Skip to main content

Advertisement

Log in

A privacy-preserving method for cross-chain interoperability using homomorphic encryption

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Cross-chain technology mitigates the interoperability challenges between disparate blockchains, facilitating communication and information sharing. However, the evolution of cross-chain technology has brought forward privacy concerns that require immediate attention. Cross-chain transactions involve the participation of various blockchain networks, thereby introducing potential risks of sensitive information exposure. We propose a privacy protection method for blockchain interoperability through the utilization of homomorphic encryption. By enabling computations to be carried out on encrypted data, our method ensures the correctness of cross-chain transactions while simultaneously upholding the confidentiality of sensitive information. We apply our proposed privacy-preserving method for Hash Time-Locked Contract and Relay cross-chain technologies, named PTLC and PRC, respectively. To validate the effectiveness of our method, the experiments of both applications are performed on two distinct blockchain networks to simulate the process of cross-chain. The experimental results indicate that our method can ensure that asset exchange and data interactions are carried out securely without compromising the confidentiality of relevant information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

Notes

  1. https://z.cash/

  2. https://www.hyperchain.cn/en/products/bitxhub

References

  1. Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Netw Comput Appl 126:45–58

    Article  MATH  Google Scholar 

  2. Yin R, Yan Z, Liang X, Xie H, Wan Z (2023) A survey on privacy preservation techniques for blockchain interoperability. J Syst Architect 140:102892

    Article  MATH  Google Scholar 

  3. Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W (2022) An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput Netw 218:109378

    Article  Google Scholar 

  4. Lu S, Pei J, Zhao R, Yu X, Zhang X, Li J, Yang G (2023) CCIO: A cross-chain interoperability approach for consortium blockchains based on oracle. Sensors. 23(4):1864

    Article  MATH  Google Scholar 

  5. Baum C, David B, Frederiksen TK (2021) P2dex: Privacy-preserving decentralized cryptocurrency exchange. In: Proceedings of Applied Cryptography and Network Security,June 21-24, pp. 163–194. Springer, Kamakura, Japan

  6. Wang G, Wang Q, Chen S (2023) Exploring blockchains interoperability: A systematic survey. ACM Comput Surv 55(13s):290–129038

    Article  MATH  Google Scholar 

  7. Wang J, Cheng J, Yuan Y, Li H, Sheng VS (2022) A survey on privacy protection of cross-chain. In: Proceedings of the Advances in Artificial Intelligence and Security (ICAIS), July 15–20, Qinghai, China, pp. 283–296 . Springer

  8. Haugum T, Hoff B, Alsadi M, Li J (2022) Security and privacy challenges in blockchain interoperability - a multivocal literature review. In: Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering (EASE), June 13-15, pp. 347–356. Association for Computing Machinery, Gothenburg, Sweden

  9. Osmanoglu M, Selcuk AA (2022) Privacy in blockchain systems. Turk J Electr Eng Comput Sci 30(2):344–360

    Article  MATH  Google Scholar 

  10. Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White paper. 21(2327):4662

    MATH  Google Scholar 

  11. Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput Surv 51(4):79–17935

    MATH  Google Scholar 

  12. Cai J, Zhou Y, Hu T, Li B (2022) Ptlc: Protect the identity privacy during cross-chain asset transaction more effectively. In: Proceedings of the 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), December 05-09, Guangzhou, China, pp. 70–78. IEEE

  13. Liang X, Zhao Y, Wu J, Yin K (2022) A privacy protection scheme for cross-chain transactions based on group signature and relay chain. International Journal of Digital Crime and Forensics (IJDCF). 14(2):1–20

    Article  MATH  Google Scholar 

  14. Sanchez A, Stewart A, Shirazi F (2022) Bridging sapling: Private cross-chain transfers. In: Proceedings of the Crosschain Workshop, 06 May, Shanghai, China, pp. 1–9. IEEE

  15. Li Y, Weng J, Li M, Wu W, Weng J, Liu J-N, Hu S (2022) Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing 169(C):301–316

  16. Zhang Y, Hu S, Wang Q, Qin B, Wu Q, Shi W (2022) Pxcrypto: A regulated privacy-preserving cross-chain transaction scheme. In: Proceedings of the 22nd International Conference of Algorithms and Architectures for Parallel Processing (ICA3PP), October 10-12, vol. 13777, pp. 170–191. Springer, Copenhagen, Denmark

  17. Chen C, Yang G, Li Z, Xiao F, Chen Q, Li J (2024) Privacy-preserving multi-party cross-chain transaction protocols. Cryptogr. 8(1):6

    Google Scholar 

  18. Khan SN, Loukil F, Guegan CG, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-Peer Netw. Appl. 14(5):2901–2925

    Article  Google Scholar 

  19. Ivanov N, Li C, Yan Q, Sun Z, Cao Z, Luo X (2023) Security threat mitigation for smart contracts: A comprehensive survey. ACM Comput Surv 55(14s):326–132637

    Article  MATH  Google Scholar 

  20. Sanka AI, Irfan M, Huang I, Cheung RCC (2021) A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research. Comput Commun 169:179–201

    Article  Google Scholar 

  21. Schwartz E (2016) A payment protocol of the web, for the web: Or, finally enabling web micropayments with the interledger protocol. In: Proceedings of the 25th International Conference on World Wide Web (WWW), April 11-15, Companion Volume, pp. 279–280. ACM, Montreal, Canada

  22. Hope-Bailie A, Thomas S (2016) Interledger: Creating a standard for payments. In: Proceedings of the 25th International Conference on World Wide Web (WWW), April 11-15, Companion Volume, pp. 281–282. ACM, Montreal, Canada

  23. Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P (2014) Enabling Blockchain Innovations with Pegged Sidechains. https://blockstream.com/sidechains.pdf

  24. Li D, Liu J, Tang Z, Wu Q, Guan Z (2019) Agentchain: A decentralized cross-chain exchange system. In: Proceedings of the 18th International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom), August 5-8, pp. 491–498. IEEE, Rotorua, New Zealand

  25. Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network-paper.pdf

  26. Hao W, Xiangfu S, Junming K, Qiuliang X (2017) Blockchain in digital currency and its privacy protection mechanism. Information Network Security. 7:32–39

    Google Scholar 

  27. Silva Vanin FN, Policarpo LM, Rosa Righi R, Heck SM, Silva VF, Goldim JR, Costa CA (2023) A blockchain-based end-to-end data protection model for personal health records sharing: A fully homomorphic encryption approach. Sensors. 23(1):14

    Article  Google Scholar 

  28. Wang Y, Wang W, Zeng Y, Yang T (2023) Gradingshard: A new sharding protocol to improve blockchain throughput. Peer Peer Netw. Appl. 16(3):1327–1339

    Article  MATH  Google Scholar 

  29. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 2-6, vol. 1592, pp. 223–238. Springer, Prague, Czech Republic

Download references

Funding

This work was funded by the Key Research and Development Program of Jiangsu Province (under no.BE2021002-3).

Author information

Authors and Affiliations

Authors

Contributions

Dongyu Cao and Jingyuan Cai performed the methodology, validation, and writing. Bixin Li supervised the research paper, secured funding, and critically reviewed and edited the manuscript.

Corresponding author

Correspondence to Bixin Li.

Ethics declarations

Ethics approval

This work does not contain any studies with human participants and/or animals performed by any of the authors.

Conflict of Interest

The authors declare that they have no conflict of interest in the submitted work.

Consent to publish

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: 3 - Track on Blockchain Guest Editor: Haojin Zhu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, D., Li, B. & Cai, J. A privacy-preserving method for cross-chain interoperability using homomorphic encryption. Peer-to-Peer Netw. Appl. 18, 48 (2025). https://doi.org/10.1007/s12083-024-01813-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01813-9

Keywords