Abstract
One most potential solution to enhance the interoperability of various kinds of blockchains is to utilize the cross-chain mechanism. This mechanism, however, still faces some challenges. One is to find a universal cross-chain solution, independent of the underlying heterogeneous blockchains. The other is the lack of formal security definitions. To address these challenges, we propose UCC, a universal cross-chain framework using the cross-chain committees. We provide the formal security definition of the cross-chain framework and prove that UCC is secure when each well-defined module meets its security requirement. To demonstrate the feasibility of UCC, we implement it with efficient components and make the experimental evaluation. The result shows that UCC achieves a secure cross-chain with a low cost in comparison to the underlying chains.
This work is supported by the National Natural Science Foundation of China (No. 61872142), the Key (Keygrant) Project of Chinese Ministry of Education (No. 2020KJ010201), the Key Research and Development Plan of Shandong Province (No. 2021CXGC010105).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
It is worth noting that the cross-chain committee running upon each chain could work in the partially synchronous model, as long as it satisfies the security properties of the BFT consensus.
References
Wood, G.: Polkadot: Vision for a heterogeneous multi-chain framework. In: White Paper, vol. 21 (2016)
Zamani, M., Movahedi, M., Raykova, M.: Rapidchain: scaling blockchain via full sharding. In: ACM CCS, pp. 931–948 (2018)
Thyagarajan, S.A., Malavolta, G., Moreno-Sánchez, P.: Universal atomic swaps: secure exchange of coins across all blockchains. In: S &P (2022)
Herlihy, M., Liskov, B., Shrira, L.: Cross-chain deals and adversarial commerce. VLDB J. 31, 1–19 (2021)
Miller, A., et al.: Sprites and state channels: Payment networks that go faster than lightning. In: FC, pp. 508–526 (2019)
Guo, B., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo: faster asynchronous BFT protocols. In: ACM CCS, pp. 803–818 (2020)
Pass, R., Shi, E.: Hybrid consensus: efficient consensus in the permission less model. Cryptology ePrint Archive (2016)
Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_10
Micali, S., Rabin, M., Vadhan, S.: Verifiable random functions. In: FOCS, pp. 120–130 (1999)
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000)
Thyagarajan, S.A.K., et al.: Verifiable timed signatures made practical. In: ACM CCS, pp. 1733–1750 (2020)
Aumayr, L., et al.: Generalized bitcoin-compatible channels. IACR Cryptol. ePrint Arch. 2020, 476 (2020)
Shadab, N., Houshmand, F., Lesani, M.: Cross-chain transactions. In: ICBC, pp. 1–9. IEEE (2020)
Buterin, V.: Chain interoperability. In: R3 Research Paper, vol. 9 (2016)
Hearn, M., Brown, R.G.: Corda: a distributed ledger. In: Corda Technical White Paper, vol. 2016 (2016)
Frauenthaler, P., Sigwart, M., Spanring, C., Sober, M., Schulte, S.: Eth relay: a cost-efficient relay for Ethereum-based blockchains. In: ICBC, pp. 204–213 (2020)
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36(2), 335–348 (1989)
Massey, J.: Review of ‘theory and practice of error control codes’ (Blahut, R. 1983). IEEE Trans. Inf. Theory 31(4), 553–554 (1985)
Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP, pp. 576–587 (2000)
Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Addendum to scalable secure storage when half the system is faulty. Inf. Comput. 205(7), 1114–1116 (2007)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Appendices
A Related definition
Definition 2
(Secure Committee Construction) For one run a secure committee construction protocol, the following properties need to be satisfied,
-
Termination If at least \(f+1\) honest nodes activate the protocol, and all messages among honest nodes arrive, then each honest node outputs a committee \(\textsf{cccom}\) within a pre-defined time.
-
Agreement Any two honest nodes output the same \(\textsf{cccom}\).
-
Validity If any honest node outputs \(\textsf{cccom}\), then the probability that (1) \(|\textsf{cccom}|=n\), (2) the probability of each candidate node \(P_i\in \textsf{cccom}\) is the same, (3) \(\textsf{cccom}\) contains at most f Byzantine nodes, is at least \(1-\epsilon \).
-
Unpredictability Before an honest node innovates the election, the probability that the adversary predicts the result is at most \(1/{\left( {\begin{array}{c}N\\ n\end{array}}\right) }\).
B Security Analysis of the Instantiation
In this part, we will analyze the security of each module in Sect. 7.1. We assume the adversary ratio is 1/3. That is, \(F<N/3\).
Committee Member Selection Module. We will prove that when \(F<N/3\), the probability that \(f<n/2\) does not hold is negligible. The proof is inspired by Rapidchain [2]. Suppose there are X Byzantine nodes in the committee, then \(Pr[X\ge \lfloor n/2\rfloor ]=\Sigma _{x=\lfloor n/2\rfloor }^{n}{\frac{\left( {\begin{array}{c}F\\ x\end{array}}\right) \left( {\begin{array}{c}N-F\\ n-x\end{array}}\right) }{\left( {\begin{array}{c}N\\ n\end{array}}\right) }}\). When N and n are large enough, we can estimate the probability with a binomial distribution \(Pr[X\ge \lfloor n/2\rfloor ]=\Sigma _{x=0}^{f}{\left( {\begin{array}{c}n\\ x\end{array}}\right) (\frac{f}{n})^x(1-\frac{f}{n})^x}\). The value of this expression decreases exponentially when N and n increases. Thus, the security of this module is proved.
Committee Consensus Module. The intra-committee consensus protocol in Rapidchain achieves both safety and liveness if \(f<n/2\) [2]. Here safety guarantees that all the honest nodes will obtain the correct value, and liveness guarantees that it can be completed within a bounded time.
Inter-chain Message Passing Module. The IDA gossip protocol in Rapidchain guarantees that the probability that all the honest nodes receive the correct message is at least 0.9 if the parameters are properly adjusted, and the time is bounded to a certain value \(\delta _\text {IDA}\). In our model, we perform IDA gossip k times. Therefore, the probability that there exist some honest nodes that do not receive the correct message is at most \(0.1^k\), a negligible value, with a bounded time.
C Communication Complexity Analysis
-
When \(\textsf{cccom}_\text {A}\) receives the transaction and make a consensus since every honest user can obtain the information from chain A and calculate the hash value according to a known rule, they are able to send only the hash value, which is a fixed small value that can be ignored.
-
When the transaction is passed from \(\textsf{cccom}_\text {A}\) to \(\textsf{cccom}_\text {B}\), we assume that the message format is as follows. It has an 8-byte transaction id, 35-byte target address, 2-byte chain id, and 8-byte transaction amount. Thus, the size of one transaction is 53 bytes. Besides, we should add a 20n-byte signature length. Thus, the total size is \(53u+20n\) bytes.
-
When \(\textsf{cccom}_\text {B}\) receives the transaction and makes a consensus, the signature is not included. Thus, the size is 53u bytes.
-
When \(\textsf{cccom}_\text {B}\) sends the message back to \(\textsf{cccom}_\text {A}\), each transaction can be represented by 8-byte id. Thus, the total size is \(8u+20n\) bytes.
-
Similarly, when \(\textsf{cccom}_\text {A}\) makes a consensus for \(\textsf{cccom}_\text {B}\)’s response, the message size is 8u bytes.
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Y., Ge, Z., Long, Y., Gu, D. (2022). UCC: Universal and Committee-based Cross-chain Framework. In: Su, C., Gritzalis, D., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science, vol 13620. Springer, Cham. https://doi.org/10.1007/978-3-031-21280-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-21280-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21279-6
Online ISBN: 978-3-031-21280-2
eBook Packages: Computer ScienceComputer Science (R0)