In the competition of Web3 infrastructure, an increasing number of projects claim to be building “the TCP/IP of Web3.” Among these, Zero-Knowledge (ZK) proof technology has gained significant attention due to its powerful verification capabilities, with many Layer 0 projects positioning ZK proofs as their core competitive advantage. However, we need to think deeply: Are ZK proofs truly the essence of Layer 0?

Let us approach this question from a more fundamental perspective.



Reimagining the Nature of Layer 0

When we talk about Layer 0, what are we actually discussing? It is not an execution engine, nor is it merely a consensus mechanism. The true value of Layer 0 lies in trust abstraction — providing a dependable trust foundation for upper-layer applications while encapsulating complex cross-chain operations, state synchronization, and verification mechanisms within the protocol layer.

Much like the Internet’s TCP/IP protocol stack, Layer 0 needs to solve a core problem: how to establish a reliable communication and state transfer mechanism in a network environment filled with uncertainty. The key concepts here are “abstraction” and “trust,” rather than specific technical implementations.



The Limitations of ZK Proofs

ZK proofs indeed possess powerful verification capabilities, enabling the proof of computational correctness without revealing information. However, when we consider them as the sole technical path for Layer 0, we encounter several practical challenges.

First is the computational cost. ZK proof protocols are computationally intensive, requiring substantial processing power and time, which may be impractical for real-time, high-throughput applications. Every state transition requires generating ZK proofs, creating serious performance bottlenecks in scenarios involving high-frequency trading or numerous state updates. While mitigation strategies include efficient implementation techniques, optimized cryptographic algorithms, and advances in hardware acceleration, the computationally intensive nature of ZK proofs means they cannot serve as a universal solution for all scenarios.

Second is the flexibility constraint. Pure ZK systems often require predefined rules and circuits for state transitions, which poses a serious limitation for Layer 0 systems that need rapid iteration and adaptation to different application scenarios.

Most importantly, ZK proofs solve verification problems, not trust problems. Even if we can perfectly prove the correctness of every state transition, we still need to address more fundamental questions: how to enable different chains and applications to trust each other and collaborate effectively.



Understanding the Limitations of TCP/IP and the Complexity of Web3

When we discuss learning design philosophy from TCP/IP, we need to recognize an important reality: the traditional TCP/IP protocol stack was born in the 1970s, primarily solving connectivity problems — how to enable different computer networks to communicate reliably with each other. TCP/IP’s design assumptions were based on a relatively trustworthy environment where network nodes were fundamentally trustworthy or at least had clear administrative authority.

However, Web3 faces entirely different challenges. Web3 must not only solve connectivity problems but also address trust issues in a completely decentralized environment without authoritative institutions. This is like being in a room full of strangers where you need not only to communicate but also to verify identities, securely exchange goods, collaborate on tasks, and maintain fair payment mechanisms.

If TCP/IP solved the problem of “how to build roads,” then Web3 needs to solve the problem of “how to establish a complete socio-economic system without government.” This system requires coordination across multiple dimensions including identity authentication, property rights, contract execution, and dispute resolution.

The Multi-dimensional Challenges of Web3 Protocol Stack

Let us examine the complexity of Web3 infrastructure from a more comprehensive perspective:

ModuleObjectiveExisting ProjectsMaturity Level
ConnectivityGossip networks, P2P, secure routinglibp2p, waku, quic✅ Relatively mature
Decentralized IdentityNo reliance on CA, no reliance on PKIENS, DID, Ethereum Name Service⚠️ Early stage
Decentralized StorageContent addressing, censorship resistance, verifiabilityIPFS, Arweave, Ceramic⚠️ Semi-mature, high cost
Decentralized ComputingVerifiable execution, off-chain computation, ZK verificationRISC Zero, zkWASM, Aleo⚠️ Very early stage
Decentralized PaymentsState transitions + settlement + zkPayLightning, StarkNet, Aztec✅ Initial framework
Proof Protocol Layer (ZK)Composable, recursive, security layerPlonky2, Halo2, Nova✅ Mature but heavy

This table reveals that genuine Web3 infrastructure faces multi-dimensional challenges. The connectivity layer is already relatively mature because it most closely resembles the problems traditional TCP/IP aimed to solve. The decentralized identity layer remains in early stages, reflecting the fundamental challenge of establishing trustworthy identity systems without central authority. The decentralized storage layer is semi-mature but costly, indicating that technical feasibility has been proven but economic models require optimization. The decentralized computing layer is very early stage because verifiable computation involves complex cryptographic proofs. The proof protocol layer is mature but heavy, which perfectly validates our point about ZK proofs — the technology itself is relatively mature, but computational costs remain high.



The Hybrid Model of Trust Abstraction

Based on our understanding of Web3’s complexity, a genuine Layer 0 should adopt a hybrid trust model, providing different trust guarantee mechanisms according to various application scenarios and security requirements. This design approach can draw inspiration from LayerZero V2’s architecture.

LayerZero’s architecture is modular at the verification level while remaining static at the transport level. This design achieves a crucial balance between current performance and future-oriented design. Any entity capable of verifying cross-chain data packets can join LayerZero as a Decentralized Verification Network (DVN), thereby avoiding vendor lock-in at the security level.

The core principle of this design philosophy is: different messages and state transitions can choose different verification mechanisms. For high-value cross-chain asset transfers, ZK proofs can provide the strongest security guarantees. For low-risk data synchronization or state queries, optimistic verification or multi-signature mechanisms can be used to reduce costs. For applications requiring rapid response, instant confirmation mechanisms can be provided with asynchronous verification running in the background.

It is worth noting that practical solutions are being explored to address ZK proof computational costs. For example, Polyhedra’s zkLightClient directly addresses LayerZero V2’s challenge through proof batching. Polyhedra’s zkLightClient significantly reduces on-chain verification costs and latency by compressing multiple transaction verifications into a single ZKP. This batching technique demonstrates how to maintain ZK proof security while solving performance bottlenecks through engineering optimization.



Concrete Implementation of the Hybrid Model

Based on this approach, a genuine Layer 0 system should comprise several layers:

Core State Layer: For account balances, critical state transitions, and other core data, ZK proofs ensure absolute security. This data has relatively low update frequency but requires the highest security standards.

Extended Interaction Layer: For inter-application message passing, governance voting, data publishing, and other operations, configurable verification mechanisms are provided. Applications can choose ZK proofs, optimistic verification, or hybrid modes based on their specific needs.

Routing Coordination Layer: Responsible for coordination between different verification mechanisms, ensuring system-wide consistency and reliability. This layer’s design resembles the routing layer in network protocol stacks, handling load balancing and fault recovery.



Design Proposal for Hybrid Model

When considering a hybrid model, we can reference real hybrid chain design experiences and adopt the following structure:

ZK Core + Optimistic Side Path Architecture: This architecture’s core concept is maintaining the strongest security guarantees while providing optimization paths for high-frequency interaction scenarios. The default path enters the state engine through signature verification, account nonce checking, and snapshot mechanisms, enabling rapid response to most transaction requests. Simultaneously, the system asynchronously generates ZK proofs, marking them as “strong security state blocks” to ensure absolute safety of critical states.

More importantly, this architecture provides a flexible query interface through the query_proof(hash) mechanism, allowing users or other chains to verify the correctness of any state transition on demand. This “proof on demand” design philosophy solves a crucial problem: not all state transitions require real-time ZK proofs, but all state transitions should be verifiable.

This design’s advantage lies in finding the optimal balance between performance and security. If Layer 0 is positioned as “the final trust anchor for consensus, state, and transfers,” then more ZK proofs are indeed better because they provide the strongest security guarantees. However, if Layer 0 needs to support high-frequency interactions and low-latency experiences, then hybrid strategies become crucial. By introducing the “proof on demand + optimistic path” combination mechanism, the system can maintain the highest security standards while meeting real-world application performance requirements.



Understanding Trust Abstraction Evolution Through LayerZero

In LayerZero V2, oracles and relayers have been replaced by Decentralized Verification Networks (DVNs) and permissionless executors. DVNs are responsible for verifying message accuracy before message delivery and correct execution on target chains.

This evolution embodies an important design philosophy: separating verification from execution. LayerZero addresses the resource-intensive nature of developing and updating external security code by separating verification from execution. Any code not critical to security is moved to separate components — executors — which can run permissionlessly and remain isolated from verification logic.

This separation not only improves system flexibility but, more importantly, provides applications with choice. LayerZero endpoints provide stable application-facing interfaces, lossless network channel abstractions, exactly-once delivery guarantees, and manage OApp security stacks. Endpoint immutability ensures long-term channel validity through enforced update isolation, configuration ownership, and channel integrity.



Trade-offs in Practical Applications

Let us return to practical application scenarios to understand the value of this design. Suppose we are building a cross-chain DeFi application:

For large-value asset transfers, we need the highest level of security guarantees, making ZK proofs the optimal choice. Even with high computational costs, this is acceptable relative to asset value.

For price information synchronization, we need speed and timeliness, allowing us to use optimistic verification mechanisms and initiate ZK proof processes only when disputes arise.

For governance voting, we need transparency and tamper-resistance, allowing us to use commit-reveal mechanisms combined with delayed ZK verification.

For user behavior data, we need privacy protection and batch processing, allowing us to use recursive ZK proofs to amortize computational costs.



Design Philosophy of Modular Protocol Ecosystem

The success of traditional TCP/IP protocol stacks lies in providing a layered, modular, and scalable architecture where each layer has clearly defined responsibility boundaries, upper layers need not concern themselves with lower-layer implementations, and lower layers provide abstract service interfaces for upper layers.

However, Web3’s complexity far exceeds traditional internet requirements. Web3’s trust abstraction encompasses not only transaction verification but also identity authentication, data storage, computational execution, payment settlement, and multiple other dimensions. Each dimension has its own maturity level and challenges requiring coordinated development. Therefore, Web3’s Layer 0 needs to adopt modular composition thinking, not merely layered abstraction.

As we can see from our protocol stack analysis, the true Web3 TCP/IP is not just “one protocol” but rather a modular, composable protocol ecosystem. Different application scenarios require different trust guarantees, storage methods, computational models, and payment mechanisms.

Similarly, Web3’s Layer 0 should follow this design philosophy. LayerZero enables developers to create and configure unified applications, tokens, and data primitives — regardless of chain — through arbitrary message transmission, much like TCP/IP standardized internet communication.

The key to this standardization lies not in forcing the use of specific verification mechanisms but in providing unified interfaces and abstractions. Developers can focus on business logic while delegating complex cross-chain communication, state synchronization, and security verification to the protocol layer.



Technical Implementation of Hybrid Model

From a technical implementation perspective, a hybrid model Layer 0 system needs to address several key issues:

State Management: How to maintain state consistency across different verification mechanisms? This requires designing a unified state mechanism capable of handling different types of state updates and verification results.

Routing Mechanism: How to automatically select appropriate verification paths based on message types and security requirements? This requires implementing intelligent routing algorithms that can balance security, cost, and performance.

Dispute Resolution: How to arbitrate and resolve conflicts when different verification mechanisms produce contradictory results? This requires designing layered dispute resolution mechanisms that ultimately fall back to the most secure verification methods.

Performance Optimization: How to maximize system throughput and response speed while ensuring security? This requires implementing various optimization techniques such as batching, parallel verification, and precomputation.



Conclusion: The Future of Trust Abstraction

ZK proofs are an important technology providing Web3 with powerful verification capabilities. However, treating them as the sole technical path for Layer 0 represents limited thinking. A genuine Layer 0 should be a trust abstraction layercapable of providing the most appropriate trust guarantee mechanisms according to different application needs and scenarios.

This hybrid model design can not only fully leverage ZK proof advantages but also provide greater flexibility and scalability for the entire Web3 ecosystem. Just as TCP/IP protocol stacks achieved internet prosperity through layered and modular design, Web3’s Layer 0 should also establish a solid foundation for next-generation decentralized applications through trust abstraction and hybrid models.

In this process, we need to shift from technical implementation perspectives to protocol design perspectives, from single solutions to ecosystem construction, and from technology-first to user experience-first approaches. Only in this way can we truly build the “TCP/IP” of the Web3 world.

Comprehensively speaking, building genuine Web3 infrastructure requires us to grasp several key points:

  • Recognize that Web3 complexity far exceeds traditional internet requirements: Traditional TCP/IP only solved connectivity problems, while Web3 needs to solve multi-dimensional trust problems including identity, storage, computation, and payments in a completely decentralized environment.

  • ZK proofs are not the essence of Layer 0; trust abstraction is: True value lies in providing the most appropriate trust guarantee mechanisms according to different application needs, rather than forcing the use of a single technical path.

  • Build a modular, composable protocol ecosystem: Web3’s Layer 0 should be a protocol ecosystem capable of flexibly combining different trust mechanisms, storage solutions, computational models, and payment methods.

  • Learn from LayerZero V2’s practical experience: Through decentralized verification networks and verification-execution separation, a good balance has been achieved between modular security and protocol stability.

Only by deeply understanding these complexities can we truly build infrastructure suitable for the Web3 era, establishing a solid foundation for the prosperity of decentralized applications.