Computer Science ›› 2024, Vol. 51 ›› Issue (8): 403-411.doi: 10.11896/jsjkx.230500060

• Information Security • Previous Articles     Next Articles

Study on Time Rotation Notary Group Model Based on Threshold Signature

ZANG Wenyang, LYU Jinlai   

  1. School of Information and Computer,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China
  • Received:2023-05-09 Revised:2023-10-11 Online:2024-08-15 Published:2024-08-13
  • About author:ZANG Wenyang,born in 1996,master.Her main research interests include blockchain and cross-chain.
    LYU Jinlai,born in 1962,master,associate professor.His main research interests include video picture proces-sing and blockchain.

Abstract: With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are often used in cross-chain transaction verification,cross-chain transaction confirmation and other processes.How-ever,the notary schemes have some problems,such as low degree of decentralization,verifiable transactions with low signature ratio,and information disclosure of verification nodes.In order to improve the security of cross-chain bridge verification,a time rotation notary group model based on threshold signature is proposed.The notary group in this model is composed of high credibility nodes that have both source and target blockchain accounts.The verification nodes in the notary group have tenure requirements and need to pledge the security deposit.The notary group uses threshold signature technology to sign cross-chain transactions.The cross-chain transaction can only be implemented after more than half of the verification nodes in the notary group sign.The candidate notary group provides some new verification nodes for the time rotation notary group.The analysis results of the time rotation notary group model proves that the proposed model has high degree of decentralization,low malicious attack rate of the verification nodes,high security of the verification signature links,high privacy of the verification nodes,and high efficiency of cross-chain message verification.

Key words: Blockchain, Cross-chain, Cross-chain bridge, Notary schemes, Threshold signature

CLC Number: 

  • TP309
[1]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].http://bitcoin.org/bitcoin.pdf.
[2]BUTERIN V.A next-generation smart contract and decentra-lized application platform[EB/OL].https://github.com/ethereum/wiki/wiki/White-Paper.
[3]SCHWARTZ D,YOUNGS N,BRITTO A.The Ripple protocol consensus algorithm[EB/OL].https://ripple.com/files/ripple_consensus_whitepaper.pdf.
[4]TIAN Z H,ZHAO J D.Overview of block- chain consensusmechanism for Internet of things [J].Journal of Computer Applications,2021,41(4):917-929.
[5]YE X H,LIU X Y,WANG B H,et al.Distributed Notary Cross-Chain Model for Consortium Chain[J].Journal of Applied Sciences,2022,40(4):567-582.
[6]WEI S J,LÜ W L,LI S S.Overview on Typical Security Pro-blems in Public Block-chain Applications[J].Journal of Software,2022,33(1):324-355.
[7]HAO Y,LI Y,DONG X H,et al.Performance analysis of consensus algorithm in private blockchain[C] // Proceedings of 2018 IEEE Intelligent Vehicles Symposium.Piscataway:IEEE Press,2018:280-285.
[8]RAVI D,RAMACHANDRAN S,VIGN-ESH R,et al.Privacy preserving transparent supply chain management through Hyperledger Fabric[J].Blockchain:Research and Applications,2022,3(2):100072.
[9]ZENG S Q,HUO R,HUANG T,et al.Survey of blockchain:principle,progress and application [J].Journal on Communications,2020,41(1):134-151.
[10]VO H T,WANG Z Y,KARUNAMOORTHY D,et al.Internet of blockchains:techniques and challenges ahead [C]//Procee-dings of the 2018 IEEE International Conference on Internet of Things and Green Computing and Communications and IEEE Cyber,Physical and Social Computing and IEEE Smart Data.2018:1574-1581.
[11]DAI B R,JIANG S M,LI D W,et al.Evaluation Model of Cross-chain Notary Mechanism Based on Improved PageRank Algorithm[J].Computer Engineering,2021,47(2):26-31.
[12]JIANG C Y,FANG L X,ZHANG N,et al.Cross-chain interaction safety model based on notary groups[J].Journal of Computer Applications,2022,42(11):3438-3443.
[13]XU Q,ZHAI J H.Research on cross-chain data integrationtechnology based on committee rotation mechanism [J].Intelligent Computer and Applications,2023,13(1):213-220.
[14]LU A T,ZHAO K,YANG J Y,et al.Research on Cross-chain Technology of Blockchain [J].Netinfo Security,2019(8):83-90.
[15]MENG B,WANG Y B,ZHAO C,et al.Survey on Cross-Chain Protocols of Blockchain [J].Journal of Frontiers of Computer Science and Technology,2022,16(10):2177-2192.
[16]LI F,LI Z R,ZHAO H.Research on the progress of blockchain cross chaintechnology[J].Journal of Software,2019,30(6):1649-1660.
[17]SUN H,MAO H Y,ZHANG Y F,et al.Development and Application of Blockchain Cross-chain Technology[J].Computer Science,2022,49(5):287-295.
[18]SHEN C N.Review on cross-chain technology research of blockchains[J].Chinese Journal on Internet of Things,2022,6(4):183-196.
[19]YU C F,WANG L,ZHOU A H,et al.Method and apparatus for performing multi-party secure computing based on issuing certi-ficate:US2021067347[P].2021.
[20]CONSENSYS.BTC Relay’s documentation [EB/OL].https://btcrelay.readthedocs.io/en/la-test/.
[21]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments[J/OL].https://lightning.network/lightning-network-paper.pdf.
[22]WANG Q,LI F J,NI X L,et al.Research on Blockchain Interoperability and Cross-Chain Technology[J].Journal of Frontiers of Computer Science and Technology,2023,17(8):1749-1775.
[23]SUN Z,ZHU X S,LIU X L,et al.Off-chain consensus scheme of distributed oracles based on threshold signature[J].Computer Engineering and Design,2023,44(1):37-44.
[1] XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446.
[2] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[3] LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429.
[4] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[5] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[6] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
[7] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[8] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[9] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[10] ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5.
[11] ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389.
[12] LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387.
[13] WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339.
[14] LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47.
[15] DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!