PCT: A Relay-Based Privacy-Preserving Cross-Chain Transaction Scheme

被引:0
|
作者
Li, Da [1 ,2 ,3 ]
Guo, Qinglei [1 ,2 ,3 ]
Wang, Yansong [4 ]
Chen, Shuai [1 ,2 ,3 ]
Wu, Xiaowen [1 ,2 ,3 ]
Wang, Lei [4 ]
Li, Xuan [5 ]
机构
[1] State Grid Digital Technol Holding Co Ltd, Beijing 100053, Peoples R China
[2] State Grid Blockchain Technol Beijing Co Ltd, Beijing 100053, Peoples R China
[3] State Grid Corp China, Blockchain Technol Lab, Beijing 100053, Peoples R China
[4] State Grid Beijing Elect Power Co, Beijing 100031, Peoples R China
[5] Bubi Technol Co Ltd, Beijing 100086, Peoples R China
关键词
Blockchain; Cross-chain; Privacy-preserving; Pedersen commitment; Financial transaction; BLOCKCHAIN; SIGNATURES;
D O I
10.1007/978-981-19-8877-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain has been rapidly evolving in recent years and widely used in financial transactions due to its tamper-proof and decentralization features. However, as a relatively independent system, different blockchains have difficulty interoperating with each other, and the issue of "Value Island" becomes more problematic. In addition, the users on the different ledgers are also concerned about the leakage of privacy in the cross-chain process. In this paper, we propose a Privacy-Preserving Cross-Chain Transaction (PCT) scheme combining the relay mechanism with the hash locking mechanism. Meanwhile, the Pedersen commitment is introduced to enable the committers to verify the transaction without acknowledging the amount. We also conduct the range proof based on the Borromean ring signature to ensure that the transaction amount is legitimate. Finally, a lending scheme is designed to solve the problem of insufficient funds in cross-chain transactions. Security analysis and experiments show our scheme achieves privacy-preserving cross-chain transactions with low overhead.
引用
收藏
页码:83 / 99
页数:17
相关论文
共 50 条
  • [41] Privacy-Preserving Trade Chain Detection
    Wueller, Stefan
    Breuer, Malte
    Meyer, Ulrike
    Wetzel, Susanne
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 373 - 388
  • [42] BPFL: A Blockchain Based Privacy-Preserving Federated Learning Scheme
    Wang, Naiyu
    Yang, Wenti
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [43] A channel matching scheme for cross-chain
    She, Wei
    Gu, Zhi-hao
    Liu, Wei
    Chen, Jian-sen
    Wang, Bo
    Tian, Zhao
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 500 - 509
  • [44] A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
    Xu, Guangquan
    Qi, Chen
    Dong, Wenyu
    Gong, Lixiao
    Liu, Shaoying
    Chen, Si
    Liu, Jian
    Zheng, Xi
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 698 - 709
  • [45] Linkable Privacy-Preserving Scheme for Location-Based Services
    Yadav, Vijay Kumar
    Verma, Shekhar
    Venkatesan, Subramanian
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 7998 - 8012
  • [46] Graph partition based privacy-preserving scheme in social networks
    Zhang, Hongyan
    Lin, Limei
    Xu, Li
    Wang, Xiaoding
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 195
  • [47] Privacy-Preserving Classification Scheme Based on Support Vector Machine
    Mao, Qinyu
    Chen, Yange
    Duan, Pu
    Zhang, Benyu
    Hong, Zhiyong
    Wang, Baocang
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5906 - 5916
  • [48] A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain
    Zhang, Yujian
    Tong, Fei
    Xu, Yuwei
    Tao, Jun
    Cheng, Guang
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [49] VANET Based Privacy-Preserving Navigation scheme with replica server
    Shaikh, Rukaiya
    Bharadwaj, Deeksha
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1194 - 1198
  • [50] Supply chain optimization: cross-chain data privacy protection scheme based on semi-homomorphic encryption.
    Guo, Yahui
    Cai, Zhiming
    Chen, Jian
    Hu, Shanwen
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 86 - 91