Security models

ZK-SNARK Security

The network provides the same security guarantees as the main chain for a variety of attack scenarios. The two main cases considered are:

  1. The chain operator (the Layer-2 shard chain layer) is corrupt.

  2. The user is corrupt.

With zk-SNARKs, all transactions have their final validation in an Ethereum smart contract. Even if the operator is corrupt or unable to operate, the data on Ethereum cannot be modified, so there is no loss of user assets, and the user has to start exiting from the main chain's contract. It provides a construct on the main chain's smart contract that can be leveraged to facilitate the user's direct exit.

Actually, the security is equal to Ethereum's security. Users' assets are only ever at risk if Ethereum fails. Simply put, the Layer-2 shard chain is as secure as the main chain's consensus mechanism. Users can always permissionlessly reconstruct state data and withdraw assets.

Last updated