Papers
Topics
Authors
Recent
Search
2000 character limit reached

Burn-and-Mint Bridges Explained

Updated 19 February 2026
  • Burn-and-mint bridges are cryptoeconomic protocols transferring assets across blockchains by burning tokens on the source chain and minting equivalents on the destination.
  • ASAS-BridgeAMM couples a burn-and-mint bridge with an automated market maker using a trinary state machine to dynamically adjust risk parameters based on latency and market conditions.
  • Empirical evaluations show that dynamic risk pricing reduces insolvency risk by 73% and maintains liquidity provider engagement even during volatile market events.

Burn-and-mint bridges are cryptoeconomic protocols enabling asset transfer between distinct blockchains by destroying (burning or locking) tokens on the source chain and minting synthetic equivalents on the destination. The systemic risk posed by such systems derives from their cross-chain consensus dependencies, operational latency, adversarial frontiers, and discrete failure modes. ASAS-BridgeAMM, as exemplified in "ASAS-BridgeAMM: Trust-Minimized Cross-Chain Bridge AMM with Failure Containment" (You et al., 18 Jan 2026), advances this lineage by coupling a burn-and-mint bridge to an automated market maker (AMM) with a formally specified mechanism for graceful degradation, quantifying bridge-induced risk and dynamically pricing it within the protocol.

1. Formal State Machine and Contained Degradation

ASAS-BridgeAMM models bridge operation as an atomic state machine M=(S,Σ,δ,s0)\mathcal{M} = (S, \Sigma, \delta, s_0) with three states:

Transitions are determined by cross-chain latency τ\tau, health index H\mathcal{H}, and oracle price deviation δ\delta. The start state s0s_0 is SNS_N, and the transition function δ:S×ΣS\delta: S \times \Sigma \to S enforces state change based on quantifiable risk parameters. Transition guards such as τ>Tthresh\tau > T_{\mathrm{thresh}} or H<Hsafe\mathcal{H} < \mathcal{H}_{\mathrm{safe}} trigger SRS_R, while τ>Tcrit\tau > T_{\mathrm{crit}}, H<Hcrit\mathcal{H} < \mathcal{H}_{\mathrm{crit}}, or excessive oracle deviation lead to SHS_H. Recovery to SNS_N requires all risk metrics returning within thresholds. This trinary model contrasts with legacy bridge architectures that admit only "operational" vs. "compromised" states, introducing the possibility of limited, risk-priced outflows under stress rather than total halt or unbounded capital extraction (You et al., 18 Jan 2026).

2. Latency as Quantifiable Execution Risk

ASAS-BridgeAMM elevates observed cross-chain message latency, τ=tdesttsrc\tau = t_{\mathrm{dest}} - t_{\mathrm{src}}, as a first-class risk metric. Under non-adversarial conditions, τLogNormal(μ=5.7,σ=2.0)sec\tau \sim \mathrm{LogNormal}(\mu=5.7, \sigma=2.0)\,\text{sec} empirically. This latency directly informs protocol parameters:

  • Dynamic Haircut h(τ)h(\tau): Funds transferred are subject to a haircut increasing with latency:

h(τ)={hminτTmin hmin+τTminTmaxTmin(hmaxhmin)Tmin<τ<Tmax hmaxτTmaxh(\tau) = \begin{cases} h_{\min} & \tau \le T_{\min}\ h_{\min} + \frac{\tau - T_{\min}}{T_{\max} - T_{\min}} (h_{\max} - h_{\min}) & T_{\min} < \tau < T_{\max}\ h_{\max} & \tau \ge T_{\max} \end{cases}

With hmin=0.3%h_{\min}=0.3\%, hmax=5%h_{\max}=5\%, Tmin=15T_{\min}=15 min, Tmax=4T_{\max}=4 h.

  • Slippage Bound s(τ)s(\tau): Enforced per state—s01%s_0 \approx 1\% in SNS_N, doubled in SRS_R, infinite (all swaps revert) in SHS_H.
  • Withdrawal Limit w(τ)w(\tau): Caps maximum withdrawal per epoch by state—up to 20%20\% of pool in SNS_N, 5%5\% in SRS_R, $0$ in SHS_H.

This explicit risk-pricing approach throttles user flows in proportion to growing uncertainty, mitigating contagion from bridge liveness/finality delays.

3. Automated Market Maker (AMM) Coupling and Price Invariant

The bridging process consists of users locking assets on the source chain via IngressVault.sol; cross-chain messages communicate lock events via a relayer/oracle "Hub", culminating in synthetic asset minting on the destination chain within BridgeAMM.sol. The on-chain AMM uses a risk-adjusted constant-product invariant:

kadj=xy(1h(τ))Δy=yΔx(1h(τ))x+Δx(1h(τ))k_{\mathrm{adj}} = x y (1 - h(\tau)) \qquad \Delta y = \frac{y\,\Delta x\,(1 - h(\tau))}{x + \Delta x (1 - h(\tau))}

where (x,y)(x, y) represent pool reserves. The dynamic haircut h(τ)h(\tau) reduces effective liquidity during latency-induced uncertainty, increasing slippage and price impact. During SNS_N standard Uniswap-style execution applies; in SRS_R haircuts and slippage caps adjust upward and withdrawal caps tighten; in SHS_H swaps revert and withdrawals are locked via CircuitBreaker.sol.

4. Safety, Bounded Bad Debt, and Liveness

Safety is established in the presence of a Byzantine Relayer adversary (permitting delays, reordering, censorship, and front-running but not signature forgery):

  • Theorem 1 (Bounded Bad Debt):

BhmaxCtotalB \leq h_{\max} C_{\text{total}}

Proof sketch: each swap contracts the AMM invariant by at most 1hmax1-h_{\max}, and with per-epoch withdrawal throttling, cumulative loss per epoch is capped. The circuit breaker precludes subsequent loss epochs.

  • Liveness (Theorem 2): If τ<2Tmax\tau < 2 T_{\max}, oracle deviations <θprice<\theta_{\mathrm{price}}, and oracle integrity holds, then honest swaps eventually finalize since the protocol remains in SNS_N or SRS_R, both of which allow settlement.

These properties are formally proven, ensuring bounded insolvency and settlement completion with high confidence, even under adversarial delay or natural market volatility.

5. Manipulation Resistance and Adversarial Robustness

Let VV be attack size, δ\delta the oracle distortion, and τ\tau the induced delay. Adversarial profit function:

Π(δ,τ,V)=δVs(V)Vh(τ)V\Pi(\delta, \tau, V) = \delta V - s(V) V - h(\tau) V

Whenever δθprice\delta \geq \theta_{\mathrm{price}} or τ>Tcrit\tau > T_{\mathrm{crit}}, the circuit breaker nullifies profit (Π=0)(\Pi=0) by halting swaps. Monte Carlo simulation (100,000 runs) demonstrates p99\mathrm{p}_{99} per-epoch bad debt of 0.189% (<0.2%<0.2\%), and solvency probability >0.9999>0.9999 over stress regimes (0–50% price crash, up to 60 min latency, (You et al., 18 Jan 2026)).

6. Empirical Evaluation and Practical Results

Two primary evaluation tracks were used:

  • Historical Replay (18 months, Ethereum + 2 auxiliary chains): 54,700 bridge swaps under observed network and price variability, including high-volatility events. Found worst-case bridge-induced insolvency reduced by 73% relative to baseline lock-and-mint models and transaction volume retention of 104.5% (liquidity providers remained during stress).
  • Monte Carlo Stress Testing: System maintained P(solvent)=1.0\mathrm{P}(\text{solvent}) = 1.0 under diverse adversarial and market scenarios, including up to 50% asset price drawdown and 30 min cross-chain latency.

Metrics, replay methodology, and code-level instrumentation adhere precisely to the stated protocol and analysis criteria.

7. Core Contract Modules

Key modules are implemented in Solidity-style pseudocode:

  • IngressVault.sol: Manages collateral lock on source chain.
  • Hub.sol: Aggregates latency attestations and oracle pricing.
  • BridgeAMM.sol: Implements AMM, state machine, and risk adaptation.
  • CircuitBreaker.sol: Automates pausing and reinitialization during critical events.

A summary of implementation details is provided below:

Module Role Key Interface
IngressVault.sol Source chain deposit and lock tracking lock(address asset, uint256 amt)
Hub.sol Cross-chain latency and price aggregation attestLatency(uint256 t_src), aggregatePrice(...)
BridgeAMM.sol Stateful AMM, enforces slippage, haircuts, limits swap(uint256 dx), checkState(...)
CircuitBreaker.sol Protocol halt and recovery trigger(), reset()

Contained degradation is enforced at the contract layer via mode checks and dynamic parameterization, directly implementing the state machine and risk response logic in executable code.


ASAS-BridgeAMM transforms burn-and-mint bridges from brittle, binary-fail systems into "safe-to-fail" cryptonetworks by embedding dynamic risk-based controls at the protocol level. This architecture formally bounds bad debt, preserves user settlement under adverse conditions, and empirically demonstrates enhanced insolvency resistance and capital efficiency, as established through both simulation and historical chain replay (You et al., 18 Jan 2026).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Burn-and-Mint Bridges.