Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm
-
Published:2024-07-28
Issue:15
Volume:13
Page:2978
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Wang Yichuan12ORCID, Yan Yiliang1, Zhang Yaling1, Tian Mengjie1, Liu Xiaoxue1
Affiliation:
1. Cyberspace Security Research Institute, Xi’an University of Technology, Xi’an 710048, China 2. Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710121, China
Abstract
As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-chain-secure transmission technique, incorporating the Trusted Platform Module (TPM) and the SM algorithm, which is based on trusted roots. This research paper elaborates on the design and implementation of the cross-chain-secure transmission technique based on TPM and the SM algorithm, emphasizing the academic rigor necessary for addressing the security requirements of cross-chain interactions. The research shows that compared with the previous method, the throughput of production capacity is not significantly different from that before and after adding the network delay, and the success rate of preventing attacks is increased by 46.9% by simulating related attacks. After multiple rounds of experiments, the effectiveness and feasibility of this technology in protecting cross-chain communication data are verified.
Funder
the National Natural Science Founds of China
Reference36 articles.
1. Nie, X.-W., Fang, D.-G., Che, J.-J., and Wang, X.-P. (2006, January 13–16). Design and implementation of security operating system based on trusted computing. Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China. 2. Allan, T. (2017). Introduction to the TPM. Smart Cards, Tokens, Security and Applications, Springer. 3. Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004, January 9–13). Design and implementation of a TCG-based integrity measurement architecture. Proceedings of the USENIX Security Symposium, San Diego, CA, USA. 4. Lioy, A., and Ramunno, G. (2010). Trusted computing. Handbook of Information and Communication Security, Springer. 5. Survey on Cross-Chain Protocols of Blockchain;Meng;J. Front. Comput. Sci. Technol.,2022
|
|