Skip to content

Sidechains

Overview

A sidechain is an independent blockchain that runs in parallel with a main chain (often called the parent chain or mainnet), interacting with the main chain for asset transfer and information exchange through a Two-Way Peg mechanism. The core idea of sidechains is to migrate some transactions from the main chain to the sidechain for processing, thereby reducing the main chain's burden and improving the overall system's scalability and flexibility.

Sidechains have their own consensus mechanisms, validator nodes, and block production rules, and can operate independently without relying on real-time validation from the main chain. Users can "lock" assets on the main chain, then receive equivalent tokens on the sidechain for transactions, and "unlock" the assets back to the main chain when finished.

Unlike state channels or Rollup-based Layer 2 solutions, sidechains are generally considered independent blockchains that do not inherit the main chain's security. Instead, they rely on their own set of validators for security. This design gives sidechains greater flexibility but also means their security assumptions differ from those of the main chain.

Core Properties

1. Independent Consensus Mechanism

Sidechains can choose consensus algorithms different from the main chain, such as PoS, PoA, DPoS, etc., to meet specific performance or governance requirements.

2. Two-Way Peg

Users can generate equivalent tokens on the sidechain by locking main chain assets, and vice versa. This process is typically implemented through cross-chain bridges or multisig custody mechanisms.

3. Independent Security Model

Sidechains have their own validator networks, and their security does not directly depend on the main chain, but this also means they need to independently maintain sufficient decentralization.

4. Flexible Feature Extension

Sidechains can implement features not supported by the main chain, such as privacy transactions, different virtual machine types, or optimizations for specific applications.

5. Interoperability

Through standardized cross-chain protocols, sidechains can interoperate with multiple main chains or other sidechains.

Core Advantages

1. Improved Scalability

By migrating a large volume of transactions from the main chain to the sidechain, overall system throughput is significantly increased.

2. Lower Transaction Costs

Sidechains typically have lower Gas fees because they can adopt more efficient consensus mechanisms or fewer validators.

3. Feature Customization

Developers can customize sidechain functionality, performance parameters, and governance rules according to specific application needs.

4. Experimental Innovation

Sidechains provide a testing environment for new technologies and features without posing risk to the main chain.

5. Reduced Main Chain Congestion

Non-critical or high-frequency transactions are moved to the sidechain, keeping the main chain focused on high-value settlement.

How It Works

Asset Transfer Flow

  1. Main Chain to Sidechain:
  2. User initiates a transfer on the main chain, sending assets to a lock address or smart contract
  3. Main chain nodes confirm the transaction
  4. Sidechain monitors main chain events and verifies the lock transaction
  5. Sidechain mints equivalent sidechain tokens at the user's address

  6. Sidechain to Main Chain:

  7. User initiates a withdrawal request on the sidechain, burning sidechain tokens
  8. Sidechain validators confirm the burn transaction
  9. Main chain receives proof and verifies it
  10. Main chain unlocks the corresponding amount of assets to the user's address

Security Mechanisms

  • Federated Sidechain: A group of trusted validators jointly manage locked assets
  • SPV Proof (Simple Payment Verification): Uses lightweight proofs to verify cross-chain transactions
  • Smart Contract Custody: Smart contracts deployed on the main chain manage asset locking and release
  • Challenge Period: A time window is set to allow fraud proof submissions

Notable Projects

Bitcoin Sidechains

  • Liquid Network: A Bitcoin sidechain developed by Blockstream, focused on fast settlement and asset issuance
  • Rootstock (RSK): A sidechain providing smart contract functionality for Bitcoin, EVM-compatible
  • Stacks: A Bitcoin Layer 2 connected to Bitcoin through Proof of Transfer

Ethereum Sidechains

  • Polygon PoS (formerly Matic Network): One of the most successful Ethereum sidechains, using PoS consensus
  • Gnosis Chain (formerly xDai): A sidechain focused on fast and stablecoin payments
  • Skale Network: An elastic sidechain network providing dedicated sidechains for DApps

Application-Specific Sidechains

  • Ronin: A dedicated sidechain developed for the Axie Infinity game
  • DFK Chain: A dedicated sidechain for the DeFi Kingdoms game
  • Loom Network: A sidechain platform focused on gaming and social applications

Sidechain vs Rollup

Feature Sidechain Rollup
Security Source Own validators Inherits main chain security
Consensus Mechanism Independent consensus Relies on main chain consensus
Data Storage Off-chain storage Data posted on-chain (or DA layer)
Trust Assumption Requires trust in sidechain validators No additional trust assumptions needed
Flexibility Very high Limited by main chain compatibility
Withdrawal Speed Relatively fast May have challenge periods
Cost Very low Relatively low

Use Cases

1. High-Frequency Trading Applications

Gaming, social, micropayment, and other applications requiring high TPS and low latency.

2. Privacy Protection

Implementing privacy transaction features on sidechains, such as Confidential Transactions.

3. Asset Issuance Platforms

Leveraging sidechains for rapid issuance and trading of various digital assets or security tokens.

4. DeFi Protocols

Building DeFi ecosystems on sidechains, enjoying low cost and high speed advantages.

5. Cross-Chain Bridging

Serving as bridges between different blockchain networks.

Challenges and Risks

1. Security Tradeoffs

Sidechain security depends on its validator set. If validators are not sufficiently decentralized or act maliciously, asset losses may occur.

2. Cross-Chain Bridge Risk

Two-way peg mechanisms can become attack targets. Multiple cross-chain bridges have historically suffered hacker attacks.

3. Liquidity Fragmentation

Sidechains fragment users and funds, potentially leading to insufficient liquidity in individual ecosystems.

4. Interoperability Complexity

Interoperability between multiple sidechains requires complex protocols and additional trust assumptions.

5. User Experience

Users need to understand the differences between chains and manage assets across multiple chains, increasing the usage barrier.

1. Transition to App Chains

More projects are choosing to build application-specific sidechains, optimizing performance for specific use cases.

2. Shared Security Solutions

Through protocols like EigenLayer, sidechains can rent Ethereum's security, reducing the cost of independently maintaining a validator network.

3. Convergence with Rollups

Some projects adopt hybrid architectures, combining the flexibility of sidechains with the security of Rollups.

4. Cross-Chain Interoperability Standards

Protocols like IBC and LayerZero are driving seamless interoperability between sidechains.