Primitives / Sidechains
Scalability Blockchain Primitive

Sidechains

Independent blockchains connected to a main chain through two-way pegs for asset transfers

What are Sidechains?

Sidechains are independent blockchains that run parallel to a main chain, operating with their own consensus mechanisms, block parameters, and validator sets while maintaining a connection that allows assets to move between the two networks. Unlike Layer 2 solutions that derive their security directly from the base layer, sidechains are sovereign networks responsible for their own security. This independence gives sidechains tremendous flexibility in how they operate, allowing them to optimize for specific use cases, implement experimental features, or achieve higher throughput than the main chain supports.

The core innovation that enables sidechains is the two-way peg, a mechanism that allows assets to be transferred between the main chain and sidechain without requiring trust in a centralized intermediary. When users want to move assets to a sidechain, they lock tokens on the main chain and receive equivalent tokens on the sidechain. When they want to return, they burn the sidechain tokens and unlock the original assets. This bidirectional flow creates a persistent link between otherwise independent networks, enabling users to take advantage of sidechain features while retaining the ability to return to the security of the main chain.

The concept emerged from early Bitcoin scaling discussions, with proposals like Blockstream’s Liquid Network demonstrating how sidechains could handle specific workloads without congesting the main network. The Ethereum ecosystem later embraced sidechains as a practical solution to high gas fees, with networks like Polygon PoS attracting billions of dollars in value and hosting major decentralized applications. Today, sidechains represent an important piece of the multi-chain landscape, offering a middle ground between the security of main chains and the scalability demands of growing user bases.

How Sidechains Work

The fundamental mechanism enabling sidechains is the lock-and-mint process that occurs when assets cross between chains. When a user wants to move tokens from a main chain to a sidechain, they send assets to a special smart contract or address on the main chain where they become locked and inaccessible. Once this locking transaction is confirmed and verified, the sidechain mints an equivalent amount of wrapped tokens that represent a claim on the locked originals. These wrapped tokens function identically to native tokens on the sidechain, allowing users to transact, interact with smart contracts, and participate in the sidechain ecosystem.

The reverse process occurs when users want to return to the main chain. They burn their wrapped tokens on the sidechain, destroying them permanently, and present proof of this burn to the main chain bridge contract. Upon verification, the locked original tokens are released back to the user’s control. The entire system maintains a one-to-one backing between wrapped sidechain tokens and locked main chain assets, ensuring that total supply remains constant across both networks. This conservation property is essential for maintaining the value parity between wrapped and original tokens.

Bridge mechanisms that verify cross-chain transactions vary significantly in their trust assumptions and security properties. Some sidechains rely on federated bridges where a fixed set of known entities, often the same validators that secure the sidechain, collectively control the locked assets through multi-signature arrangements. Others implement more decentralized verification using light client proofs that cryptographically demonstrate the state of one chain to the other. The choice of bridge design represents one of the most consequential security decisions in sidechain architecture, as bridge failures have historically resulted in some of the largest losses in cryptocurrency history.

Sidechain Security

Unlike rollups that inherit security from their base layer, sidechains are responsible for their own consensus and must attract sufficient honest participation to remain secure. Each sidechain operates with its own set of validators who stake tokens, produce blocks, and reach agreement on the canonical chain state. The security of a sidechain therefore depends entirely on the honesty and competence of its validator set, the economic value they have at stake, and the technical soundness of its consensus protocol.

This independence creates distinct trust assumptions that users must understand. When using a rollup, the security guarantee comes from the underlying main chain, and users can recover their funds through main chain mechanisms even if rollup operators misbehave. With sidechains, if a majority of validators collude or the consensus mechanism is compromised, users have no recourse to the main chain for protection. Their sidechain assets could be stolen or frozen without the main chain being able to intervene. This fundamental difference means that sidechain security is only as strong as the sidechain itself, regardless of how secure the connected main chain might be.

