Skip to main content
Version: Next

Terminology

You may have heard of one or multiple buzzwords thrown around in the cosmos and wider crypto ecosystem such shared security, interchain security and replicated security. These and other terms are clarified below.

Shared Security

Shared Security is a family of technologies that include optimistic rollups, zk-rollups, sharding and Interchain Security. Basically, any protocol or technology that can allow one blockchain to lend/share its proof-of-stake security with another blockchain or off-chain process.

Interchain Security (ICS)

Interchain Security is the Cosmos-specific category of Shared Security that uses IBC (Inter-Blockchain Communication).

Consumer Chain

Chain that is secured by the validator set of the provider, instead of its own. Interchain Security allows a subset of the provider chain's validator set to validate blocks on the consumer chain.

Replicated Security

A particular protocol/implementation of Interchain Security that fully replicates the security and decentralization of a validator set across multiple blockchains. Replicated security has also been referred to as "Interchain Security V1", a legacy term for the same protocol. That is, a "provider chain" such as the Cosmos Hub can share its exact validator set with multiple consumer chains by communicating changes in its validator set over IBC. Note that since the introduction of Partial Set Security, a TopN consumer chain with N 100% fully replicates the security and decentralization of the provider chain.

Partial Set Security (PSS)

A major feature of Interchain Security (also referred to as "Interchain Security V2") that allows a provider chain to share only a subset of its validator set with a consumer chain. This subset can be determined by the top N% validators by voting power, or by validators opting in to validate the consumer chain. PSS allows for more flexible security tradeoffs than Replicated Security.

Permissionless ICS

Permissionless ICS is the latest version of ICS that allows to launch Opt In chains in a permissionless way (i.e., without requiring a governance proposal).

Consumer Chain

Chain that is secured by the validator set of the provider, instead of its own. Interchain Security allows a subset of the provider chain's validator set to validate blocks on the consumer chain.

Standalone Chain

Chain that is secured by its own validator set. This chain does not participate in Interchain Security.

Changeover Procedure

Chains that were not initially launched as consumers of Interchain Security can still participate in the protocol and leverage the economic security of the provider chain. The process where a standalone chain transitions to being a replicated consumer chain is called the changeover procedure and is part of the ICS protocol. After the changeover, the new consumer chain will retain all existing state, including the IBC clients, connections and channels already established by the chain.

Mesh Security

A protocol built on IBC that allows delegators on a Cosmos chain to re-delegate their stake to validators in another chain's own validator set, using the original chain's token (which remains bonded on the original chain). For a deeper exploration of Mesh Security, see Replicated vs. Mesh Security on the Informal Blog.