Schema

On an application level, C2CC provides cross-chain communication channels through which messages are transferred. Security of C2CC is mainly achieved by proof-of-challenge architecture. Two components of C2CC, notifier and challenger, compose information dichotomy where with the former message is transferred and the latter challenges its validity.

Bridges or protocols connecting two different chains have been pointed as a vulnerable single point of failure so far. C2CC guarantees its security reduced to hardness of exploiting challenger.

Gateways of each channel are on any chain. Thanks to its architecture, extending C2CC to a new chain is relatively easier than building a whole bridge dApp. Any type of messages are transferred to and processed in each channel. C2CC truly enables omnichain interoperability.

C2CC schematic diagram

Last updated