Published July 12, 2024
Bitlayer, a Bitcoin Layer 2 (L2) solution, extends the capabilities of Bitcoin by integrating a Turing-complete computational layer based on the BitVM paradigm. It addresses core challenges such as scalability, smart contract limitations, and transaction costs, thus enabling a more expansive ecosystem for Bitcoin applications.
Bitlayer’s approach combines the value of $BTC with the complex applications that can be built on top of a programmable layer supported by smart contracts.
With Bitlayer, developers can write and deploy complex smart contracts using their preferred language and toolchain. Applications of all kinds can be developed and supported similarly to other Layer 1 (L1) and L2 blockchains, adding more utility to $BTC by expanding the opportunity set and use cases.
Bitlayer aims to significantly improve the verification process for L2 transactions by using optimistic execution while retaining the core integrity of Bitcoin. The architecture integrates elements such as transaction processing, verification, and asset bridging, all designed to optimize transaction handling and computational efficiency. Each component is critical in maintaining the transaction’s security and integrity from the L2 handling up to the L1 confirmation, ensuring a seamless and secure transaction lifecycle.
Transaction processing in Bitlayer involves a combination of a sequencer and a Layered Virtual Machine (LVM), both of which are integral to handling and executing transactions efficiently.
The unique component in this process is the LVM which offers a versatile and secure environment for executing smart contracts across different blockchain ecosystems. By bridging various frontend and backend technologies, LVM not only increases the platform’s appeal to developers but also boosts its capacity to handle the evolving demands of blockchain technology.
The LVM technology is designed to improve both the flexibility and security of executing contracts by supporting a variety of frontend smart contract types and backend zero-knowledge proof verifiers.
LVM technology facilitates the integration of multiple frontend smart contract platforms such as EVM (Ethereum Virtual Machine) and CairoVM. This inclusion broadens the appeal to developers across different blockchain ecosystems, enabling them to utilize familiar tools and programming models for Bitcoin.
Future developments of this kind of technology will allow for additional integrations with other VMs, enabling all kinds of applications to be deployed on Bitcoin without any limitations. This is important for Bitlayer because it allows the protocol to be flexible for future adaptations and evolving blockchain standards.
On the backend, LVM incorporates various zero-knowledge proof generators such as ZK-STARKs and ZK-SNARKs (including well-known schemes like Groth16 and PLONK). These technologies are key for ensuring the integrity and privacy of computations without revealing underlying data.
The dual approach of supporting diverse frontend contract types and robust backend-proof systems allows LVM to offer computational flexibility and enhanced security measures. This structure ensures that Bitlayer can handle a broad spectrum of applications and use cases, ranging from simple transactions to complex decentralized applications, all while maintaining high security and compliance standards.
Transaction verification within Bitlayer is facilitated through a zero-knowledge-based optimistic mechanism that involves both provers and challengers, ensuring that all transactions adhere to network rules and are valid.
The relationship between the Prover and the Challenger has a significant influence on the protocol. Their tasks are interconnected and their interaction immediately affects the verification of transactions.
Bitlayer is connected to multiple blockchains including Bitcoin, and EVM chains through multiple bridges. The Bitcoin bridge is built with Coinbase and Sinohope has the key MPC custody platforms. The EVM bridge is built with the Polyhedra team. Bitlayer also supports bridges that connect with centralized exchange (CEX) allowing users to withdraw assets from CEXes directly to Bitlayer wallet addresses.
The use of a dual-channel two-way peg asset bridge includes the OP-DLC (DLC with optimistic mechanism) and BitVM bridge, each tailored to meet different security and operational needs of the users.
Dual-Channel Architecture:
The dual-channel approach not only diversifies the security options available to users but also boosts the scalability of the system, ensuring it can perform efficiently even under high demand.
The security model for the asset bridge assumes the solid security of the Bitcoin blockchain as a base layer. However, it acknowledges potential risks within the BitVM Federation nodes, which manage the bridge. The model allows for the scenario where an adversary could compromise up to n−1 of these nodes, with the system’s integrity still being maintainable as long as one node remains secure and operational.
The Bitlayer bridge is composed of several key components that satisfy both L1 and L2 users and their needs.
These components are necessary for the correct operation of the bridge. Every single one ensures the smooth execution of transactions and the security of the bridge.
The bridge protocol outlines the lifecycle of transactions as they happen in the bridge including Peg-In and Peg-Out functions.
Peg-In Process: Users can lock $BTC using either the OP-DLC or BitVM bridge channels as seen in the graph below. Each channel supports different user needs in terms of speed and security. The transaction is verified through the latest Bitcoin block information and an SPV proof to confirm the legitimacy of the locking transaction. The process takes approximately 7 blocks to confirm for any user to mint on L2.
Peg-Out Process: Users submit withdrawal requests through their chosen channel. The process involves either direct withdrawals via BitVM or using a combined mechanism in the OP-DLC channel, which handles larger withdrawals and potential changes via BitVM.
If a user deposited through the OP-DLC channel, then both options for withdrawing are available. If the initial deposit was through the BitVM channel (Option 2 on the graph) or without a Peg-In transaction, then the user is restricted only to withdraw via the BitVM bridge channel.
Specifics of the OP-DLC Peg-Out Channel:
Upon receiving an OP-DLC withdrawal request from a user, the BitVM Federation nodes access the CET’s manager to select an appropriate Conditional Execution Transaction (CET) output that matches the withdrawal request. A quorum of 𝑡 BitVM Federation nodes then collaboratively signs to generate the valid DLC signature for that selected CET.
Once the necessary signatures are broadcasted, the user immediately receives the corresponding $BTC from the selected CET output. The $BTC directed towards the BitVM Federation address is initially placed into a timelock script, safeguarding the funds for the user to challenge in the case of incorrect data. Only after the challenge period is over the $BTC will be transferred to the address.
Challenges:
In the context of the Bitlayer asset bridge, security is paramount, ensuring both the safety of transactions and the liveness of the network. This section outlines how the Bitlayer bridge upholds these critical properties, even within the complex threat model previously discussed.
For the Peg-In process, the security of the OP-DLC and BitVM bridge channels is primarily ensured through the integrity of the Light client, which utilizes zero-knowledge proofs to verify transactions. This system ensures that the minting of equivalent $BTC on the Bitlayer network only occurs following the verification of a valid locking transaction on the Bitcoin network.
For the Peg-Out process, there is a different approach regarding the security of the two bridge channels.
For the OP-DLC Channel: This channel combines the roles of oracle and liquidity management under the BitVM Federation. The safety of the OP-DLC channel during the Peg-Out process is safeguarded by introducing two distinct challenge games:
These challenge games are integral to maintaining operational integrity and are supported by the novel Challenge Protocol, ensuring an efficient and secure transaction verification process.
For the BitVM Channel: The security for the BitVM channel relies on there being at least one honest node within the BitVM Federation. The scenarios considered include:
Both models heavily rely on integrity to secure the operation of the bridge protocol.
Liveness within the Bitlayer bridge is important to ensure that the system remains operational even under potential node failures or other issues:
In the design of the Bitlayer protocol, advanced mechanisms have been integrated that connect BitVM zero-knowledge proofs with an optimistic mechanism to execute transactions off-chain and validate Bitcoin on the main network without interfering with it at any stage. The essence of this design is the creation of a Turing-complete, L2 smart contract platform that can validate complex computations on the Bitcoin blockchain which is not possible currently, vastly extending its capabilities beyond simple payment functionalities.
Bitlayer uses a similar optimistic execution mechanism to that used in optimistic rollups such as Arbitrum and Optimism. This mechanism inherently assumes all transactions within a batch are valid unless proven otherwise by a network participant. This presumption allows for swift on-chain processing while maintaining the ability to revert transactions when their invalidity is proved by any participant, which adopts a 1-of-n security model.
By also integrating Zero-Knowledge proofs (ZK-Proofs), Bitlayer further optimizes the challenge process, making it more cost-effective. ZK-Proofs provide a path for Bitlayer to verify the correctness of transactions without revealing any underlying data about those transactions, which improves privacy and security. These proofs allow the network to validate complex operations and state transitions without having to publish the details on-chain, thus preserving bandwidth and maintaining confidentiality.
This hybrid approach significantly enhances throughput, reduces costs, and preserves the security and decentralization of the blockchain.
The optimistic execution mechanism is structured around several core operations in this order:
The challenge process within the optimistic execution mechanism of Bitlayer depends on the transaction initiator revealing transactions and their current states. For this reason, Bitlayer requires a data availability solution that is not only secure and reliable but also decentralized. As of now, Bitlayer uses Bitcoin’s blockchain, which is recognized for its security, and decentralized consensus, to ensure data availability. To accommodate the specific requirements of Bitcoin’s blockchain, the data submitted is compressed and divided into multiple transactions, structured similarly to Bitcoin inscriptions. These transactions are then processed by validators who identify the inscriptions and reconstruct the original data.
Bitlayer is exploring potential integrations to reduce operational costs by adding different data availability solutions such as Celestia and Data Availability (DA) Committees. These solutions aim to maintain the existing standards of security, reliability, and decentralization in a more cost-efficient manner.
The Bitlayer protocol features a proof generation system composed of five circuits:
The five circuits and their operation can be seen on the graph below.
Every transaction or state transition from the Execution Circuits goes through the Aggregation Layer that batches them into one single proof to be pushed to the Bitlayer Rollup Circuit that links all the proofs from all the circuits.
Going deeper into Bitlayer’s architecture there is the Challenge Protocol responsible for the integrity and accuracy of transactions across the BitVM framework.
In its initial form at earlier stages of the BitVM (BitVM1), the Challenge Protocol employed a binary method for challengers to identify errors in the instructions provided by the Prover. If an error was detected, the Prover would be unable to execute the instruction correctly, nor could they retrieve their staked Bitcoin. Instead, the Challenger had the opportunity to unlock the staked amount after the timelock period ended, ensuring that errors were accountable and stakes were properly managed.
The subsequent iteration, BitVM2, revolutionized the challenge process by enabling the Prover to commit the entire program in segments directly to the leaf nodes. This change significantly enhanced the efficiency and breadth of the verification process. The challenge game of Bitlayer still uses the BitVM2 challenge system but the correctness of a STARK verifier’s execution is challenged by the introduction of a Bitcoin-Friendly FRI, which bypasses the need to simulate MerklePath verification in Tapscript, leveraging the Taptree’s inherent characteristics instead. This adaptation reduced complexity and increased the directness and speed of verifications.
Commitments play a foundational role in the data processing of Bitlayer’s Challenge Protocol. These commitments are important in structuring the computing process and are seamlessly integrated into Bitcoin scripts, enhancing the blockchain’s computational capabilities.
There are three types of commitments:
The Challenge Game represents a mechanism for verifying the integrity and validity of transactions in an environment that still handles a substantial number of intermediate states through its STARK Verifier.
Bitlayer continues to employ an optimistic execution approach while aspiring to integrate validity proofs into the Bitcoin blockchain. This approach is segmented into distinct phases, each designed to validate the transactions and protect the assets involved.
Here’s what happens when a challenge occurs during the last phase.
The Challenge Game is a fundamental piece of Bitlayer’s security architecture, designed to maintain transparency, enforce accountability, and ensure the integrity of every transaction within its L2 solution.
Integrating ZK-Proof Verifiers into the Bitcoin network could evolve its capabilities by allowing for improved transaction introspection and the creation of a ZK aggregation layer. This layer would aggregate verification proofs from various applications within the Bitcoin ecosystem, streamlining the verification process and helping with network congestion.
ZK-Proof systems fall into two main categories, each with unique features and applications.
Elliptic Curve Pairing-based ZK-Proof Systems
These systems, such as the BN254-based Groth16 proof system, utilize elliptic curve technology. They rely on a prime field, typically around 256 bits, making the verification process economical due to optimizations like Ethereum’s implementation of the BN254 precompiled contract. However, integrating such systems into Bitcoin poses challenges, primarily because Bitcoin’s script does not support the OP_MUL opcode, necessary for pairing operations. Strategies to potentially overcome these challenges include:
Hash Function-based ZK-Proof Systems
Systems like STARK and its variations offer robust security, including resistance to quantum computing attacks, making them a preferable long-term solution. STARK systems utilize smaller finite fields that are more compatible with Bitcoin’s existing operations, such as using OP_ADD and OP_SUB for basic arithmetic functions. These systems circumvent the need for the OP_MUL opcode by applying alternative methods like the double-and-add algorithm.
Currently, Bitcoin does not support these features because of its scripting language limitations. Bitlayer lays a series of adaptations to implement a hash function-based ZK verifier on Bitcoin.
Integrating ZK-Proof Verifiers into the Bitcoin network is an effort to boost its capabilities that will allow improved transaction introspection and the creation of a ZK aggregation layer. This layer would aggregate verification proofs from various applications within the Bitcoin ecosystem, streamlining the verification process and reducing network congestion
Briefly mentioned in previous sections, Bitcoin Friendly FRI is designed to address the high costs and complexity involved in traditional verification processes on Bitcoin, especially when a Prover is dealing with a large number of intermediate states as required in STARK verifications with many Merkle paths. This new protocol facilitates the execution of more efficient and cost-effective validations directly on the Bitcoin blockchain.
With the Taproot upgrade, Bitcoin introduced the Taptree structure, which provides an innovative way to manage scripts and signatures on the blockchain. Leveraging this new feature, the Bitcoin Friendly FRI replaces the traditional MerkleTree used in proof verifications with Taptree. This allows for all the evaluations to be committed directly to the polynomial in the Leaf Script of Taptree, significantly reducing the complexity and size of the data required for verifications with Merkle paths.
In the context of the Challenge Game here’s an overview:
The Bitcoin Friendly FRI makes the work easier for both the Prover and Verifier where both parties have to manage fewer tasks. In other words, without it, the process would have been slow and inefficient causing numerous issues in the system.
The Multi-Proof Challenge Game represents an advancement in Bitlayer’s security protocols, addressing the complexities and inherent challenges of implementing ZK-Proof verifiers based on Bitcoin scripts. Given the difficulty in achieving completely bug-free systems, this approach leverages the diversity of client architectures in blockchain technology to improve verification robustness and security.
Bitlayer integrates multiple ZK-Proof systems, including both ZK-SNARKs (Groth16) and Bitcoin-friendly ZK-STARKs, to construct a diversified and resilient verification framework. This multi-proof approach is inspired by the blockchain principle of using diverse clients to ensure network integrity and fault tolerance.
The operational principle of Bitlayer’s Multi-Proof Challenge Game is designed to mitigate the risks associated with relying on a single-proof verifier. Here’s how it functions:
Similar to the use of diverse client software in traditional blockchains, having multiple proofs and verification systems increases the fault tolerance of the network. This approach helps to ensure that even if one part of the system fails, others can still function correctly, preserving network integrity and continuity.
The Bitlayer network is heavily based on BitVM in combination with other technical components. The BitVM allows Bitlayer to develop a turing-complete computation layer on the Bitcoin stack, which can handle any program or calculation without interfering with the Bitcoin protocol and its consensus rules.
If a system or programming language can solve any computational problem, it is considered Turing complete. Solidity is a Turing complete system that can run almost any program, including zero-knowledge proof verifiers, DeFi protocols, and many others. This makes it possible to directly implement these applications on Ethereum. Bitcoin lacks this capability since Script is not Turing complete.
Think of Script as a typical calculator handling some basic functions whereas Solidity is your smartphone, capable of handling any program or application.
BitVM changes that and facilitates the expression of complex Bitcoin contracts through a system where a prover claims a specific function’s output for given inputs, and a verifier can contest these claims with clear fraud proofs. This mechanism minimizes the on-chain footprint by handling extensive computations and communications off-chain, engaging the blockchain only during disputes.
Bitcoin’s inherent smart contract capabilities are generally limited to basic functionalities like signatures, timelocks, and hashlocks. BitVM expands these capabilities, enabling more expressive contracts and complex off-chain computations. Potential applications of BitVM vary, ranging from strategic games and prediction markets to bridging $BTC across different blockchains and simulating novel opcodes. This is a promising scenario for the Bitcoin network and its scaling capacities.
BitVM’s architecture borrows elements from optimistic rollups and the Merkelize All The Things (MATT) proposal, focusing on fraud proofs and a challenge-response protocol without necessitating changes to Bitcoin’s consensus rules. It relies on simple underlying primitives like hashlocks, timelocks, and Taproot trees. The prover and verifier engage in a pre-signed sequence of transactions that facilitate a challenge-response game to resolve disputes, illustrating the potential for universal computations on Bitcoin using this model. As long as both parties are cooperative, they can jointly settle any contract.
The Challenge Protocol is analyzed in detail in the corresponding section above.
Some words and notions are familiar since they were discussed previously under the Bitlayer architecture which adopts the BitVM technology.
This component allows the prover to set a bit’s value to ‘0’ or ‘1’ across different Scripts and UTXOs, improving Bitcoin’s VM runtime by distributing execution across multiple transactions. The commitment mechanism, based on Lamport signatures, involves two hashes (hash0, hash1) where revealing the correct preimage sets the bit’s value. If the prover provides a preimage of hash1, `1` is pushed onto the stack. If the prover provides a preimage of hash0, `0`’ is pushed onto the stack. If at any time the prover reveals both preimages then the verifier can claim a fraud-proof and take the deposit of the prover. This process is called ‘equivocation’.
This setup not only secures the commitment but also incorporates timelocks to enforce timely decisions to the prover.
Below is an implementation for a 1-bit commitment where the prover reveals hash1 by setting the bit’s value to ‘1’, thus unlocking the script.
We refer to these opcode sets as “OP_BIT_COMMITMENT”. The opcode will place a bit value on the stack based on which hash is matched by the preimage.
Every computable function can be broken down into a series of Boolean circuits, with the NAND gate serving as a universal component. Common elements found in logic circuits consist of AND gates, OR gates, NOT gates, and NAND gates. NAND gates are referred to as “universal gates” because they can construct all other types of gates.
BitVM’s method involves simple commitments for NAND gates, where each gate’s input and output are secured through bit commitments. Specifically, a NAND gate contains two bit commitments which represent two inputs and a third bit commitment for the output. The Script will compute the NAND value of the two inputs that must match the output bit.
The commitment to a binary circuit extends the logic gate commitment by allowing the prover to execute any gate within the circuit as committed in a Tapleaf. These commitments are aggregated into a single Taproot address, which, despite potentially containing a vast number of Tapleaf Scripts up to a billion, maintains a minimal on-chain footprint.
The prover’s Taproot address contains a leaf script for each gate. The leaf scripts have a corresponding gate commitment as seen above.
Challenge and Response are initiated when the Verifier disagrees that the Prover’s statement is correct. If the statement’s inconsistencies are identified, the Verifier is entitled to seize the funds of the Prover.
This is facilitated by pre-signed transactions that link challenges to responses. If one party disengages, the other can claim victory after a timeout, ensuring that disputes are resolved fairly and deposits are secured against fraudulent claims.
To understand this concept better here’s an example with simpler terms:
Imagine you and your friend are playing a game where you both have a box of blocks. Each block can be a different shape like a circle, square, or triangle. You claim that all the blocks in your box are circles. Your friend, who doesn’t believe you, can ask you to show a few blocks from the box to check if you’re telling the truth.
If your friend asks to see a block and it’s a circle, you keep playing. But, if one day your friend picks a block and it turns out to be a square, then you weren’t telling the truth about only having circles, and your friend wins the game and gets to keep some of your blocks. The same happens when you decide not to reveal the block’s shape.
In this game, your friend is the Verifier, who checks if you, the Prover, are telling the truth. The blocks are like the gates in a circuit, and each time your friend picks a block to see, it’s like opening a gate to check if the input (what goes into the gate) and the output (what comes out of the gate) match what you claimed.
Below is also a visual illustration where the Verifier asks the Prover to open specific gates as part of the challenge.
Inputs are set by revealing the corresponding bit commitments, ideally off-chain to minimize blockchain load. In opposing conditions, the verifier can make on-chain revelations. BitVM also supports multi-party inputs, allowing gates to integrate commitments from multiple parties.
Along with BitVM and various XVMs, Bitlayer incorporates the DLC model. It contributes to the security of the protocol and the efficiency of cross-chain interactions.
In summary, DLC is a contract execution framework that allows two parties to engage in contracts based on external conditions verified by an Oracle. A DLC enables the execution of conditional Bitcoin transactions directly on the blockchain. These contracts allow the parties to set and agree on the outcomes of predefined conditions, and when these conditions are met, as certified by the Oracle, the corresponding transactions are automatically executed.
DLCs start with two parties agreeing on the terms of a contract, including the possible outcomes and their respective payouts. These outcomes are contingent on a specific event whose result will be provided by an oracle.
The oracle is a third party that provides a digital signature on the outcome of the event being bet upon. This signature is crucial as it is used to unlock the transaction in favor of the winning party. Importantly, the oracle does not need to be aware of the existence of the contract itself; it only signs the outcome of an event.
Each potential outcome of the event is tied to a unique set of cryptographic conditions in the contract. Depending on the outcome, the corresponding transaction is executed. These transactions are pre-signed before the outcome is known and are only broadcasted to the Bitcoin network once the oracle has provided the necessary signature.
Since the contract details are not stored on the blockchain and the transactions are only broadcasted when the outcome is confirmed, DLCs offer enhanced privacy compared to traditional on-chain contracts. The oracle’s signature is the only part that links the outcome of the event to the blockchain transaction.
Below is a visual representation of a DLC. Alice and Bob agree to form a contract and agree on predefined terms. They lock 2 $BTC each in a 2-of-2 multi-signature output (1 key for each) and pre-sign. Their pre-signatures will be used to execute the payments after the Oracle broadcasts the results.
A contract of this type can look like this: Alice bets on Team A to win, while Bob thinks Team B will win. The payoffs look like this: If Team A wins, Alice gets 3 $BTC and Bob 1 $BTC. If Team B wins, Bob gets 3 $BTC and Alice 1 $BTC.
The primary purpose of integrating DLC into Bitlayer’s architecture is to improve the security and control that users have over their assets while enabling complex financial contracts directly on the Bitcoin network. The DLC helps in overcoming the inherent limitations of Bitcoin’s design that does not support complex, state-dependent computations. This integration along with its other features allows Bitlayer to leverage the strong security measures of Bitcoin while enabling more complex transaction types and smart contract functionalities such as the Asset Bridge discussed earlier.
There are several benefits for why Bitlayer chose to incorporate DLC:
Adding DLC enhances Bitlayer’s operation by enabling a solid asset bridge model that operates with increased independence from external validators. This model is important for Bitlayer’s rollup-equivalent framework, which aims to combine the security and simplicity of Bitcoin with the versatility and functionality of a Turing-complete programming layer. DLC, combined with BitVM, allows Bitlayer to support a wide range of applications, from simple transfers to complex DeFi solutions, thereby expanding the utility and applicability of Bitcoin.
