The Evolution of L2 Network Security: Three Stages of Transition from Full Control to Limited Intervention

The Three Stages of L2 Network Security: Evolution from Zero to Two

The Ethereum community has been discussing the security of L2 networks in three stages. This is not only related to the stable operation of the Ethereum mainnet and L2 networks but also closely tied to the actual development status of L2 networks. Recently, community members proposed standards for Stage 2 of the L2 network, prompting in-depth reflection and responses from Ethereum's co-founders.

Three Stages of L2 Network Security

The security of Ethereum rollups can be divided into three stages based on the level of control the security committee has over the trustless components:

  1. Phase 0: The Security Committee has complete control. Although there may be a proof system, the Security Committee can overturn it with a simple majority vote.

  2. Phase 1: The Security Committee requires 75% approval to override the operating system. There must be a certain number of members outside the main organization to prevent collusion.

  3. Stage 2: The Security Committee can only take action in the event of a provable error and can only choose one of the proposed answers, not respond arbitrarily.

These three stages can be represented by the "voting shares" of the security committee:

Phase 0: The Security Committee has 100% control. Phase 1: The Security Committee requires a 75% majority Stage 2: The Security Committee intervenes limitedly only in the presence of provable errors.

The Best Time for Phase Transition

The best timing for an L2 network to transition from one phase to the next depends on the level of trust in the proof system. The only reasonable reason for not immediately entering phase 2 is doubts about the proof system. The more confidence there is in the proof system, the more the network should be pushed to evolve to a higher phase.

Mathematical Model Analysis

Through a simplified mathematical model, we can quantify the security at different stages. Assume:

  • Each member of the security committee has a 10% independent failure probability.
  • Stage 0 requires a majority of 4/7, Stage 1 requires a majority of 6/8
  • There exists a holistic proof system

Based on these assumptions, we can calculate the system failure probabilities at different failure probabilities of the proof system for each stage. The results show that as the quality of the proof system improves, the optimal stage shifts from 0 to 1, and then to 2.

Mathematical Model Reveals L2 Phase Selection Logic: Why Phase 1 Might Be Skipped?

Realistic Considerations

However, the assumptions of the simplified model do not fully align with reality:

  • Members of the security committee may have common mode failures.
  • The proof system may consist of multiple independent systems.

These factors make Phase 1 and Phase 2 more attractive than predicted by the model.

Mathematical model reveals L2 stage selection logic: Why might stage 1 be skipped?

Conclusion

The existence of Stage 1 may theoretically be somewhat unreasonable, and transitioning directly from Stage 0 to Stage 2 seems more ideal. However, to address emergencies, members of the security committee can be granted the authority to delay withdrawals.

At the same time, entering stage 2 too early may also be a mistake, especially if it affects the strengthening of the underlying proof system. Ideally, there should be dedicated data providers showcasing the audit and maturity indicators of the proof system, while also displaying the current stage.

Overall, the evolution of security in L2 networks is a complex process that requires finding a balance between theoretical models and practical considerations to ensure the stability and reliability of the network.

ETH-2.31%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 10
  • Share
Comment
0/400
MetaEggplantvip
· 07-24 03:24
This is too centralized.
View OriginalReply0
GmGmNoGnvip
· 07-23 17:52
You can't copy homework like this.
View OriginalReply0
Blockblindvip
· 07-21 21:32
Stage 2, why is this not finished yet?
View OriginalReply0
MetaRecktvip
· 07-21 20:17
There are also v1 and v2 for security.
View OriginalReply0
MEVHunterZhangvip
· 07-21 20:15
It mainly depends on how the committee handles it in the end.
View OriginalReply0
MidsommarWalletvip
· 07-21 20:12
V sauce also gets this idea.
View OriginalReply0
HodlKumamonvip
· 07-21 20:10
Only by truly being able to go from 0 to 2 can one survive in the encryption circle.
View OriginalReply0
LiquidatedAgainvip
· 07-21 20:10
The online banking suckers are back again, and even the three phases can't stop the Liquidation during the big dump.
View OriginalReply0
RugpullSurvivorvip
· 07-21 20:07
Shivering, wanting safety but also fearing being trapped, I will run into the first stage first.
View OriginalReply0
LiquiditySurfervip
· 07-21 20:00
This job isn't going too well... 70% of the votes aren't being cast?
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)