Exploring Eclipse’s Canonical Ethereum Bridge and Its Advanced Proving System

芝麻开门

芝麻开门(Gateio)

注册芝麻开门享最高$2,800好礼。

币安

币安(Binance)

币安是世界领先的数字货币交易平台,注册领100U。

Eclipse’s Canonical Ethereum Bridge and Proving System consists of three layers: Execution (SVM transaction execution), Settlement (Ethereum-based bridge and fraud proofs), and Data Availability (Celestia for data blobs). The bridge enables deposits, withdrawals, and fraud proofs, leveraging Celestia’s Blobstream for data verification. Fraud proofs ensure correct state transitions by validating transaction inputs and outputs. Eclipse’s design avoids global state trees, using transaction chaining for efficiency. The system includes safeguards against invalid batches, with verifiers able to challenge incorrect commitments. Eclipse’s modular L2 architecture emphasizes trust minimization and scalability.

*Forward the Original Title:Exploring Eclipse’s Canonical Ethereum Bridge and Proving System

An Overview of Our Canonical Bridge

Eclipse’s architecture is built upon three fundamental layers that work in harmony to create a robust blockchain ecosystem. At the execution layer, we’ve implemented a modified version of the Solana Labs client (v1.17) to handle SVM transaction processing. The settlement layer operates through our canonical bridge on Ethereum, which not only determines Eclipse’s fork-choice rule but also serves as the submission point for fraud proofs. Completing this triad is the data availability layer, where Eclipse publishes essential verification data as blobs on Celestia’s decentralized network.

The diagram below illustrates how these modules interact:

Exploring Eclipse's Canonical Ethereum Bridge and Its Advanced Proving System

This article will focus primarily on Eclipse’s Ethereum bridge component. Through Blobstream, Celestia’s validator set relays signed attestations to Ethereum, verifying the proper publication of Eclipse’s slot data batches. This mechanism enables Eclipse’s bridge to cross-check fraud proof data against Celestia’s signed data roots. We’ll explore the complete workflow covering fund deposits through our bridge, the posting of Eclipse block batches as data blobs on Celestia, withdrawal processing, and fraud proof generation in exceptional circumstances.

Depositing via Eclipse’s Native Ethereum Bridge

When users initiate deposits through Eclipse’s native Ethereum bridge, the process unfolds through several coordinated steps. The journey begins when a user interacts with Eclipse’s Deposit Bridge contract on the Ethereum network. Eclipse’s SVM executor then detects this deposit through its relayer system, which monitors both the deposited amount and destination address. The relayer subsequently engages with the SVM bridge program to facilitate the transfer of funds to the intended recipient address.

As an additional security measure, the relayer verifies the deposit transaction using a zk-light client (currently in development). The final step involves the block containing the post-deposit transfer transaction being finalized and published through Solana’s Geyser Plugin mechanism.

The diagram below shows the interactions between Ethereum, Celestia, and the SVM Executor during the deposit flow described above:

Exploring Eclipse's Canonical Ethereum Bridge and Its Advanced Proving System

Publishing Eclipse’s Slots to Celestia as Data Blobs

The process of publishing Eclipse’s slot batches to Celestia begins with the SVM executor transmitting each Eclipse slot to the message queue via the Geyser interface. These slot batches are then formatted and posted to Celestia as data blobs, creating a verifiable record of Eclipse’s blockchain activity. Celestia’s validator set generates cryptographic commitments for these data blobs, enabling transaction inclusion proofs against the published data root. These critical data roots, embedded in every Celestia block header, are then relayed to Eclipse’s bridge contract on Ethereum through Blobstream’s secure channel.

The diagram below from Celestia explains how the commitment of the data within a given Celestia block is stored in the block header:
Exploring Eclipse's Canonical Ethereum Bridge and Its Advanced Proving System

Withdrawing and Submitting Fraud Proofs to Eclipse’s Ethereum Bridge

Similar to other L2 solutions employing fraud proofs (such as Arbitrum and Fuel), Eclipse implements a challenge period for withdrawals to allow for potential fraud proof submissions. The process begins with the SVM executor regularly posting commitments to Eclipse’s slot epochs (comprising predetermined batch quantities) to Ethereum, accompanied by collateral deposits. Eclipse’s bridge contract performs preliminary validation checks on the submitted batch data structure (detailed in the Fraud Proof Design section).

If the batch passes these initial checks, a predefined challenge window opens during which network verifiers can submit fraud proofs if they detect invalid state transitions. Successful fraud proofs result in the verifier claiming the executor’s collateral, rejection of the disputed batch, and reversion of Eclipse’s canonical state to the last valid batch commitment. In such cases, Eclipse’s governance mechanism would initiate the selection of a new executor.

Conversely, if the challenge period concludes without any successful fraud proofs, the executor reclaims its collateral along with a reward. The Eclipse bridge contract then processes all withdrawal transactions included in the now-finalized batch, completing the withdrawal cycle.

Fraud Proof Design

Our fraud proof system draws inspiration from the work of Anatoly Yakovenko and John Adler. The fraud proof mechanism requires verifiers to identify transactions containing invalid state transitions, provide the relevant transaction inputs, and demonstrate how re-executing the transaction with these inputs produces outputs that diverge from the on-chain commitment.

Eclipse’s approach leverages Celestia’s merklization of block batch blobs for transaction inclusion proofs via Merkle witnesses. Unlike EVM-based L2s that maintain a global state tree, Eclipse prioritizes performance by avoiding transaction-by-transaction state tree updates. For output verification, Eclipse’s system generates zk-proofs rather than employing the interactive verification games common in EVM-based solutions.

All Eclipse transactions follow a consistent pattern of consuming input accounts, executing transactions, and producing output accounts:

Exploring Eclipse's Canonical Ethereum Bridge and Its Advanced Proving System

Our fraud proof design hinges on the observation that every input account must originate as an output account from a previous transaction. This allows our system to reference prior transactions rather than requiring Merkle witnesses to a global state tree. This innovative approach introduces new fraud accusation types, including invalid previous transaction references or already-spent input accounts.

Transaction Inputs Posted to Celestia

The data posted to Celestia includes both the original transaction data from the sequencer and execution data from the SVM executor. The execution data contains crucial information such as transaction counts, Celestia namespace locations, account hashes with their originating transaction counts, relevant sysvars with their values and originating transactions, and transaction outcomes (successful outputs or failure indicators).

Batch Commitments Posted to The Ethereum Bridge

Alongside the Celestia data, batch commitments are relayed to the Ethereum contract, including namespace locations for transaction and execution data, plus lists of deposits, withdrawals, and overrides with their associated Eclipse transaction counts.

Criteria for an Invalid Batch

Our system identifies several potential batch invalidity scenarios, ranging from malformed namespace locations to missing execution data or incorrect transaction outputs. The verification process may involve submitting Celestia namespace locations, transaction sequences, or zk-proofs of correct execution (potentially generated through RISC Zero’s Bonsai). The bridge contract automatically detects certain invalid conditions, while others require verifier intervention. When invalid batches are identified, the bridge contract rolls back to the last provably correct commitment while preserving all transaction records.

Parting Thoughts

This overview has provided insights into Eclipse’s trust-minimized Ethereum bridge and our innovative fraud proof design. As our modular L2 solution continues to evolve, we’ll be sharing more technical documentation and articles about various aspects of the Eclipse ecosystem in the coming weeks.

For those interested in participating in the Eclipse Testnet, detailed instructions are available here. We welcome questions and feedback through our Twitter or Discord channels.

Footnotes

[1]: The node which computes the results of SVM transactions and applies the eventual output to Eclipse’s new state

[2]: An operator which passes on-chain events between Ethereum and Eclipse

[3]: Note that the executor, not the sequencer, posts this. If it were included in the data posted by the sequencer, it would add the complication that the sequencer could skip over a count, making it impossible for the executor to do their job correctly. This could be compensated for in the fraud proof design, but it would add extra complexity. A second advantage of having only the executor post the count is that it makes it easy to allow transaction overrides to be posted to Celestia, if desired.

[4]: SVM accounts can be represented with a unique hash. The only way this hash is modified is via a transaction.

