Computer Engineering and Applications ›› 2024, Vol. 60 ›› Issue (2): 32-45.DOI: 10.3778/j.issn.1002-8331.2304-0275
• Research Hotspots and Reviews • Previous Articles Next Articles
LI Guangzhu, LI Leixiao, GAO Haoyu
Online:
2024-01-15
Published:
2024-01-15
李光柱,李雷孝,高昊昱
LI Guangzhu, LI Leixiao, GAO Haoyu. Cross-Chain Technology Development and Application Research[J]. Computer Engineering and Applications, 2024, 60(2): 32-45.
李光柱, 李雷孝, 高昊昱. 跨链技术发展与应用研究进展[J]. 计算机工程与应用, 2024, 60(2): 32-45.
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2304-0275
[1] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[J]. Consulted, 2008(3). [2] 沈鑫, 裴庆祺, 刘雪峰. 区块链技术综述[J]. 网络与信息安全学报, 2016, 2(11): 11-20. SHEN X, PEI Q Q, LIU X F. Survey of block chain[J]. J Chinese Journal of Network and Information Security, 2016, 2(11): 11-20. [3] 路爱同, 赵阔, 杨晶莹, 等. 区块链跨链技术研究[J]. 信息网络安全, 2019(8): 83-90. LU A T, ZHAO K, YANG J Y, et al. Research on cross-chain technology of blockchain[J]. Netinfo Security, 2019(8): 83-90. [4] 李芳, 李卓然, 赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6): 1649-1660. LI F, LI Z R, ZHAO H. Research on the progress of blockchain cross-chain technology[J]. Journal of Software, 2019, 30(6): 1649-1660. [5] 孙浩, 毛瀚宇, 张岩峰, 等. 区块链跨链技术发展及应用[J]. 计算机科学, 2022, 49(5): 287-295. SUN H, MAO H Y, ZHANG Y F, et al. Blockchain cross-chain technology development and application[J]. Computer Science, 2022, 49(5): 287-295. [6] 孟博, 王乙丙, 赵璨, 等. 区块链跨链协议综述[J]. 计算机科学与探索, 2022, 16(10): 2177-2192. MENG B, WANG Y B, ZHAO C, et al. Survey on cross-chain protocols of blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(10): 2177-2192. [7] LYS L, MICOULET A, POTOP-BUTUCARU M. Atomic cross chain swaps via relays and adapters[C]//Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2020: 59-64. [8] 邵奇峰, 金澈清, 张召, 等. 区块链技术: 架构及进展[J]. 计算机学报, 2018, 41(5): 969-988. SHAO Q F, JIN C Q, ZHANG Z, et al. Blockchain technology: architecture and progress[J]. Journal of Computer Science, 2018, 41(5): 969-988. [9] GAROFFOLO A, KAIDALOV D, OLIYNYKOV R. Zendoo: a ZK-SNARK verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains[C]//Proceedings of the IEEE 40th International Conference on Distributed Computing Systems (ICDCS), 2020. [10] 喻辉, 张宗洋, 刘建伟. 比特币区块链扩容技术研究[J]. 计算机研究与发展, 2017, 54(10): 2390-2403. YU H, ZHANG Z Y, LIU J W. Research on scaling technology of bitcoin blockchain[J]. Journal of Computer Research and Development, 2017, 54(10): 2390-2403. [11] 马栋捷. 面向区块链服务的跨链通信技术研究与实现[D]. 杭州: 浙江工业大学, 2020. MA D J. Research and implementation of cross-chain communication technology for blockchain services[D]. Hangzhou: Zhejiang University of Technology, 2020. [12] HOPEBAILIE A, THOMAS S. Interledger: creating a standard for payments[C]//Proceedings of the International Conference Companion on World Wide Web, 2016. [13] HERLIHY M. Atomic cross-chain swaps[C]//Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018: 245-254. [14] BACK A, CORALLO M, DASHJR L, et al. Enabling blockchain innovations with pegged sidechains[EB/OL]. (2014-10-22). http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains. [15] DILLEY J, POELSTRA A, WILKINS J, et al. Strong federations: an interoperable blockchain solution to centralized third-party risks[J]. arXiv:1612.05491, 2016. [16] POON J, DRYJA T. The bitcoin lightning network: scalable off-chain instant payments[R/OL]. (2016-12-17)[2023-04-01]. http://lightning.network/lightningnetwork-paper.pdf. [17] ConsenSys. Welcome to BTC Relay’s documentation[EB/OL]. (2023-01-18)[2023-04-01]. https://btcrelay.readthedocs.io/en/l-atest/. [18] COLEMAN L. BTC relay bridges BTC with Ethereum[J]. Allowing BTC Verification For Smart Contracts, 2016(1). [19] KWON J, BUCHMAN E. Cosmos: a network of distributed ledgers[EB/OL]. (2016)[2023-04-01]. https://cosmos.network/whitepaper. [20] WOOD G. Polkadot: vision for a heterogeneous multi-chain framework[J]. White Paper, 2016, 21: 4662. [21] LU J, YANG B, LIANG Z, et al. Wanchain: building super financial markets for the new digital economy[R]. Technical Report, 2017. [22] 张诗童, 秦波, 郑海彬. 基于哈希锁定的多方跨链协议研究[J]. 网络空间安全, 2018(11): 57-62. ZHANG S T, QIN B, ZHENG H B. Research on the protocol of multiple cross-chains based on the hash lock[J]. Cyberspace Security, 2018(11): 57-62. [23] YE S, WANG X, XU C, et al. BitXHub: side-relay chain based heterogeneous blockchain interoperable platform[J]. Computer Science, 2020, 47(6): 294-302. [24] WeCross Blockchain. WeCross technical white paper[EB/OL]. (2020-02-19)[2023-04-01]. https://mp.weixin.qq.com/s/w0APEAonFXbOoinMJipPAA. [25] ZIE J Y, DENEUVILLE J C, BRIFFAUT J, et al. Extending atomic cross-chain swaps[C]//Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, Luxembourg, September 26-27, 2019: 219-229. [26] 戴炳荣, 姜胜明, 李顿伟, 等. 基于改进PageRank算法的 跨链公证人机制评价模型[J]. 计算机工程, 2021, 47(2): 26-31. DAI B R, JIANG S M, LI D W, et al. An evaluation model of cross-chain notary mechanism based on improved PageRank algorithm[J]. Computer Engineering, 2021, 47(2): 26-31. [27] China Banknote Blockchain Technology Research Institute. Lu Yu cross-chain protocol white paper[EB/OL]. (2021-11-26)[2023-04-01]. https://gitee.com/luyu-community/l-uyu-cross-chain-protocol/blob/master/doc/white-paper. pdf. [28] NARAYANAM K, RAMAKRISHNA V, VINAYAGAMURTHY D, et al. Generalized HTLC for cross-chain swapping of multiple assets with co-ownerships[J]. arXiv:2202.12855, 2022. [29] KOENS T, POLL E. Assessing interoperability solutions for distributed ledgers[J]. Pervasive and Mobile Computing, 2019, 59: 101079. [30] 潘晨, 刘志强, 刘振, 等. 区块链可扩展性研究: 问题与方法[J]. 计算机研究与发展, 2018(10): 2099-2110. PAN C, LIU Z Q, LIU Z, et al. Research on scalability of blockchain technology: problems and methods[J]. Journal of Computer Research and Development, 2018(10): 2099-2110. [31] 蒋楚钰, 方李西, 章宁, 等. 基于公证人组的跨链交互安全模型[J]. 计算机应用, 2022, 42(11): 3438-3443. JIANG C, FANG L X, ZHANG N, et al. Cross-chain interaction safety model based on notary groups[J]. Journal of Computer Applications, 2022, 42(11): 3438-3443. [32] GUO Z L, LIU L X, LIANG Z H, et al. Blockchain cross-chain technology research[C]//Proceedings of the IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, 2022: 1064-1070. [33] XIONG A, LIU G, ZHU Q, et al. A notary group-based cross-chain mechanism[J]. Digital Communications and Networks, 2022, 8(6): 1059-1067. [34] ZHANG Q, XIN C, WU H. Privacy preserving deep learning based on multi-party secure computation: a survey[J]. IEEE Internet of Things Journal, 2021, 99: 1. [35] YIN L, XU J, TANG Q. Sidechains with fast cross-chain transfers[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(6): 3925-3940. [36] WANG H, HE D, WANG X, et al. An electricity cross-chain platform based on sidechain relay[J]. Journal of Physics Conference Series, 2020, 1631(1): 012189. [37] GUO J, GAI K, ZHU L, et al. An approach of secure two-way-pegged multi-sidechain[C]//Proceedings of the 19th International Conference on Algorithms and Architectures for Parallel Processing, 2020: 551-564. [38] SINGH A, SINGH A, CLICK K, et al. Sidechain technologies in blockchain networks: An examination and state-of-the-art review[J]. Journal of Network and Computer Applications, 2020, 149: 102471-102502. [39] W3F(Web3 Foundation). XCMP overview[EB/OL]. [2023-04-01]. https://research.web3.foundation/en/latest/polkado-t/XCMP/index. html. [40] MUSUNGATE B N, CANDAN B, ?ABUK U C, et al. Sidechains: highlights and challenges[C]//Proceedings of the 2019 Innovations in Intelligent Systems and Applications Conference (ASYU), 2019: 1-5. [41] ASGAONKAR A, KRISHNAMACHARI B. Solving the buyer and seller’s dilemma: a dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator[J]. arXiv:1806.08379, 2018. [42] MAAZUMDAR S. Towards faster settlement in HTLC-based cross-chain atomic swaps[C]//Proceedings of the IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), 2022: 295-304. [43] 何帅, 黄襄念, 陈晓亮. 区块链跨链技术发展及应用研究综述[J]. 西华大学学报(自然科学版), 2021, 40(3): 1-14. HE S, HUANG X N, CHEN X L. The research summary of the development and application of blockchain cross-chain technology[J]. Journal of Xihua University (Natural Science Edition), 2021, 40(3): 1-14. [44] 魏昂. 一种改进的区块链跨链技术[J]. 网络空间安全, 2019, 10(6): 40-45. WEI A. Novel Hash-time-lock-contract based cross-chain token swap mechanism of blockchain[J]. Cyberspace Security, 2019, 10(6): 40-45. [45] 刘峰, 张嘉淏, 周俊杰, 等. 基于改进哈希时间锁的区块链跨链资产交互协议[J]. 计算机科学, 2022, 49(1): 336-344. LIU F, ZHANG J H, ZHOU J J, et al. Novel Hash-time-lock-contract based cross-chain token swap mechanism of blockchain[J]. Computer Science, 2022, 49(1): 336-344. [46] ZHOU Q, HUANG H, ZHENG Z. Solutions to scalability of blockchain: a survey[J]. IEEE Access, 2020, 8: 16440-16455. [47] CONG Z, LIANG Z H, XIONG F, et al. Research on cross-chain technology of blockchain: challenges and prospects[C]//Proceedings of the IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA), Shenyang, China, 2022: 422-428. [48] LIN S, KONG Y, NIE S. Overview of block chain cross chain technology[C]//Proceedings of the 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2021: 357-360. [49] MULTICHAIN FOUNDATION. AnyCall: a generic cross-chain message protocol[EB/OL]. [2023-04-01]. https://drive.google.com/file/d/1NFFFecAjStbGMyvJVDez3xmsGSHYvNYv/view. [50] KARAME G O, ANDROULAKI E, CAPKUN S. Double-spending fast payments in Bitcoin[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012. [51] ZARICK R, PELLEGRINO B, BANISTER C. LayerZero: Trustless omnichain interoperability protocol[J]. arXiv:2110. 13871, 2021. [52] BURDGES J, CEVALLOS A, CZABAN P, et al. Overview of polkadot and its design considerations[J]. arXiv:2005.13456, 2020. [53] HEILMAN E, KENDLER A, ZOHAR A , et al. Eclipse attacks on Bitcoin’s peer-to-peer network[C]//Proceedings of the USENIX Security Symposium, 2015. [54] MASSIAS M. Celer: a fast solver for the lasso with dual extrapolation[J]. arXiv:1802.07481, 2018. [55] 徐卓嫣, 周轩. 跨链技术发展综述[J]. 计算机应用研究, 2021, 38(2): 341-346. XU Z Y, ZHOU X. Survey on crosschain technology[J]. Application Research of Computers, 2021, 38(2): 341-346. [56] 曾诗钦, 霍如, 黄韬, 等. 区块链技术研究综述: 原理, 进展与应用[J]. 通信学报, 2020, 41(1): 134-151. ZENG S Q, HUO R, HUANG T, et al. Survey of blockchain: principle, progress and application[J]. Journal of Communication, 2020, 41(1): 134-151. [57] TSEPELEVA R, KORKHOV V. Implementation of the cross-blockchain interacting protocol[C]//Proceedings of the 21st International Conference on Computational Science and Its Applications, Cagliari, Italy, September 13-16, 2021: 42-55. [58] MIZRAHI A, ZOHAR A. Congestion attacks in payment channel networks[J]. arXiv:2002.06564, 2020. [59] ZAMYATIN A, HARZ D, LIND J, et al. XCLAIM: trustless, interoperable, cryptocurrency-backed assets[C]//Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019. [60] BORKOWSKI M, SIGWART M, FRAUENTHALER, et al. DeXTT: deterministic cross-blockchain token transfers[J]. IEEE Access, 2019, 7: 111030-111042. [61] 康海燕, 邓婕. 区块链数据隐私保护研究综述[J]. 山东大学学报(理学版), 2021, 56(5): 92-110. KANG H Y, DENG J. A review of research on blockchain data privacy protection[J]. Journal of Shandong University (Science Edition), 2021, 56(5): 92-110. [62] BUTERIN V. Ethereum: a next-generation smart contract and decentralized application platform[EB/OL]. (2014-12-01)[2023-04-01]. https://courses.cs.duke.edu/spr-ing23/compsci512/papers/ethereum.pdf. [63] PILLAI B, BISWAS K, HOU Z, et al. The Burn-to-Claim cross-blockchain asset transfer protocol[C]//Proceedings of the 25th International Conference on Engineering of Complex Computer Systems (ICECCS), Singapore, Oct 28-31, 2020: 119-124. [64] YAFFE L. Investigating long range attack[EB/OL]. (2018-12-11)[2023-04-01]. https://medium.com/hackernoo-n/investigating-long-range-attack-2bce0887-a2da. [65] ZHANG R, XUE R, LIU L. Security and privacy on blockchain[J]. ACM Computing Surveys (CSUR), 2019, 52(3): 1-34. [66] 蔡晓晴, 邓尧, 张亮, 等. 区块链原理及其核心技术[J]. 计算机学报, 2021, 44(1): 84-131. CAI X Q, DENG Y, ZHANG L, et al. The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021, 44(1): 84-131. [67] 张亮, 刘百祥, 张如意, 等. 区块链技术综述[J]. 计算机工程, 2019(5): 1-12. ZHANG L, LIU B X, ZHANG R Y, et al. Overview of blockchain technology [J]. Computer Engineering, 2019(5): 1-12. [68] WORLEY C, SKJELLUM A. Blockchain tradeoffs and challenges for current and emerging applications: generalization, fragmentation, sidechains, and scalability[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018. [69] HAN X, YUAN Y, WANG F Y. Security problems on blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(1): 206-225. [70] PETERS G, PANAYI E, CHAPELLE A. Trends in crypto-currencies and blockchain technologies: a monetary theory and regulation perspective[J]. arXiv:1508.04364,2015. |
[1] | ZHANG Mingquan, YANG Tian, DUO Chunhong. Access Authentication Method of Power Distribution Internet of Things Based on Improved PBFT [J]. Computer Engineering and Applications, 2024, 60(2): 279-287. |
[2] | LI Fujuan, MA Zhuo, WANG Qun. Survey on Identity Management in Blockchain Systems [J]. Computer Engineering and Applications, 2024, 60(1): 57-73. |
[3] | WANG Chundong, GUO Ruyue. Trust Management Solution for Internet of Vehicles Based on Logistic Regression and Blockchain [J]. Computer Engineering and Applications, 2024, 60(1): 281-288. |
[4] | ZHANG Tianxiang, LI Leixiao, LIU Dongjiang, GAO Haoyu. Survey on Application and Research of Blockchain Incentive Mechanism in Internet of Vehicles [J]. Computer Engineering and Applications, 2023, 59(9): 59-74. |
[5] | ZHAI Sheping, TONG Tong, BAI Xifang. Blockchain-Based Attribute Proxy Re-Encryption Data Sharing Scheme [J]. Computer Engineering and Applications, 2023, 59(8): 270-279. |
[6] | WEI Zizuan, WANG Xin, YU Dan, MA Yao, CHEN Yongle. Defense Mechanism to Solve Eclipse Attack of POW Consensus [J]. Computer Engineering and Applications, 2023, 59(8): 280-287. |
[7] | WANG Xiaoguang, YIN Meng. Research on Two-Stage Pricing of Shipping Supply Chain Under Blockchain Platform [J]. Computer Engineering and Applications, 2023, 59(7): 319-327. |
[8] | JIANG Chengyang, PANG Jun, JIA Dayu, YU Minghe, XIN Junchang, LIU Chen. Research on Blockchain Expansion Combining Community Detection and Local Reconstruction Code [J]. Computer Engineering and Applications, 2023, 59(5): 297-304. |
[9] | LI Xiangyang, LIU Yang, YAN Zhiquan, LIU Xinlei, CAO Haohao, WANG Yaoqi. Research and Implementation of Intellectual Property Trading Platform Based on Blockchain [J]. Computer Engineering and Applications, 2023, 59(3): 308-316. |
[10] | WEI Kexin, LI Leixiao, GAO Haoyu, XIONG Xiao. Review and Prospect of Blockchain Access Control Technology in Internet of Vehicles [J]. Computer Engineering and Applications, 2023, 59(24): 26-45. |
[11] | LIU Xin, WANG Haiwen, SUN Zhijian, YANG Dawei, PANG Mingjiang. Research on Tracing Major Public Opinion Events Based on Double-Layer Blockchain [J]. Computer Engineering and Applications, 2023, 59(23): 263-272. |
[12] | ZHANG Xiaodong, CHEN Taowei, YU Yimin. Distributed Data Access Control and Sharing Scheme Based on CPABE [J]. Computer Engineering and Applications, 2023, 59(23): 254-262. |
[13] | LU Yiren, ZHU Youwen. Cross-Chain Supervision Mechanism for Consortium Blockchain Based on Relay-Chain Technology [J]. Computer Engineering and Applications, 2023, 59(22): 268-275. |
[14] | WANG Qian, ZHU Junwei, ZHANG Xiaodong. Design and Implementation of Materials Sharing Related to Government Affairs Based on On-Chain and Off-Chain Data Collaboration [J]. Computer Engineering and Applications, 2023, 59(20): 333-342. |
[15] | YANG Changchun, ZHANG Yang, CHEN Yourong, MIAO Kelei, REN Tiaojuan, WANG Zhangquan. Node Consistency Consensus Algorithm for Malicious Node Attacks in Internet of Vehicles [J]. Computer Engineering and Applications, 2023, 59(19): 229-236. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||