Skip to main content

UCC: Universal and Committee-based Cross-chain Framework

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13620))

  • 1141 Accesses

Abstract

One most potential solution to enhance the interoperability of various kinds of blockchains is to utilize the cross-chain mechanism. This mechanism, however, still faces some challenges. One is to find a universal cross-chain solution, independent of the underlying heterogeneous blockchains. The other is the lack of formal security definitions. To address these challenges, we propose UCC, a universal cross-chain framework using the cross-chain committees. We provide the formal security definition of the cross-chain framework and prove that UCC is secure when each well-defined module meets its security requirement. To demonstrate the feasibility of UCC, we implement it with efficient components and make the experimental evaluation. The result shows that UCC achieves a secure cross-chain with a low cost in comparison to the underlying chains.

This work is supported by the National Natural Science Foundation of China (No. 61872142), the Key (Keygrant) Project of Chinese Ministry of Education (No. 2020KJ010201), the Key Research and Development Plan of Shandong Province (No. 2021CXGC010105).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    It is worth noting that the cross-chain committee running upon each chain could work in the partially synchronous model, as long as it satisfies the security properties of the BFT consensus.

References

  1. Wood, G.: Polkadot: Vision for a heterogeneous multi-chain framework. In: White Paper, vol. 21 (2016)

    Google Scholar 

  2. Zamani, M., Movahedi, M., Raykova, M.: Rapidchain: scaling blockchain via full sharding. In: ACM CCS, pp. 931–948 (2018)

    Google Scholar 

  3. Thyagarajan, S.A., Malavolta, G., Moreno-Sánchez, P.: Universal atomic swaps: secure exchange of coins across all blockchains. In: S &P (2022)

    Google Scholar 

  4. Herlihy, M., Liskov, B., Shrira, L.: Cross-chain deals and adversarial commerce. VLDB J. 31, 1–19 (2021)

    Google Scholar 

  5. Miller, A., et al.: Sprites and state channels: Payment networks that go faster than lightning. In: FC, pp. 508–526 (2019)

    Google Scholar 

  6. Guo, B., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo: faster asynchronous BFT protocols. In: ACM CCS, pp. 803–818 (2020)

    Google Scholar 

  7. Pass, R., Shi, E.: Hybrid consensus: efficient consensus in the permission less model. Cryptology ePrint Archive (2016)

    Google Scholar 

  8. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_10

    Chapter  Google Scholar 

  9. Micali, S., Rabin, M., Vadhan, S.: Verifiable random functions. In: FOCS, pp. 120–130 (1999)

    Google Scholar 

  10. Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  11. Thyagarajan, S.A.K., et al.: Verifiable timed signatures made practical. In: ACM CCS, pp. 1733–1750 (2020)

    Google Scholar 

  12. Aumayr, L., et al.: Generalized bitcoin-compatible channels. IACR Cryptol. ePrint Arch. 2020, 476 (2020)

    Google Scholar 

  13. Shadab, N., Houshmand, F., Lesani, M.: Cross-chain transactions. In: ICBC, pp. 1–9. IEEE (2020)

    Google Scholar 

  14. Buterin, V.: Chain interoperability. In: R3 Research Paper, vol. 9 (2016)

    Google Scholar 

  15. Hearn, M., Brown, R.G.: Corda: a distributed ledger. In: Corda Technical White Paper, vol. 2016 (2016)

    Google Scholar 

  16. Frauenthaler, P., Sigwart, M., Spanring, C., Sober, M., Schulte, S.: Eth relay: a cost-efficient relay for Ethereum-based blockchains. In: ICBC, pp. 204–213 (2020)

    Google Scholar 

  17. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36(2), 335–348 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  18. Massey, J.: Review of ‘theory and practice of error control codes’ (Blahut, R. 1983). IEEE Trans. Inf. Theory 31(4), 553–554 (1985)

    Article  Google Scholar 

  19. Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP, pp. 576–587 (2000)

    Google Scholar 

  20. Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Addendum to scalable secure storage when half the system is faulty. Inf. Comput. 205(7), 1114–1116 (2007)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yu Long or Dawu Gu .

Editor information

Editors and Affiliations

Appendices

A Related definition

Definition 2

(Secure Committee Construction) For one run a secure committee construction protocol, the following properties need to be satisfied,

  • Termination If at least \(f+1\) honest nodes activate the protocol, and all messages among honest nodes arrive, then each honest node outputs a committee \(\textsf{cccom}\) within a pre-defined time.

  • Agreement Any two honest nodes output the same \(\textsf{cccom}\).

  • Validity If any honest node outputs \(\textsf{cccom}\), then the probability that (1) \(|\textsf{cccom}|=n\), (2) the probability of each candidate node \(P_i\in \textsf{cccom}\) is the same, (3) \(\textsf{cccom}\) contains at most f Byzantine nodes, is at least \(1-\epsilon \).

  • Unpredictability Before an honest node innovates the election, the probability that the adversary predicts the result is at most \(1/{\left( {\begin{array}{c}N\\ n\end{array}}\right) }\).

B Security Analysis of the Instantiation

In this part, we will analyze the security of each module in Sect. 7.1. We assume the adversary ratio is 1/3. That is, \(F<N/3\).

Committee Member Selection Module. We will prove that when \(F<N/3\), the probability that \(f<n/2\) does not hold is negligible. The proof is inspired by Rapidchain [2]. Suppose there are X Byzantine nodes in the committee, then \(Pr[X\ge \lfloor n/2\rfloor ]=\Sigma _{x=\lfloor n/2\rfloor }^{n}{\frac{\left( {\begin{array}{c}F\\ x\end{array}}\right) \left( {\begin{array}{c}N-F\\ n-x\end{array}}\right) }{\left( {\begin{array}{c}N\\ n\end{array}}\right) }}\). When N and n are large enough, we can estimate the probability with a binomial distribution \(Pr[X\ge \lfloor n/2\rfloor ]=\Sigma _{x=0}^{f}{\left( {\begin{array}{c}n\\ x\end{array}}\right) (\frac{f}{n})^x(1-\frac{f}{n})^x}\). The value of this expression decreases exponentially when N and n increases. Thus, the security of this module is proved.

Committee Consensus Module. The intra-committee consensus protocol in Rapidchain achieves both safety and liveness if \(f<n/2\) [2]. Here safety guarantees that all the honest nodes will obtain the correct value, and liveness guarantees that it can be completed within a bounded time.

Inter-chain Message Passing Module. The IDA gossip protocol in Rapidchain guarantees that the probability that all the honest nodes receive the correct message is at least 0.9 if the parameters are properly adjusted, and the time is bounded to a certain value \(\delta _\text {IDA}\). In our model, we perform IDA gossip k times. Therefore, the probability that there exist some honest nodes that do not receive the correct message is at most \(0.1^k\), a negligible value, with a bounded time.

C Communication Complexity Analysis

  • When \(\textsf{cccom}_\text {A}\) receives the transaction and make a consensus since every honest user can obtain the information from chain A and calculate the hash value according to a known rule, they are able to send only the hash value, which is a fixed small value that can be ignored.

  • When the transaction is passed from \(\textsf{cccom}_\text {A}\) to \(\textsf{cccom}_\text {B}\), we assume that the message format is as follows. It has an 8-byte transaction id, 35-byte target address, 2-byte chain id, and 8-byte transaction amount. Thus, the size of one transaction is 53 bytes. Besides, we should add a 20n-byte signature length. Thus, the total size is \(53u+20n\) bytes.

  • When \(\textsf{cccom}_\text {B}\) receives the transaction and makes a consensus, the signature is not included. Thus, the size is 53u bytes.

  • When \(\textsf{cccom}_\text {B}\) sends the message back to \(\textsf{cccom}_\text {A}\), each transaction can be represented by 8-byte id. Thus, the total size is \(8u+20n\) bytes.

  • Similarly, when \(\textsf{cccom}_\text {A}\) makes a consensus for \(\textsf{cccom}_\text {B}\)’s response, the message size is 8u bytes.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Ge, Z., Long, Y., Gu, D. (2022). UCC: Universal and Committee-based Cross-chain Framework. In: Su, C., Gritzalis, D., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science, vol 13620. Springer, Cham. https://doi.org/10.1007/978-3-031-21280-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21280-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21279-6

  • Online ISBN: 978-3-031-21280-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics