Next Article in Journal
Robust Overbooking for No-Shows and Cancellations in Healthcare
Previous Article in Journal
Distributed Regional Photovoltaic Power Prediction Based on Stack Integration Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts

1
School of Computer Science and Engineering, Northeastern University, Shenyang 110169, China
2
School of Software, Northeastern University, Shenyang 110169, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(16), 2562; https://doi.org/10.3390/math12162562
Submission received: 9 July 2024 / Revised: 1 August 2024 / Accepted: 14 August 2024 / Published: 19 August 2024

Abstract

:
We propose an innovative approach called SMPTC3, designed specifically to enhance security and privacy in cross-chain transaction verification. This approach addresses multi-chain, multi-participant information exchange and large-scale cross-chain transfers, resisting various types of malicious attacks. We leverage the verifiability of cross-chain transactions based on smart contracts and innovatively transform transaction information into confidential sets, organizing them into quadratic secret polynomials. By utilizing secret sharing and random distribution techniques, we construct a secure multiparty computation method, tailored for cross-chain transactions. To enhance the efficiency of cross-chain transactions, we introduce cross-chain batch processing technology, grouping inter-chain transactions into cross-chain transaction sets. Unlike traditional distributed notary technologies, SMPTC3 designates honest participants as a cross-chain notary group, reducing the time required for redundant signature confirmations and significantly lowering the possibility of malicious notaries. Theoretical analysis and empirical experiments demonstrate that SMPTC3 is highly efficient in addressing cross-chain transaction security issues.
MSC:
68Mxx

1. Introduction

Since Satoshi Nakamoto proposed the concept of blockchain [1], blockchain technology has realized a decentralized shared general ledger, which can be understood as a large-scale and decentralized distributed database, which is traceable, verifiable and not easily tampered with [2].
Blockchain has developed very quickly, and a large number of blockchain projects and their unique chain structures and tokens have been recently created, such as bitcoin blockchain [1] based on proof-of-work, Ethereum blockchain [3] transitioning from proof-of-work to proof-of-stake, the use of proof-of-stake [4,5,6], the use of proof-of-authority [7,8], and web3′s hot consortium blockchains, such as Hyperledger Fabric, Corda, and Quorum, which use consensus protocols such as PBFT [9,10] and Raft [11]. These chains do not communicate with each other in structure, which leads to great obstacles in the application and development of blockchain technology. Token and application data on the chain may form the data-islanding effect of blockchain, so different blockchains need a unified method to transfer data and assets. Therefore, researchers put forward the concept of “cross-chain”, which breaks the islanding effect among different blockchain projects and realizes interoperability between chains.
The current mainstream projects of cross-chain technology include Cosmos [12], Polkadot [13], Lightning Network [14], Fusion [15], Interledger [16], etc. Their purpose is to realize asset exchange, information interaction, and application collaboration between different blockchain platforms, reduce the difficulty of blockchain users, and reduce the cross-chain transmission process. Table 1 shows the key attributes of some cross-chain projects.
The Problem: At present, cross-chain still relies on third-party centralized nodes and relays. Even though Cosmos, Polkadot and cross-chain bridges [17,18] are proposed, which solve the inter-chain consensus protocol and some security problems, there is still the possibility of bridging chains being used for malicious purposes. In 2019, Cosmos was found to have a re-entrustment loophole, which could immediately redeem guarantee tokens by replacing the validator of a parallel chain, resulting in the early redemption of 7250 Atom tokens with a value of about 43,500 US dollars; this event destroyed the fairness of the transaction. The Grandpa Consensus (GHOST-based Recursive Ancestor Deriving Prefix Agreement) Protocol used by Polkadot cannot tolerate Dos attacks, and there is the possibility that Nominators will be used for malicious purposes together [13]. In 2022, Lightning Network had a malicious channel attack problem, and after the uplink timed out, malicious traders could still send bitcoin under the chain, resulting in theft.
Cross-chain bridge solutions focus on two-blockchain interoperability, which does not suit the complex cross-chain requirements in multi-chain ecosystems. As depicted in Figure 1 [17,18], suppose a user U , driven by investment motives, intends to exchange their assets t 1 held on blockchain C 1 for equivalent assets t 3 on another blockchain C 3 . However, given that both t 1 and t 2 are not stable currencies (potentially speculative coins), it requires converting t 1 through cross-chain bridge B 1 to obtain t 2 on blockchain C 2 (e.g., Ethereum′s ETH), then subsequently through B 2 , converting t 2 to t 3 via cross-chain transfer. It is evident in this operational flow that U engages in two separate cross-chain transactions, resulting in a cumbersome process, and the multiple transactions incur additional operational costs.
To address the issues of excessively long waiting times and high cross-chain transaction fees caused by multiple cross-chain operations in multi-party cross-chain scenarios, as well as to enhance the security and privacy of cross-chain operations and prevent other participating nodes or third-party verification nodes from stealing secret information during the cross-chain process, we propose the following solution.
Our approach: we can derive the following research objectives:
  • Reduce transaction time in multi-party, multi-cross-chain scenarios.
  • Lower the high fees associated with multi-party, multi-cross-chain scenarios.
  • Enhance the security and attack resistance of the cross-chain process.
  • Prevent third-party verification nodes or other participating nodes from stealing information, thereby improving the privacy of cross-chain operations.
In blockchain cross-chain scenarios, involving collaboration among multiple parties may require computations involving sensitive information. Secret sharing can be employed to securely execute computations among multiple parties, ensuring that no private information from any party is disclosed. We propose SMPTC3 (secure multi-party protocol-based trusted cross-chain contracts) to implement a secure cross-chain interaction protocol, which is mainly aimed at a token transfer of a large amount and the cross-chain transmission of important private data. SMPTC3 does not need to trust any central committee or third-party node. It uses and improves the SMC [19,20,21,22,23] (secure multi-party computation) proposed by Yao to establish the trust between the participating chains, and defines the participating nodes as semi-honest adversaries to prevent the participating chain from being used for malicious purposes. Meanwhile, participants can prove their identities without providing too much private data to ensure the privacy of cross-chain transactions. SMPTC3 embeds the improved SMC into the smart contract, and the cross-chain initiator C1 initiates the smart contract (SC) of the relay chain, and SC verifies whether the identities of C1 and other participants in the chain are true and reliable.
The SMPTC3 deploys a group of contracts, each situated on various participating chains, referred to as validator contracts. These validator contracts can invoke the validator contracts of other participating chains for cross-chain validation. They can also invoke sender and receiver contracts deployed across different chains to perform application-specific tasks. Depending on the application scenario, validator contracts may also require participating nodes to provide transaction information and Merkle proofs of smart contract states to ensure the atomicity of asset exchanges and the correctness of smart contracts. Figure 2 illustrates a hypothetical scenario of multi-chain asset exchange facilitated by SMPTC3. Initially, user U1 requests the validator contract to initiate a cross-chain transaction (step 1). To transfer the asset, the validator contract invokes SClock and notifies participating users to lock their respective assets (steps 2 and 3). Subsequently, the validator contract verifies the correctness and atomicity of the cross-chain transaction (steps 5 and 6). Upon successful validation, it invokes SCmint to issue assets. To ensure transaction atomicity, SCmint can issue new assets only when users have locked assets on the chain. This necessitates SCmint to read the state of SClock (balance of U, step 4) from the relevant blockchain, which is not directly accessible in cross-chain transactions. This is achieved through validator contracts facilitating the transmission of block headers, transaction information, and correctness proofs between chains (step 5 and 6). SCmint can verify the correctness of user balances through the validator contract (step 7) and, upon successful verification, issue new assets to each user (step 8).
Apart from the aforementioned multi-chain asset transfer, SMPTC3 can also support applications such as multi-chain message interaction and multi-chain voting.
This design offers four benefits.
  • For a token transfer of a large amount and the transmission of important private data in a cross-chain, there is no need to verify its offline identity repeatedly, and its reliability is ensured through strict identity verification on the chain;
  • In multi-chain ecology, confidential information sharing or anonymous voting can be carried out for mutual distrust among members;
  • Prevent various types of attacks and avoid possible losses caused by loopholes in the consensus protocol in the participating chain;
  • Due to the reliability of SMPTC3, there is no need for any additional security requirements beyond the security logic of underlying blockchains, especially the third-party centralized nodes or the security committees in the relay chain.
Technical challenges: Although there are many theoretical works of research [23,24] on secure multi-party computation at present, SMC is rarely used for blockchain cross-chain. Secondly, the two-party secure computation model is mostly used in the privacy protection methods on the chain, and whether the multi-party can resist collusion attack is an important problem for protocol security. Thirdly, the execution efficiency of complex computation tasks on ciphertext is very low and the communication cost is high. The question of how to simplify the computation and communication cost in the cross-chain process has become a research challenge. Finally, when using SMC and blockchain, it should be noted that the participating nodes of the two technologies may overlap. Therefore, in practical application, it is necessary to consider that these overlapping situations can meet the security assumptions of the two technologies at the same time.
It is obviously infeasible to directly extend the inter-chain communication of a secure two-party secure computation to multi-party, so we propose a novel scheme based on the original research results [19,20,25,26,27]; the presently available schemes include the garbled circuit method [20,28,29], secret sharing method [30,31,32] and homomorphic encryption method [27,33,34]. We transform the private information of each participant into a secret set, and use the secret set for SMC. We find that in a cross-chain, the set elements are regularly verifiable (traceability and immutability of the blockchain), so the secure set is encoded into a special array, and the homomorphic encryption method is combined to solve the problem of SMC, to reduce the high computing cost and communication cost of a traditional SMC. Then, we use smart contract in EVM or chaincode in a privacy channel by Fabric to ensure the information security of the computing process. Therefore, a secure cross-chain protocol with lower computation and communication cost is realized.
Our contribution: in this paper, we make the following contributions:
  • In order to resist malicious attacks such as Sybil and Dos, we improve the homomorphic encryption method (P-ElGamal) and threshold signature method, and combine these with the improved secure multi-party computation method (SMPTC3). The improved combination method can resist a variety of attacks to which the original blockchain was susceptible.
  • We propose an improved multi-party security computation method (SMPTC3) for blockchain. Compared with the original method, it significantly reduces the computational complexity and communication complexity, so the SMPTC3 in this paper is efficient, and SMPTC3 can be applied to a variety of environments except blockchain.
  • Based on SMPTC3, we convert the private data of multiple participants in different chains into secure sets. This method has great application value in cross-chain interaction, and can also provide a new secure transmission scheme for other cross-chain methods.
  • SMPTC3 uses secure multi-party computation to solve collusion attacks and avoid relying on third-party central nodes or security committees for authentication. SMPTC3 is a novel cross-chain interaction protocol.
  • Based on the Fabric, Ethernet and Cosmos systems, we implement the multi-party participation model of SMPTC3 and verify it. The experiments show that this protocol has high performance.
Section 2 introduces the background knowledge required for this paper. Section 3 is the core of this paper, including how to construct confidential sets and the two-round communication and computation process of SMPTC3. Section 4 describes the usage scenarios of SMPTC3. Section 5 extends SMPTC3 to two-party secure computation, which is one of the key challenges in multi-party secure computation. Section 6 presents the experiments demonstrating the security and efficiency of SMPTC3. Section 7 summarizes the work and advantages of SMPTC3. Section 8 briefly describes future research work.

2. Background

In this section we cover the background on blockchains, secure multi-party computation, and homomorphic encryption.

2.1. Blockchains

Blockchain [35,36,37] is a distributed shared ledger based on various technologies, essentially a distributed database with multi-participation and joint maintenance. Compared with centralized database management system, the blockchain system adopts a decentralized or weakly centralized data management mode [38], There is no central node; all participating nodes can store data. The persistence of transactions is realized by the increasing data chain and decentralized consensus mechanism jointly maintained by participating nodes, which ensures the credibility of data based on verification, improves the query efficiency of participants and the data security of the system, and reduces the maintenance cost of the original database maintainer [39].

2.1.1. Cross-Chain

Cross-chain [2,40] can be understood as chain-to-chain communication protocols. Current cross-chain technologies include the following methods: notary schemes, sidechains/relays, distributed private key control, hash-locking, and tight coupling. Because cross-chain involves building trust between chains, there may be some problems, such as private data leakage in a public chain, Sybil attacks in a consortium chain, and malicious intentions from third-party nodes. In the process of the cross-chain, there may be more security problems due to the different consensus protocols of participating chains. The common solution is to use a relay chain (cross-chain bridge [18,41]) to solve the problems of different consensus protocols, data leakage and third-party malicious intentions. However, at present, the relay chains are becoming centralized, and there is the possibility that the relay chains may be used for malicious purposes (Table 2 shows some cross-chain bridges’ security problems). Therefore, solving the trust problem between chains has become one of the key objectives of the research.

