Computer Science ›› 2022, Vol. 49 ›› Issue (5): 287-295.doi: 10.11896/jsjkx.210800132

• Information Security • Previous Articles     Next Articles

Development and Application of Blockchain Cross-chain Technology

SUN Hao1, MAO Han-yu1, ZHANG Yan-feng1, YU Ge1, XU Shi-cheng2, HE Guang-yu2   

  1. 1 School of Computer Science and Engineering,Northeastern University,Shenyang 110169,China
    2 Neusoft Corporation,Shenyang 110179,China
  • Received:2021-08-16 Revised:2022-02-04 Online:2022-05-15 Published:2022-05-06
  • About author:SUN Hao,born in 1997,postgraduate,is a student member of China Computer Federration.Her main research interests include query processing and blockchain technology.
    YU Ge,born in 1962,professor and Ph.D supervisor,is a member of China Computer Federation.His main research interests include distributed system and big data management.
  • Supported by:
    Key R & D Program of Liaoning Province(2020JH2/10100037) and Open Program of Neusoft Corporation(NCBETOP2001).

Abstract: With the continuous development and innovation of blockchain technology,a large number of blockchain-based applications have been generated.Today’s blockchain systems are mostly heterogeneous and not interconnected,and there is no direct value circulation between chains.This greatly limits the functional expansion and development of blockchains.Cross-chain technology refers to the exchange of information between different blockchain system instances and the use of the exchanged information to achieve interconnection and value transfer between blockchains.Firstly,this paper introduces the development process of blockchain cross-chain technology,and introduces in detail four current mainstream cross-chain technologies including the notary mechanism,the side chain relay,the hash lock and the distributed private key control.Then,based on the above-mentioned cross-chain technology,it further introduces several current mainstream cross-chain projects and applications.Finally,by comparing the similarities and differences of several cross-chain technologies in trust model,security,atomicity,scalability,etc.,the current development trend of cross-chain technology is summarized and analyzed,and the difficulties and future development direction in the field of cross-chain are discussed.

Key words: Blockchain, Cross-chain technology, Distributed private key control, Hash lock, Notary mechanism, Side chain relay

CLC Number: 

