An Approach of Secure Two-Way-Pegged Multi-sidechain

被引:7
作者
Guo, Jinnan [1 ]
Gai, Keke [2 ]
Zhu, Liehuang [2 ]
Zhang, Zijian [2 ,3 ]
机构
[1] Beijing Inst Technol, Sch Informat & Elect, Beijing, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
[3] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II | 2020年 / 11945卷
基金
中国国家自然科学基金;
关键词
Blockchain; Sidechain protocol; Scalability; High throughput; Global consensus;
D O I
10.1007/978-3-030-38961-1_47
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a temper-resistant ledger, blockchain ensures integrity of transaction information among trust-less participants in peer to peer network. Thus, blockchain has attracted enormous research interests in the past decade due to its prior application in cryptocurrency, financial auditing, supply chain management, etc. However, blockchain scalability limitations has impeded blockchain technology from large scale commercial applications. Since blockchain is low in throughput, blockchain in incapable of handling large scale asset transfer. To tackle this problem, in this paper, we propose a secure multi-sidechain system. The proposed approach can transfer assets simultaneously to increase throughput. In addition, security of assets during transfer was also ensured by implementing firewall property. Detailed adversarial analysis shows this proposed approach can (1) prevent double spending and transaction ordering dependence attacks during asset transfer, (2) protect mainchain from sidechain's catastrophic failure, (3) apply multi-sidechain model with different functions in each sidechain.
引用
收藏
页码:551 / 564
页数:14
相关论文
共 23 条
[1]  
[Anonymous], 2019, LIBR WRIT PAP
[2]  
Back A., 2014, Enabling blockchain innovations with pegged sidechains, V72, P201
[3]   Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards [J].
Choudhuri, Arka Rai ;
Green, Matthew ;
Jain, Abhishek ;
Kaptchuk, Gabriel ;
Miers, Ian .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :719-736
[4]  
Chow J., 2016, Btc relay
[5]   General State Channel Networks [J].
Dziembowski, Stefan ;
Faust, Sebastian ;
Hostakova, Kristina .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :949-966
[6]  
Gai K., 2019, IEEE T IND INF
[7]   Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Xu, Lei ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :7992-8004
[8]   Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers [J].
Gai, Keke ;
Qiu, Meikang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3590-3598
[9]   Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing [J].
Gai, Keke ;
Qiu, Meikang ;
Zhao, Hui .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 :126-135
[10]   Proof-of-Stake Sidechains [J].
Gazi, Peter ;
Kiayias, Aggelos ;
Zindros, Dionysis .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :139-156