Pheasant Network
HomeProductLinks
  • πŸͺΊWelcome
  • βˆ’ Bridge βˆ’
    • πŸŒ‰Protocol
      • Network Participants
      • L2 > L1 and L2 > L2
      • L1 > L2
      • CCTP
      • Fees
    • πŸ§‘β€πŸ’»Contracts
      • Overview
      • Technical Details
      • Audit
    • 🌐Network Code and Address
  • βˆ’ Swap βˆ’
    • πŸ”„Protocol
      • Architecture
      • Fees
    • πŸ§‘β€πŸ’»Contracts
  • 🌐Supported Networks
  • βˆ’ Ecosystem βˆ’
    • 🐦Pheasant Points
      • Pheasant Points Terms of Use
      • Snapshot History
    • ❓FAQ
    • πŸ“—Release Notes
    • ⏫Development Status
    • πŸ™ŒSupported by
    • 🎨Brand Assets
    • πŸ’šCollaboration Requests
    • πŸ”—Links
Powered by GitBook
On this page
  • Default
  • In the event of fraud
  • Sequence Diagram
  1. βˆ’ Bridge βˆ’
  2. Protocol

L2 > L1 and L2 > L2

PreviousNetwork ParticipantsNextL1 > L2

Last updated 2 months ago

Default

  1. A relayer deposits liquidity to the BondManager contract (Layer2 Bridge Contract).

  2. A user sends assets they want to transfer to the PheasantNetworkBridgeChild contract deployed on the source chain and submits a request to relayers.

  3. The relayer directly send asset to the user address on destination chain.

  4. The relayer generates proof of the directly transferred assets from its transactional hash and registers it with the PheasantNetworkBridgeChild contract. This proof enables the relayer to withdraw the assets deposited by the user.

In the event of fraud

  1. A disputer triggers a verification process by pointing out a relayer's misbehavior. The disputer needs to deposit a certain amount of assets to initiate a challenge period.

  2. The relayer submits evidence to vindicate themselves within a designated period of time after the disputer's claim.

  3. If the evidence proves the relayer's legitimacy, meaning if the disputer's claim was false, the assets locked by the disputer will be confiscated as a punishment and sent to the relayer.

  4. If the evidence does not clear the relayer, or they are unable to submit evidence within the designated period of time, the disputer will be able to slash the relayer’s bond and reclaim the locked assets.

Sequence Diagram

πŸŒ‰