Provide VSC uniformity: If the provider chain provides a VSC to a consumer chain, then it MUST eventually provide that VSC to all consumer chains.
Validator Set Update
↑ Back to Outline The provider chain providing VSCs to the consumer chains has two desired outcomes: the consumer chains apply the VSCs; and the provider chain registers VSC maturity notifications from every consumer chain. Thus, for clarity, we split the properties of VSCs in two: properties of applying provided VSCs on the consumer chains; and properties of registering VSC maturity notifications on the provider chain. For simplicity, we focus on a single consumer chain. The following properties define the guarantees of CCV on applying on the consumer chain VSCs provided by the provider chain.- Apply VSC Validity: Every VSC applied by the consumer chain MUST be provided by the provider chain.
- Apply VSC Order: If a VSC
vsc1is provided by the provider chain before a VSCvsc2, then the consumer chain MUST NOT apply the validator updates included invsc2before the validator updates included invsc1. - Apply VSC Liveness: If the provider chain provides a VSC
vsc, then the consumer chain MUST eventually apply all validator updates included invsc.
- Register Maturity Validity: If the provider chain registers a maturity notification of a VSC from the consumer chain, then the provider chain MUST have provided that VSC to the consumer chain.
- Register Maturity Timeliness: The provider chain MUST NOT register a maturity notification of a VSC
vscbeforeUnbondingPeriodhas elapsed on the consumer chain since the consumer chain appliedvsc. - Register Maturity Order: If a VSC
vsc1was provided by the provider chain before another VSCvsc2, then the provider chain MUST NOT register the maturity notification ofvsc2before the maturity notification ofvsc1. - Register Maturity Liveness: If the provider chain provides a VSC
vscto the consumer chain, then the provider chain MUST eventually register a maturity notification ofvscfrom the consumer chain.
Consumer Initiated Slashing
↑ Back to Outline-
Consumer Slashing Warranty: Let
ccbe a consumer chain, such that its CCV module receives at heightheevidence that a validatorvalmisbehaved onccat heighthi. Lethvbe the height when the CCV module ofccreceives the first VSC from the provider CCV module, i.e., the height when the CCV channel is established. Then, the CCV module ofccMUST send (to the provider CCV module) exactly oneSlashPacketP, such thatPis sent at heighth = max(he, hv);P.val = valandP.id = HtoVSC[hi], i.e., the ID of the latest VSC that updated the validator set onccat heighthior0if such a VSC does not exist (ifhi < hv).
Note: A consequence of the Consumer Slashing Warranty property is that the initial validator set on a consumer chain cannot be slashed during the initialization of the CCV channel. Therefore, consumer chains SHOULD NOT allow user transactions before the CCV channel is established. Note that once the CCV channel is established (i.e., a VSC is received from the provider CCV module), CCV enables the slashing of the initial validator set for infractions committed during channel initialization.
-
Provider Slashing Warranty: If the provider CCV module receives from a consumer chain
ccaSlashPacketcontaining a validatorvaland a VSC IDvscId, then it MUST make exactly one request to the provider Slashing module to slashvalfor misbehaving at heighth, such that- if
vscId = 0,his the height of the block when the provider chain established a CCV channel tocc; - otherwise,
his the height of the block immediately subsequent to the block when the provider chain provided toccthe VSC with IDvscId. Furthermore, the provider CCV module MUST make this slash request before registering any maturity notifications received fromccafter theSlashPacket.
- if
-
VSC Maturity and Slashing Order: If a consumer chain sends to the provider chain a
SlashPacketbefore a maturity notification of a VSC, then the provider chain MUST NOT receive the maturity notification before theSlashPacket.Note: VSC Maturity and Slashing Order requires the VSC maturity notifications to be sent through their own IBC packets (i.e.,
VSCMaturedPackets) instead of e.g., through acknowledgements ofVSCPackets.
Reward Distribution
↑ Back to Outline- Distribution Liveness: If the CCV module on a consumer chain sends to the distribution module account on the provider chain an amount
Tof tokens as reward for providing security, thenT(equivalent) tokens are eventually minted in the distribution module account on the provider chain.
Correctness Reasoning
↑ Back to Outline In this section we argue the correctness of the CCV protocol described in the Technical Specification, i.e., we informally prove the properties described in the previous section.-
Channel Uniqueness: The consumer chain side of the CCV channel is established when the consumer CCV module receives the first
ChanOpenAckmessage that is successfully executed; all subsequentChanOpenAckmessages will fail (cf. Safe Blockchain). LetccvChanneldenote this channel. Then,ccvChannelis the onlyOPENchannel that can be connected to a port owned by the consumer CCV module. The provider chain side of the CCV channel is established when the provider CCV module receives the firstChanOpenConfirmmessage that is successfully executed; all subsequentChanOpenConfirmmessages will fail (cf. Safe Blockchain). TheccvChannelis the only channel for whichChanOpenConfirmcan be successfully executed (cf. Safe Blockchain, i.e., IBC channel opening handshake guarantee). As a result,ccvChannelis unique. Moreover, ts existence is guaranteed by the Correct Relayer assumption. - Channel Validity: Follows directly from the Safe Blockchain assumption.