The bridge connecting a sidechain to its main chain represents a critical vulnerability that requires careful consideration. Even if a sidechain’s consensus is perfectly secure, a bridge failure can result in loss of all locked assets. Bridge operators, whether federated validators or decentralized verification systems, hold the keys to potentially billions of dollars in locked tokens. This concentration of value makes bridges attractive targets for attackers, and the complexity of cross-chain verification creates opportunities for subtle bugs. High-profile bridge exploits at Ronin, Wormhole, and other projects have demonstrated the catastrophic consequences when bridge security fails.

Notable Sidechains

Polygon PoS stands as the most prominent sidechain in the Ethereum ecosystem, processing millions of transactions daily at a fraction of mainnet gas costs. Originally launched as Matic Network, it evolved into a comprehensive scaling solution that attracted major DeFi protocols, NFT marketplaces, and gaming applications seeking cheaper and faster transactions. Polygon PoS operates with its own validator set running a modified version of Tendermint consensus, secured by staked MATIC tokens. While Polygon has since expanded into ZK rollup development with zkEVM and other products, the PoS sidechain remains its highest-volume network and continues to serve as critical infrastructure for the Ethereum ecosystem.

Ronin emerged as a purpose-built sidechain for blockchain gaming, specifically designed to support Axie Infinity and other games from Sky Mavis. By creating a dedicated execution environment with minimal fees and fast confirmations, Ronin enabled the play-to-earn gaming model that drove explosive growth in 2021. However, Ronin also experienced one of the largest bridge exploits in history when attackers compromised validator keys controlling the bridge to Ethereum, draining over $600 million. The incident highlighted the security risks inherent in sidechains with small, identifiable validator sets, and prompted significant redesign of Ronin’s security architecture including expanding the validator set and implementing additional safeguards.

Gnosis Chain, formerly known as xDai, pioneered the sidechain concept in the Ethereum ecosystem with its focus on stable-value transactions using DAI-backed tokens. The network processes transactions in a stablecoin-denominated environment, making it particularly suitable for payment applications and everyday transactions where fee predictability matters. Gnosis Chain transitioned to a proof-of-stake consensus mechanism secured by GNO tokens and now positions itself as a community-owned network with a focus on resilience and decentralization. Its validator set is notably more distributed than many sidechains, reflecting a design philosophy that prioritizes security over raw performance.

Sidechains vs Rollups

The fundamental distinction between sidechains and rollups lies in where security guarantees originate. Rollups post transaction data to the main chain and use either fraud proofs or validity proofs to ensure that anyone can verify correct execution. This architecture means that even if all rollup operators become malicious or disappear, users can reconstruct the rollup state from on-chain data and recover their funds through main chain mechanisms. Sidechains offer no such guarantee because they don’t post their transaction data to the main chain, and their security depends entirely on their own validator set remaining honest and operational.

This security model difference has profound implications for trust requirements. When using a rollup, users need only trust the security of the underlying main chain because the rollup inherits those guarantees through cryptographic and economic mechanisms. When using a sidechain, users must separately evaluate and trust the sidechain’s consensus mechanism, validator set, bridge design, and operational security. A sufficiently motivated or sophisticated attack on a sidechain could result in permanent loss of user funds, whereas a rollup attack is ultimately constrained by main chain security. For applications handling significant value or requiring strong security guarantees, this distinction often favors rollups despite their higher costs.

However, sidechains retain important advantages that ensure their continued relevance. The independence that creates security challenges also enables flexibility that rollups cannot match. Sidechains can run entirely different virtual machines, implement novel consensus algorithms, or optimize for specific use cases without being constrained by main chain capabilities. They can achieve lower latency because they don’t wait for main chain confirmations, and they can offer lower costs because they don’t pay for main chain data availability. For applications where speed and cost matter more than absolute security, or where the specific features of a sidechain are essential, the tradeoff may be worthwhile. The blockchain scaling landscape ultimately benefits from having both options, with sidechains and rollups serving different points on the security-performance spectrum.

Related Primitives