1DLT: Rapid Deployment of Secure and Efficient EVM-Based Blockchains

Authors Simone Bottoni, Anwitaman Datta, Federico Franzoni, Emanuele Ragnoli, Roberto Ripamonti, Christian Rondanini, Gokhan Sagirlar, Alberto Trombetta

Thumbnail PDF


  • Filesize: 5.27 MB
  • 15 pages

Document Identifiers

Author Details

Simone Bottoni
  • RTM, Lugano, Switzerland
Anwitaman Datta
  • Nanyang Technological University, Singapore, Singapore
Federico Franzoni
  • Unaffiliated Researcher, Barcelona, Spain
Emanuele Ragnoli
  • RTM, Lugano, Switzerland
Roberto Ripamonti
  • RTM, Lugano, Switzerland
Christian Rondanini
  • RTM, Lugano, Switzerland
Gokhan Sagirlar
  • RTM, Lugano, Switzerland
Alberto Trombetta
  • Insubria University, Varese, Italy

Cite AsGet BibTex

Simone Bottoni, Anwitaman Datta, Federico Franzoni, Emanuele Ragnoli, Roberto Ripamonti, Christian Rondanini, Gokhan Sagirlar, and Alberto Trombetta. 1DLT: Rapid Deployment of Secure and Efficient EVM-Based Blockchains. In 4th International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2022). Open Access Series in Informatics (OASIcs), Volume 110, pp. 3:1-3:15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)


Limited scalability and transaction costs are some of the critical issues that hamper a wider adoption of distributed ledger technologies (DLTs). That is particularly true for the Ethereum [Wood, 2014] blockchain, which, so far, has been the ecosystem with the highest adoption rate. Several solutions have been attempted in the last few years, most of which adopt the approach to offload transactions from the blockchain mainnet, a.k.a. Level 1 (L1), to a separate network. Such solutions are collectively known as Level 2 (L2) systems. While improving scalability, the adoption of L2 introduces additional drawbacks: users have to trust that the L2 system has correctly performed transactions or, conversely, high computational power is required to prove transactions’ correctness. In addition, significant technical knowledge is needed to set up and manage such an L2 system. To tackle such limitations, we propose 1DLT: a novel system that enables rapid deployment of an Ethereum Virtual Machine based (EVM-based) blockchain that overcomes those drawbacks.

Subject Classification

ACM Subject Classification
  • Computer systems organization → Distributed architectures
  • Blockchain
  • EVM
  • Layer Two
  • Scalability
  • Network Fees


  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    PDF Downloads


  1. Binance bridge. URL: https://www.bnbchain.org/en/bridge.
  2. Blockchain bridges. URL: https://ethereum.org/en/developers/docs/bridges.
  3. Blockchain bridges classification. URL: https://li.fi/knowledge-hub/bridge-classification.
  4. CertiK. URL: https://www.certik.com.
  5. Connext bridge. URL: https://bridge.connext.network.
  6. DragonGlass. URL: https://app.dragonglass.me.
  7. EIPS 2930. URL: https://eips.ethereum.org/EIPS/eip-2930.
  8. Erigon. URL: https://github.com/ledgerwatch/erigon.
  9. Erigon stage sync. URL: https://github.com/ledgerwatch/erigon/blob/devel/eth/stagedsync.
  10. Ethereum gas. URL: https://ethereum.org/en/developers/docs/gas.
  11. Ethereum nodes. URL: https://ethereum.org/en/developers/docs/nodes-and-clients.
  12. Ethereum opcodes. URL: https://ethereum.org/it/developers/docs/evm/opcodes.
  13. Ethereum Scaling. URL: https://ethereum.org/en/developers/docs/scaling.
  14. Ethereum testnets. URL: https://ethereum.org/en/developers/docs/networks.
  15. Ethereum TPS. URL: https://ethtps.info.
  16. Etherscan. URL: https://etherscan.io.
  17. Etherscan smart contract verification. URL: https://etherscan.io/verifyContract.
  18. EVM. URL: https://ethereum.org/en/developers/docs/evm.
  19. EVMone. URL: https://github.com/ethereum/evmone.
  20. Geth. URL: https://geth.ethereum.org/docs.
  21. Hacken. URL: https://hacken.io.
  22. Hardhat. URL: https://hardhat.org.
  23. Hedera Consensus Service. URL: https://hedera.com/consensus-service.
  24. Hedera mirror service. URL: https://hedera.com/learning/hedera-hashgraph/what-is-the-hedera-mirror-network.
  25. Hop. URL: https://app.hop.exchange.
  26. Introduction to blockchain bridges. URL: https://ethereum.org/en/bridges/.
  27. Leaderboard of Ethereum bridge attacks. URL: https://rekt.news/leaderboard.
  28. Leveldb database. URL: https://github.com/google/leveldb.
  29. Merkle Patricia Trie. URL: https://eth.wiki/fundamentals/patricia-tree.
  30. Metamask. URL: https://metamask.io.
  31. Optimism Attack. URL: https://cointelegraph.com/news/optimism-loses-20m-tokens-after-l1-and-l2-confusion-exploited.
  32. Optimism Bounty. URL: https://cryptoslate.com/critical-bug-in-ethereum-l2-optimism-2m-bounty-paid.
  33. Optimistic Rollups. URL: https://ethereum.org/en/developers/docs/scaling/optimistic-rollups.
  34. Plasma. URL: https://ethereum.org/en/developers/docs/scaling/plasma.
  35. Polygon-Ethereum Bridge. URL: https://docs.polygon.technology/docs/develop/ethereum-polygon/getting-started.
  36. Raspberry. URL: https://datasheets.raspberrypi.com/rpi4/raspberry-pi-4-datasheet.pdf.
  37. Real time Bitcoin finality. URL: https://statoshi.info/d/000000006.
  38. Real time Ethereum finality. URL: https://ethtps.info.
  39. Sidechains. URL: https://ethereum.org/en/developers/docs/scaling/sidechains.
  40. Sled database. URL: https://github.com/spacejam/sled.
  41. Solidity report. URL: https://blog.soliditylang.org/2022/02/07/solidity-developer-survey-2021-results.
  42. Sourcify. URL: https://docs.sourcify.dev/docs/intro.
  43. State Channels. URL: https://ethereum.org/en/developers/docs/scaling/state-channels.
  44. The Ethereum merge. URL: https://ethereum.org/en/upgrades/merge.
  45. The interoperability trilemma. URL: https://blog.connext.network/the-interoperability-trilemma-657c2cf69f17.
  46. The Optimism bridge. URL: https://ethereum.org/en/developers/tutorials/optimism-std-bridge-annotated-code.
  47. Trail of Bits. URL: https://www.trailofbits.com.
  48. Validium. URL: https://ethereum.org/en/developers/docs/scaling/validium.
  49. web3.js API. URL: https://web3js.readthedocs.io/en/v1.7.4/.
  50. Wormhole hack. URL: https://rekt.news/wormhole-rekt.
  51. Zk Rollups. URL: https://ethereum.org/en/developers/docs/scaling/zk-rollups.
  52. Bored ape crush Ethereum. https://www.cnet.com/personal-finance/crypto/bored-ape-yacht-club-just-broke-the-ethereum-blockchain, 2022.
  53. Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. Sok: Layer-two blockchain protocols. In Financial Cryptography and Data Security - 24th International Conference, FC, Lecture Notes in Computer Science, pages 201-226. Springer, 2020. Google Scholar
  54. Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, and Keisuke Tanaka. Sok: A taxonomy for layer-2 scalability related protocols for cryptocurrencies. IACR Cryptol. ePrint Arch., page 352, 2019. Google Scholar
  55. Starkware. Starkware Cairo. URL: https://starkware.co/cairo.
  56. Starkware. Starkware Libs. URL: https://github.com/starkware-libs.
  57. Nicholas Weaver. The Web3 Fraud. https://www.usenix.org/publications/loginonline/web3-fraud, 2021.
  58. Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014. Google Scholar
Questions / Remarks / Feedback

Feedback for Dagstuhl Publishing

Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail