Skip to main content

Secure Collaboration Between Consortiums in Permissioned Blockchains

  • Conference paper
  • First Online:
Provable and Practical Security (ProvSec 2022)

Abstract

Secure collaboration between consortiums is imperative for the distributed applications deployed on distinct permissioned blockchains or consortium blockchains to provide superior services. The collaboration can be realized by cross-chain transactions processed by cross-chain protocol. The previous two-phase commit and two-phase locking cross-chain protocol are unable to be applied in the scenario where the consortium can be malicious. In this work, we propose the ledger framework of the multiple consortium blockchain systems including the global cross-chain ledger. The cross-chain ledger establishes the order relationship between cross-chain sub-transactions defined in the cross-chain protocol and adopts the hierarchical Byzantine fault-tolerant consensus to tolerate malicious consortiums. We also give two instances of the framework. Based on the cross-chain ledger, we propose the revoke operation in the two-phase commit and two-phase locking cross-chain protocol. We also make the protocol secure in the presence of malicious consortiums and prove its security. Finally, we conduct comprehensive experiments to characterize the performance of the two instances and the cross-chain protocol. The experimental results reveal the efficiency of our scheme even in the presence of malicious consortiums.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adelson, E.H., Anderson, C.H., Bergen, J.R., Burt, P.J., Ogden, J.M.: Pyramid methods in image processing. RCA Eng. 29(6), 33–41 (1984)

    Google Scholar 

  2. Al-Bassam, M., Sonnino, A., Bano, S., Hrycyszyn, D., Danezis, G.: Chainspace: a sharded smart contracts platform. arXiv preprint arXiv:1708.03778 (2017)

  3. Amiri, M.J., Agrawal, D., Abbadi, A.E.: Caper: a cross-application permissioned blockchain. Proc. VLDB Endowment 12(11), 1385–1398 (2019)

    Article  Google Scholar 

  4. Amiri, M.J., Agrawal, D., El Abbadi, A.: Sharper: sharding permissioned blockchains over network clusters. In: Proceedings of the 2021 International Conference on Management of Data, pp. 76–88 (2021)

    Google Scholar 

  5. Baird, L.: The swirlds hashgraph consensus algorithm: fair, fast, byzantine fault tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01, Technical Report (2016)

    Google Scholar 

  6. Bonomi, S., Del Pozzo, A., García-Pérez, Á., Tucci-Piergiovanni, S.: Sok: achieving state machine replication in blockchains based on repeated consensus. arXiv preprint arXiv:2105.13732 (2021)

  7. Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 International Conference on Management of Data, pp. 123–140 (2019)

    Google Scholar 

  8. Gaži, P., Kiayias, A., Zindros, D.: Proof-of-stake sidechains. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 139–156. IEEE (2019)

    Google Scholar 

  9. Hellings, J., Sadoghi, M.: Byshard: sharding in a byzantine environment. Proc. VLDB Endow. 14(11), 2230–2243 (2021)

    Article  Google Scholar 

  10. Herlihy, M.: Atomic cross-chain swaps. In: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pp. 245–254 (2018)

    Google Scholar 

  11. Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583–598. IEEE (2018)

    Google Scholar 

  12. Kwon, J., Buchman, E.: Cosmos: a network of distributed ledgers (2016). https://cosmos.network/whitepaper

  13. Marvin, R.: Blockchain: The invisible technology that’s changing the world. PC MAG Australia. ZiffDavis, LLC. Archived from the original on 25 (2017)

    Google Scholar 

  14. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)

    Google Scholar 

  15. Wang, Q., Yu, J., Chen, S., Xiang, Y.: Sok: diving into dag-based blockchain systems. arXiv preprint arXiv:2012.06128 (2020)

  16. Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Paper 21 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Na Ruan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, J., Tang, Q., Su, C., Ruan, N. (2022). Secure Collaboration Between Consortiums in Permissioned Blockchains. In: Ge, C., Guo, F. (eds) Provable and Practical Security. ProvSec 2022. Lecture Notes in Computer Science, vol 13600. Springer, Cham. https://doi.org/10.1007/978-3-031-20917-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20917-8_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20916-1

  • Online ISBN: 978-3-031-20917-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics