Abstract
Recently, numerous challenges concerning personal identity security along with other security issues regarding privacy have been introduced. While the blockchain offers a solution for recording personal information and facilitating matching needs, existing researches have indicated the absence of privacy and traceability. In this paper, we introduce an information matching scheme rooted in cross-chain technology. This approach employs a public blockchain for information matching and a consortium blockchain for transmitting private data. Cross-chain consensus protocols are leveraged to accomplish privacy protection and validation for cross-chain information transmission. The scheme serves the purpose of achieving information matching between two parties within the public blockchain framework. It enhances users’ identity and information privacy, while also bolstering the auditability of cross-chain information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentral. Bus. Rev. (2008)
WĂĽst, K., Kostiainen, K., Capkun, V., Capkun, S.: Prcash: centrally-issued digital currency with privacy and regulation. IACR Cryptology ePrint Archive 2018, p. 412 (2018)
Noura, M., Atiquzzaman, M., Gaedke, M.: Interoperability in internet of things: taxonomies and open challenges. Mob. Netw. Appl. 24, 796–809 (2019)
Celer homepage. https://celer.network/. Accessed 10 Nov 2023
Multichain homepage. https://multichain.org. Accessed 10 Nov 2023
Synapse homepage. https://www.synapseprotocol.com. Accessed 10 Nov 2023
Umbri homepage. https://bridge.umbria.network/. Accessed 10 Nov 2023
Ghosh, B.C., Bhartia, T., Addya, S.K., Chakraborty, S.: Leveraging public-private blockchain interoperability for closed consortium interfacing. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1–10. IEEE (2021)
Syta, E., et al.: Keeping authorities “honest or bust” with decentralized witness cosigning. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 526–545. IEEE (2016)
Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20(4), 398–461 (2002)
Garoffolo, A., Kaidalov, D., Oliynykov, R.: Zendoo: A zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1257–1262. IEEE (2020)
Yin, Z., Zhang, B., Xu, J., Lu, K., Ren, K.: Bool network: an open, distributed, secure cross-chain notary platform. IEEE Trans. Inf. Forensics Secur. 17, 3465–3478 (2022)
He, Y., Zhang, C., Wu, B., Yang, Y., Xiao, K., Li, H.: Cross-chain trusted service quality computing scheme for multi-chain model-based 5g network slicing SLA. IEEE Internet Things J. (2021)
Yi, L., et al.: CCUBI: a cross-chain based premium competition scheme with privacy preservation for usage-based insurance. Int. J. Intell. Syst. 37(12), 11522–11546 (2022)
Chen, K., Lee, L.F., Chiu, W., Su, C., Yeh, K.H., Chao, H.C.: A trusted reputation management scheme for cross-chain transactions. Sensors 23(13), 6033 (2023)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_9
Maxwell, G.: Confidential transactions (2015) (2016)
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_4
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9_26
Camenisch, J., Chaabouni, R., shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234–252. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_15
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)
Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)
Fuchsbauer, G., Orrù, M., Seurin, Y.: Aggregate cash systems: a cryptographic investigation of mimblewimble. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 657–689. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_22
Yuen, T.H.: PAChain: private, authenticated and auditable consortium blockchain. In: Mu, Y., Deng, R.H., Huang, X. (eds.) CANS 2019. LNCS, vol. 11829, pp. 214–234. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31578-8_12
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, Z., Lu, Z., Chen, J. (2024). Cross-Chain Trusted Information Match Scheme with Privacy-Preserving and Auditability. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-60037-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-60036-4
Online ISBN: 978-3-031-60037-1
eBook Packages: Computer ScienceComputer Science (R0)