Cross-Chain Asset Trading Scheme Without Trusted Third-Party (original) (raw)

Abstract

The development of blockchain technology is influenced by user diversity and application scenarios, resulting in limitations on the applicability of assets. Although cloud computing is renowned for facilitating cross-chain token transfers, it lacks a robust trust mechanism. Existing cross-chain transaction solutions are typically confined to interactions between two blockchains or within established networks. Hence, constructing a trustless cross-chain transaction protocol remains a significant challenge. This study proposes a trustless third-party cross-chain asset trading solution, Vchain, based on a Blockchain of Blockchains architecture and driven by a relay chain. This solution supports various blockchain ecosystem accounts and leverages cloud computing to integrate external data sources and API calls to obtain the latest token exchange rates, ensuring transaction accuracy and real-time performance. Simulation results demonstrate that Vchain’s cross-chain transaction costs are \(69.25\%\) lower than those of existing models. The research indicates that Vchain offers significant advantages in enhancing transaction efficiency and reducing costs, effectively addressing current challenges in cross-chain transactions.

Similar content being viewed by others

References

  1. Ou, W., et al.: An overview on cross-chain: mechanism, platforms, challenges and advances. Comput. Netw. 218, 109378 (2022)
    Article Google Scholar
  2. Belchior, R., et al.: A survey on blockchain interoperability: past, present, and future trends. ACM Comput. Surv. (CSUR) 54(8), 1–41 (2021)
    Article Google Scholar
  3. Ferrer, A.J., Marqués, J.M., Jorba, J.: Towards the decentralised cloud: survey on approaches and challenges for mobile, ad hoc, and edge computing. ACM Comput. Surv. (CSUR) 51(6), 1–36 (2019)
    Article Google Scholar
  4. Zou, J., et al.: Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput. Surv. (CSUR) 54(8), 1–36 (2021)
    Article Google Scholar
  5. Xiong, A., et al.: A notary group-based cross-chain mechanism. Digital Commun. Netw. 8(6), 1059–1067 (2022)
    Article Google Scholar
  6. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_8
    Chapter Google Scholar
  7. Lee, J.: Komodo: an advanced blockchain technology, focused on freedom. Komodo Platform, Komodo 12 (2018)
    Google Scholar
  8. Herlihy, M.: Atomic cross-chain swaps. In: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing (2018)
    Google Scholar
  9. Back, A., et al.: Enabling blockchain innovations with pegged sidechains, vol. 72, pp. 201–224 (2014). http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains
  10. Wiki, Bitcoin. Hashed Time-Lock Contracts. Hashed Time-Lock Contracts (2018)
    Google Scholar
  11. Zamyatin, A., et al.: Xclaim: trustless, interoperable, cryptocurrency-backed assets. In: 2019 IEEE Symposium on Security and Privacy (SP). IEEE (2019)
    Google Scholar
  12. Chen, K., Lee, L.F., Chiu, W., et al.: A trusted reputation management scheme for cross-chain transactions. Sensors 23(13), 6033 (2023)
    Article Google Scholar
  13. Buterin, V.: Chain interoperability. In: R3 Research Paper, vol. 9, pp. 1–25 (2016)
    Google Scholar
  14. Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Paper 21, 2327–4662 (2016)
    Google Scholar
  15. Nolan, T.: Alt chains and atomic transfers. https://bitcointalk.org/index.php?topic=193281.0
  16. Thomas, S., Schwartz, E.: A protocol for interledger payments (2015). https://interledger.org/
  17. Btc relay. http://btcrelay.org/
  18. Kwon, J., Buchman, E.: Cosmos whitepaper. A Netw. Distrib. Ledgers 27, 1–32 (2019)
    Google Scholar
  19. Mazumdar, S.: Towards faster settlement in HTLC-based cross-chain atomic swaps. In: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE (2022)
    Google Scholar
  20. Cason, D., et al.: The design, architecture and performance of the tendermint blockchain network. In: 2021 40th International Symposium on Reliable Distributed Systems (SRDS). IEEE (2021)
    Google Scholar
  21. Blaut, G., Ma, X., Wolter, K.: Exploring randomness in blockchains. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE (2023)
    Google Scholar
  22. Abbas, H., Caprolu, M., Di Pietro, R.: Analysis of polkadot: architecture, internals, and contradictions. In: 2022 IEEE International Conference on Blockchain (Blockchain). IEEE (2022)
    Google Scholar
  23. Li, W., Andreina, S., Bohli, J.-M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) ESORICS/DPM/CBT -2017. LNCS, vol. 10436, pp. 297–315. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0_17
    Chapter Google Scholar
  24. Zeng, Y., Zuo, S.: The matthew effect in computation contests: high difficulty may lead to 51% dominance?. In: The World Wide Web Conference (2019)
    Google Scholar

Download references

Acknowledgements

This study was funded by the National Natural Science Foundation (62202118). Natural Science Research Technology Top Talent Project of Guizhou Provincial Department of Education (Qianjiao ji [2022]073), Science and Technology Tackling Project of Guizhou Education Department (Qianjiao ji [2023]003), Hundred-level Innovative Talent Project of Guizhou Provincial Science and Technology Department (Qiankehe Platform Talent-GCC[2023]018) and Guizhou Province Major Project (Qiankehe Major Project [2024]003), Open Fund for Chongqing Key Laboratory of Public Big Data Security Technology(CQKL-QJ202300001).

Author information

Authors and Affiliations

  1. State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, Guizhou, 550025, China
    Bo Li, Yuling Chen, Siyuan Huang & Yuxiang Yang

Authors

  1. Bo Li
  2. Yuling Chen
  3. Siyuan Huang
  4. Yuxiang Yang

Corresponding author

Correspondence toYuling Chen .

Editor information

Editors and Affiliations

  1. Xidian University, Xi'an, China
    Xiaofeng Chen
  2. The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China
    Xinyi Huang
  3. Columbia University, New York, NY, USA
    Moti Yung

Ethics declarations

Disclosure of Interests

The authors have no competing interests to declare that are relevant to the content of this article.

Rights and permissions

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Li, B., Chen, Y., Huang, S., Yang, Y. (2025). Cross-Chain Asset Trading Scheme Without Trusted Third-Party. In: Chen, X., Huang, X., Yung, M. (eds) Data Security and Privacy Protection. DSPP 2024. Lecture Notes in Computer Science, vol 15215. Springer, Singapore. https://doi.org/10.1007/978-981-97-8540-7\_3

Download citation

Keywords

Publish with us