• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Niu Xiangyu, Kong Lanju, Jiang Yali, Qian Jin, Cui Lizhen, Li Qingzhong. A Lightweight and Efficiently Verified Assets Cross-Chain Transfer Method for Multi-Level Blockchains Architecture[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440649
Citation: Niu Xiangyu, Kong Lanju, Jiang Yali, Qian Jin, Cui Lizhen, Li Qingzhong. A Lightweight and Efficiently Verified Assets Cross-Chain Transfer Method for Multi-Level Blockchains Architecture[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440649

A Lightweight and Efficiently Verified Assets Cross-Chain Transfer Method for Multi-Level Blockchains Architecture

Funds: This work was supported by the National Key Research and Development Program of China (2021YFB2700100) and the Major Science and Technology Innovation of Shandong Province (2021CXGC010108).
More Information
  • Author Bio:

    Niu Xiangyu: born in 2000. Master candidate. Student member of CCF. His main research interests include cross-chain technologies

    Kong Lanju: born in 1978. PhD, professor, PhD supervisor. Senior member of CCF. Her main research interests include blockchain and cloud computing

    Jiang Yali: born in 1976. PhD, lecturer. Member of CCF. Her main research interests include data privacy protection

    Qian Jin: born in 1980. PhD, engineer. Member of CCF. His main research interests include database optimization and software engineering

    Cui Lizhen: born in 1976. PhD, professor, PhD supervisor. Senior member of CCF. His main research interests include software and data engineering and AI

    Li Qingzhong: born in 1965. PhD, professor, PhD supervisor. Senior member of CCF. His main research interests include blockchain and privacy protection

  • Received Date: July 31, 2024
  • Accepted Date: April 02, 2025
  • Available Online: April 02, 2025
  • The multi-level blockchains architecture is an architecture that organizes multiple blockchains into a tree, where each blockchain can control and manage part of the functions and on-chain data of the next level of the blockchains to which it is connected by cross-chain technology. However, the cross-chain transfer of assets under this architecture is a multi-hop cross-chain problem, where the evidence of successful execution of a cross-chain transaction needs to be transmitted and verified in multiple hops on the path from the source chain to the target chain, resulting in longer execution latency of the cross-chain transaction, higher evidence transmission overhead and verification overhead. Therefore, this paper proposes a lightweight and efficiently verified assets cross-chain transfer method for multi-level blockchains architecture, which introduces a top-level witness chain connecting each multi-level architecture and deploys a witness contract on each chain, so that the parent chains of the source and target chains in a cross-chain transaction act as witness chains to drive the completion of the cross-chain transaction. This paper also introduces a cross-chain transaction verification evidence based on Verkle tree, the method organizes the cross-chain transaction information to be processed in the same block in a Verkle tree employing KZG polynomial commitment, and adds the KZG commitment and the proof data into the evidence, and proves the execution state of the cross-chain transaction by verifying the evidence, so as to optimize the transmission and verification of the evidence. Theoretical analysis and experiments on the prototype of the method prove that the method reduces the execution latency of the cross-chain transaction and reduces the evidence verification overhead compared to the scheme using SPV without increasing the evidence transmission overhead, which is lightweight and efficiently verified.

  • [1]
    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. [2024-03-18]. https://bitcoin.org/bitcoin.pdf
    [2]
    Taherdoost H, Madanchian M. Blockchain-based new business models: A systematic review[J]. Electronics, 2023, 12(6): 1479 doi: 10.3390/electronics12061479
    [3]
    Frizzo-Barker J, Chow-White P A, Adams P R, et al. Blockchain as a disruptive technology for business: A systematic review[J]. International Journal of Information Management, 2020, 51: 102029 doi: 10.1016/j.ijinfomgt.2019.10.014
    [4]
    Luthra S, Janssen M, Rana N P, et al. Categorizing and relating implementation challenges for realizing blockchain applications in government[J]. Information Technology & People, 2023, 36(4): 1580−1602
    [5]
    Elisa N, Yang Longzhi, Chao Fei, et al. A framework of blockchain-based secure and privacy-preserving E-government system[J]. Wireless Networks, 2023, 29(3): 1005−1015 doi: 10.1007/s11276-018-1883-0
    [6]
    Andrew J, Isravel D P, Sagayam K M, et al. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions[J]. Journal of Network and Computer Applications, 2023, 215: 103633 doi: 10.1016/j.jnca.2023.103633
    [7]
    Ghosh P K, Chakraborty A, Hasan M, et al. Blockchain application in healthcare systems: A review[J]. Systems, 2023, 11(1): 38 doi: 10.3390/systems11010038
    [8]
    Amiri M J, Loo B T, Agrawal D, et al. Qanaat: A scalable multi-enterprise permissioned blockchain system with confidentiality guarantees[J]. Proceedings of the VLDB Endowment, 2022, 15(11): 2839−2852 doi: 10.14778/3551793.3551835
    [9]
    Liu Jiaguo, Zhang Huimin, Zhen Lu. Blockchain technology in maritime supply chains: applications, architecture and challenges[J]. International Journal of Production Research, 2023, 61(11): 3547−3563 doi: 10.1080/00207543.2021.1930239
    [10]
    Buterin V. Ethereum 2.0 mauve paper[EB/OL]. [2024-03-18]. https://cdn.hackaday.io/files/10879465447136/Mauve%20Paper%20Vitalik.pdf
    [11]
    Xu Caichao, Wang Xiaoyi, Xia Liwei, et al. BitXHub whitepaper[EB/OL]. [2024-03-18]. https://upload.hyperchain.cn/BitXHub%20Whitepaper.pdf
    [12]
    Kate A, Zaverucha G M, Goldberg I. Constant-size commitments to polynomials and their applications[C] //Proc of the 16th Int Conf on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2010: 177−194
    [13]
    Kuszmaul J. Verkle trees[EB/OL]. [2024-03-18]. https://klein.mit.edu/research/highschool/primes/materials/2018/Kuszmaul.pdf
    [14]
    Kwon J, Buchman E. Cosmos: A network of distributed ledgers[EB/OL]. [2024-03-18]. https://github.com/cosmos/cosmos/blob/master/WHITEPAPER.md
    [15]
    Wood G. Polkadot: Vision for a heterogeneous multi-chain frame-work[EB/OL]. [2024-03-18]. https://github.com/polkadot-io/polkadot-white-paper/blob/master/PolkaDotPaper.pdf
    [16]
    段田田,郭仪,李博,等. PieBridge:一种按需可扩展的跨链架构[J]. 计算机研究与发展,2023,60(11):2520−2533

    Duan Tiantian, Guo Yi, Li Bo, et al. PieBridge: An on-demand scalable cross-chain architecture[J]. Journal of Computer Research and Development, 2023, 60(11): 2520−2533(in Chinese)
    [17]
    Zakhary V, Agrawal D, Abbadi A E. Atomic commitment across blockchains[J]. Proceedings of the VLDB Endowment, 2020, 13(9): 1319−1331 doi: 10.14778/3397230.3397231
    [18]
    Herlihy M. Atomic cross-chain swaps[C] //Proc of the 37th SIGACT-SIGOPS ACM Symp on Principles of Distributed Computing. New York: ACM, 2018: 245−254
    [19]
    Jin Fuqi, Li Wenquan, Kong Lanju, et al. An efficient atomic cross-chain commitment resisting fork fraud[J]. Frontiers of Computer Science, 2023, 17(5): 175614 doi: 10.1007/s11704-022-2275-2
    [20]
    Buterin V. Verkle trees[EB/OL]. [2024-03-18]. https://vitalik.eth.limo/general/2021/06/18/verkle.html
    [21]
    Barreto P S L M, Naehrig M. Pairing-friendly elliptic curves of prime order[C] //Proc of the 12th Int Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005: 319−331
  • Related Articles

    [1]Hong Zhen, Feng Wanglei, Wen Zhenyu, Wu Di, Li Taotao, Wu Yiming, Wang Cong, Ji Shouling. Detecting Free-Riding Attack in Federated Learning Based on Gradient Backtracking[J]. Journal of Computer Research and Development, 2024, 61(9): 2185-2198. DOI: 10.7544/issn1000-1239.202330886
    [2]Shu Chang, Li Qingshan, Wang Lu, Wang Ziqi, Ji Yajiang. A Networked Software Optimization Mechanism Based on Gradient-Play[J]. Journal of Computer Research and Development, 2022, 59(9): 1902-1913. DOI: 10.7544/issn1000-1239.20220016
    [3]Dong Ye, Hou Wei, Chen Xiaojun, Zeng Shuai. Efficient and Secure Federated Learning Based on Secret Sharing and Gradients Selection[J]. Journal of Computer Research and Development, 2020, 57(10): 2241-2250. DOI: 10.7544/issn1000-1239.2020.20200463
    [4]Sun Jian, Li Zhanhuai, Li Qiang, Zhang Xiao, Zhao Xiaonan. SSD Power Modeling Method Based on the Gradient of Energy Consumption[J]. Journal of Computer Research and Development, 2019, 56(8): 1772-1782. DOI: 10.7544/issn1000-1239.2019.20170694
    [5]Li Shengdong, Lü Xueqiang. Static Restart Stochastic Gradient Descent Algorithm Based on Image Question Answering[J]. Journal of Computer Research and Development, 2019, 56(5): 1092-1100. DOI: 10.7544/issn1000-1239.2019.20180472
    [6]Chen Yao, Zhao Yonghua, Zhao Wei, Zhao Lian. GPU-Accelerated Incomplete Cholesky Factorization Preconditioned Conjugate Gradient Method[J]. Journal of Computer Research and Development, 2015, 52(4): 843-850. DOI: 10.7544/issn1000-1239.2015.20131919
    [7]Shen Yan, Zhu Yuquan, Liu Chunhua. Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting[J]. Journal of Computer Research and Development, 2015, 52(3): 569-578. DOI: 10.7544/issn1000-1239.2015.20131436
    [8]Li Zhidan, He Hongjie, Yin Zhongke, Chen Fan. A Sparsity Image Inpainting Algorithm Combining Color with Gradient Information[J]. Journal of Computer Research and Development, 2014, 51(9): 2081-2093. DOI: 10.7544/issn1000-1239.2014.20130071
    [9]Mei Yuan, Sun Huaijiang, and Xia Deshen. A Gradient-Based Robust Method for Estimation of Fingerprint Orientation Field[J]. Journal of Computer Research and Development, 2007, 44(6): 1022-1031.
    [10]Zhao Qianjin, Hu Min, Tan Jieqing. Adaptive Many-Knot Splines Image Interpolation Based on Local Gradient Features[J]. Journal of Computer Research and Development, 2006, 43(9): 1537-1542.

Catalog

    Article views (23) PDF downloads (4) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return