计算机科学 ›› 2022, Vol. 49 ›› Issue (5): 287-295.doi: 10.11896/jsjkx.210800132

• 信息安全 • 上一篇    下一篇

区块链跨链技术发展及应用

孙浩1, 毛瀚宇1, 张岩峰1, 于戈1, 徐石成2, 何光宇2   

  1. 1东北大学计算机科学与工程学院 沈阳110169
    2 东软集团股份有限公司技术与战略发展事业部 沈阳110179
  • 收稿日期:2021-08-16 修回日期:2022-02-04 出版日期:2022-05-15 发布日期:2022-05-06
  • 通讯作者: 于戈(yuge@mail.neu.edu.cn)
  • 作者简介:(704825130@qq.com)
  • 基金资助:
    辽宁省重点研发计划(2020JH2/10100037);东软集团股份有限公司开放课题(NCBETOP2001)

Development and Application of Blockchain Cross-chain Technology

SUN Hao1, MAO Han-yu1, ZHANG Yan-feng1, YU Ge1, XU Shi-cheng2, HE Guang-yu2   

  1. 1 School of Computer Science and Engineering,Northeastern University,Shenyang 110169,China
    2 Neusoft Corporation,Shenyang 110179,China
  • Received:2021-08-16 Revised:2022-02-04 Online:2022-05-15 Published:2022-05-06
  • About author:SUN Hao,born in 1997,postgraduate,is a student member of China Computer Federration.Her main research interests include query processing and blockchain technology.
    YU Ge,born in 1962,professor and Ph.D supervisor,is a member of China Computer Federation.His main research interests include distributed system and big data management.
  • Supported by:
    Key R & D Program of Liaoning Province(2020JH2/10100037) and Open Program of Neusoft Corporation(NCBETOP2001).

摘要: 随着区块链技术的不断发展与创新,大量基于区块链的应用不断诞生,如今的区块链系统大多是异构且不互联的,链与链之间无法进行直接的价值流通,这在很大程度上限制了区块链的功能拓展与发展空间。跨链技术指在不同区块链系统实例之间交换信息,并对交换的信息加以利用,实现区块链之间的互联互通和价值转移。文中首先介绍了区块链跨链技术的发展历程,详细介绍了公证人机制、侧链中继、哈希锁定和分布式私钥控制4种当前主流的跨链技术;接着,基于上述跨链技术,介绍了几种当前的主流跨链项目与应用;最后,通过对比几种跨链技术在信任模型、安全性、原子性和可扩展性等不同性能上的异同,总结分析了当前跨链技术的发展趋势,并探讨了跨链领域面临的难点问题和今后的发展方向。

关键词: 侧链中继, 分布式私钥控制, 公证人机制, 哈希锁定, 跨链技术, 区块链

Abstract: With the continuous development and innovation of blockchain technology,a large number of blockchain-based applications have been generated.Today’s blockchain systems are mostly heterogeneous and not interconnected,and there is no direct value circulation between chains.This greatly limits the functional expansion and development of blockchains.Cross-chain technology refers to the exchange of information between different blockchain system instances and the use of the exchanged information to achieve interconnection and value transfer between blockchains.Firstly,this paper introduces the development process of blockchain cross-chain technology,and introduces in detail four current mainstream cross-chain technologies including the notary mechanism,the side chain relay,the hash lock and the distributed private key control.Then,based on the above-mentioned cross-chain technology,it further introduces several current mainstream cross-chain projects and applications.Finally,by comparing the similarities and differences of several cross-chain technologies in trust model,security,atomicity,scalability,etc.,the current development trend of cross-chain technology is summarized and analyzed,and the difficulties and future development direction in the field of cross-chain are discussed.

Key words: Blockchain, Cross-chain technology, Distributed private key control, Hash lock, Notary mechanism, Side chain relay

中图分类号: 

  • TF315
[1]LONE A H,NAAZ R.Demystifying Cryptography behindBlockchains and a Vision for Post-Quantum Blockchains[C]//2020 IEEE International Conference for Innovation in Technology (INOCON).2020:1-6.
[2]YU G,NIE T Z,LI X H,et al.The Challenge and Prospect of Distributed Data Management Techniques in Blockchain Systems[J].Chinese Journal of Computers,2021,44(1):28-54.
[3]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Tech-nology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.
[4]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[J/OL].Consulted.https://courses.cs.washington.edu/courses/csep552/18wi/papers/nakamoto-bitcoin.pdf.
[5]KÕLVART M,POOLA M,RULL A.Smart Contracts[M].Springer International Publishing,2016.
[6]HUA S,ZHANG S,PI B,et al.Reasonableness discussion and analysis for Hyperledger Fabric configuration[C]//2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).2020:1-3.
[7]ZHU L,YU H,ZHAN S X,et al.Research on high-performance consortium blockchain technology[J].Ruan Jian Xue Bao:Journal of Software,2019,30(6):1577-1593.
[8]WANG X L,LIU X F,ZHAO G S,et al.Overview of Blockchain:Technology and Challenges[J].Radio Communications Technology,2018,44(6)531-537.
[9]LU A T,ZHAO K,YANG J Y,et al.Research on Cross-chain Technology of Blockchain[J]. Netinfo Security,2019(8):83-90.
[10]GUO Z,GUO S Y,ZHANG S L,et al.Analysis of blockchain cross chain technology[J].Journal of Internet of Things,2020,4(2):36-49.
[11]SUN Y,FAN L J,HONG X H.Technology Development and Application of Blockchain:Current Status and Challenges[J].Engineering Science,2018,20(2):35-40.
[12]SCHWARTZ D,YOUNGS N,BRITTO A.The Ripple protocol consensus algorithm[EB/OL].https://ripple.com/files /ripple_consensus_whitepaper.Pdf.
[13]THOMAS S,SCHWARTZ E.A protocol for interledger pay-ments[EB/OL].https://interledger.org/interledger.pdf.
[14]COLLADO A,GÓMEZ-SUÁREZ A,OONISHI Y,et al.Synthesis,characterisation,and oxygen atom transfer reactions involving the first gold(I)-alkylperoxo complexes[J].Chemical Communications,2013,49(91):10745-10747.
[15]LI C L,CHEN Y.Merkle Hash Tree Based Deduplication in Cloud Storage[J].Applied Mechanics and Materials,2014,556:6223-6227.
[16]Blockstream[EB/OL].[2019-04-12].https://blockstream.com/.
[17]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments[J/OL].https://www.mianshigee.com/ppt/17915exz/.
[18]KWON J,BUCHMAN E.Cosmos:A network of distributedledgers[EB/OL].https://github.com/cosmos/cosmos /blob/master/WHITEPAPER.md.
[19]CONSENSYS.BTC Relay’s documentation[EB/OL].http://btc-relay.readthedocs.io/en/latest/.
[20]KWON J.Tendermint:Consensus without mining[EB/OL].https://tendermint.com/static/docs/tendermint.pdf.
[21]POON J,BUTERIN V.Plasma:Scalable autonomous smart contracts[EB/OL].https://plasma.io/plasma.pdf.
[22]LI F,LI Z R,ZHAO H.Research on the progress of blockchain cross chain technology[J].Journal of Software,2019,30(6):1649-1660.
[23]DAI B R,JIANG S M,LI D W,et al.Evaluation Model of Cross-chain Notary Mechanism Based on Improved PageRank Algorithm[J].Computer Engineering,2021,47(2):26-31.
[24]NEISSE R.An Interledger Blockchain Platform for Cross-Bor-der Management of Cybersecurity Information[J].IEEE Internet Computing,2020,24(3):19-29.
[25]THOMAS S,SCHARRTZ E.Interledger whitepaper[EB/OL].https://interledger.org/.
[26]RIVEST R,SHAMIR A,ADLEMAN L.A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (1978)[M/OL].2021.https://www.researchgate.net/publication/349073609_A_Method_for_Obtaining_Digital_Signatures_and_Public-Key_Cryptosystems_1978.
[27]YU C F,WANG L,ZHOU A H,et al.Method and apparatus for performing multi-party secure computing based-on issuing certificate:US2021067347[P].2021-03-04.
[28]YU C F,WANG L,ZHOU A H,et al.Method and apparatus for performing multi-party secure computing based-on issuing certificate:US2021250183[P].2021-08-12.
