TY - GEN
T1 - An Approach of Secure Two-Way-Pegged Multi-sidechain
AU - Guo, Jinnan
AU - Gai, Keke
AU - Zhu, Liehuang
AU - Zhang, Zijian
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - As a temper-resistant ledger, blockchain ensures integrity of transaction information among trust-less participants in peer to peer network. Thus, blockchain has attracted enormous research interests in the past decade due to its prior application in cryptocurrency, financial auditing, supply chain management, etc. However, blockchain scalability limitations has impeded blockchain technology from large scale commercial applications. Since blockchain is low in throughput, blockchain in incapable of handling large scale asset transfer. To tackle this problem, in this paper, we propose a secure multi-sidechain system. The proposed approach can transfer assets simultaneously to increase throughput. In addition, security of assets during transfer was also ensured by implementing firewall property. Detailed adversarial analysis shows this proposed approach can (1) prevent double spending and transaction ordering dependence attacks during asset transfer, (2) protect mainchain from sidechain’s catastrophic failure, (3) apply multi-sidechain model with different functions in each sidechain.
AB - As a temper-resistant ledger, blockchain ensures integrity of transaction information among trust-less participants in peer to peer network. Thus, blockchain has attracted enormous research interests in the past decade due to its prior application in cryptocurrency, financial auditing, supply chain management, etc. However, blockchain scalability limitations has impeded blockchain technology from large scale commercial applications. Since blockchain is low in throughput, blockchain in incapable of handling large scale asset transfer. To tackle this problem, in this paper, we propose a secure multi-sidechain system. The proposed approach can transfer assets simultaneously to increase throughput. In addition, security of assets during transfer was also ensured by implementing firewall property. Detailed adversarial analysis shows this proposed approach can (1) prevent double spending and transaction ordering dependence attacks during asset transfer, (2) protect mainchain from sidechain’s catastrophic failure, (3) apply multi-sidechain model with different functions in each sidechain.
KW - Blockchain
KW - Global consensus
KW - High throughput
KW - Scalability
KW - Sidechain protocol
UR - http://www.scopus.com/inward/record.url?scp=85082140777&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-38961-1_47
DO - 10.1007/978-3-030-38961-1_47
M3 - Conference contribution
AN - SCOPUS:85082140777
SN - 9783030389604
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 551
EP - 564
BT - Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Proceedings
A2 - Wen, Sheng
A2 - Zomaya, Albert
A2 - Yang, Laurence T.
PB - Springer
T2 - 19th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2019
Y2 - 9 December 2019 through 11 December 2019
ER -