Because of its intrinsic technical constraints and lack of support for Turing-complete smart contracts, the growth of the Bitcoin ecosystem has trailed behind that of other L1 blockchain ecosystems like Ethereum. Stacks, Lighting Network, and other initiatives have helped to shape the Bitcoin ecosystem and are becoming increasingly important as the sector strives to get past the limitations imposed by Bitcoin’s original design. Transaction capacity and on-chain congestion are the main causes of the issue.
Bitlayer aims to improve the scalability and functionality of Bitcoin by enabling the execution of complex, stateful smart contracts directly on the Bitcoin network without altering its underlying consensus rules.
The core value proposition of Bitlayer centers around extending Bitcoin’s utility beyond simple currency transactions, enabling it to support a broader range of dApps, including those in DeFi that require complex smart contracts. As a L2 solution, Bitlayer provides a Turing-complete toolbox and advanced smart contract capabilities similar to EVM blockchains that solve the limitations of Bitcoin as a platform for complex applications. This structure aligns with the one found on Ethereum L2s.
Bitlayer standout feature that’s substantially important is the security component that follows the standards of the Bitcoin network while improving scalability and user experience. By being the first protocol to leverage the capabilities of BitVM, Bitlayer offers developers the ability to write and deploy smart contracts using familiar tools used for the development of dApps on EVM chains. This lowers barriers for developers from other blockchain ecosystems looking to take advantage of the growing Bitcoin L2 landscape.
The development of Bitlayer is structured into a phased rollout of its mainnet, each designed to progressively improve the platform’s capabilities, improve user experience, and integrate solid security measures aligned with Bitcoin’s consensus mechanisms and onchain activities.
First Stage: Bitlayer PoS
In the first stage, Bitlayer adopts a superior security model combining PoS and Multisig. This phase integrates with multiple MPC custody platforms within a 100% EVM-Compatible environment, easing the way for users and developers to transition seamlessly.
Bitlayer PoS facilitates cross-chain movements among BTC, EVM, and other blockchains, significantly enhancing the ecosystem’s value.
The focus during this initial phase is on delivering a fully EVM-compatible development kit and ecosystem support. This setup allows developers to rapidly develop, test, and deploy applications, offering the early adopters benefits like lower gas fees and a versatile Bitcoin framework.
Second Stage: Bitcoin Friendly Finality-V1
Moving forward, the second stage introduces a rollup-equivalent model that includes a BitVM component for committing to and challenging state transitions, thus enabling L1 verification capabilities.
Bitlayer continues to uphold the highest security standards by leveraging Bitcoin’s extensive network and security features, which provide users with greater flexibility and an enriched on-chain experience via continual network upgrades.
Third Stage: Bitcoin Finality-V2
The culmination of Bitlayer’s roadmap is marked by the third stage, aiming to implement a trustless bridge based on L1 verification capabilities. The successful completion of this stage will see the full deployment of Bitlayer’s final mainnet, achieving its foundational goals of providing Bitcoin-equivalent security alongside Turing completeness.
This final version is anticipated to raise the security benchmarks for Bitcoin L2 solutions to unparalleled standards.
The Bitcoin ecosystem is undergoing significant evolution, marked by the introduction of new technologies that collectively expand its utility beyond a mere store of value. Recently, the approval of Bitcoin spot ETFs has catalyzed a wave of institutional interest. In addition, Ordinals, BRC20s, and Runes show that there is a demand to enable more productive use cases for $BTC. This trend is complemented by technical innovations within Bitcoin’s infrastructure, particularly through L2 solutions like Bitlayer and BitVM, which aim to improve Bitcoin’s functionality and scalability.
Projects such as the Lightning Network, Stacks, and others have led the efforts to scale Bitcoin over the past few years. The Lightning Network addresses transaction speed and cost, making Bitcoin feasible for microtransactions and payments. Stacks extends Bitcoin’s utility by enabling smart contracts and decentralized applications directly atop its blockchain, pushing the limits of Bitcoin’s original capabilities. Other L2 solutions have been entering the market since the publication of the BitVM whitepaper in 2023, inspiring the development of new efforts to scale Bitcoin with additional features and capabilities.
Bitlayer and BitVM push further this technological evolution by integrating advanced computational features and Turing completeness without compromising the decentralized principle of Bitcoin. This bridges a huge gap between the EVM and the Bitcoin ecosystem. All these L2 technologies not only improve transaction throughput but also expand Bitcoin’s use cases into sectors like DeFi, NFTs, and beyond.
However, these initiatives also bring challenges. The inherent limitations of Bitcoin’s script, which is not Turing complete, mean that complex operations and applications that are feasible on platforms like Ethereum require innovative solutions to work on Bitcoin. BitVM, for example, addresses these by enabling off-chain computation with on-chain verification, similar to how optimistic rollups function. This approach maintains Bitcoin’s security and decentralization while allowing for more complex functions and applications. As more solutions develop and the space grows, the impact of past limitations will be mitigated to a point where Bitcoin can support every DeFi application.
The demand for Bitcoin-based applications is rising, driven by the broader acceptance of Bitcoin as a viable foundation for more than just financial transactions. This demand is further increased by the halving events, which, while reducing miner rewards, potentially increase transaction fees as a necessary compensation, thus highlighting the need for more efficient transaction processing solutions. As these Layer 2 solutions mature, they promise to unlock a new era of functionality and efficiency for Bitcoin.
Bitcoin is considered the most popular blockchain in the world, as demonstrated by $BTC having the largest market cap. Some understand Bitcoin as a means of payment and some consider it as digital gold used to protect wealth against inflation. While these cases are true, Bitcoin can also be a layer where applications are built on top of or around it just as other L1s. Up until now, this has not been possible due to the limitations of the underlying L1, which is not Turing complete. However, L2s like Bitlayer are solving this problem by extending the functionality of Bitcoin while inheriting its security. Unlike Ethereum, where L2s are used for scalability, Bitcoin L2s are an extension of the base layer, adding functionality that is not possible at the L1 level.
There is a lot of demand for protocols whose mission and vision is to support and scale Bitcoin. For comparison, look at the growth Ethereum had with the introduction of L2s and how it was able to solve some of the problems it had similar to Bitcoin. Apart from Ethereum, L2s like Arbitrum and Optimism saw significant growth and adoption by users attracting billions of capital into the protocols. In a similar case for Bitcoin where a L2 space similar to Ethereum emerged, the growth may be substantially bigger due to the current adoption and larger market size.
Suppose Bitlayer can overcome the limitations of Bitcoin’s infrastructure for smart contracts and provide a solid solution for applications on Bitcoin. In that case, the protocol can attract many users and significant capital from various types of investors who want to interact with Bitcoin in a more complex and sophisticated way.
What differentiates Bitlayer from other projects on Bitcoin is its compatibility with EVM tools. Unlike purely payment-focused solutions like the Lightning Network or Turing-incomplete smart contract platforms such as Stacks, Bitlayer integrates a comprehensive approach using the BitVM framework, which allows for the execution and verification of complex, Turing-complete contracts directly on Bitcoin. This not only expands Bitcoin’s use cases to include decentralized applications similar to those found on other chains but does so while being secured by Bitcoin’s security.
The bridge is also a component of the network that contributes significantly to the possible adoption of the protocol. It offers a secure and direct getaway from EVM chains to Bitlayer and the Bitcoin ecosystem.
To start using the Bitlayer network users must follow and complete some required steps before interacting with the protocol.
Now it’s time to set up a wallet that supports the Bitlayer network. Users can access Bitlayer through three main sources: Bitcoin, Ethereum, and Other EVM Chains.
To use the Bitlayer network you need $BTC for gas. The easiest way to send $BTC to your wallet is through a CEX. Use your preferred CEX (Coinbase, Binance, etc) to buy $BTC and transfer it over to your wallet.
The process of bridging to Bitlayer from Ethereum is pretty straightforward.
If you want to transfer from other EVM chains, Bitlayer supports these third-party bridges:
If you don’t have any $BTC on Bitlayer but have $USDT or $USDC you can still get gas through the network.
Many projects are available on Bitlayer offering a variety of products and services to users.
In this example, we will conduct a simple swap of $USDC to $BTC on one of the available DEXs, Macaron.
Bitlayer operates as a L2 solution on Bitcoin, serving as a bridge between the security and reliability of Bitcoin and the flexibility needed for more complex applications. By utilizing BitVM technology, Bitlayer enables developers to build and deploy applications that require more computational complexity than Bitcoin’s base layer can support. This integration facilitates the creation of dApps such as DeFi protocols of all kinds, directly taking advantage of Bitcoin’s underlying security without compromising on scalability or functionality.
The business model of Bitlayer is structured around providing value to the cryptocurrency ecosystem by expanding Bitcoin’s utility. It captures value through the network effects generated by increased activity on the network. As more applications are built and run on Bitlayer, the demand for Bitcoin and Bitlayer’s native functionalities increases, potentially raising the value of the network. Additionally, by making Bitcoin more versatile and capable of supporting a wider range of applications, Bitlayer attracts new users and developers to the ecosystem, which in turn can lead to increased adoption and usage of Bitcoin itself.
Bitlayer’s role as a facilitator for new applications creates value not just by expanding the usability of Bitcoin but also by improving its economic value proposition. As transactions and smart contracts run on Bitlayer, they contribute to the overall activity on Bitcoin’s blockchain, indirectly impacting transaction fee dynamics and the security of the network through increased demand for block space. This model also opens avenues for future revenue besides transaction fees through potential layer-specific tokens, services, or different transaction fee mechanisms that could be introduced as the ecosystem matures. Thus, Bitlayer not only broadens the capabilities of Bitcoin but also contributes to its longevity by increasing the amount of miner revenue that comes from transaction fees, which is especially important as we go through more halving events that reduce mining rewards.
Users of the Bitlayer network incur fees for various types of transactions, which include but are not limited to:
Below is a fee table with the approximate values for each one.
Fee Type | Description | Value |
Minimum Transfer Amount | The minimum amount of $BTC allowed for a single transfer. | 0.0005 $BTC |
Transfer Fee | Fee charged for transferring assets. | ~0.00008 $BTC |
Gas Swap Fee | Fee charged for swapping $USDT or $USDC for gas on Bitlayer | 2 $USDT/$USDC |
Minimum Tip (Mainnet/Testnet) | Minimum tip required for transactions. | 0.1 gwei |
Gas Price for Legacy Transactions | Gas price typically used for legacy transactions. | 0.11 gwei |
Max Priority Fee per Gas | Maximum priority fee per gas for transactions. | 0.1 gwei |
Max Fee per Gas | Sufficiently high fee per gas set to ensure transaction processing. | Depends on network conditions. (see Gas Parameters sections on how to set). |
While Bitlayer operates largely independently of the Bitcoin mainnet, certain interactions, especially those related to dispute resolution or final settlements, require the use of the Bitcoin network. In these cases, standard Bitcoin network fees apply. These fees ensure that the transactions are processed by miners on the Bitcoin blockchain and are necessary to secure the finality and immutability of these transactions. In addition, there is also the security fee paid by the Bitlayer network.
The $BTR token is officially announced by the team and the TGE (Token Generation Event) will happen some time soon.
Holders of $BTR will have the option to stake their tokens and be part of Bitlayer’s governance. The incentives and other information about staking will be announced when the staking system takes place.
Governance is a huge part of every protocol. It is the process where the protocol becomes decentralized and allows the community to influence the development and management of the project. Bitlayer’s vision is committed to decentralization and a governance structure is planned after the $BTR token launch.
However, Bitlayer has already launched some initiatives that are directed to future protocol governance.
For example, Bitlayer announced the launch of its first official NFT “Lucky Helmet”. This was an initiative after the launch of Mainnet-V1 to incentivize part of the community. A total of 5,000 Lucky Helmets were distributed through a whitelist to the community of Bitlayer. Amongst the many incentives that this NFT offers, holders will benefit from priority governance rights within the ecosystem when governance is implemented in the protocol.
As with any other protocol in crypto, Bitlayer faces some risks related to the technologies supporting the network and its operations. L2s are often more complex than a single dApp because their infrastructure contains various components tied together and every single piece works in synergy with the other. For that reason, the risk profile increases, introducing numerous factors that need to be addressed.
Here’s an overview of the possible risks associated with Bitlayer:
Security Risks: While L2 solutions aim to inherit the security of their underlying L1 blockchains (like Bitcoin for Bitlayer and Ethereum for others), they can introduce new vulnerabilities, especially at the bridging level. Bitlayer leverages technologies such as BitVM and DLC, and as a result, still relies heavily on the correct implementation and security of these additional technologies. There’s always a risk of bugs or vulnerabilities in the smart contracts or the Layer 2 protocol itself, which could be exploited maliciously.
Liquidity and Bridging Risks: L2 solutions often rely on bridges for transferring assets between the L1 and L2 networks. These bridges can be complex and are frequent targets for hackers. Bitlayer’s use of a multi-signature or DLC approach to asset bridging can mitigate some risks but still needs robust implementation to prevent exploits.
Economic Risks: L2 solutions must design effective economic incentives to ensure security and participation. This includes the design of transaction fees, staking rewards, and other financial incentives. Poorly designed economic models could lead to security vulnerabilities or fail to attract enough participants to the network. Tokenomics could also play a part and impact the protocol, where a poor design can hurt the economics despite the fundamentals of the protocol being solid.
Bitlayer has gone through rigorous audits for its smart contracts and code, placing significant emphasis on the security aspect. The audits were conducted by third-party audit firms, Hacken and SlowMist.
Bitlayer has had the following audits done:
Smart Contract Code Review And Security Analysis Report – April 22, 2024 – Hacken
Smart Contract Code Review And Security Analysis Report – April 8, 2024 – Hacken
Smart Contract Code Review And Security Analysis Report – April 1, 2024 – Hacken
Blockchain Protocol Security Analysis Report – March 27, 2024 – Hacken
Blockchain Security Audit Report – February 27, 2024 – SlowMist
Smart Contract Security Audit Report – February 27, 2024 – SlowMist
The Bitlayer team is composed of individuals with many years in the crypto space and valuable contributions to the ecosystem.
Some of the core team members include:
Charlie Yechuan Hu is an active figure in the Web3 space, currently serving as a co-founder of Bitlayer. His career is marked by extensive experience in community building, ecosystem development, and growth marketing, particularly within the cryptocurrency sector. Charlie has held significant roles, including managing partner at LucidBlue Ventures and Head of China & South East Asia at Polygon, where he drove substantial growth by supporting hundreds of projects in community engagement and ecosystem development. Additionally, Charlie has contributed to the Polkadot community as an ecosystem builder and co-founder of the PolkaBase Community.
Kevin is another important figure for the team, notably recognized for his leadership as the co-founder of Bitlayer and his extensive work with BitVM. He has a strong background in Web3 technologies, having served as the Web3 tech head at Huobi Global. During his tenure, he successfully launched three EVM chains, two ZK-Rollups, and a non-custodial platform, collectively managing billions in total value locked. Other significant contributions include leading the product and R&D teams at New Huo Tech and driving major advancements in digital asset custody solutions. Additionally, Kevin played a crucial role in establishing and scaling the Huobi Eco Chain, impacting its transaction volume and TVL.
A PHD in cryptography, published over 10 international papers and holds more than 20 invention patents. currently, his primary research focuses on zero-knowledge proofs, ecdsa threshold signatures, and fully homomorphic encryption.
Daniel Zhou is a former Chief Architect at @Antchain, a former staff engineer at Intel and Alibaba Cloud. A seasoned software architect with a background in cryptography / distributed systems and years of experience in cloud computing / blockchain technology. He excels at building strong teams and bootstrapping complex software projects. Notably led a team that delivered Antchain’s state-of-the-art blockchain system, achieving a certified throughput of 200,000 TPS and serving more than 60M end users. Published 4 top-tier journal papers in blockchain field.
Core developer at EthStorage, delivered 2 of the most important modules of EthStorage chain – storage node and cross-chain bridge. Core developer at EigenLabs, delivered the kernel of eigen-zkVM – ZKP prover and aggregator.
Allen Joseph is a seasoned Developer Relations Engineer with a robust background in blockchain technology. Currently, he leads developer relations at Bitlayer, focusing on enhancing the blockchain ecosystem’s growth by improving developer onboarding experiences and fostering community relationships. He has worked across various platforms, including Binance, StarkNet, Ethereum, NEAR, and Aurora, where he supported development lifecycles and engaged with partner communities.
Bitlayer has raised $5 million at an $80 million valuation in a seed round led by notable funds, angel investors, and teams.
The funding round was led by blockchain-focused venture firms Framework Ventures and ABCDE Capital, with additional investments from StarkWare, OKX Ventures, Alliance DAO, UTXO Management, Asymmetric Capital, Kenetic Capital, Kestrel, Global Coin Research, Pivot Global, Web3Port, Gate Labs, Mindfulness Capital, Quotient Ventures, Cogitent Ventures, NxGen, C6E Capital, PAKA, Comma3 Ventures, Kronos Ventures, Pragma Ventures, Faculty Group, Rising Capital, Samara Group, DuckDAO, CSP DAO, and DCI.
Renowned angel investors who contributed include Messari CEO Ryan Selkis, Messari co-founder Dan McArdle, Asymmetric Capital Bitcoin educator Dan Held, Hacken CEO Dyma, Sky Mavis CEO Trung and CTO Andy, Kyber Network founder Loi Luu, Coin98 founder Thanh Le, and Blockchain Founders Fund partner Tobias.
The seed round received substantial support from ecosystem partners such as Hacken, AWS Cloud, Ankr, Polyhedra, Babylon, Particle Network, Meson, Nubit, BitSmiley, TokenPocket, Xverse, Flash Protocol, Umoja.xyz, RunesTerminal, Lamina, NFTGO, Giants Planet, Tria, Tonka Finance, Anome, BitLen, Ordimint, and Caliber.
A L2 solution based on the BitVM technology, designed to enhance Bitcoin’s capabilities by enabling Turing-complete contracts and complex computations directly on or linked to the Bitcoin blockchain.
A virtual machine paradigm that enables the creation of Turing-complete Bitcoin contracts, allowing for complex computations to be verified rather than executed on Bitcoin, using a model similar to optimistic rollups.
A characteristic of a system or programming language that implies it can perform any computation given enough time and resources. Turing-complete systems can execute a wide array of programs, including those found in modern blockchain applications.
Solidity is a high-level programming language designed specifically for developing smart contracts that run on the Ethereum Virtual Machine (EVM).
Script is a simple, stack-based programming language associated with Bitcoin’s transaction protocol.
A L2 scaling solution that assumes transactions are valid by default and only runs computation, typically in the form of fraud proofs, when a transaction is challenged.
Smart contracts for Bitcoin that allow two parties to interact based on conditions agreed upon and signed off by an oracle without revealing the specifics to the blockchain, thus maintaining privacy and reducing blockchain bloat.
Cryptographic methods that allow one party to prove to another that a statement is true without conveying any additional information apart from the fact that the statement is indeed true.
The ability of a blockchain platform to support and execute contracts written for the Ethereum Virtual Machine (EVM), which is the primary environment for running decentralized applications on Ethereum.
A Bitcoin protocol upgrade that improves the blockchain’s privacy, efficiency, and capability to handle complex smart contracts through Schnorr signatures and MAST (Merkelized Abstract Syntax Trees).
Utilized in BitVM, a Taptree is a form of Merkle tree used to organize different scripts or smart contract clauses efficiently. This structure helps in minimizing the data that needs to be included in a transaction, thereby optimizing transaction space and costs.
In the context of blockchain L2 solutions, a sequencer orders transactions before they are batched into a single submission to L1, optimizing network efficiency and reducing costs.
Refers to the metrics or costs associated with executing transactions on a blockchain network, including costs tied to computation and storage.
Solutions or technologies developed to scale applications by handling transactions off the main blockchain (Layer 1) while maintaining the decentralized security model of the underlying network.
A cryptographic protocol that distributes computation across multiple parties where no individual party can see the other’s data, enhancing privacy and security.
A cryptographic method for distributing control over a single private key among multiple parties, any subset of which can cooperate to perform a cryptographic operation.
A signature algorithm that allows for more complex signature types, offering advantages in scalability and privacy in Bitcoin transactions.
An entity in blockchain protocols that provides external data (e.g., price feeds, event outcomes) to smart contracts that cannot access off-chain data independently.
What is Bitlayer?
Bitlayer is a L2 scaling solution for Bitcoin that enhances Bitcoin’s capabilities by allowing for the execution of more complex applications directly on top of the Bitcoin network.
How does Bitlayer work with Bitcoin?
Bitlayer operates on top of the Bitcoin network, utilizing a technology called BitVM to facilitate complex computations without altering Bitcoin’s original blockchain or consensus rules.
What is BitVM?
BitVM is a computational layer that enables Turing-complete smart contracts and complex applications to run on top of Bitcoin by using a challenge-response protocol and off-chain computation.
Can Bitlayer handle smart contracts?
Yes, Bitlayer enables smart contract functionality on Bitcoin by providing a platform for developers to build and deploy decentralized applications using complex computations that are not natively possible on Bitcoin’s base layer.
What types of applications can be built on Bitlayer?
Developers can build a variety of decentralized applications (dApps) on Bitlayer, including DeFi platforms, NFT marketplaces, games, and more, all benefiting from the security of the underlying Bitcoin blockchain.
Is Bitlayer secure?
Bitlayer inherits the security of the underlying Bitcoin network while adding layers of its own security protocols through the BitVM technology, making it a secure platform for running decentralized applications.
How does Bitlayer affect Bitcoin transaction fees?
Bitlayer aims to provide lower transaction fees for complex operations by handling these transactions off the Bitcoin main chain, thereby reducing the direct fee impact on the Bitcoin network.
What are the gas fees on Bitlayer?
Transactions on Bitlayer require gas fees similar to those on Ethereum, but they are denominated in $BTC with a specific structure to ensure minimal costs and efficient processing.
How can I participate in Bitlayer?
Users can participate by using applications built on Bitlayer, developers can build applications, and validators can participate in the network’s security through various consensus mechanisms proposed by
Bitlayer.
Does Bitlayer support Ethereum-based applications?
Bitlayer is designed to be EVM-compatible, allowing developers to easily port existing Ethereum applications onto Bitlayer, leveraging lower transaction costs and the security of the Bitcoin network.
Where can I learn more about developing on Bitlayer?
Developers interested in building on Bitlayer can access documentation, developer tools, and community support through the official Bitlayer website and developer portals.
Why are Bitcoin’s capabilities for complex computations limited?
Satoshi originally designed Bitcoin to operate like this to solidify the core principles: Decentralization and Security.