[5]: To do this without an excessive amount of hashing, we will run a trace on each executed program to see which parts of each used sysvar are actually accessed. This is possible, but will require modifying Solana’s BPF interpreter.

[6]: This includes data for attempted transactions that failed to execute.

Disclaimer:

  1. This article is reprinted from [[mirror], All copyrights belong to the original author [Eclipse]. If there are objections to this reprint, please contact the Gate Learn team, and they will handle it promptly.
  2. Liability Disclaimer: The views and opinions expressed in this article are solely those of the author and do not constitute any investment advice.
  3. Translations of the article into other languages are done by the Gate Learn team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.

声明:文章不代表CHAINTT观点及立场,不构成本平台任何投资建议。投资决策需建立在独立思考之上,本文内容仅供参考,风险 自担!转载请注明出处:https://www.chaintt.cn/12088.html

CHAINTT的头像CHAINTT
上一篇 2025年7月20日 下午7:47
下一篇 2025年7月20日 下午8:23

相关推荐

  • 区块链加密市场热门概念深度解析

    本文探讨了2023-2024年加密市场七大主流概念:AI(市值77亿美元)、Meme币(600亿美元)、RWA(70亿美元)、DeFi(920亿美元)、L2(280亿美元)、P2E(150亿美元)和DePIN(280亿美元)。分析指出,牛市期间概念选择对项目成功至关重要,AI与加密技术的结合、Meme币的高风险高回报特性、RWA的传统金融整合潜力等成为关键趋势。数据显示DeFi仍占据主导地位,而L2解决方案和GameFi正迎来新一轮发展机遇。

    2025年9月27日
    4000
  • 区块链终结性原理与实践:全面解析从理论到应用

    区块链终结性解析 文章通过混凝土凝固的类比解释区块链”终结性”概念:交易从提交到确认再到最终不可逆(约13分钟),如同混凝土从浇筑到完全硬化。详细对比了以太坊(需2个Epoch验证)、Optimistic L2(7天欺诈窗口)和ZK L2(双重终结机制)的实现差异,并指出PoW链(如比特币)不存在真正终结性。终结性为区块链带来三大核心价值:确保经济安全、加速交易结算、抑制恶意攻击,是构建可信区块链生态的基础机制。

    5天前
    2500
  • 探索区块链数据可用性层的关键作用与重要性

    数据可用性层:模块化区块链的关键组件 数据可用性层作为模块化架构的核心组件,通过数据可用性采样(DAS)技术大幅降低验证成本(最高达99%),解决了传统区块链全节点下载所有数据导致的效率低下问题。主流方案包括Avail(KZG承诺+纠删码)、Celestia(欺诈证明)和EigenDA(基于以太坊智能合约),在技术架构、安全模型和生态系统适配性上各有侧重。这些方案将推动Rollup链爆发式增长,并通过统一数据层提升跨链互操作性,成为未来区块链扩展性解决方案的基础设施。

    2025年7月9日
    3600
  • 解读Initia:全链模块化Rollup网络的便捷定制与拎包入住体验

    区块链项目Initia近期成为加密社区焦点,其750万美元种子轮融资由Delphi Ventures和Hack VC领投,Binance Labs跟投。Initia采用独特架构,结合L1协调层与模块化L2(Minitia),通过Cosmos、Celestia等技术实现跨链互操作,解决多链生态的碎片化问题。每个Minitia内置DEX、预言机等组件,支持即插即用开发。测试网已吸引Blackwing、Lunch App等生态项目,用户可通过交互获取NFT奖励。该项目以”链间粘合剂”定位,试图在基建赛道建立差异化优势。

    3天前
    1500
  • 坎昆升级后时代:数据分析与投资策略深度解析

    Dencun 升级显著降低 L2 交易费用近 90%,提升吞吐量,Base 链表现突出。升级引入 Blob 数据结构,为未来高并发奠定基础。L2 龙头 Arbitrum 和 Optimism 生态繁荣,Base 链凭借 Coinbase 资源快速崛起。交互成本降低将促进未发币 L2 项目发展,如 Blast、Zksync 等。

    2025年8月20日
    4500

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

风险提示:防范以"数字货币""区块链"名义进行非法集资的风险