Self-Sequencing Specs

Describes current self-sequencing method available for end-user on applications leveraging the Multichain Sequencer. Self-sequencing allows users to exit or interact with the protocol trustlessly.

One of the key components of current Coprocessor based solutions is the ability for users to exit the protocols in a trustless manner. The main security considerations for enabling self-sequencing are reliant on the following aspects

  • Finalize state to prevent leveraging a direct attack on a rollup as an attack vector to access liquidity

  • Generate a correct proof on the finalized state

In this architecture the following example walks through how a trustless exit can be designed into the applications logic:

  • Rollup A contains the global ledger

  • User A initiates a withdrawal transaction via self-sequencing in case of liveness issues with the sequencer

  • Rollup A achieves finality in two ways with current solutions:

    • Optimistic design → Once the challenge period expired a self-sequenced proof can be generated

    • zk-based design → L1 verification of the submitted zk-proof on the rollup state is sufficient to generate the self-sequenced proof

  • On the applications side its key to enable a selector for end-users to decide when they want to self-sequence, and when the end-user will submit the proof instead of the sequencer

Last updated