How Blockchain Bridges Work
Lesson by Uvin Vindula
A blockchain bridge is a protocol that connects two or more blockchains, enabling the transfer of assets, data, or messages between them. While the concept sounds simple, the engineering behind bridges is one of the most challenging problems in all of blockchain technology.
The Lock-and-Mint Model
The most common bridge mechanism works through a lock-and-mint process:
- Lock: A user sends their tokens (e.g., 1 BTC) to a smart contract or custodian on the source chain. These tokens are "locked" — they cannot be spent while the bridge holds them.
- Verify: The bridge protocol verifies that the tokens have indeed been locked on the source chain. This verification can happen through validators, relayers, or cryptographic proofs.
- Mint: Once verified, the bridge mints an equivalent "wrapped" token on the destination chain (e.g., 1 WBTC on Ethereum). This wrapped token is a representation of the original asset.
- Burn-and-Release: To move back, the user burns the wrapped token on the destination chain, and the original token is unlocked on the source chain.
The Verification Challenge
The hardest part of bridging is the verification step. How does the destination chain know that tokens were truly locked on the source chain? Different bridges use different approaches:
- External validators: A committee of validators monitors the source chain and attests to events. This is the most common but introduces a trusted third party.
- Light client verification: The destination chain runs a light client of the source chain, verifying block headers and transaction proofs cryptographically. This is more trust-minimized but technically complex.
- Optimistic verification: Transactions are assumed valid unless challenged within a dispute period. Similar to optimistic rollups, this relies on at least one honest watcher.
- Zero-knowledge proofs: The most cutting-edge approach — cryptographic proofs verify source chain state without revealing underlying data. Still emerging as of 2026.
Liquidity Networks
An alternative to lock-and-mint is the liquidity network model. Instead of locking and minting, liquidity providers hold native assets on both chains. When a user wants to bridge, they send tokens to a liquidity provider on one chain and receive tokens from a different provider on the other chain. This avoids wrapped tokens entirely but requires deep liquidity pools.
Message-Passing Bridges
Beyond asset transfers, some bridges enable arbitrary message passing — sending data and instructions between chains. This allows a smart contract on Ethereum to trigger an action on another chain, enabling true cross-chain applications. Protocols like LayerZero, Axelar, and Wormhole focus heavily on this capability.
For Sri Lankan developers exploring cross-chain development, understanding these mechanisms is crucial for building applications that can reach users across multiple blockchain ecosystems.
Key Takeaways
- •The lock-and-mint model locks tokens on the source chain and mints wrapped tokens on the destination
- •Verification is the hardest challenge — methods range from external validators to zero-knowledge proofs
- •Liquidity networks avoid wrapped tokens by using liquidity providers on both chains
- •Message-passing bridges enable cross-chain smart contract interactions beyond simple token transfers
- •Different verification methods offer different trust and security trade-offs
Quick Quiz
Question 1 of 3
0 correct so far
In the lock-and-mint model, what happens to tokens on the source chain?