-
Channel Order: The provider chain accepts only ordered channels when receiving a
ChanOpenTrymessage (cf. Safe Blockchain). Similarly, the consumer chain accepts only ordered channels when receivingChanOpenInitmessages (cf. Safe Blockchain). Thus, the property follows directly from the fact that the CCV channel is ordered. - Channel Liveness: The property follows from the Correct Relayer assumption.
-
Validator Update To VSC Validity: The provider CCV module provides only VSCs that contain validator updates obtained from the Staking module,
i.e., by calling the
GetValidatorUpdates()method (cf. Safe Blockchain). Furthermore, these validator updates were applied to the validator set of the provider chain (cf. Validator Update Provision). -
Validator Update To VSC Order: We prove the property through contradiction.
Given two validator updates
U1andU2, withU1occurring on the provider chain beforeU2, we assumeU2is included in a provided VSC beforeU1. However,U2could not have been obtained by the provider CCV module beforeU1(cf. Validator Update Provision). Thus, the provider CCV module could not have provided a VSC that containsU2before a VSC that containsU1(cf. Safe Blockchain), which contradicts the initial assumption. -
Validator Update To VSC Liveness: The provider CCV module eventually provides to all consumer chains VSCs containing all validator updates obtained from the provider Staking module (cf. Safe Blockchain, Life Blockchain).
Thus, it is sufficient to prove that every update of a validator in the validator set of the provider chain MUST eventually be obtained from the provider Staking module.
We prove this through contradiction. Given a validator update
Uthat is applied to the validator set of the provider chain at the end of a blockBwith heighth, we assumeUis never obtained by the provider CCV module. However, at heighth, the provider CCV module tries to obtain a new batch of validator updates from the provider Staking module (cf. Safe Blockchain). Thus, this batch of validator updates MUST contain all validator updates applied to the validator set of the provider chain at the end of blockB, includingU(cf. Validator Update Provision), which contradicts the initial assumption. -
Apply VSC Validity: The property follows from the following two assertions.
- The consumer chain only applies VSCs received in
VSCPackets through the CCV channel (cf. Safe Blockchain). - The provider chain only sends
VSCPackets containing provided VSCs (cf. Safe Blockchain).
- The consumer chain only applies VSCs received in
-
Apply VSC Order: We prove the property through contradiction.
Given two VSCs
vsc1andvsc2such that the provider chain providesvsc1beforevsc2, we assume the consumer chain applies the validator updates included invsc2before the validator updates included invsc1. The following sequence of assertions leads to a contradiction.- The provider chain could not have sent a
VSCPacketP2containingvsc2before aVSCPacketP1containingvsc1(cf. Safe Blockchain). - The consumer chain could not have received
P2beforeP1(cf. Channel Order). - Given the Safe Blockchain assumption, we distinguish two cases.
- First, the consumer chain receives
P1during blockB1andP2during blockB2(withB1<B2). Then, it applies the validator updates included invsc1at the end ofB1and the validator updates included invsc2at the end ofB2(cf. Validator Update Inclusion), which contradicts the initial assumption. - Second, the consumer chain receives both
P1andP2during the same block. Then, it applies the validator updates included in bothvsc1andvsc2at the end of the block. Thus, it could not have apply the validator updates included invsc2before.
- First, the consumer chain receives
- The provider chain could not have sent a
-
Apply VSC Liveness: The provider chain eventually sends over the CCV channel a
VSCPacketcontainingvsc(cf. Safe Blockchain, Life Blockchain). As a result, the consumer chain eventually receives this packet (cf. Channel Liveness). Then, the consumer chain aggregates all received VSCs at the end of the block and applies all the aggregated updates (cf. Safe Blockchain, Life Blockchain). As a result, the consumer chain applies all validator updates invsc(cf. Validator Update Inclusion). -
Register Maturity Validity: The property follows from the following sequence of assertions.
- The provider chain only registers VSC maturity notifications when receiving on the CCV channel a
VSCMaturedPackets notifying the maturity of those VSCs (cf. Safe Blockchain). - The provider chain receives on the CCV channel only packets sent by the consumer chain (cf. Channel Validity).
- The consumer chain only sends
VSCMaturedPackets matching theVSCPackets it receives on the CCV channel (cf. Safe Blockchain). - The consumer chain receives on the CCV channel only packets sent by the provider chain (cf. Channel Validity).
- The provider chain only sends
VSCPackets containing provided VSCs (cf. Safe Blockchain).
- The provider chain only registers VSC maturity notifications when receiving on the CCV channel a
-
Register Maturity Timeliness: We prove the property through contradiction.
Given a VSC
vscprovided by the provider chain to the consumer chain, we assume that the provider chain registers a maturity notification ofvscbeforeUnbondingPeriodhas elapsed on the consumer chain since the consumer chain appliedvsc. The following sequence of assertions leads to a contradiction.- The provider chain could not have register a maturity notification of
vscbefore receiving on the CCV channel aVSCMaturedPacketPwithP.id = vsc.id(cf. Safe Blockchain). - The provider chain could not have received
Pon the CCV channel before the consumer chain sent it (cf. Channel Validity). - The consumer chain could not have sent
Pbefore at leastUnbondingPeriodhas elapsed since receiving aVSCPacketP'withP'.id = P.idon the CCV channel (cf. Safe Blockchain). Note that since time is measured in terms of the block time, the time of receivingP'is the same as the time of applyingvsc. - The consumer chain could not have received
P'on the CCV channel before the provider chain sent it (cf. Channel Validity). - The provider chain could not have sent
P'before providingvsc. - Since the duration of sending packets through the CCV channel cannot be negative, the provider chain could not have registered a maturity notification of
vscbeforeUnbondingPeriodhas elapsed on the consumer chain since the consumer chain appliedvsc.
- The provider chain could not have register a maturity notification of
-
Register Maturity Order: We prove the property through contradiction. Given two VSCs
vsc1andvsc2such that the provider chain providesvsc1beforevsc2, we assume the provider chain registers the maturity notification ofvsc2before the maturity notification ofvsc1. The following sequence of assertions leads to a contradiction.- The provider chain could not have sent a
VSCPacketP2, withP2.updates = C2, before aVSCPacketP1, withP1.updates = C1(cf. Safe Blockchain). - The consumer chain could not have received
P2beforeP1(cf. Channel Order). - The consumer chain could not have sent a
VSCMaturedPacketP2', withP2'.id = P2.id, before aVSCMaturedPacketP1', withP1'.id = P1.id(cf. Safe Blockchain). - The provider chain could not have received
P2'beforeP1'(cf. Channel Order). - The provider chain could not have registered the maturity notification of
vsc2before the maturity notification ofvsc1(cf. Safe Blockchain).
- The provider chain could not have sent a
-
Register Maturity Liveness: The property follows from the following sequence of assertions.
- The provider chain eventually sends on the CCV channel a
VSCPacketP, withP.updates = C(cf. Safe Blockchain, Life Blockchain). - The consumer chain eventually receives
Pon the CCV channel (cf. Channel Liveness). - The consumer chain eventually sends on the CCV channel a
VSCMaturedPacketP', withP'.id = P.id(cf. Safe Blockchain, Life Blockchain). - The provider chain eventually receives
P'on the CCV channel (cf. Channel Liveness). - The provider chain eventually registers the maturity notification of
vsc(cf. Safe Blockchain, Life Blockchain).
- The provider chain eventually sends on the CCV channel a
- Consumer Slashing Warranty: Follows directly from Safe Blockchain.
- Provider Slashing Warranty: Follows directly from Safe Blockchain.
- VSC Maturity and Slashing Order: Follows directly from Channel Order.
-
Distribution Liveness: The CCV module on the consumer chain sends to the provider chain an amount
Tof tokens through an IBC token transfer packet (as defined in ICS 20). Thus, if the packet is relayed within the timeout period, thenT(equivalent) tokens are minted on the provider chain. Otherwise, theTtokens are refunded to the consumer CCV module account. In this case, theTtokens will be part of the next token transfer packet. Eventually, a correct relayer will relay a token transfer packet containing theTtokens (cf. Correct Relayer, Life Blockchain). As a result,T(equivalent) tokens are eventually minted on the provider chain. - Validator Set Replication: The property follows from the Safe Blockchain assumption and both the Apply VSC Validity and Validator Update To VSC Validity properties.
-
Bond-Based Consumer Voting Power: The existence of
hpis given by construction, i.e., the block on the proposer chain that handles a governance proposal to spawn a new consumer chaincchappens before all the blocks ofcc. The existence ofhc'andhp'is given by Life Blockchain and Channel Liveness. To prove the Bond-Based Consumer Voting Power property, we use the following property that follows directly from the design of the protocol (cf. Safe Blockchain, Life Blockchain).- Property1: Let
valbe a validator; letUaandUbbe two updates ofvalthat are applied subsequently by a consumer chaincc, at block heightshaandhb, respectively (i.e., no other updates ofvalare applied in between). Then,Power(cc,ha,val) = Power(cc,h,val), for all block heightsh, such thatha <= h < hb(i.e., the voting power granted tovalonccin the period betweents(ha)andts(hb)is constant).
hon the provider chain betweenhpandhp'such thatPower(cc,hc,val) > VP( pBonded(h,val) + sumUnbonding(hp, h, val) + sumSlash(hp, h, val) ). The following sequence of assertions leads to a contradiction.- Let
U1be the latest update ofvalthat is applied byccbefore or not later than block heighthc(i.e.,U1is the update that setsPower(cc,hc,val)forval). Lethp1be the height at whichU1occurs on the provider chain; lethc1be the height at whichU1is applied oncc. Then,hp1 << hc1 <= hc,hp1 <= hp, andPower(cc,hc,val) = Power(cc,hc1,val) = VP(pBonded(hp1,val)). This means that some of the tokens bonded byvalat heighthp1were completely unbonded before or not later than heighthp'(cf.Power(cc,hc,val) > VP( pBonded(h,val) + sumUnbonding(hp, h, val) + sumSlash(hp, h, val) )). - Let
uobe the first such unbonding operation that is initiated on the provider chain at heighthp2, such thathp1 < hp2 <= hp'. Note that at heighthp2, the tokens unbonded byuoare part ofpUnbonding(hp2,val). LetU2be the validator update caused by initiatinguo. Lethc2be the height at whichU2is applied oncc; clearly,Power(cc,hc2,val) < Power(cc,hc,val). Note that the existence ofhc2is ensured by Validator Update To VSC Liveness and Apply VSC Liveness. Then,hc2 > hc1(cf.hp2 > hp1, Validator Update To VSC Order, Apply VSC Order). Power(cc,hc,val) = Power(cc,hc1,val) = Power(cc,h,val), for all heightsh, such thathc1 <= h < hc2(cf. Property1). Thus,hc2 > hc(cf.Power(cc,hc2,val) < Power(cc,hc,val)).uocannot complete beforets(hc2) + UnbondingPeriod, which means it cannot complete beforehc'and thus it cannot complete beforehp'(cf.hc' << hp').
- Property1: Let
-
Slashable Consumer Misbehavior: The second part of the Slashable Consumer Misbehavior property (i.e.,
valis not slashed more than once for the same misbehavior) follows directly from Evidence Provision, Channel Validity, Consumer Slashing Warranty, Provider Slashing Warranty. To prove the first part of the Slashable Consumer Misbehavior property (i.e., exactly the amount of tokenssf*Token(Power(cc,hi,val))are slashed on the provider chain), we consider the following sequence of statements.- The CCV module of
ccreceives at heighthethe evidence thatvalmisbehaved onccat heighthi(cf. Evidence Provision, Safe Blockchain, Life Blockchain). - Let
hvbe the height when the CCV module ofccreceives the first VSC from the provider CCV module. Then, the CCV module ofccsends at heighth = max(he, hv)to the provider chain aSlashPacketP, such thatP.val = valandP.id = HtoVSC[hi](cf. Consumer Slashing Warranty). - The provider CCV module eventually receives
P(cf. Channel Liveness). - The provider CCV module requests the provider Slashing module to slash
valfor misbehaving at heighthp = VSCtoH[P.id]before handling any further maturity notifications received from the CCV module ofcc(cf. Provider Slashing Warranty). - The provider Slashing module slashes the amount of tokens
valhad bonded at heighthpexcept the amount that has already completely unbonded (cf. Slashing Warranty). Thus, it remains to be proven thatToken(Power(cc,hi,val)) = pBonded(hp,val), withhp = VSCtoH[HtoVSC[hi]]. We distinguish two cases: HtoVSC[hi] != 0, which means that by definitionHtoVSC[hi]is the ID of the last VSC that updatePower(cc,hi,val). Also by definition, this VSC contains the last updates to the voting power at heightVSCtoH[HtoVSC[hi]]on the provider. Thus,Token(Power(cc,hi,val)) = pBonded(hp,val).HtoVSC[hi] == 0, which means that by definitionPower(cc,hi,val)was setup at genesis during Channel Initialization. Also by definition, this is the same voting power of the provider chain block when the first VSC was provided to that consumer chain, i.e.,VSCtoH[HtoVSC[hi]]. Thus,Token(Power(cc,hi,val)) = pBonded(hp,val).
- The CCV module of
- Consumer Rewards Distribution: The first part of the Consumer Rewards Distribution property (i.e., the tokens are eventually minted on the provider chain and then distributed among the validators) follows directly from Distribution Liveness and Distribution Warranty. The second part of the Consumer Rewards Distribution property (i.e., the total supply of tokens is preserved) follows directly from the Supply property of the Fungible Token Transfer protocol (see ICS 20).