MAP Protocol 2.0
Overview
How It Works
Source Chain Maintainer Network Target Chain
│ │ │
│ 1. User deposits │ │
│ to Vault │ │
│ │ │
│ 2. Maintainers │ │
│ observe ────────────►│ │
│ │ │
│ 3. TSS KeySign │
│ │ │
│ │ 4. Signature submitted │
│ ├──────────────────────────►│
│ │ │
│ │ 5. Gateway verifies │
│ │ and releases assets │
│ │ │Step-by-Step Process
Key Components
TSS (Threshold Signature Scheme)
Vault
Gateway
Maintainer
Security Model
Threshold Security
Why It's Secure
Supported Chains
Advantages over v1
Aspect
v1 (Light Client)
v2 (TSS)
Fusion with Light Client
Use Cases
Getting Started
Roles in v2
Role
Responsibility
Reward
Last updated