Skip to main content

Cross-Chain Trusted Information Match Scheme with Privacy-Preserving and Auditability

  • Conference paper
  • First Online:
Blockchain Technology and Emerging Applications (BlockTEA 2023)

Abstract

Recently, numerous challenges concerning personal identity security along with other security issues regarding privacy have been introduced. While the blockchain offers a solution for recording personal information and facilitating matching needs, existing researches have indicated the absence of privacy and traceability. In this paper, we introduce an information matching scheme rooted in cross-chain technology. This approach employs a public blockchain for information matching and a consortium blockchain for transmitting private data. Cross-chain consensus protocols are leveraged to accomplish privacy protection and validation for cross-chain information transmission. The scheme serves the purpose of achieving information matching between two parties within the public blockchain framework. It enhances users’ identity and information privacy, while also bolstering the auditability of cross-chain information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentral. Bus. Rev. (2008)

    Google Scholar 

  2. WĂĽst, K., Kostiainen, K., Capkun, V., Capkun, S.: Prcash: centrally-issued digital currency with privacy and regulation. IACR Cryptology ePrint Archive 2018, p. 412 (2018)

    Google Scholar 

  3. Noura, M., Atiquzzaman, M., Gaedke, M.: Interoperability in internet of things: taxonomies and open challenges. Mob. Netw. Appl. 24, 796–809 (2019)

    Article  Google Scholar 

  4. Celer homepage. https://celer.network/. Accessed 10 Nov 2023

  5. Multichain homepage. https://multichain.org. Accessed 10 Nov 2023

  6. Synapse homepage. https://www.synapseprotocol.com. Accessed 10 Nov 2023

  7. Umbri homepage. https://bridge.umbria.network/. Accessed 10 Nov 2023

  8. Ghosh, B.C., Bhartia, T., Addya, S.K., Chakraborty, S.: Leveraging public-private blockchain interoperability for closed consortium interfacing. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1–10. IEEE (2021)

    Google Scholar 

  9. Syta, E., et al.: Keeping authorities “honest or bust” with decentralized witness cosigning. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 526–545. IEEE (2016)

    Google Scholar 

  10. Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)

    Article  Google Scholar 

  11. Garoffolo, A., Kaidalov, D., Oliynykov, R.: Zendoo: A zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1257–1262. IEEE (2020)

    Google Scholar 

  12. Yin, Z., Zhang, B., Xu, J., Lu, K., Ren, K.: Bool network: an open, distributed, secure cross-chain notary platform. IEEE Trans. Inf. Forensics Secur. 17, 3465–3478 (2022)

    Article  Google Scholar 

  13. He, Y., Zhang, C., Wu, B., Yang, Y., Xiao, K., Li, H.: Cross-chain trusted service quality computing scheme for multi-chain model-based 5g network slicing SLA. IEEE Internet Things J. (2021)

    Google Scholar 

  14. Yi, L., et al.: CCUBI: a cross-chain based premium competition scheme with privacy preservation for usage-based insurance. Int. J. Intell. Syst. 37(12), 11522–11546 (2022)

    Article  Google Scholar 

  15. Chen, K., Lee, L.F., Chiu, W., Su, C., Yeh, K.H., Chao, H.C.: A trusted reputation management scheme for cross-chain transactions. Sensors 23(13), 6033 (2023)

    Article  Google Scholar 

  16. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_9

    Chapter  Google Scholar 

  17. Maxwell, G.: Confidential transactions (2015) (2016)

    Google Scholar 

  18. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_4

    Chapter  Google Scholar 

  19. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  20. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_26

    Chapter  Google Scholar 

  21. Camenisch, J., Chaabouni, R., shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234–252. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_15

    Chapter  Google Scholar 

  22. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)

    Google Scholar 

  23. Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)

    Google Scholar 

  24. Fuchsbauer, G., Orrù, M., Seurin, Y.: Aggregate cash systems: a cryptographic investigation of mimblewimble. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 657–689. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_22

    Chapter  Google Scholar 

  25. Yuen, T.H.: PAChain: private, authenticated and auditable consortium blockchain. In: Mu, Y., Deng, R.H., Huang, X. (eds.) CANS 2019. LNCS, vol. 11829, pp. 214–234. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31578-8_12

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiageng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Z., Lu, Z., Chen, J. (2024). Cross-Chain Trusted Information Match Scheme with Privacy-Preserving and Auditability. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-60037-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-60036-4

  • Online ISBN: 978-3-031-60037-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics