Abstract
As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.











Similar content being viewed by others
Data availability
Not applicable.
References
Kumar R, Tripathi R (2019) Traceability of counterfeit medicine supply chain through blockchain. 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp 568–570
Kumar R, Marchang N, Tripathi R (2020) Distributed off-chain storage of patient diagnostic reports in healthcare system using ipfs and blockchain. 2020 International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp 1–5
Kumar R, Tripathi R (2021) Scalable and secure access control policy for healthcare system using blockchain and enhanced bell-lapadula model. J Ambient Intell Humaniz Comput 12:2321–2338
Kumar R, Tripathi R (2021) Towards design and implementation of security and privacy framework for internet of medical things (iomt) by leveraging blockchain and ipfs technology. J Supercomput 77(8):7916–7955
Sharma A, Kaur P (2023) Tamper-proof multitenant data storage using blockchain. Peer Peer Netw Appl 16(1):431–449. https://doi.org/10.1007/S12083-022-01410-8
Yang X, Tian T, Wang J, Wang C (2022) Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw Appl 15(5):2270–2288. https://doi.org/10.1007/S12083-022-01345-0
Dabbagh M, Choo K-KR, Beheshti A, Tahir M, Safa NS (2021) A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput Secur 100:102078
Polge J, Robert J, Le Traon Y (2021) Permissioned blockchain frameworks in the industry: A comparison. Ict Express 7(2):229–233
Saraf C, Sabadra S (2018) Blockchain platforms: A compendium. 2018 IEEE International Conference on Innovative Research and Development (ICIRD). IEEE, pp 1–6
Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W (2022) An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput Netw 218:109378
Guo Z, Liu L, Liang Z, Huang Y (2022) Blockchain cross-chain technology research. 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), vol 5. IEEE, pp 1064–1070
Poon J, Dryja T (2015) The bitcoin lightning network: scalable off-chain instant payments. https://lightning.network. Accessed 22 Jul 2024
Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White Paper 21(2327):4662
Garoffolo A, Kaidalov D, Oliynykov R (2020) Zendoo: A zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 1257–1262
Westerkamp M, Eberhardt J (2020) zkrelay: Facilitating sidechains using zksnark-based chain-relays. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW). IEEE, pp 378–386
Pincheira M, Donini E, Vecchio M, Giaffreda R (2023) Towards an infrastructure cost model for blockchain-based applications. In: Prieto J, Benítez Martínez FL, Ferretti S, Arroyo Guardeño D, Tomás Nevado-Batalla P (eds) Blockchain and Applications, 4th International Congress. Springer, Cham, pp 345–355
Duan L, Sun Y, Ni W, Ding W, Liu J, Wang W (2023) Attacks against cross-chain systems and defense approaches: A contemporary survey. IEEE/CAA J Autom Sin 10(8):1647–1667
Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18(1):186–208. https://doi.org/10.1137/0218012
Crawley J (2023) Crypto bridging protocol multichain ceases operations. https://www.coindesk.com/business/2023/07/14/crypto-bridging-protocol-multichain-ceases-operations/. Accessed 14 Jul 2023
Kumar R, Javeed D, Aljuhani A, Jolfaei A, Kumar P, Islam AKMN (2024) Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans Consum Electron 70(1):1145–1154. https://doi.org/10.1109/TCE.2023.3320157
Kumar P, Kumar R, Aloqaily M, Islam AKMN (2024) Explainable ai and blockchain for metaverse: A security and privacy perspective. IEEE Consum Electr M 13(3):90–97. https://doi.org/10.1109/MCE.2023.3296222
Kumar P, Kumar R, Garg S, Kaur K, Zhang Y, Guizani M (2022) A secure data dissemination scheme for IoT-based e-health systems using AI and blockchain. In: GLOBECOM 2022—2022 IEEE Global Communications Conference, 2022, pp. 1397–1403. IEEE
Kumar R, Kumar P, Aloqaily M, Aljuhani A (2023) Deep-learning-based blockchain for secure zero touch networks. IEEE Commun Mag 61(2):96–102. https://doi.org/10.1109/MCOM.001.2200294
Bitansky N, Canetti R, Chiesa A, Tromer E (2012) From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Goldwasser, S. (ed.) ITCS 2012, pp. 326–349. ACM, https://doi.org/10.1145/2090236.2090263
Sergeenkov A (2021) A beginner’s guide to atomic swaps. https://www.coindesk.com/tech/2021/08/20/a-beginners-guide-to-atomic-swaps/. Accessed 20 Aug 2021
Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P (2014) Enabling blockchain innovations with pegged sidechains. https://www.blockstream.com/sidechains.pdf. Accessed 22 Jul 2024
Zamyatin A, Harz D, Lind J, Panayiotou P, Gervais A, Knottenbelt W (2019) Xclaim: Trustless, interoperable, cryptocurrency-backed assets. 2019 IEEE Symposium on Security and Privacy (SP). IEEE, pp 193–210
Zamyatin A, Al-Bassam M, Zindros D, Kokoris-Kogias E, Moreno-Sanchez P, Kiayias A, Knottenbelt WJ (2021) Sok: Communication across distributed ledgers. Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II 25. Springer, pp 3–36
Kwon J, Buchman E (2019) Cosmos Whitepaper. https://github.com/cosmos/cosmos/blob/master/WHITEPAPER.md. Accessed 22 Jul 2024
Blum M, De Santis A, Micali S, Persiano G (1991) Noninteractive zero-knowledge. SIAM J Comput 20(6):1084–1118 (Preliminary version in STOC 1988)
Chen T, Lu H, Kunpittaya T, Luo A (2022) A review of zk-snarks. arXiv preprint arXiv:2202.06877
Xu J, Ackerer D, Dubovitskaya A (2021) A game-theoretic analysis of cross-chain atomic swaps with htlcs. 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 584–594
Herlihy M (2018) Atomic cross-chain swaps. In: 2018 ACM symposium on principles of distributed computing, pp 245–254
Thyagarajan SA, Malavolta G, Moreno-Sanchez P (2022) Universal atomic swaps: Secure exchange of coins across all blockchains. 2022 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1299–1316
Manevich Y, Akavia A (2022) Cross chain atomic swaps in the absence of time via attribute verifiable timed commitments. 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P). IEEE, pp 606–625
Xie T et al (2022) zkBridge: trustless cross-chain bridges made practical. In: ACM CCS 2022. ACM Press
CoinGecko (2023) Coingecko 2023 q2 cryptocurrency report. Technical report, CoinGecko. https://assets.coingecko.com/reports/2023/CoinGecko-2023-Q2-Report.pdf. Accessed 22 Jul 2024
Funding
This research was supported in part by Natural Science Foundation of Inner Mongolia Autonomous Region under Grant 2020MS06009, in part by Department of Science and Technology of Inner Mongolia Autonomous Region under Grant 2022YFSH0044, in part by Education Department of Inner Mongolia Autonomous Region under Grant NJZY23076, and in part by Inner Mongolia University of Science and Technology under Grant 2022-132.
Author information
Authors and Affiliations
Contributions
Haonan Wang and Yu Lu provided ideas and wrote the main manuscript text. Jingyu Wang and Lixin Liu provided guiding ideas and suggestions. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent to publish
No Conflict of interest exists in the submission of this manuscript, and the manuscript is approved for publication by all the authors. I would like to declare on behalf of my co-authors that the work described is original research that has not been published previously, and not under consideration for publication elsewhere. All the authors listed have approved the manuscript that is enclosed.
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, H., Wang, J., Liu, L. et al. Temporary relay: A more flexible way to cross chains. Peer-to-Peer Netw. Appl. 17, 3489–3504 (2024). https://doi.org/10.1007/s12083-024-01762-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01762-3