FBTC Bridge

The strong liquidity of assets within the Ethereum ecosystem is attributed to the presence of numerous EVM-equivalent or compatible chains. This aspect presents a greater challenge for Bitcoin. Therefore, designing a secure and reliable bridge is essential for unlocking the potential of Bitcoin assets.

In its initial version, FBTC will utilize a TSS network to ensure the bridge's security.

Key Features

Qualified User Management

  • Add Qualified Users - The contract owner can add qualified users and set their deposit and withdrawal addresses. Only qualified users can initiate minting and burning requests.

  • Edit Qualified Users - The contract owner can update the deposit and withdrawal addresses of qualified users to ensure uniqueness and accuracy.

  • Remove Qualified Users - The contract owner can remove qualified users and delete their associated address mappings.

Request Handling

  • Minting Requests - Qualified users can initiate minting requests to convert BTC deposits into FBTC. Minting requests undergo verification and signature processes to ensure the legality and security of the transactions.

  • Burning Requests - Qualified users can initiate burning requests to convert FBTC back into BTC. Burning requests also undergo strict verification processes to ensure asset security.

  • Cross-Chain Requests - Users can initiate cross-chain requests to transfer FBTC from one chain to another. Cross-chain requests need to be confirmed and signed on both the source and target chains.

Fee Management

The FBTC Bridge contract employs a flexible fee model to collect and pay transaction-related fees. Fees can be paid by minting new FBTC or deducting from the user's account.

Security Mechanisms

  • Multi-Signature - All critical operations require multi-signature verification to ensure transaction legality and security.

  • Decentralized Governance - The contract is managed by multiple governance members in a decentralized manner to prevent single points of failure and malicious actions.

  • Real-Time Monitoring - The contract monitors all transaction requests and operations in real-time to ensure system stability and security.

Last updated