2.1.2. Smart Contracts

Smart contracts are event-driven, stateful computer programs deployed on shared distributed databases. The implementation of a smart contract is not based on the trust of centralized third party, and its security is based on cryptography. Smart contracts based on blockchain support the creation of distrusted protocols. This means that the contract participants do not need to know or trust each other, but only make commitments through blockchain, which is consistent with secure multi-party computation. For example, the Ethereum smart contract consists of a contract code and two public keys. The first public key is provided by the contract creator, and the other public key is the contract itself, which serves as a unique numeric identifier for each smart contract. All smart contract deployments are conducted through blockchain transactions, which will only be activated when external accounts (EOAs) or other smart contracts invoke. Ethereum smart contract has the characteristics of certainty, non-tampering and distrust. Regarding the trust problem in cross-chain process, it is one of the important means to express secure multi-party computing in the form of a smart contract.

2.2. Secure Multi-Party Computation

2.2.1. Mathematical Definition

Assuming there are n participants p 1 ,   p 2 ,   ,   p n , each party has a private input data x i , all participants calculate a function f   ( x 1 ,   x 2 ,   ,   x n ) together, and at the end of the calculation, each participant p i can only obtain the output of private input data x i , but can not obtain the input information and output information of other participants [42]. In secure multi-party computing, the semi-honest model and malicious adversary model are usually used.

2.2.2. Honest Participants

Honest participants [19,20] mean that, ideally, this kind of participant calculates strictly according to the requirements of the protocol, does not collect data privately, and does not have any malicious behaviors (attacking the protocol, refusing to participate in the protocol, stopping the protocol halfway, entering false data). This type of participant is ideal, but when designing a security model, it is generally assumed that there are no absolutely honest participants.

2.2.3. Semi-Honest Model

Semi-honest model is also called passive model [19,20,34] or honest-but-curious model. All participants in this kind of model are semi-honest, which refers to participants who calculate according to the requirements of the protocol during the calculation process, but these participants will record all the information collected during the protocol process and calculate the input information (private information) of other participants according to the collected information. Semi-honest participants do not actively attack protocols, but collect and record possible private information.

2.2.4. Malicious Adversary Model

In the malicious adversary model [19,20,43], some participants, as attackers, may use illegal input or malicious tampering input to calculate the private information of other participants, and may also refuse to participate in the protocol or stop the protocol halfway. A secure multi-party computation protocol based on malicious adversary model can meet the security requirements of semi-honest model.

2.3. Homomorphic Encryption

Because secure multi-party computation needs to ensure the privacy of data of each participant, it needs an encryption method with good homomorphism. ElGamal [27] has good multiplication homomorphism, as follows:

2.3.1. Key Generation

Given the security parameter k , the key generation algorithm generates a large prime number p with k bits and a generator g of Z p * , and randomly selects x as the secret key, and the corresponding public key is h = g x mod   p .

2.3.2. Encryption

To encrypt the message M ( M Z p * ) , select the random number r , and the ciphertext is E p k M = c 1 , c 2 = ( g r mod   p , M h r mod   p ) .

2.3.3. Decryption

For ciphertext E p k M = c 1 , c 2 , decrypt it to M = c 2 · c 1 x mod   p .

2.3.4. Homomorphic Property

Encryption system has multiplicative homomorphism:
E p k M 1 × E p k M 2 = g r 1 , M 1 h r 1 × g r 2 , M 2 h r 2 = g r 1 + r 2 , M 1 × M 2 h r 1 + r 2 = E p k M 1 × M 2
The data encrypted by ElGamal E p k M cannot obtain the original data M after decryption, so it is not completely decrypted, which can ensure that malicious nodes (semi-honest participants and malicious participants) in the chain cannot obtain the private data of other participants, which is one of the important objectives in this paper.

3. Confidential Set and Secure Multi-Party Computation for Cross-Chain

Firstly, the proposed solution in this paper does not require on-chain participants to encrypt transaction information in their sets using cryptographic algorithms. Since cryptographic algorithms consume significant computational power and communication costs, they are not suitable for cross-chain interactions. Therefore, the solution presented in this paper no longer employs cryptographic algorithms. Instead, it leverages mathematical methods for confidential computation, where participants communicate with each other only twice, establishing inter-chain trust locally. An essential feature of this solution is the elimination of the need to obtain and store public keys of other participants, preventing malicious activities by centralized transaction nodes or relay chains. This approach significantly reduces both computational and communication overhead.

3.1. Constructing Transaction Set

Assuming there are n participants on different chains, denoted as p 1 ,   p 2 ,   ,   p n   n     3 , collectively participating in a cross-chain transaction T, they collectively sign the transaction elements, including transaction signatures, sender identities, locked assets, transaction order, etc., denoted as e 1 ,   e 2 ,   e 3 ,   , e m . These elements are hashed and packaged into sets as follows:
X 1 = x 11 , x 12 , , x 1 m   X n = { x n 1 , x n 2 , , x n m }
In order to ensure the confidentiality of the set information, each participant converts their set into polynomial form. They construct a quadratic secret polynomial by taking each element (hash value) of their set as a root parameter for the polynomial. The quadratic secret polynomials constructed by participants p 1 ,   p 2 ,   ,   p n can be represented as:
f 1 x = ( x x 11 ) 2 ( x x 12 ) 2 ( x x 1 m ) 2 f n x = ( x x n 1 ) 2 ( x x n 2 ) 2 ( x x n m ) 2
When x = e , f i e = 0 iff e X i .

