Home

Awesome

cosmos-ethereum-ibc-lcp

banner

This is a cross-chain messaging demo between Cosmos and Ethereum using IBC and LCP (Light Client Proxy).

High verification (or gas) costs on Ethereum make it challenging to implement IBC. For example, light client verification for Tendermint Consensus requires over 10 million gas costs on Ethereum1.

Datachain has developed LCP (Light Client Proxy), a middleware embedded with TEE, to overcome this challenge. LCP can solve the gas cost problem while minimizing the trust assumption, by replacing light client verification in cryptographically secure areas on memory.

To enable IBC on Ethereum using LCP, we primarily need the following modules:

We have implemented the modules mentioned above and have built a demo, as described below.

architecture

The packet relaying flow from one of the Cosmos appchains to Ethereum proceeds as follows:

  1. The Cosmos appchain submits a packet, and the relayer queries it.
  2. The relayer sends it to the LCP node.
  3. The LCP node verifies the packet and creates a proof using the key generated in the enclave.
  4. The relayer submits the packet, along with the proof, to the LCP client on Ethereum.
  5. The LCP client on Ethereum then verifies the proof, incurring a reduced gas cost.

This demo sets up a network in your local environment. Please read the instructions below to learn how to build and run the demo.

This repository contains multiple modules:

Supported Versions

Build enclave and run E2E test

Prerequisites

You need to install the Intel SGX SDK for your environment:

$ curl -LO https://download.01.org/intel-sgx/sgx-linux/2.19/distro/ubuntu22.04-server/sgx_linux_x64_sdk_2.19.100.3.bin
$ chmod +x ./sgx_linux_x64_sdk_2.19.100.3.bin
$ echo -e 'no\n/opt' | ./sgx_linux_x64_sdk_2.19.100.3.bin
$ source /opt/sgxsdk/environment

SGX HW mode(default)

$ make yrly prepare-contracts build-images
$ make e2e-test

SGX SW mode(for non-SGX supported environment)

This mode is for non-SGX supported environment. This doesn't require SGX hardware and driver, but the enclave is not secure.

$ export SGX_MODE=SW
$ make yrly prepare-contracts build-images
$ make e2e-test

How to build

Build an enclave contains tendermint and ethereum ELC

# NOTE: the following command requires sgx-sdk to be installed in the environment
$ make

If succeeded, a signed enclave binary is created at ./bin/enclave.signed.so.

Relayer(between tendermint to ethereum)

$ make yrly

Build a docker image of tendermint chain

$ make -C ./tests/e2e/chains/tendermint image

Run E2E test (Manually)

Launch local networks

The following command launches both tendermint and ethereum chains. It also deploys the solidity contract on the ethereum's execution chain.

$ make -C ./tests/e2e/cases/tm2eth network

Remote Attestation

First, generate an Enclave Key

$ /path/to/lcp enclave generate-key --enclave=/path/to/enclave.signed.so
0x8b76f939e238a54c7a1ba46ed4c027dc21993cc3
# set ENCLAVE_KEY environment variable for the following steps
$ export ENCLAVE_KEY=0x8b76f939e238a54c7a1ba46ed4c027dc21993cc3

Next, execute the remote attestation with the IAS and get an AVR that contains the public key of the Enclave Key from the IAS

$ /path/to/lcp enclave ias-remote-attestation --enclave_key=${ENCLAVE_KEY} --enclave=/path/to/enclave.signed.so

Modify Relayer config

You probably need to edit the mrenclave, ibc_address values in the some files under ./tests/e2e/cases/tm2eth/configs with your own.

Launch LCP service

$ /path/to/lcp service start --enclave=/path/to/enclave.signed.so --address=127.0.0.1:50051 --threads=2

Run test

$ make -C ./tests/e2e/cases/tm2eth test

Shutdown local networks

$ make -C ./tests/e2e/cases/tm2eth network-down

Footnotes

  1. Chorus One’s report