[29]ZHANG Q N,ZHU J M,GAO S,et al.A Smart Service Transaction and Supervision System Based on Blockchain:CN113313592A[P].2021-08-27.
[30]KANG J S,CHOI Y S,SUNG M Y,et al.A Study of Security and Privacy in USN Environment using HASH LOCK Approach[C]//International Conference on Future Information & Communication Engineering.2007.
[31]ZHONG P,MA W,WANG B,et al.A Cryptocurrency Multi-channel Payment Method Based on Smart Contracts:CN113011878A[P].2021-06-22.
[32]Fusion[EB/OL].[2019-04-15].https://www.fusion.org/.
[33]PATIN A.Technologies for private key recovery in distributed ledger systems:US11025423[P].2021-06-01.
[34]ZHAO Z,WU G,SUSILO W,et al.Accountable identity-based encryption with distributed private key generators[J].Information Sciences,2019,505(10):352-366.
[35]HOPEBAILIE A,THOMAS S.Interledger:Creating a Standard for Payments[C]//International Conference Companion on World Wide Web.International World Wide Web Conferences Steering Committee,2016.
[36]HASSAN A O,HASAN A A.Simplified Data Processing forLarge Cluster:A MapReduce and Hadoop Based Study[J].Advances in Applied Sciences,2021,6(3):43.
[37]LAN R,UPADHYAYA G,TSE S,et al.Horizon:A Gas-Efficient,Trustless Bridge for Cross-Chain Transactions[J].arXiv:2101.06000,2021.
[38]GAROFFOLO A,KAIDALOV D,OLIYNYKOV R.Zendoo:a zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains[C]//2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).IEEE,2020:1257-1262.
[39]GAROFFOLO A,VIGLIONE R.Sidechains:Decoupled consensus between chains[J].arXiv:1812.05441,2018.
[40]GAZI P,KIAYIAS A,ZINDROS D.Proof-of-stake sidechains[C]//2019 IEEE Symposium on Security and Privacy (SP).IEEE,2019:139-156.
[41]WeCross Technical White Paper[EB/OL].http://fintech.webank.com/wecross.
[42]LI K,CHEN Q H,LU J X.Summary of Research on HTTP Protocol[J].China CIO News,2021(5):126-129.
[43]LIAO H M,WANG D,XUAN J X,et al.Threshold Signature and Decryption Scheme Based on Domestic Public Key Cryptographic Algorithm[J].Computer Applications and Software,2021,38(6):313-317.
[44]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public key cryptosystems[M].Routledge,2019.
[45]JIN S X,ZHANG X D,GE J G,et al.Review of Blockchain Consensus Algorithm Research[J].Journal of Information Security,2021,6(2):85-100.
[46]KING S.PPCoin:Peer-to-peer crypto-currency with proof-of-stake[EB/OL].http://www.peercoin.net/assets /paper/peercoin-paper.pdf.
[47]GERVAIS A,KARAME G O,WÜST K,et al.On the Security and Performance of Proof of Work Blockchains[C]//the 2016 ACM SIGSAC Conference on Computer and Communications Security.ACM,2016.
[48]BUTERIN V.Plasma cash:Plasma with much less per-user data checking[OL].https://ethresear.ch/t/plasma-cash-plasma-with-much-less per-user-data-checking/1298.
[49]KARAME G O,ANDROULAKI E,CAPKUN S.Double spending Fast Payments in Bitcoin[C]//The 2012 ACM Conference on Computer & Communications Security.New York:ACM,2012:906-917.
[50]KANG H Y,DENG J.Summary of Research on Blockchain Data Privacy Protection[J].Journal of Shandong University (Science Edition),2021,56(5):92-110.
[51]DICKERSON T,GAZZILLO P,HERLIHY M,et al.AddingConcurrency to Smart Contracts:US20190087793A1[P].2019-03-21.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[3] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[4] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[5] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[6] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[9] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[10] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[11] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[12] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[13] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[14] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
[15] 温啸林, 李长林, 张馨艺, 刘尚松, 朱敏.
基于DPoS共识机制的区块链社区演化的可视分析方法
Visual Analysis Method of Blockchain Community Evolution Based on DPoS Consensus Mechanism
计算机科学, 2022, 49(1): 328-335. https://doi.org/10.11896/jsjkx.201200118
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!