3.2. First Round of Participant Communication

The quadratic secret polynomials for participant p i ,   i 1 , n can be organized as follows:
f i x = p = 0 2 m e i p x p
The secret polynomials are then randomly divided into non-zero t ,   2 t n shares, such that:
f i x = f i 1 x + + f i t x
Even if an adversary S on a certain chain obtains t 1 shares of the secret polynomial p i , 1 < j < t :
f i 1 x + + f i j 1 x + f i j + 1 x + + f i t x
From Formula (3), it can be seen that S cannot obtain the complete secret polynomial. It is crucial to note that each share of the polynomial is non-zero and random, making Equation (4) an indeterminate equation. Therefore, it is impossible to construct the complete quadratic secret polynomial f i x . Even if S possesses the ability to reverse hash or use rainbow tables, they cannot obtain any element of the secret set p i .
Due to the possibility of collusion attacks such as Sybil attacks and conspiracy attacks in a multi-chain environment, to enhance security, we introduce random sending and random number strategies.
Random Sending Strategy: As the sender, participant p i randomly sends t shares of the polynomial to t recipients among the n participants 2 t n , and t may include the sender p i itself. Thus, t is not fixed, and the recipients are not certain whether other recipients have received the shares from the sender. This approach can also be used for cross-chain methods with relay chains and notary groups. In such cases, t shares of the polynomial are randomly sent to t relay chain nodes, forming a notary group, which then verifies and publicly discloses on the relay chain. The random sending strategy implies that even in a multi-chain environment, a witch attack or collusion attack cannot obtain the complete quadratic secret polynomial. Moreover, common consensus protocols have tolerances of 49% or 33%, while this scheme has a tolerance of 0%. Therefore, the tolerance of this scheme is lower than that of the consensus protocols used by each chain, eliminating the need for security guarantees at the underlying blockchain level.
Random Number Strategy: To further enhance the security of this scheme, we introduce a random number strategy. Specifically, each share of the polynomial is assigned a random number r i j ,   r i j 0 ,   i 1 , n ,   j 1 , t . To reduce the difficulty of verification and computational overhead in smart contracts, it is necessary to ensure:
i = 1 n j = 1 t r i j = 0
From Formulas (3)–(5), it can be observed that with the introduction of the random number strategy, if S obtains an incomplete secret polynomial, the sum of some random numbers must be non-zero. This will significantly increase the decryption cost, greatly enhancing the security of the secret polynomial.
The first-round communication example among participant nodes is illustrated in Figure 3, involving six participant nodes labeled as A, B, C, D, E, F. In this initial communication round, each node divides its quadratic secret polynomial into three parts:
f A = f A 1 + + f A 3 f D = f D 1 + + f D 3
Then, each node randomly sends them to the cross-chain participant nodes.
The participants randomly distribute their respective secret polynomial fragments. As evident from nodes C, D, and F in the diagram, it is possible for a participant to distribute a fragment randomly to themselves. Meanwhile, as node B indicates, due to the random transmission strategy, a participant node might not receive any secret polynomial fragments.

3.3. Second Round of Participant Communication

After the first communication round, each participant p i adds up all the partial polynomials they possess to form a new secret polynomial h i x . Due to the random sending strategy, h i x may be zero. After forming h i x , the second communication protocol is initiated. Participant p i sends the h i x they own to every participant node involved in the cross-chain transaction. Upon receiving h 1 x , h 2 x , , h n x , participant p i adds them up to create a new secret polynomial F x .
F x = h 1 x + + h n x
From Formulas (3), (5) and (6), the following computation process can be derived, resulting in Formula (7).
F x = i = 1 n g i x = ( f 11 x + r 11 ) + + ( f n t x + r n t ) = i = 1 n f i x + i = 1 n j = 1 t r i j = f 1 x + + f n x
We provided the construction process of the secret polynomial in Protocol 1.
Protocol 1: Constructing the Secret Polynomial F ( x )
Input: Transaction Elements e 1 ,   e 2 ,   e 3 ,   , e m from each Participant p i
Output: Secret Polynomial F ( x )
  1.
Each participant p i hashes and compiles their transaction elements e 1 ,   e 2 ,   e 3 ,   , e m into a secret set X i .
  2.
p i constructs quadratic secret polynomials f i ( x ) based on the elements in the secret set X i .
  3.
p i randomly divides f i ( x ) into t parts. For each participant p i and each polynomial fragment f i j ( x ) , generate a random number r i j such that r i j 0 . These random numbers enhance security and ensure that f i j = f i 1 x + r i 1 + + ( f i t ( x ) + r i t ) .
  4.
p i randomly sends the t polynomial fragments to t participating nodes.
  5.
Participants p 1 ,   p 2 ,   ,   p n collectively add up all the polynomial fragments to obtain h 1 x , , h n x , then broadcast it to all cross-chain participants.
  6.
Each node adds up all received polynomials h 1 x , , h n x to construct F ( x ) .
After the first round of communication, each participant consolidates all the secret polynomial fragments they own into a new secret polynomial, denoted as:
h A = f B 1 + f C 2 + f D 3 + f E 2 h B = h F = f A 3 + f B 2 + f D 1 + f E 3 + f F 3
After the consolidation, each participant broadcasts the secret polynomial they possess to the participant network, ensuring that eventually, each participant has the complete secret polynomial F. Specifically, as in the case of node B shown in Figure 3, h B is zero, and, for the integrity and security of the protocol, B also needs to broadcast h B to the network.

3.4. Secure Comparison

When the element e i represents the transaction verification information collectively possessed by all participants, f i x can be transformed into the following form:
f i x = x e i 2 S x
where S x is a ( 2 m 2 ) -degree polynomial obtained by dividing f ( x ) by x e i 2 . Substituting e i into Equation (8), we obtain f i x = 0 , implying F x = 0 . If a transaction element e * is not a shared element, then ( x e * ) 2 > 0 , and it follows that f i x > 0 , which implies F x 0 .
Each participant can substitute their transaction elements e 1 ,   e 2 ,   e 3 ,   , e m into Equation (7). If F e i = 0 , then e i represents the transaction information collectively owned by all participants. The smart contract can then make decisions based on predefined elements for comparison.
If the transaction elements possessed by each participant are accurately compared, operations such as cross-chain transfers are executed.
In Protocol 2, a secure multiparty computation scheme for transaction elements is provided.
Protocol 2: Secure Comparison Protocol
Input:  F ( x ) , e i
Output: Verification Result
1: Procedure CompareElements ( F ( x ) , e i )
2:  For i = 1 to m
3:   If F( e i )! = 0 Then
4:    return False//Verification failed, indicating data tampering, terminate the cross-chain contract
5:   Else Continue
6:   End if
7:  End
8:  Send transactions to Pools // Execute cross-chain transfer

4. Application Use Cases

A building block of cross-chain applications is ability to verify whether specific transactions exist on another blockchain and transactions’ atomicity. The existence of a transaction can be verified by the receiver contract on the destination chain, acquired from a user, third-party service, or validator contract (in this paper). This transaction t r x on source blockchain at block d can be obtained with the Merkle proof. Subsequently, the receiver contract invokes the updater contract to check if the Merkle proof of d from the source blockchain matches the one provided by the validator contract. The atomicity of multi-chain cross-chain transactions relies on a group of receiver contracts across all participating chains. This group of receiver contracts must collectively confirm the Merkle proof before proceeding, aiming for strong consistency and atomicity.
We present two application examples supported by SMPTC3, representing integral parts of Web 3.0.

4.1. Multi-Chain Asset Transfer

In Web 3.0, the investment demands of individual users expand, often involving the transfer and exchange of cross-chain assets. Unlike miner node transfers of assets to high-yield mainstream blockchain networks, regular cross-chain bridges suffice for these scenarios. However, for individual users investing in potential coins or NFTs, regular cross-chain bridges entail complex multiple cross-chain transfers and high fees. Leveraging SMPTC3, users can employ a unified validator contract and pre-deployed locking contracts S C l o c k and minting contract S C m i n t across multiple chains. The specific protocol involves the deployment of S C v , S C l o c k , and S C m i n t in a multi-chain ecosystem. User U 1 aims to swap their investment asset NFT t 1 for an equivalent value in potential coin t 3 . User U 2 is willing to purchase t 1 with an equivalent stable coin t 2 , while User U 3 has completed their investment and desires to exchange t 3 for stable coin t 2 . The detailed process is outlined in Figure 2.

4.2. Multi-Chain Information Interaction

Cross-chain message passing and data sharing involve sharing off-chain data across different blockchains, but simple bilateral cross-chain information exchange cannot satisfy the current complexities of the blockchain ecosystem. Multi-chain information interaction satisfies this need. Message passing can be achieved by embedding messages into transactions. As shown in Figure 4, to pass messages m 1 ,   m 2 from blockchain C 1 ,   C 2   to   C 3 , a multi-chain transaction can be initiated, divided into two parts t r x 1 and t r x 2 . Users can embed messages m 1 and m 2 into t r x 1 and t r x 2 , respectively, sending them to C 3 for verification and execution.

5. Trusted Cross-Chain Protocol for Two Participants

In this section, we aim to extend SMPTC3 to accommodate two participants and demonstrate through an example and security analysis that this approach is ineffective. Subsequently, we introduce a two-participant cross-chain verification method based on discrete logarithms.

5.1. Direct Extension of TMPC3 to Two Participants

In SMPTC3, the fundamental security assumption is n 3 , signifying multiple participants collectively executing cross-chain verification tasks. It allows participants to conceal data within secret polynomials and share them among other participants while ensuring the secrecy of data. However, a majority of cross-chain interaction scenarios are concentrated on two participants across two chains, i.e., n = 2 , from Section 3.1, resulting in t = 2, which can be derived from Equation (3):
f A = f A 1 x + f A 2 x f B = f B 1 x + f B 2 x
The execution of the first round of communication leads to the transformation of Figure 3 into Figure 5:
h A + h B f B = f A
From Equation (9), it can be observed that B can directly compute the complete quadratic secret polynomial of A. This makes the secret information of A highly susceptible to direct deduction, rendering the direct extension of SMPTC3 to two-party computation ineffective.

5.2. Two-Participant Cross-Chain Verification Method Based on Discrete Logarithms

In practical cross-chain scenarios involving two participants, the data source is determinate. Therefore, relying on random transmission based on quadratic secret polynomials becomes ineffective. Hence, leveraging discrete logarithms [38], we have designed a verification method (2PC3) tailored for two-participant cross-chain scenarios.
As shown in Figure 6:
Two participants, A and B, first collectively agree on a large prime number p . Subsequently, each generates a large random number, r a and r b , respectively. Then, based on their respective sets X A = { x 11 , x 12 , , x 1 m } and X B = { x 21 , x 22 , , x 2 m } , they create Y A and Y B through the first round of discrete logarithm encryption and exchange these (steps 1 and 2). Following this, A and B individually perform the second round of discrete logarithm encryption to obtain Y B and Y A (step 3) and send these results to the verification contract (step 4). Upon successful comparison by the verification contract, a verification success message is sent to A and B (step 5).
The first round of discrete logarithm encryption is represented as:
y A i = x 1 i r a m o d p ,   x 1 i X A , y B i = x 2 i r b m o d p ,   x 2 i X B , i 1 , m
The second round of discrete logarithm encryption is represented as:
y B i = y B i r a   m o d p ,   y B i Y B , y A i = y A i r b   m o d p ,   y A i Y A , i 1 , m
Derived from Equations (9) and (10):
y A i = x 1 i r a + r b   m o d p y B i = x 2 i r a + r b   m o d p
From Equation (11), if X A = X B , then Y A = Y B , where the exponents r a and r b along with the large prime number p are randomly generated. Hence, the encryption verification method used in this paper ensures semantic security. Due to the complexity of the discrete logarithm problem, deducing xi is almost impossible. Even in the presence of curious nodes on the chain or among participants, access to confidential information is unattainable.
Protocol 3: 2PC3 Protocol
Input: Transaction Elements Set X A and X B from Participants p A and p B
Output: Verification Result
1: Participants p A and p B jointly generate a large prime number p .
2:  p A and p B each generate a large random number r a and r b .
3:  p A and p B , respectively, perform the first round of discrete logarithm encryption on elements x A i from set X A and x B i from set X B , denoted as y A i = x 1 i r a m o d p ,   y B i = x 2 i r b m o d p , where i 1 , m , then forming confidential sets Y A and Y B .
4:  p A and p B mutually exchange Y A and Y B .
5:  p A and p B , respectively, perform the second round of discrete logarithm encryption on Y B and Y A , denoted as y B i =   y B i r a m o d p , y A i = y A i r b m o d p , forming sets Y B and Y A .
6:  p A and p B send Y B and Y A to the validator contract. After verification by the validator contract, the verification result is sent to the participants.

6. Implementation and Evaluation

The experiments for SMPTC3 are based on Fabric and the Ethereum test version Rinkeby (Geth) systems. The cross-chain contracts are implemented using Go and Solidity 3 multi-party cross-chain algorithm and the two-party cross-chain algorithm. Depending on the number of participants, the contract will automatically select the corresponding cross-chain solution (2PC or MPC). Based on the characteristics of blockchain cross-chain transactions (cross-chain information transmission also falls under cross-chain transactions), we use methods such as hashing and feature extraction to compute the transaction features, forming a verifiable high-privacy secret set. Then, based on the concept of multi-party secure computation (MPC) and combined with the communication characteristics of blockchain, we achieve communication and secure computation.

6.1. Experiment Setup

We conducted experimental tests using an Intel(R) Xeon(R) Gold 6354 CPU @ 3.00 GHz and 504 GB RAM. In accordance with requirements and industry standards, we report the average execution time and fees. The reported results are derived from the average of ten executions.

6.2. Security Test

We divided the participant nodes into four types: honest nodes, semi-honest adversaries, malicious adversaries, and downtime nodes. Based on these classifications, we set up four test scenarios: all honest nodes, an unspecified number of semi-honest adversaries, mostly honest nodes with one malicious adversary, and mostly honest nodes with one downtime node. Security testing was conducted with ( 2 ,   3 ,   5 ) participants, with each scenario undergoing 100 actual tests, resulting in Figure 7.
From Figure 7, we can see that SMPTC3 can operate normally when all participants are honest nodes or when there are semi-honest adversaries. According to Formulas (4)–(8), the semi-honest adversary model can only obtain partial fragments of the secret set and cannot acquire effective secret information. When there is a malicious adversary among the participants, SMPTC3 cannot pass the verification, and the cross-chain transaction will be abandoned, strictly ensuring the safety of cross-chain assets and information. Therefore, in a malicious adversary environment, the number of successful verifications is zero. In the downtime node test environment, we divided it into two scenarios: one where the node downtime time exceeds the verification waiting time, and the other where the node recovers and re-responds to verification. Experimental tests show that if the node recovers from the crash and promptly responds and continues to participate honestly in verification, the verification task can still be successfully completed. This experiment demonstrates that SMPTC3 has good security and robustness, ensuring the safety of cross-chain assets and information.

6.3. Verify Time of SMPTC3

We measured the time overhead required for cross-chain transactions. For comparison with SMPTC3, we deployed conventional multi-signature notary mechanisms and sidechain mechanisms as control groups in the same experimental environment. Due to the complexity of multi-chain cross-chain scenarios, we designed the control group to achieve optimal experimental results, as shown in Figure 8. This ideal situation assumes there are only n 1 cross-chain operations (with n cross-chain participants, the maximum number of cross-chain operations could be n ( n 1 ) 2 , and the minimum is n 1 ).
After executing each set of experiments ten times and averaging the results, we obtained the data presented in Figure 9. As shown in Figure 8, the ideal verify time for the multi-signature notary mechanism and the sidechain mechanism increases linearly ( n ) with the number of participants. Given that the maximum number of cross-chain operations could be n ( n 1 ) 2 , it is evident that the worst-case scenario will show a quadratic increase ( n 2 ).
In contrast, for SMPTC3, the horizontal axis range of participants is 2–32, and the overall trend remains horizontal. It is worth noting that with only two participants, the verify time of SMPTC3 is slightly higher than in the multi-participant scenario. According to Formulas (10)–(12), this is likely due to the computation time for exponential and modular operations. For multiple participants, as the number of participants increases, the SMPTC3 verify time generally remains stable. However, when there are too many participants, such as 16–32, the verify time slightly increases. As indicated by Protocols 1 and 2, this is due to the increased communication and computation costs caused by the larger number of elements involved in the computation, but such situations are uncommon in practical applications and do not hold significant practical value.
In summary, SMPTC3 can effectively solve the complex problem of cross-chain interactions among multiple participants in practical applications. It also satisfactorily meets the basic requirements for two-party interactions.

7. Conclusions

The paper proposes an improved decentralized cross-chain method, SMPTC3, based on multi-party secure computation (MPC). The improved MPC method addresses the centralization issue inherent in traditional blockchain cross-chain methods, providing enhanced privacy and security. It innovatively solves the problem of multiple cross-chain operations in multi-chain ecosystems, significantly reducing the complexity of cross-chain interactions for multi-chain participants. Additionally, by leveraging the characteristics of blockchain technology, it extends MPC to two-party secure computation (2PC), meeting the basic cross-chain needs between two blockchains. Furthermore, SMPTC3 replaces the original cross-chain bridge solution, avoiding high cross-chain fees. Experimental results show that in blockchain cross-chain application scenarios, SMPTC3 effectively resolves issues that previously required multiple cross-chain operations through a single cross-chain interaction. For basic two-chain cross-chain requirements, its performance also surpasses that of previous methods. Unlike previous cross-chain bridge methods, SMPTC3 further reduces the various costs associated with cross-chain interactions, thereby avoiding limitations on blockchain ecosystem performance due to cross-chain operations.

8. Discussion and Future Research Work

This paper proposed a blockchain-based multi-party secure computation cross-chain method, addressing the complex issue of multiple cross-chain verifications with multiple participants and extending the multi-party participation model to a two-party model. However, it primarily focuses on blockchain cross-chain security issues and multi-party, multi-cross-chain scenarios issues, and does not address the recalculation load problem in MPC. In the future, we will continue to research the issue of recomputation load after interruptions in on-chain multi-party secure computation and further reduce the computational load of MPC algorithms.

Author Contributions

Conceptualization, G.Y. and T.N.; methodology, H.M. and X.L.; software, H.M. and M.Y.; validation, G.Y., T.N. and X.D.; formal analysis, G.Y. and X.L.; investigation, X.D. and M.Y.; resources, T.N.; data curation, H.M. and M.Y.; writing—original draft preparation, H.M.; writing—review and editing, T.N. and M.Y.; visualization, H.M.; supervision, H.M.; project administration, G.Y.; funding acquisition, all authors. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (grant number 62072086, 62372097, and 61991404), and the Special Funds for Basic Scientific Research of Central Universities (grant number N2116005, N2116008, and N2416003).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. In Decentralized Business Review; The United States Sentencing Commission: Washington, DC, USA, 2008; p. 21260. [Google Scholar]
  2. Mao, H.; Nie, T.; Sun, H.; Shen, D.; Yu, G. A Survey on Cross-Chain Technology: Challenges, Development, and Prospect. IEEE Access 2023, 11, 45527–45546. [Google Scholar] [CrossRef]
  3. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  4. Bentov, I.; Pass, R.; Shi, E. Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch. 2016, 2016, 919. [Google Scholar]
  5. David, B.; Ga, P.; Kiayias, A.; Russell, A. Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. Cryptol. ePrint Arch. 2017, 2017, 573. [Google Scholar]
  6. Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Advances in Cryptology—CRYPTO 2017, Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Springer: Cham, Switzerland, 2017; pp. 357–388. [Google Scholar]
  7. Angelis, S.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs. Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain. ITASEC 2018, 2058, 6. [Google Scholar]
  8. Liu, X.; Zhao, G.; Wang, X.; Lin, Y.; Zhou, Z.; Tang, H.; Chen, B. MDP-Based Quantitative Analysis Framework for Proof of Authority. In Proceedings of the Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guilin, China, 17–19 October 2019; pp. 227–236. [Google Scholar]
  9. Li, Y.; Wang, Z.; Fan, J.; Zheng, Y.; Luo, Y.; Deng, C.; Ding, J. An Extensible Consensus Algorithm Based on PBFT. In Proceedings of the Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guilin, China, 17–19 October 2019; pp. 17–23. [Google Scholar]
  10. Wang, Y.; Song, Z.; Cheng, T. Improvement Research of PBFT Consensus Algorithm Based on Credit. In Blockchain and Trustworthy Systems, Proceedings of the First International Conference, BlockSys 2019, Guangzhou, China, 7–8 December 2019; Springer: Singapore, 2019; Volume 1156, pp. 47–59. [Google Scholar]
  11. Wang, R.; Zhang, L.; Xu, Q.; Zhou, H. K-Bucket Based Raft-Like Consensus Algorithm for Permissioned Blockchain. In Proceedings of the 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 4–6 December 2019; pp. 996–999. [Google Scholar]
  12. Kim, J.; Essaid, M.; Ju, H. Inter-Blockchain Communication Message Relay Time Measurement and Analysis in Cosmos. In Proceedings of the 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Takamatsu, Japan, 28–30 September 2022; pp. 1–6. [Google Scholar]
  13. Abbas, H.; Caprolu, M.; Pietro, R. Analysis of Polkadot: Architecture, Internals, and Contradictions. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 61–70. [Google Scholar]
  14. Zabka, P.; Foerster, K.-T.; Schmid, S.; Decker, C. Empirical evaluation of nodes and channels of the lightning network. Pervasive Mob. Comput. 2022, 83, 101584. [Google Scholar] [CrossRef]
  15. Fusion Foundation. Fusion Whitepaper: An Inclusive Cryptofinance Platform Based on Blockchain; Fusion Foundation: Singapore, 2017. [Google Scholar]
  16. Trestioreanu, L.; Cassagnes, C.; State, R. Deep dive into Interledger: Understanding the Interledger ecosystem. arXiv 2022, arXiv:2206.10446. [Google Scholar]
  17. LayerZero. 2022. Available online: https://layerzero.network/ (accessed on 1 July 2022).
  18. Xie, T.; Zhang, J.; Cheng, Z.; Zhang, F.; Zhang, Y.; Jia, Y.; Boneh, D.; Song, D. zkBridge: Trustless Cross-chain Bridges Made Practical. In Proceedings of the CCS 2022, Los Angeles, CA, USA, 7–11 November 2022; pp. 3003–3017. [Google Scholar]
  19. Yao, A.C.-C. Protocols for Secure Computations. In Proceedings of the FOCS 1982, Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
  20. Yao, A.C.-C. How to Generate and Exchange Secrets. In Proceedings of the FOCS 1986, Toronto, ON, Canada, 27–29 October 1986; pp. 162–167. [Google Scholar]
  21. Goldwasser, S. Multi-Party Computations: Past and Present. In Proceedings of the PODC 1997, Santa Barbara, CA, USA, 21–24 August 1997; pp. 1–6. [Google Scholar]
  22. Dalskov, A.P.K.; Escudero, D.; Nof, A. Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. In Proceedings of the CCS 2022, Los Angeles, CA, USA, 7–11 November 2022; pp. 653–666. [Google Scholar]
  23. Bayatbabolghani, F.; Blanton, M. Secure Multi-Party Computation. In Proceedings of the CCS 2018, Toronto, ON, Canada, 15–19 October 2018; pp. 2157–2159. [Google Scholar]
  24. Zhu, R.; Cassel, D.; Sabry, A.; Huang, Y. NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. In Proceedings of the CCS 2018, Toronto, ON, Canada, 15–19 October 2018; pp. 862–879. [Google Scholar]
  25. Freedman, M.J.; Hazay, C.; Nissim, K.; Pinkas, B. Efficient Set Intersection with Simulation-Based Security. J. Cryptol. 2016, 29, 115–155. [Google Scholar] [CrossRef]
  26. Cheon, J.H.; Jarecki, S.; Seo, J.H. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2012, 95-A, 1366–1378. [Google Scholar] [CrossRef]
  27. El Gamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
  28. Goyal, V.; Mohassel, P.; Smith, A.D. Efficient Two Party and Multi Party Computation Against Covert Adversaries. In Advances in Cryptology, Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008, Istanbul, Turkey, 13–17 April 2008; Springer: Berlin/Heidelberg, Germany, 2008; Volume 2008, pp. 289–306. [Google Scholar]
  29. Volgushev, N.; Schwarzkopf, M.; Getchell, B.; Varia, M.; Lapets, A.; Bestavros, A. Conclave: Secure multi-party computation on big data. In Proceedings of the EuroSys ‘19, Dresden, Germany, 25–28 March 2019; pp. 3:1–3:18. [Google Scholar]
  30. Dolev, S.; Li, Y.; Sharma, S. Private and Secure Secret Shared MapReduce. In DBSec 2016; Springer: Cham, Switzerland, 2016; pp. 151–160. [Google Scholar]
  31. Dahl, M.; Mancuso, J.; Dupis, Y.; Decoste, B.; Giraud, M.; Livingstone, I.; Patriquin, J.; Uhma, G. Private Machine Learning in TensorFlow using Secure Computation. arXiv 2018, arXiv:1810.08130. [Google Scholar]
  32. Kumar, N.; Rathee, M.; Chandran, N.; Gupta, D.; Rastogi, A.; Sharma, R. Low: Secure TensorFlow Inference. In Proceedings of the 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 18–21 May 2020; pp. 336–353. [Google Scholar]
  33. Dong, Y.; Milanova, A.L.; Dolby, J. SecureMR: Secure mapreduce computation using homomorphic encryption and program partitioning. In Proceedings of the HotSoS ’2018, Raleigh, NC, USA, 10–11 April 2018; pp. 4:1–4:13. [Google Scholar]
  34. Bautista, O.G.; Manshaei, M.H.; Hernandez, R.; Akkaya, K.; Homsi, S.; Uluagac, S. MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. J. Netw. Syst. Manag. 2023, 31, 68. [Google Scholar] [CrossRef]
  35. Bhushan, B.; Sinha, P.; Sagayam, K.M.; Andrew, J. Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. 2021, 90, 106897. [Google Scholar] [CrossRef]
  36. Wu, S.; Li, J.; Duan, F.; Lu, Y.; Zhang, X.; Gan, J. The Survey on the development of Secure Multi-Party Computing in the blockchain. In Proceedings of the 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), Shenzhen, China, 9–11 October 2021; pp. 1–7. [Google Scholar]
  37. Zhu, G.; He, D.; An, H.; Luo, M.; Peng, C. The governance technology for blockchain systems: A survey. Front. Comput. Sci. 2024, 18, 182813. [Google Scholar] [CrossRef]
  38. Reddy, B.S.; Reddy, T.U.K. CompactChain: An efficient stateless chain for UTXO-model blockchain. Front. Comput. Sci. 2024, 18, 182806. [Google Scholar] [CrossRef]
  39. Zhang, P.; Yuan, Y.; Song, J.; Gu, Y.; Qu, Q.; Bai, Y. Introducing on-chain graph data to consortium blockchain for commercial transactions. Front. Comput. Sci. 2024, 18, 182608. [Google Scholar] [CrossRef]
  40. Belchior, R.; Vasconcelos, A.; Guerreiro, S.; Correia, M. A Survey on Blockchain Interoperability: Past, Present, and Future Trends. ACM Comput. Surveys 2021, 54, 1–41. [Google Scholar] [CrossRef]
  41. Zhang, J.; Gao, J.; Li, Y.; Chen, Z.; Guan, Z.; Chen, Z. Xscope: Hunting for Cross-Chain Bridge Attacks. In Proceedings of the ASE ’22, Rochester, MI, USA, 10–14 October 2022; pp. 171:1–171:4. [Google Scholar]
  42. Dou, J.; Liu, X.; Zhou, S.; Li, S. Efficient Secure Mutiparty Set Operations Protocols and Their Application. Chin. J. Comput. 2018, 41, 1844–1860. [Google Scholar]
  43. Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications; Cambridge University Press: London, UK, 2009. [Google Scholar]
Figure 1. Two cross-chain transactions based on cross-chain bridge.
Figure 1. Two cross-chain transactions based on cross-chain bridge.
Mathematics 12 02562 g001
Figure 2. Multi-chain asset exchange by SMPTC3.
Figure 2. Multi-chain asset exchange by SMPTC3.
Mathematics 12 02562 g002
Figure 3. First-round communication example.
Figure 3. First-round communication example.
Mathematics 12 02562 g003
Figure 4. Multi-chain information interaction.
Figure 4. Multi-chain information interaction.
Mathematics 12 02562 g004
Figure 5. First-round communication on two participants.
Figure 5. First-round communication on two participants.
Mathematics 12 02562 g005
Figure 6. Verification method tailored for two-participant scenarios (2PC3).
Figure 6. Verification method tailored for two-participant scenarios (2PC3).
Mathematics 12 02562 g006
Figure 7. Security test results.
Figure 7. Security test results.
Mathematics 12 02562 g007
Figure 8. Ideal situation of the control group.
Figure 8. Ideal situation of the control group.
Mathematics 12 02562 g008
Figure 9. Verify time of SMPTC3 and conventional cross-chain methods.
Figure 9. Verify time of SMPTC3 and conventional cross-chain methods.
Mathematics 12 02562 g009
Table 1. Comparison of cross-chain projects.
Table 1. Comparison of cross-chain projects.
Cross-Chain ProjectConsensusCross-Chain TechnologySecurityTransaction Speed
CosmosTendermint BFTIBC Protocol and RelaysMediumVery High
PolkadotAsynchronous BFTRelaysMediumMedium
Lighting NetworkFollowing transactions chainChannelsMediumHigh
FusionPoWDCRMMediumMedium
InterledgerFollowing transactions chainMulti-NotaryLowMedium
Table 2. Cross-chain bridges security problem.
Table 2. Cross-chain bridges security problem.
DateVictimization AgreementType of AttackOperation Position
2021.07ChainswapCheck for defectsAfter signing/cross-chain
2021.08Poly NetworkHash collusion/check defectsignature
2022.01Qubit BridgeIncorrect setup/check defectBefore cross-chain
2022.01MultichainInterface compatibility issuesBefore cross-chain
2022.02Meter BridgeInspection defectsBefore cross-chain
2022.02WormholeInterface verification problemsignature
2022.03Li FinanceInspection defectsBefore cross-chain
2022.03Ronin NetworkValidator controlsignature
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mao, H.; Nie, T.; Yu, M.; Dong, X.; Li, X.; Yu, G. SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts. Mathematics 2024, 12, 2562. https://doi.org/10.3390/math12162562

AMA Style

Mao H, Nie T, Yu M, Dong X, Li X, Yu G. SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts. Mathematics. 2024; 12(16):2562. https://doi.org/10.3390/math12162562

Chicago/Turabian Style

Mao, Hanyu, Tiezheng Nie, Minghe Yu, Xiaomei Dong, Xiaohua Li, and Ge Yu. 2024. "SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts" Mathematics 12, no. 16: 2562. https://doi.org/10.3390/math12162562

APA Style

Mao, H., Nie, T., Yu, M., Dong, X., Li, X., & Yu, G. (2024). SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts. Mathematics, 12(16), 2562. https://doi.org/10.3390/math12162562

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop