Data availability using PLONK & fraud proof

Ensure the security and validity of transactions on the network

PLONK

In Hyper Chain, data availability is ensured through the use of the PLONK proof system, which is a type of zk-SNARK that allows for efficient verification of complex computations. PLONK requires that all the data necessary to validate a transaction be available on-chain at the time the transaction is submitted. This means that all the inputs to the transaction, including the Merkle proofs and the state transitions, must be available on-chain so that any node can validate the transaction.

PLONK can reduce the size of the proofs by several orders of magnitude, making them faster to generate and verify, thus maintaining high throughput and low gas fees. Meanwhile, PLONK provides better data availability guarantees compared to other proof systems. The use of a structured reference string in PLONK ensures that the data used in the proof generation is available and can be reconstructed if necessary. This is important for the security of the system, as it ensures that the validity of the proofs can be verified even if some of the data is lost or corrupted.

Fraud Proof

Given the advantages of PLONK for network performance, however, if any data is missing, it is possible for an attacker to submit an invalid transaction that cannot be verified, or for a user to lose their funds due to an incorrect state transition. To mitigate this risk, Hyper Chain also allows anyone to submit a proof of fraud to the network. This proof can be used to show that a transaction was invalid or that the state transition was incorrect, and it can trigger a rollback of the transaction and a redistribution of funds if necessary.

Fraud proofs provide an additional layer of security by enabling users to prove the occurrence of fraudulent behavior on the network. In the event of fraud or misbehavior by validators, users can submit a fraud proof to the smart contract to trigger a penalty for the offending validator. This helps to deter malicious actors and maintain the integrity of the network.

Overall, the combination of PLONK proofs and fraud proofs in Hyper Chain helps to ensure the security and validity of transactions on the network, even in the presence of adversarial actors or data availability issues.

Last updated