  • TF315
[1]LONE A H,NAAZ R.Demystifying Cryptography behindBlockchains and a Vision for Post-Quantum Blockchains[C]//2020 IEEE International Conference for Innovation in Technology (INOCON).2020:1-6.
[2]YU G,NIE T Z,LI X H,et al.The Challenge and Prospect of Distributed Data Management Techniques in Blockchain Systems[J].Chinese Journal of Computers,2021,44(1):28-54.
[3]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Tech-nology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.
[4]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[J/OL].Consulted.https://courses.cs.washington.edu/courses/csep552/18wi/papers/nakamoto-bitcoin.pdf.
[5]KÕLVART M,POOLA M,RULL A.Smart Contracts[M].Springer International Publishing,2016.
[6]HUA S,ZHANG S,PI B,et al.Reasonableness discussion and analysis for Hyperledger Fabric configuration[C]//2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).2020:1-3.
[7]ZHU L,YU H,ZHAN S X,et al.Research on high-performance consortium blockchain technology[J].Ruan Jian Xue Bao:Journal of Software,2019,30(6):1577-1593.
[8]WANG X L,LIU X F,ZHAO G S,et al.Overview of Blockchain:Technology and Challenges[J].Radio Communications Technology,2018,44(6)531-537.
[9]LU A T,ZHAO K,YANG J Y,et al.Research on Cross-chain Technology of Blockchain[J]. Netinfo Security,2019(8):83-90.
[10]GUO Z,GUO S Y,ZHANG S L,et al.Analysis of blockchain cross chain technology[J].Journal of Internet of Things,2020,4(2):36-49.
[11]SUN Y,FAN L J,HONG X H.Technology Development and Application of Blockchain:Current Status and Challenges[J].Engineering Science,2018,20(2):35-40.
[12]SCHWARTZ D,YOUNGS N,BRITTO A.The Ripple protocol consensus algorithm[EB/OL].https://ripple.com/files /ripple_consensus_whitepaper.Pdf.
[13]THOMAS S,SCHWARTZ E.A protocol for interledger pay-ments[EB/OL].https://interledger.org/interledger.pdf.
[14]COLLADO A,GÓMEZ-SUÁREZ A,OONISHI Y,et al.Synthesis,characterisation,and oxygen atom transfer reactions involving the first gold(I)-alkylperoxo complexes[J].Chemical Communications,2013,49(91):10745-10747.
[15]LI C L,CHEN Y.Merkle Hash Tree Based Deduplication in Cloud Storage[J].Applied Mechanics and Materials,2014,556:6223-6227.
[16]Blockstream[EB/OL].[2019-04-12].https://blockstream.com/.
[17]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments[J/OL].https://www.mianshigee.com/ppt/17915exz/.
[18]KWON J,BUCHMAN E.Cosmos:A network of distributedledgers[EB/OL].https://github.com/cosmos/cosmos /blob/master/WHITEPAPER.md.
[19]CONSENSYS.BTC Relay’s documentation[EB/OL].http://btc-relay.readthedocs.io/en/latest/.
[20]KWON J.Tendermint:Consensus without mining[EB/OL].https://tendermint.com/static/docs/tendermint.pdf.
[21]POON J,BUTERIN V.Plasma:Scalable autonomous smart contracts[EB/OL].https://plasma.io/plasma.pdf.
[22]LI F,LI Z R,ZHAO H.Research on the progress of blockchain cross chain technology[J].Journal of Software,2019,30(6):1649-1660.
[23]DAI B R,JIANG S M,LI D W,et al.Evaluation Model of Cross-chain Notary Mechanism Based on Improved PageRank Algorithm[J].Computer Engineering,2021,47(2):26-31.
[24]NEISSE R.An Interledger Blockchain Platform for Cross-Bor-der Management of Cybersecurity Information[J].IEEE Internet Computing,2020,24(3):19-29.
[25]THOMAS S,SCHARRTZ E.Interledger whitepaper[EB/OL].https://interledger.org/.
[26]RIVEST R,SHAMIR A,ADLEMAN L.A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (1978)[M/OL].2021.https://www.researchgate.net/publication/349073609_A_Method_for_Obtaining_Digital_Signatures_and_Public-Key_Cryptosystems_1978.
[27]YU C F,WANG L,ZHOU A H,et al.Method and apparatus for performing multi-party secure computing based-on issuing certificate:US2021067347[P].2021-03-04.
[28]YU C F,WANG L,ZHOU A H,et al.Method and apparatus for performing multi-party secure computing based-on issuing certificate:US2021250183[P].2021-08-12.
[29]ZHANG Q N,ZHU J M,GAO S,et al.A Smart Service Transaction and Supervision System Based on Blockchain:CN113313592A[P].2021-08-27.
[30]KANG J S,CHOI Y S,SUNG M Y,et al.A Study of Security and Privacy in USN Environment using HASH LOCK Approach[C]//International Conference on Future Information & Communication Engineering.2007.
[31]ZHONG P,MA W,WANG B,et al.A Cryptocurrency Multi-channel Payment Method Based on Smart Contracts:CN113011878A[P].2021-06-22.
[32]Fusion[EB/OL].[2019-04-15].https://www.fusion.org/.
[33]PATIN A.Technologies for private key recovery in distributed ledger systems:US11025423[P].2021-06-01.
[34]ZHAO Z,WU G,SUSILO W,et al.Accountable identity-based encryption with distributed private key generators[J].Information Sciences,2019,505(10):352-366.
[35]HOPEBAILIE A,THOMAS S.Interledger:Creating a Standard for Payments[C]//International Conference Companion on World Wide Web.International World Wide Web Conferences Steering Committee,2016.
[36]HASSAN A O,HASAN A A.Simplified Data Processing forLarge Cluster:A MapReduce and Hadoop Based Study[J].Advances in Applied Sciences,2021,6(3):43.
[37]LAN R,UPADHYAYA G,TSE S,et al.Horizon:A Gas-Efficient,Trustless Bridge for Cross-Chain Transactions[J].arXiv:2101.06000,2021.
[38]GAROFFOLO A,KAIDALOV D,OLIYNYKOV R.Zendoo:a zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains[C]//2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).IEEE,2020:1257-1262.
[39]GAROFFOLO A,VIGLIONE R.Sidechains:Decoupled consensus between chains[J].arXiv:1812.05441,2018.
[40]GAZI P,KIAYIAS A,ZINDROS D.Proof-of-stake sidechains[C]//2019 IEEE Symposium on Security and Privacy (SP).IEEE,2019:139-156.
[41]WeCross Technical White Paper[EB/OL].http://fintech.webank.com/wecross.
[42]LI K,CHEN Q H,LU J X.Summary of Research on HTTP Protocol[J].China CIO News,2021(5):126-129.
[43]LIAO H M,WANG D,XUAN J X,et al.Threshold Signature and Decryption Scheme Based on Domestic Public Key Cryptographic Algorithm[J].Computer Applications and Software,2021,38(6):313-317.
[44]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public key cryptosystems[M].Routledge,2019.
[45]JIN S X,ZHANG X D,GE J G,et al.Review of Blockchain Consensus Algorithm Research[J].Journal of Information Security,2021,6(2):85-100.
[46]KING S.PPCoin:Peer-to-peer crypto-currency with proof-of-stake[EB/OL].http://www.peercoin.net/assets /paper/peercoin-paper.pdf.
[47]GERVAIS A,KARAME G O,WÜST K,et al.On the Security and Performance of Proof of Work Blockchains[C]//the 2016 ACM SIGSAC Conference on Computer and Communications Security.ACM,2016.
[48]BUTERIN V.Plasma cash:Plasma with much less per-user data checking[OL].https://ethresear.ch/t/plasma-cash-plasma-with-much-less per-user-data-checking/1298.
[49]KARAME G O,ANDROULAKI E,CAPKUN S.Double spending Fast Payments in Bitcoin[C]//The 2012 ACM Conference on Computer & Communications Security.New York:ACM,2012:906-917.
[50]KANG H Y,DENG J.Summary of Research on Blockchain Data Privacy Protection[J].Journal of Shandong University (Science Edition),2021,56(5):92-110.
[51]DICKERSON T,GAZZILLO P,HERLIHY M,et al.AddingConcurrency to Smart Contracts:US20190087793A1[P].2019-03-21.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[3] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[4] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[5] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[9] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[10] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[11] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
[15] WEN Xiao-lin, LI Chang-lin, ZHANG Xin-yi, LIU Shang-song, ZHU Min. Visual Analysis Method of Blockchain Community Evolution Based on DPoS Consensus Mechanism [J]. Computer Science, 2022, 49(1): 328-335.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!