Skip to main content

PCT: A Relay-Based Privacy-Preserving Cross-Chain Transaction Scheme

  • Conference paper
  • First Online:
Blockchain Technology and Application (CBCC 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1736))

Included in the following conference series:

Abstract

Blockchain has been rapidly evolving in recent years and widely used in financial transactions due to its tamper-proof and decentralization features. However, as a relatively independent system, different blockchains have difficulty interoperating with each other, and the issue of “Value Island” becomes more problematic. In addition, the users on the different ledgers are also concerned about the leakage of privacy in the cross-chain process. In this paper, we propose a Privacy-Preserving Cross-Chain Transaction (PCT) scheme combining the relay mechanism with the hash locking mechanism. Meanwhile, the Pedersen commitment is introduced to enable the committers to verify the transaction without acknowledging the amount. We also conduct the range proof based on the Borromean ring signature to ensure that the transaction amount is legitimate. Finally, a lending scheme is designed to solve the problem of insufficient funds in cross-chain transactions. Security analysis and experiments show our scheme achieves privacy-preserving cross-chain transactions with low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lin, X., Wu, J., Bashir, A.K., et al.: Blockchain-based incentive energy-knowledge trading in IoT: Joint power transfer and AI design. IEEE Internet Things J. 9(16), 14685–14698 (2022)

    Article  Google Scholar 

  2. Wang, N., Yang, W., Wang, X., et al.: A blockchain based privacy-preserving federated learning scheme for Internet of vehicles. Digital Commun. Netw. (2022)

    Google Scholar 

  3. Liao, S., Wu, J., Mumtaz, S., et al.: Cognitive balance for fog computing resource in internet of things: an edge learning approach. IEEE Transaction on Mobile Computing 21(5), 1596–1608 (2022)

    Article  Google Scholar 

  4. Zhang, Z., Yin, J., Hu, B., et al.: CLTracer: a cross-ledger tracing framework based on address relationships. Comput. Secur. 113, 102558 (2022)

    Article  Google Scholar 

  5. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

  6. Wang, N., et al.: When energy trading meets blockchain in electrical power system: the state of the art. Appl. Sci. 9(8), 1561 (2019)

    Article  Google Scholar 

  7. Zheng, Z., Xie, S., Dai, H.N., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)

    Article  Google Scholar 

  8. Kannengießer, N., et al.: Bridges between islands: cross-chain technology for distributed ledger technology. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (2020)

    Google Scholar 

  9. Lin, S., Kong, Y., Nie, S.: Overview of block chain cross chain technology. In: 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE (2021)

    Google Scholar 

  10. Hope-Bailie, A., Thomas, S.: Interledger: creating a standard for payments. In: Proceedings of the 25th International Conference Companion on World Wide Web (2016)

    Google Scholar 

  11. Back, A., Corallo, M., Dashjr, L., et al.: Enabling blockchain innovations with pegged sidechains. 72, 201—224 (2014) http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains

  12. Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts. White Pap. 1–47 (2017)

    Google Scholar 

  13. Kwon, J., Buchman, E.: A network of distributed ledgers. Cosmos, dated, 1–41, (2018)

    Google Scholar 

  14. Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Pap. 21 (2016)

    Google Scholar 

  15. ConsenSys. BTC Relay’s documentation. http://btc-relay.readthedocs.io/en/latest/

  16. Dilley, J., Poelstra, A., Wilkins, J., et al.: Strong federations: an interoperable blockchain solution to centralized third-party risks. arXiv:1612.05491 (2016)

  17. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)

    Google Scholar 

  18. Miers, I., Garman, C., Green, M., et al.: Zerocoin: anonymous distributed E-Cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE (2013)

    Google Scholar 

  19. Maxwell, G.: CoinJoin: bitcoin privacy for the real world.post on bitcoin forum (2013)

    Google Scholar 

  20. Narula, N., Vasquez, W., Virza, M.: zkledger: privacy-preserving auditing for distributed ledgers. In: 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18), 65–80 (2018). Author, F.: Article title. Journal 2(5), 99–110 (2016)

    Google Scholar 

  21. Network, R.: Trustless Privacy on Polkadot. https://www.raze.network

  22. Deshpande, A., Maurice, H.: Privacy-preserving cross-chain atomic swaps. In: International Conference on Financial Cryptography and Data Security. Springer, Cham (2020)

    Google Scholar 

  23. Pedersen, T.P.: Non-interactive and information theoretic secure verifiable secret sharing. In: Proceedings of the 11th Annual International Cryptology Conference (1992), CRYPTO 1991, pp. 129–140 (1992)

    Google Scholar 

  24. Gibson, A.: An investigation into confidential transactions, vol. 93 (2016). https://github.com/AdamISZ/ConfidentialTransactionsDoc/blob/master/essayonCT.pdf.

  25. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: International conference on the theory and application of cryptology and information security, pp. 552–565. Springer, Berlin, Heidelberg (2001)

    Google Scholar 

  26. Yang, W., Wang, N., Guan, Z., et al.: IEEE Wireless Communications (2022)

    Google Scholar 

  27. Maxwell, G., Poelstra, A.: Borromean ring signatures (2015). Accessed 8 June 2019

    Google Scholar 

  28. Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Conference on the Theory and Application of Cryptology, pp. 239–252. Springer, New York (1989)

    Google Scholar 

  29. Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 415–432. Springer, Berlin, (2002)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Science and Technology Project of State Grid Corporation of China: “Research on key technologies of cross-chain interaction of energy and power blockchain public service platform” (5700-202172412A-0–0-00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, D. et al. (2022). PCT: A Relay-Based Privacy-Preserving Cross-Chain Transaction Scheme. In: Sun, Y., Cai, L., Wang, W., Song, X., Lu, Z. (eds) Blockchain Technology and Application. CBCC 2022. Communications in Computer and Information Science, vol 1736. Springer, Singapore. https://doi.org/10.1007/978-981-19-8877-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8877-6_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8876-9

  • Online ISBN: 978-981-19-8877-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics