πŸ“„Our Research

Explore our peer-reviewed contributions to the theoretical foundations of cross-chain technology.

Overview

Vishwa's research program directly addresses key challenges in the field of blockchain interoperability through academic investigation and cryptographic innovation. Our work establishes theoretical foundations for the next generation of cross-chain protocols. This rigorous foundation in research allows Vishwa to deliver mathematically proven security guarantees instead of relying on assumptions, putting our protocol at the forefront of trustless cross-chain infrastructure development.

Our research spans three critical areas:

Click on the links above or scroll down to read more about our ongoing and published research.

SuiProof: Succinct PlonK Proofs for Move-VM Storage in Cross-Chain Applications

Authors: Cheng, J.Q., Hong, Y., Zhong, E.J., Liang, N.S., Status: Under review

This research paper introduces SuiProof, a novel system for generating succinct zero-knowledge proofs of MoveVM storage states on the Sui blockchain. Leveraging zero-knowledge technology such as PlonK and zk-SNARKS, as well as cutting-edge ideas from cryptography such as KZG polynomial commitments and the Halo2 framework, it addresses a crucial gap in cross-chain verification by developing specialized circuits optimized for Sui's architecture.

Key Contributions:

  • Modular PlonK Circuit Design: Custom circuits encoding Sui's object inclusion proofs, Merkle checkpoints, and Ed25519 threshold signature verification

  • Small, constant-size Proofs: Theoretical proof size of ~0.7-1KB regardless of the complexity of underlying state transitions

  • Efficient Verification: Estimated on-chain verification costs of 180-215k gas on Ethereum, significantly reducing overhead compared to naive verification approaches

Practical Applications: SuiProof enables efficient, trust-minimized bridges between Sui and other blockchain networks, with particular applications for Bitcoin interoperability through off-chain verification and on-chain commitment anchoring.

Bitcoin Interoperability: A Comprehensive Review

Authors: Cheng, J.Q., Choudhry, V., Karpathy, N., Rosen, G., Liang, N.S., Medard, M. Status: Under review

This review paper conducts a comprehensive survey of the Bitcoin interoperability landscape, from its theoretical foundations to past, current, and future implementation approaches to broader implications.

Key Contributions:

  • Theoretical Framework Analysis: Formal evaluation of existing interoperability models, including trust assumptions and impossibility results

  • Methodological review: Broad survey of current Bitcoin cross-chain architectures (sidechains, notary schemes, light client protocols, etc.) and their implementation details and security models

  • Economic Impact Assessment: Analysis of how Bitcoin interoperability affects native and cross-chain asset values, as well as broader blockchain ecosystem dynamics

"By enabling Bitcoin to interact with other blockchain systems while preserving its fundamental security and economic properties, interoperability solutions may help realize the full potential of Bitcoin as both a revolutionary fi- nancial innovation and a foundation for a more interconnected and efficient global financial infrastructure."

Trustless Messaging Standards Between BTC and Other Turing-Complete Execution Layers

Authors: Cheng, J.Q., Hong, Y., Zhong, E.J., Chu, S., Shi, S., Gitter, I., Liang, N.S., Status: In Preparation

This research paper introduces Vishwa Voyager, our unified zero-knowledge light client architecture that enables trustless cross-chain communication between Bitcoin and Turing-complete networks. This work represents a significant advancement in eliminating trust assumptions from cross-chain messaging.

Key Contributions:

  • Unified Light Client Architecture: Novel design that leverages efficient zero-knowledge proof systems, parallelized computation, and state detection optimized for Bitcoin's architecture

  • Bidirectional Proof Delivery: Secure verification of state transitions in both directions between Bitcoin and target chains

  • Protocol-Aware Compression: Advanced compression techniques achieving 70% reduction in proof size

Security Framework: The protocol maintains trustlessness while enabling practical cross-chain message relaying. The paper provides formal proofs demonstrating security preservation under standard cryptographic assumptions.

Last updated