Citation: | Niu Xiangyu, Kong Lanju, Jiang Yali, Qian Jin, Cui Lizhen, Li Qingzhong. A Lightweight and Efficiently Verified Assets Cross-Chain Transfer Method for Multi-Level Blockchains Architecture[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440649 |
The multi-level blockchains architecture is an architecture that organizes multiple blockchains into a tree, where each blockchain can control and manage part of the functions and on-chain data of the next level of the blockchains to which it is connected by cross-chain technology. However, the cross-chain transfer of assets under this architecture is a multi-hop cross-chain problem, where the evidence of successful execution of a cross-chain transaction needs to be transmitted and verified in multiple hops on the path from the source chain to the target chain, resulting in longer execution latency of the cross-chain transaction, higher evidence transmission overhead and verification overhead. Therefore, this paper proposes a lightweight and efficiently verified assets cross-chain transfer method for multi-level blockchains architecture, which introduces a top-level witness chain connecting each multi-level architecture and deploys a witness contract on each chain, so that the parent chains of the source and target chains in a cross-chain transaction act as witness chains to drive the completion of the cross-chain transaction. This paper also introduces a cross-chain transaction verification evidence based on Verkle tree, the method organizes the cross-chain transaction information to be processed in the same block in a Verkle tree employing KZG polynomial commitment, and adds the KZG commitment and the proof data into the evidence, and proves the execution state of the cross-chain transaction by verifying the evidence, so as to optimize the transmission and verification of the evidence. Theoretical analysis and experiments on the prototype of the method prove that the method reduces the execution latency of the cross-chain transaction and reduces the evidence verification overhead compared to the scheme using SPV without increasing the evidence transmission overhead, which is lightweight and efficiently verified.
[1] |
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. [2024-03-18]. https://bitcoin.org/bitcoin.pdf
|
[2] |
Taherdoost H, Madanchian M. Blockchain-based new business models: A systematic review[J]. Electronics, 2023, 12(6): 1479 doi: 10.3390/electronics12061479
|
[3] |
Frizzo-Barker J, Chow-White P A, Adams P R, et al. Blockchain as a disruptive technology for business: A systematic review[J]. International Journal of Information Management, 2020, 51: 102029 doi: 10.1016/j.ijinfomgt.2019.10.014
|
[4] |
Luthra S, Janssen M, Rana N P, et al. Categorizing and relating implementation challenges for realizing blockchain applications in government[J]. Information Technology & People, 2023, 36(4): 1580−1602
|
[5] |
Elisa N, Yang Longzhi, Chao Fei, et al. A framework of blockchain-based secure and privacy-preserving E-government system[J]. Wireless Networks, 2023, 29(3): 1005−1015 doi: 10.1007/s11276-018-1883-0
|
[6] |
Andrew J, Isravel D P, Sagayam K M, et al. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions[J]. Journal of Network and Computer Applications, 2023, 215: 103633 doi: 10.1016/j.jnca.2023.103633
|
[7] |
Ghosh P K, Chakraborty A, Hasan M, et al. Blockchain application in healthcare systems: A review[J]. Systems, 2023, 11(1): 38 doi: 10.3390/systems11010038
|
[8] |
Amiri M J, Loo B T, Agrawal D, et al. Qanaat: A scalable multi-enterprise permissioned blockchain system with confidentiality guarantees[J]. Proceedings of the VLDB Endowment, 2022, 15(11): 2839−2852 doi: 10.14778/3551793.3551835
|
[9] |
Liu Jiaguo, Zhang Huimin, Zhen Lu. Blockchain technology in maritime supply chains: applications, architecture and challenges[J]. International Journal of Production Research, 2023, 61(11): 3547−3563 doi: 10.1080/00207543.2021.1930239
|
[10] |
Buterin V. Ethereum 2.0 mauve paper[EB/OL]. [2024-03-18]. https://cdn.hackaday.io/files/10879465447136/Mauve%20Paper%20Vitalik.pdf
|
[11] |
Xu Caichao, Wang Xiaoyi, Xia Liwei, et al. BitXHub whitepaper[EB/OL]. [2024-03-18]. https://upload.hyperchain.cn/BitXHub%20Whitepaper.pdf
|
[12] |
Kate A, Zaverucha G M, Goldberg I. Constant-size commitments to polynomials and their applications[C] //Proc of the 16th Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2010: 177−194
|
[13] |
Kuszmaul J. Verkle trees[EB/OL]. [2024-03-18]. https://klein.mit.edu/research/highschool/primes/materials/2018/Kuszmaul.pdf
|
[14] |
Kwon J, Buchman E. Cosmos: A network of distributed ledgers[EB/OL]. [2024-03-18]. https://github.com/cosmos/cosmos/blob/master/WHITEPAPER.md
|
[15] |
Wood G. Polkadot: Vision for a heterogeneous multi-chain frame-work[EB/OL]. [2024-03-18]. https://github.com/polkadot-io/polkadot-white-paper/blob/master/PolkaDotPaper.pdf
|
[16] |
段田田,郭仪,李博,等. PieBridge:一种按需可扩展的跨链架构[J]. 计算机研究与发展,2023,60(11):2520−2533
Duan Tiantian, Guo Yi, Li Bo, et al. PieBridge: An on-demand scalable cross-chain architecture[J]. Journal of Computer Research and Development, 2023, 60(11): 2520−2533(in Chinese)
|
[17] |
Zakhary V, Agrawal D, Abbadi A E. Atomic commitment across blockchains[J]. Proceedings of the VLDB Endowment, 2020, 13(9): 1319−1331 doi: 10.14778/3397230.3397231
|
[18] |
Herlihy M. Atomic cross-chain swaps[C] //Proc of the 37th SIGACT-SIGOPS ACM Symp on Principles of Distributed Computing. New York: ACM, 2018: 245−254
|
[19] |
Jin Fuqi, Li Wenquan, Kong Lanju, et al. An efficient atomic cross-chain commitment resisting fork fraud[J]. Frontiers of Computer Science, 2023, 17(5): 175614 doi: 10.1007/s11704-022-2275-2
|
[20] |
Buterin V. Verkle trees[EB/OL]. [2024-03-18]. https://vitalik.eth.limo/general/2021/06/18/verkle.html
|
[21] |
Barreto P S L M, Naehrig M. Pairing-friendly elliptic curves of prime order[C] //Proc of the 12th Int Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005: 319−331
|
[1] | Hong Zhen, Feng Wanglei, Wen Zhenyu, Wu Di, Li Taotao, Wu Yiming, Wang Cong, Ji Shouling. Detecting Free-Riding Attack in Federated Learning Based on Gradient Backtracking[J]. Journal of Computer Research and Development, 2024, 61(9): 2185-2198. DOI: 10.7544/issn1000-1239.202330886 |
[2] | Shu Chang, Li Qingshan, Wang Lu, Wang Ziqi, Ji Yajiang. A Networked Software Optimization Mechanism Based on Gradient-Play[J]. Journal of Computer Research and Development, 2022, 59(9): 1902-1913. DOI: 10.7544/issn1000-1239.20220016 |
[3] | Dong Ye, Hou Wei, Chen Xiaojun, Zeng Shuai. Efficient and Secure Federated Learning Based on Secret Sharing and Gradients Selection[J]. Journal of Computer Research and Development, 2020, 57(10): 2241-2250. DOI: 10.7544/issn1000-1239.2020.20200463 |
[4] | Sun Jian, Li Zhanhuai, Li Qiang, Zhang Xiao, Zhao Xiaonan. SSD Power Modeling Method Based on the Gradient of Energy Consumption[J]. Journal of Computer Research and Development, 2019, 56(8): 1772-1782. DOI: 10.7544/issn1000-1239.2019.20170694 |
[5] | Li Shengdong, Lü Xueqiang. Static Restart Stochastic Gradient Descent Algorithm Based on Image Question Answering[J]. Journal of Computer Research and Development, 2019, 56(5): 1092-1100. DOI: 10.7544/issn1000-1239.2019.20180472 |
[6] | Chen Yao, Zhao Yonghua, Zhao Wei, Zhao Lian. GPU-Accelerated Incomplete Cholesky Factorization Preconditioned Conjugate Gradient Method[J]. Journal of Computer Research and Development, 2015, 52(4): 843-850. DOI: 10.7544/issn1000-1239.2015.20131919 |
[7] | Shen Yan, Zhu Yuquan, Liu Chunhua. Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting[J]. Journal of Computer Research and Development, 2015, 52(3): 569-578. DOI: 10.7544/issn1000-1239.2015.20131436 |
[8] | Li Zhidan, He Hongjie, Yin Zhongke, Chen Fan. A Sparsity Image Inpainting Algorithm Combining Color with Gradient Information[J]. Journal of Computer Research and Development, 2014, 51(9): 2081-2093. DOI: 10.7544/issn1000-1239.2014.20130071 |
[9] | Mei Yuan, Sun Huaijiang, and Xia Deshen. A Gradient-Based Robust Method for Estimation of Fingerprint Orientation Field[J]. Journal of Computer Research and Development, 2007, 44(6): 1022-1031. |
[10] | Zhao Qianjin, Hu Min, Tan Jieqing. Adaptive Many-Knot Splines Image Interpolation Based on Local Gradient Features[J]. Journal of Computer Research and Development, 2006, 43(9): 1537-1542. |