Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection
-
Published:2023-12-14
Issue:24
Volume:12
Page:5010
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Zhang Shuhui12ORCID, Zhou Ruiyao12, Wang Lianhai12ORCID, Xu Shujiang12, Shao Wei12
Affiliation:
1. Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan 250353, China 2. Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for Computer Science, Jinan 250014, China
Abstract
In recent years, the rapid development of blockchain technology has facilitated the transfer of value and asset exchange between different blockchains. However, achieving interoperability among various blockchains necessitates the exploration of cross-chain technology. While cross-chain technology enables asset flow between different blockchains, it also introduces the risk of identity privacy leakage, thus posing a significant threat to user security. To tackle this issue, this article proposes a cross-chain privacy protection scheme that leverages ring signature and relay chain technology. Specifically, this scheme utilizes RCROSS contracts based on ring signatures to handle cross-chain transactions, thereby ensuring the privacy of both parties involved in the transaction. This cross-chain solution demonstrates practicality and efficiency in facilitating cross-chain asset trading. Furthermore, it effectively combats reuse attacks and man-in-the-middle attacks at the application layer while also providing resistance against denial-of-service attacks at the network layer. To validate the proposed cross-chain solution, we conducted tests by constructing a specific cross-chain scenario and by focusing on the natural gas consumption values generated by the RCROSS contract function used in the application chain. The findings indicate that our proposed solution is highly practical in safeguarding the identity privacy of transaction participants. This article’s framework guarantees reliability, security, and efficiency in cross-chain asset transactions. By incorporating ring-based signatures and relay chain technology, users can confidently protect their identity privacy, thus ensuring secure and smooth cross-chain transactions.
Funder
Shandong Provincial Natural Science Foundation of China National Natural Science Foundation of China Shandong Provincial Key Research and Development Program
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference31 articles.
1. Analysis of cross-chain technology of blockchain;Guo;Chin. J. Internet Things,2020 2. Schulte, S., Sigwart, M., Frauenthaler, P., and Borkowski, M. (2019, January 1–6). Towards blockchain interoperability. Proceedings of the 2019 International Conference on Business Process Management, Vienna, Austria. 3. Blockchains for business process management-challenges and opportunities;Mendling;ACM Trans. Manag. Inf. Syst. (TMIS),2018 4. Blockchain dynamic sharding model based on jump Hash and asynchronous consensus group;Pan;Comput. Sci.,2020 5. Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., and Felten, E.W. (2014, January 16–17). Mixcoin: Anonymity for bitcoin with accountable mixes. Proceedings of the Int’l Conference on Financial Cryptography and Data Security, Istanbul, Turkey.
|
|