Skip to main content

Advertisement

Log in

Temporary relay: A more flexible way to cross chains

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Kumar R, Tripathi R (2019) Traceability of counterfeit medicine supply chain through blockchain. 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp 568–570

    Chapter  Google Scholar 

  2. Kumar R, Marchang N, Tripathi R (2020) Distributed off-chain storage of patient diagnostic reports in healthcare system using ipfs and blockchain. 2020 International Conference on Communication Systems & Networks (COMSNETS). IEEE, pp 1–5

    Google Scholar 

  3. Kumar R, Tripathi R (2021) Scalable and secure access control policy for healthcare system using blockchain and enhanced bell-lapadula model. J Ambient Intell Humaniz Comput 12:2321–2338

    Article  Google Scholar 

  4. Kumar R, Tripathi R (2021) Towards design and implementation of security and privacy framework for internet of medical things (iomt) by leveraging blockchain and ipfs technology. J Supercomput 77(8):7916–7955

    Article  Google Scholar 

  5. Sharma A, Kaur P (2023) Tamper-proof multitenant data storage using blockchain. Peer Peer Netw Appl 16(1):431–449. https://doi.org/10.1007/S12083-022-01410-8

    Article  Google Scholar 

  6. Yang X, Tian T, Wang J, Wang C (2022) Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw Appl 15(5):2270–2288. https://doi.org/10.1007/S12083-022-01345-0

    Article  Google Scholar 

  7. Dabbagh M, Choo K-KR, Beheshti A, Tahir M, Safa NS (2021) A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput Secur 100:102078

    Article  Google Scholar 

  8. Polge J, Robert J, Le Traon Y (2021) Permissioned blockchain frameworks in the industry: A comparison. Ict Express 7(2):229–233

    Article  Google Scholar 

  9. Saraf C, Sabadra S (2018) Blockchain platforms: A compendium. 2018 IEEE International Conference on Innovative Research and Development (ICIRD). IEEE, pp 1–6

    Google Scholar 

  10. Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W (2022) An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput Netw 218:109378

    Article  Google Scholar 

  11. Guo Z, Liu L, Liang Z, Huang Y (2022) Blockchain cross-chain technology research. 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), vol 5. IEEE, pp 1064–1070

    Chapter  Google Scholar 

  12. Poon J, Dryja T (2015) The bitcoin lightning network: scalable off-chain instant payments. https://lightning.network. Accessed 22 Jul 2024

  13. Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White Paper 21(2327):4662

    Google Scholar 

  14. Garoffolo A, Kaidalov D, Oliynykov R (2020) Zendoo: A zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 1257–1262

    Chapter  Google Scholar 

  15. Westerkamp M, Eberhardt J (2020) zkrelay: Facilitating sidechains using zksnark-based chain-relays. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW). IEEE, pp 378–386

    Chapter  Google Scholar 

  16. Pincheira M, Donini E, Vecchio M, Giaffreda R (2023) Towards an infrastructure cost model for blockchain-based applications. In: Prieto J, Benítez Martínez FL, Ferretti S, Arroyo Guardeño D, Tomás Nevado-Batalla P (eds) Blockchain and Applications, 4th International Congress. Springer, Cham, pp 345–355

    Chapter  Google Scholar 

  17. Duan L, Sun Y, Ni W, Ding W, Liu J, Wang W (2023) Attacks against cross-chain systems and defense approaches: A contemporary survey. IEEE/CAA J Autom Sin 10(8):1647–1667

    Article  Google Scholar 

  18. Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18(1):186–208. https://doi.org/10.1137/0218012

    Article  MathSciNet  Google Scholar 

  19. Crawley J (2023) Crypto bridging protocol multichain ceases operations. https://www.coindesk.com/business/2023/07/14/crypto-bridging-protocol-multichain-ceases-operations/. Accessed 14 Jul 2023

  20. Kumar R, Javeed D, Aljuhani A, Jolfaei A, Kumar P, Islam AKMN (2024) Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans Consum Electron 70(1):1145–1154. https://doi.org/10.1109/TCE.2023.3320157

    Article  Google Scholar 

  21. Kumar P, Kumar R, Aloqaily M, Islam AKMN (2024) Explainable ai and blockchain for metaverse: A security and privacy perspective. IEEE Consum Electr M 13(3):90–97. https://doi.org/10.1109/MCE.2023.3296222

    Article  Google Scholar 

  22. Kumar P, Kumar R, Garg S, Kaur K, Zhang Y, Guizani M (2022) A secure data dissemination scheme for IoT-based e-health systems using AI and blockchain. In: GLOBECOM 2022—2022 IEEE Global Communications Conference, 2022, pp. 1397–1403. IEEE 

  23. Kumar R, Kumar P, Aloqaily M, Aljuhani A (2023) Deep-learning-based blockchain for secure zero touch networks. IEEE Commun Mag 61(2):96–102. https://doi.org/10.1109/MCOM.001.2200294

    Article  Google Scholar 

  24. Bitansky N, Canetti R, Chiesa A, Tromer E (2012) From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Goldwasser, S. (ed.) ITCS 2012, pp. 326–349. ACM, https://doi.org/10.1145/2090236.2090263

  25. Sergeenkov A (2021) A beginner’s guide to atomic swaps. https://www.coindesk.com/tech/2021/08/20/a-beginners-guide-to-atomic-swaps/. Accessed 20 Aug 2021

  26. Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P (2014) Enabling blockchain innovations with pegged sidechains. https://www.blockstream.com/sidechains.pdf. Accessed 22 Jul 2024

  27. Zamyatin A, Harz D, Lind J, Panayiotou P, Gervais A, Knottenbelt W (2019) Xclaim: Trustless, interoperable, cryptocurrency-backed assets. 2019 IEEE Symposium on Security and Privacy (SP). IEEE, pp 193–210

    Chapter  Google Scholar 

  28. Zamyatin A, Al-Bassam M, Zindros D, Kokoris-Kogias E, Moreno-Sanchez P, Kiayias A, Knottenbelt WJ (2021) Sok: Communication across distributed ledgers. Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II 25. Springer, pp 3–36

    Chapter  Google Scholar 

  29. Kwon J, Buchman E (2019) Cosmos Whitepaper. https://github.com/cosmos/cosmos/blob/master/WHITEPAPER.md. Accessed 22 Jul 2024

  30. Blum M, De Santis A, Micali S, Persiano G (1991) Noninteractive zero-knowledge. SIAM J Comput 20(6):1084–1118 (Preliminary version in STOC 1988)

    Article  MathSciNet  Google Scholar 

  31. Chen T, Lu H, Kunpittaya T, Luo A (2022) A review of zk-snarks. arXiv preprint arXiv:2202.06877

  32. Xu J, Ackerer D, Dubovitskaya A (2021) A game-theoretic analysis of cross-chain atomic swaps with htlcs. 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 584–594

    Chapter  Google Scholar 

  33. Herlihy M (2018) Atomic cross-chain swaps. In: 2018 ACM symposium on principles of distributed computing, pp 245–254

  34. Thyagarajan SA, Malavolta G, Moreno-Sanchez P (2022) Universal atomic swaps: Secure exchange of coins across all blockchains. 2022 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1299–1316

    Chapter  Google Scholar 

  35. Manevich Y, Akavia A (2022) Cross chain atomic swaps in the absence of time via attribute verifiable timed commitments. 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P). IEEE, pp 606–625

    Chapter  Google Scholar 

  36. Xie T et al (2022) zkBridge: trustless cross-chain bridges made practical. In: ACM CCS 2022. ACM Press

  37. CoinGecko (2023) Coingecko 2023 q2 cryptocurrency report. Technical report, CoinGecko. https://assets.coingecko.com/reports/2023/CoinGecko-2023-Q2-Report.pdf. Accessed 22 Jul 2024

Download references

Funding

This research was supported in part by Natural Science Foundation of Inner Mongolia Autonomous Region under Grant 2020MS06009, in part by Department of Science and Technology of Inner Mongolia Autonomous Region under Grant 2022YFSH0044, in part by Education Department of Inner Mongolia Autonomous Region under Grant NJZY23076, and in part by Inner Mongolia University of Science and Technology under Grant 2022-132.

Author information

Authors and Affiliations

Authors

Contributions

Haonan Wang and Yu Lu provided ideas and wrote the main manuscript text. Jingyu Wang and Lixin Liu provided guiding ideas and suggestions. All authors reviewed the manuscript.

Corresponding author

Correspondence to Jingyu Wang.

Ethics declarations

Ethics approval

Not applicable.

Consent to publish

No Conflict of interest exists in the submission of this manuscript, and the manuscript is approved for publication by all the authors. I would like to declare on behalf of my co-authors that the work described is original research that has not been published previously, and not under consideration for publication elsewhere. All the authors listed have approved the manuscript that is enclosed.

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Wang, J., Liu, L. et al. Temporary relay: A more flexible way to cross chains. Peer-to-Peer Netw. Appl. 17, 3489–3504 (2024). https://doi.org/10.1007/s12083-024-01762-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01762-3

Keywords

Navigation