Transaction flow
Learn how Asterizm Protocol operates
Last updated
Learn how Asterizm Protocol operates
Last updated
packet - data packet containing cross-chain transaction content and related parameters;
payload - message/data transmitted as part of a cross-chain transaction;
dst - destination network ID;
xID - a unique cross-chain transaction ID generated when the cross-chain transaction is initialized
in the _initAsterizmTransferEvent()
method;
p - additional parameters of the transaction: address of the source contract, destination contract, timestamp, and other data.
The transaction can contain arbitrary information and one or more actions (instructions) to be performed on the destination networks.
Complete information can be found in Section 2 of the
The client implements a smart contract using an and deploys it to the required networks.
The _initAsterizmTransferEvent()
method is used to initiate a cross-chain transaction on the contract. The data and parameters of the cross-chain transaction are transmitted to it.
The sends the received data and hash based on the payload generated at that moment xID, source chain id, destination chain id, client smart contract address in the source and destination chains.
The receives the cross-chain transaction payload and initiates the cross-chain transaction by calling initAsterizmTransfer()
on the client's smart contract in the source network.
Before sending transaction proofs (hash and xID) to the , the performs a validity and integrity check of the transaction by comparing the hash, calculated based on the payload. This effectively mitigates the risk of spam and counterfeit transactions in case of compromise of the .
This step verifies that this exact transaction was initiated on the , which eliminates the possibility of spam from the .
The checks the transaction nonce to preserve the cross-chain transaction execution sequence and transmits the transaction proofs (hash and xID) with the unique parameters to the .
When a data packet is received on the , the client is identified based on the destination chain id, the Client smart contract address in the destination chain, and the client smart contract address in the source chain.
pull the proofs with the parameters from the and send them to the in the destination network for further processing.
The on the destination network accepts the encrypted data with the parameters from the and passes it to the for validation.
After receiving the proofs and the parameters, the checks the nonce to comply with the transaction sequence, stores the transaction xID to validate the transaction at step 10, and transmits the proofs to the .
The in the destination network receives the proofs with the parameters and emits an event to notify the delivery of proofs, which is awaited by the .
At this stage, the first but not the main step of transaction validity check occurs - the hash from the payload and the transaction's xID are compared, mitigating the risk of compromise.
After the first step of cross-chain transaction validation, the initiates the transaction on the by calling the asterizmClReceive()
method in the destination network, sending the payload (data) and xID to the contract, and validating the transaction on the by calculating the hash from received payload and checking the xID.
At this step, the integrity of the data and the trusted addresses is checked before the transaction is executed. This check eliminates the risk of hacking the .
The verification is performed by calculating and matching the hash from the payload with the hash received from and the xID that was previously stored on the . If the verification succeeds, it means that the executes exactly the transaction it sent, and does so for the first time. This algorithm eliminates the possibility of spamming transactions and spoofing data on the (if, for example, the server is compromised).
After receiving the confirmation of the validity and integrity of the cross-chain transaction, the executes the payload or data sent in the cross-chain transaction, calling methods of other contracts or performing calculations on the client’s contract. The logic of this step depends solely on the client’s business logic implemented in the cross-chain transaction.