# Hash Locking

Hash locking, often associated with atomic swaps, involves the use of a cryptographic hash function to lock a transaction or a contract. To unlock and access the assets, the counterparty must provide the correct pre-image of the hash.

Through this process, if the trade doesn't complete, funds are returned after the timeout, and neither party is at risk of losing their assets.

1. A user locks their asset on Chain 1 by generating a secret and its corresponding hash.
2. The user initiates a transaction on Chain 2 with the hash, signaling their intent to swap.
3. Chain 2's contract (or another participant) verifies the hash lock and locks the corresponding asset on Chain 2.
4. To complete the swap, the user reveals the original secret on Chain 2, which unlocks the asset there.
5. This revealed secret can then be used on Chain 1 to unlock the initially locked asset.

HTLC Limitations:

<https://dl.acm.org/doi/abs/10.1145/3558535.3559786>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://qualitax.gitbook.io/interop/bridging-approaches/mechanisms/hash-locking.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
