Gate Square “Creator Certification Incentive Program” — Recruiting Outstanding Creators!
Join now, share quality content, and compete for over $10,000 in monthly rewards.
How to Apply:
1️⃣ Open the App → Tap [Square] at the bottom → Click your [avatar] in the top right.
2️⃣ Tap [Get Certified], submit your application, and wait for approval.
Apply Now: https://www.gate.com/questionnaire/7159
Token rewards, exclusive Gate merch, and traffic exposure await you!
Details: https://www.gate.com/announcements/article/47889
RGB++ homomorphic binding and its security
Source: Nervos CKB
For asset issuanceprotocol, security is always the primary consideration. In today’s article, we will continue to introduce RGB++, detail what is homomorphic binding, and why the RGB++ protocol is considered extremely secure.
What is Isomorphic Binding?
The premise of using isomorphic binding technology is isomorphism. The Cell model of the CKB Block chain is an advanced version of the BTC UTXO model, and they have the same roots. This similarity allows us to use isomorphic binding technology to bind or map the UTXO of a Block on-chain to the UTXO of another Block chain. Taking the RGB++ protocol as an example, since the RGB assets are essentially parasitic on the BTC UTXO, the RGB++ protocol can use isomorphic binding technology to map BTC UTXO to the Cell of the CKB Block chain, so that we can use the CKB Block chain to replace the client verification of the RGB protocol.
To better understand the technology of homomorphic binding, we use land and title deeds as analogous objects:
The above 4 steps correspond exactly to the 4 operation processes of homomorphic binding technology: mapping UTXO to Cell, verifying transactions, cross-chain interaction verification, and state changes on CKB.
Security Analysis
The analogy of land and title deeds in the previous section allows us to clearly see that the security and prevention of double spending of the paper title deeds stored in BTC UTXO mainly depend on the security of the BTC blockchain. And BTC, as the longest-running and most secure PoW chain, has withstood the test of time in terms of security.
The electronic version of the land certificate generated through homomorphic binding technology relies mainly on the security and prevention of double spending of the CKB Blockchain. CKB has adopted the PoW Consensus Mechanism that is identical to BTC and has been tested over time from the beginning, ensuring maximum security and Decentralization. Currently, CKB’s Mining equipment is produced by the world’s largest ASIC Mining Rig manufacturer Bit Mainland, and the current overall Computing Power of CKB has exceeded 440 PH/s, reaching a historic high. It is extremely difficult to forge or reconstruct a PoW chain, as this would require recalculating the Computing Power for each Block, which is almost impossible to accomplish, like trying to rebuild a pyramid overnight. Therefore, we can fully trust the security of the CKB Blockchain.
Of course, if you still have doubts, you can also choose to verify it yourself, just like the second step in the example above, to confirm whether the deed really states 40 mu and whether the land tracing proof provided by Zhang San is genuine and valid. This is also the practice of the RGB protocol, where users need to complete client verification themselves; RGB++ protocol simply provides an alternative choice, in addition to choosing to complete client verification themselves, they can also choose to trust the verification of the CKB blockchain. The CKB blockchain is only used here as the DA layer and state disclosure, and the security of paper deed transactions has no direct relationship with CKB.
The charm of the RGB++ protocol lies not only in enabling the CKB Block chain to act as the DA layer, but also in supporting Leap operations, allowing BTC Block on-chain RGB++ assets to freely shuttle on the CKB Block on-chain (of course, Reverse operations are also possible, and can also be extended to other Turing Complete UTXO blockchains in the future). Because the CKB Block chain is Turing Complete, developers can build various complex Decentralized Finance applications on it, such as lending platforms, Decentralization exchange, etc. This means that RGB++ assets transferred to the CKB Block on-chain through Leap operations can participate in a variety of financial activities, such as collateralized lending, stake earning, trading, etc.
When you hold RGB++ assets transferred through Leap operation to CKB on-chain and participate in various financial activities, the security of these operations mainly depends on the security of the CKB Block chain. As we discussed earlier, the CKB Block chain itself has very high security. However, if you still have doubts about the security of the CKB Block chain, you can choose to transfer the RGB++ assets on CKB on-chain back to the BTC Block chain through Leap operation at any time, making it reappear as RGB++ assets on BTC Block on-chain.
When it comes to the Leap function, we have to mention the risk it may face - Block reorganization. However, this risk can be effectively avoided by waiting for more Block confirmations. In the BTC network, transactions are generally considered irreversible after 6 Block confirmations. It is worth noting that the number of confirmations for PoW is not linearly related to security, and the difficulty of overturning PoW Blocks rises exponentially with the increase of Blocks. Therefore, in the CKB Block on-chain, to achieve the same level of security as 6 Block confirmations in BTC, it is estimated that only about 24 CKB Block confirmations are needed. Considering that the average block time of CKB is about 10 seconds, the time for 24 Block confirmations is actually much less than the time required for 6 Block confirmations in BTC.
Image: Illustration of PoW security; Source:
So, if you want to get higher security assurance, just wait for a few more Block confirmations.
Conclusion
The homomorphic binding technology used by RGB++ cleverly binds the UTXO of BTC with the Cell of CKB, which not only simplifies the user’s verification operation, but also maintains a high level of security. At the same time, the Leap operation provides users with a wider range of application scenarios, opening up new avenues for Cross-Chain Interaction interoperability.
With more and more applications choosing to build on top of RGB++, we have reason to believe that it will play an increasingly important role in the future BTC ecosystem.