Computer Science ›› 2020, Vol. 47 ›› Issue (6): 294-302.doi: 10.11896/jsjkx.191100055

• Information Security • Previous Articles     Next Articles

BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform

YE Shao-jie1, WANG Xiao-yi2, XU Cai-chao2, SUN Jian-ling1   

  1. 1 College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China
    2 Hangzhou Qulian Technology Co.,Ltd.,Hangzhou 310051,China
  • Received:2019-10-07 Online:2020-06-15 Published:2020-06-10
  • About author:YE Shao-jie,born in 1995,Ph.D candidate,is a member of China Computer Federation.His main research interests include blockchain,distributed database and storage system.
    SUN Jian-ling,born in 1964,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include database system,machine learning,financial technology and software engineering.

Abstract: In order to make the information between heterogeneous blockchains interact and realize the interoperability of blockchain,a general cross-chain message transfer protocol IBTP is proposed.Based on the protocol IBTP and side-relay chain strategy,this paper constructs a highly scalable,easily compatible,dynamically upgradeable,secure and highly available heterogeneous blockchain cross-chain system called BitXHub,which realizes heterogeneous asset exchange,information interoperability and service complementarity.BitXHub consists of three roles:relay chain,application chain and cross-chain gateway called Pier.It has three core technologies:universal cross-chain transmission protocol,heterogeneous transaction verification engine and multi-layer routing.It ensures the security and flexibility of cross-chain transactions.Compared to Polkadot and Cosmos,BitXHub provides a unified cross-chain contract template for homogeneous and heterogeneous application chains and relay chain contains a dynamically upgradeable verification engine,so it has good heterogeneous blockchain compatibility.Based on distributed hash table,cross-chain gateways form ad hoc network which let BitXHub achieve high scalability,and cross-chain gateways can forward cross-chain messages statelessly.It has been verified by experiments that BitXHub guarantees asynchronous distributed transactions between heterogeneous blockchains,achieving high throughput,low latency,high scalability,and low overhead.

Key words: Heterogeneous blockchain, Interoperability, Universal cross-chain protocol, Stateless, Scalability, Distributed transaction

CLC Number: 

  • TP391
[1]BUTERIN V.Chain interoperability[EB/OL].[2016-9-9].https://allquantor.at/blockchainbib/pdf/vitalik2016chain.pdf.
[2]HERLIHY M.Atomic cross-chain swaps[C]//Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing.ACM,2018:245-254.
[3]HOPE-BAILIE A,THOMAS S.Interledger:Creating a standard for payments[C]//Proceedings of the 25th International Conference Companion on World Wide Web.International World Wide Web Conferences Steering Committee,2016:281-282.
[4]KWON J,BUCHMAN E.A Network of Distributed Ledgers Cosmos [EB/OL].https://static.coinpaper.io/files/whitepapers/atom-cosmos_whitepaper.pdf.
[5]WOOD G.Polkadot:Vision for a heterogeneous multi-chain framework[EB/OL].https://polkadot.network/PolkaDotPaper.pdf.
[6]KWON J.Tendermint:Consensus without mining[EB/OL].https://cdn.relayto.com/media/files/LPgoWO18TCeMIggJVakt_tendermint.pdf.
[7]BUCHMAN E,KWON J,MILOSEVIC Z.The latest gossip on BFT consensus[J].arXiv:1807.04938,2018.
[8]TEUTSCH J,REITWIEβNER C.A scalable verification solu-tion for blockchains[J].arXiv:1908.04756,2019.
[9]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments[EB/OL].https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf.
[10]POON J,BUTERIN V.Plasma:Scalable autonomous smart contracts[EB/OL].https://plasma.io/plasma.pdf.
[11]HAAS A,ROSSBERG A,SCHUFF D L,et al.Bringing the web up to speed with WebAssembly[J].ACM SIGPLAN Notices,2017,52(6):185-200.
[12]GARAY J,KIAYIAS A,LEONARDOS N.The bitcoin backbone protocol:Analysis and applications[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2015:281-310.
[13]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[EB/OL].[2008-11-1].https://bitcoin.org/bitcoin.pdf.
[14]WOOD G.Ethereum:A secure decentralised generalised transaction ledger[EB/OL].https://ljk.imag.fr/membres/Jean-Guillaume.Dumas/Enseignements/ProjetsCrypto/Ethereum/ethereum-yellowpaper.pdf.
[15]BUTERIN V.A next-generation smart contract and decentralized application platform[EB/OL].https://cryptorating.eu/ whitepapers/Ethereum/Ethereum_white_paper.pdf.
[16]DOUCEUR J R.The sybil attack[C]//International workshop on peer-to-peer systems.Berlin:Springer,2002:251-260.
[17]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hyperledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.ACM,2018:30.
[18]KIAYIAS A,KONSTANTINOU I,RUSSELL A,et al.A Provably Secure Proof-of-Stake Blockchain Protocol[J].IACR Cryptology ePrint Archive,2016,2016:889.
[19]ROCKET T.Snowflake to avalanche:A novel metastable consensus protocol family for cryptocurrencies[EB/OL].https://assets.ctfassets.net/xwo28v1qbyr0/CCMPhMqQM0kKMKyyiq0sE/d55ade6e3ea5294f3fdb913647630246/avalanche-consensus.pdf.
[20]GILAD Y,HEMO R,MICALI S,et al.Algorand:Scaling byzantine agreements for cryptocurrencies[C]//Proceedings of the 26th Symposium on Operating Systems Principles.ACM,2017:51-68.
[21]MAYMOUNKOV P,MAZIERES D.Kademlia:A peer-to-peer information system based on the xor metric[C]//International Workshop on Peer-to-Peer Systems.Berlin:Springer,2002:53-65.
[22]CHEN Z,ZHUO Y U,DUAN Z,et al.Inter-blockchain communication[J].DEStech Transactions on Computer Science and Engineering,2017(cst):448-454.
[23]BAIRD L.The swirlds hashgraph consensus algorithm:Fair, fast,byzantine fault tolerance:Swirlds Tech Reports SWIRLDS-TR-2016-01[R].2016.
[24]BENTOV I,HUBÁCEK P,MORAN T,et al.Tortoise and Hares Consensus:the Meshcash Framework for Incentive-Compatible,Scalable Cryptocurrencies[J].IACR Cryptology ePrint Archive,2017,2017:300.
[25]WANG X,ZHAO H,ZHU J.GRPC:A communication cooperation mechanism in distributed systems[J].ACM SIGOPS Ope-rating Systems Review,1993,27(3):75-86.
[26]VUKOL I.The quest for scalable blockchain fabric:Proof-ofwork vs.BFT replication[C]//International workshop on open problems in network security.Cham:Springer,2015:112-125.
[1] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[2] ZHUANG Yuan, GUO Qiang, ZHANG Jie, ZENG Yun-hui. Large Scalability Method of 2D Computation on Shenwei Many-core [J]. Computer Science, 2020, 47(8): 87-92.
[3] GAO Lin, DUAN Guo-lin and YAO Tao. Research on Organizational Interoperability Modeling and Evaluation Based on Graph Theory [J]. Computer Science, 2020, 47(6A): 572-576.
[4] WU Bin-feng. Design of IoT Middleware Based on Microservices Architecture [J]. Computer Science, 2019, 46(6A): 580-584.
[5] ZHAO Xing-wang,LIANG Ji-ye,GUO Lan-jie. Collaborative Filtering Recommendation Algorithm Based on Space Transformation [J]. Computer Science, 2018, 45(7): 16-21.
[6] ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24.
[7] ZHOU Qiang, XIE Jing and ZHAO Hua-ming. Architecture and Solution for Large Web Sites [J]. Computer Science, 2017, 44(Z6): 587-590.
[8] HAI Mo and ZHANG You. Performance Comparison of Clustering Algorithms in Spark [J]. Computer Science, 2017, 44(Z6): 414-418.
[9] TANG Bing, Laurent BOBELIN and HE Hai-wu. Parallel Algorithm of Nonnegative Matrix Factorization Based on Hybrid MPI and OpenMP Programming Model [J]. Computer Science, 2017, 44(3): 51-54.
[10] YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9.
[11] LIU Lin and ZHOU Jian-tao. Review for Research of Control Plane in Software-defined Network [J]. Computer Science, 2017, 44(2): 75-81.
[12] LI Chi-xin and LAN Cong-hua. Sobel Edge-detection on Color Image Based on Interoperability between CUDA and OpenGL [J]. Computer Science, 2015, 42(Z6): 221-222.
[13] LI Zhao, ZHAO Yi, LIANG Peng and HE Ke-qing. MFI Based Interoperability Measurement of Business Models in Enterprises [J]. Computer Science, 2015, 42(Z11): 479-485.
[14] LU Wei-feng, YU Ke-yuan and CHEN Si-guang. Performance Analysis of Time-delay of Hybrid Authentication in Mobile Multihop Relay Networks [J]. Computer Science, 2015, 42(2): 46-49.
[15] MA Zhi-xin,LIU Hai-ying and XIE Xian-zhong. Vehicular Ad hoc Networks Routing Protocol Research Based on Geographic Position [J]. Computer Science, 2014, 41(5): 107-110.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .