Abstract
Cross-chain technology mitigates the interoperability challenges between disparate blockchains, facilitating communication and information sharing. However, the evolution of cross-chain technology has brought forward privacy concerns that require immediate attention. Cross-chain transactions involve the participation of various blockchain networks, thereby introducing potential risks of sensitive information exposure. We propose a privacy protection method for blockchain interoperability through the utilization of homomorphic encryption. By enabling computations to be carried out on encrypted data, our method ensures the correctness of cross-chain transactions while simultaneously upholding the confidentiality of sensitive information. We apply our proposed privacy-preserving method for Hash Time-Locked Contract and Relay cross-chain technologies, named PTLC and PRC, respectively. To validate the effectiveness of our method, the experiments of both applications are performed on two distinct blockchain networks to simulate the process of cross-chain. The experimental results indicate that our method can ensure that asset exchange and data interactions are carried out securely without compromising the confidentiality of relevant information.










Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Netw Comput Appl 126:45–58
Yin R, Yan Z, Liang X, Xie H, Wan Z (2023) A survey on privacy preservation techniques for blockchain interoperability. J Syst Architect 140:102892
Ou W, Huang S, Zheng J, Zhang Q, Zeng G, Han W (2022) An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput Netw 218:109378
Lu S, Pei J, Zhao R, Yu X, Zhang X, Li J, Yang G (2023) CCIO: A cross-chain interoperability approach for consortium blockchains based on oracle. Sensors. 23(4):1864
Baum C, David B, Frederiksen TK (2021) P2dex: Privacy-preserving decentralized cryptocurrency exchange. In: Proceedings of Applied Cryptography and Network Security,June 21-24, pp. 163–194. Springer, Kamakura, Japan
Wang G, Wang Q, Chen S (2023) Exploring blockchains interoperability: A systematic survey. ACM Comput Surv 55(13s):290–129038
Wang J, Cheng J, Yuan Y, Li H, Sheng VS (2022) A survey on privacy protection of cross-chain. In: Proceedings of the Advances in Artificial Intelligence and Security (ICAIS), July 15–20, Qinghai, China, pp. 283–296 . Springer
Haugum T, Hoff B, Alsadi M, Li J (2022) Security and privacy challenges in blockchain interoperability - a multivocal literature review. In: Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering (EASE), June 13-15, pp. 347–356. Association for Computing Machinery, Gothenburg, Sweden
Osmanoglu M, Selcuk AA (2022) Privacy in blockchain systems. Turk J Electr Eng Comput Sci 30(2):344–360
Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White paper. 21(2327):4662
Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput Surv 51(4):79–17935
Cai J, Zhou Y, Hu T, Li B (2022) Ptlc: Protect the identity privacy during cross-chain asset transaction more effectively. In: Proceedings of the 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), December 05-09, Guangzhou, China, pp. 70–78. IEEE
Liang X, Zhao Y, Wu J, Yin K (2022) A privacy protection scheme for cross-chain transactions based on group signature and relay chain. International Journal of Digital Crime and Forensics (IJDCF). 14(2):1–20
Sanchez A, Stewart A, Shirazi F (2022) Bridging sapling: Private cross-chain transfers. In: Proceedings of the Crosschain Workshop, 06 May, Shanghai, China, pp. 1–9. IEEE
Li Y, Weng J, Li M, Wu W, Weng J, Liu J-N, Hu S (2022) Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing 169(C):301–316
Zhang Y, Hu S, Wang Q, Qin B, Wu Q, Shi W (2022) Pxcrypto: A regulated privacy-preserving cross-chain transaction scheme. In: Proceedings of the 22nd International Conference of Algorithms and Architectures for Parallel Processing (ICA3PP), October 10-12, vol. 13777, pp. 170–191. Springer, Copenhagen, Denmark
Chen C, Yang G, Li Z, Xiao F, Chen Q, Li J (2024) Privacy-preserving multi-party cross-chain transaction protocols. Cryptogr. 8(1):6
Khan SN, Loukil F, Guegan CG, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-Peer Netw. Appl. 14(5):2901–2925
Ivanov N, Li C, Yan Q, Sun Z, Cao Z, Luo X (2023) Security threat mitigation for smart contracts: A comprehensive survey. ACM Comput Surv 55(14s):326–132637
Sanka AI, Irfan M, Huang I, Cheung RCC (2021) A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research. Comput Commun 169:179–201
Schwartz E (2016) A payment protocol of the web, for the web: Or, finally enabling web micropayments with the interledger protocol. In: Proceedings of the 25th International Conference on World Wide Web (WWW), April 11-15, Companion Volume, pp. 279–280. ACM, Montreal, Canada
Hope-Bailie A, Thomas S (2016) Interledger: Creating a standard for payments. In: Proceedings of the 25th International Conference on World Wide Web (WWW), April 11-15, Companion Volume, pp. 281–282. ACM, Montreal, Canada
Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P (2014) Enabling Blockchain Innovations with Pegged Sidechains. https://blockstream.com/sidechains.pdf
Li D, Liu J, Tang Z, Wu Q, Guan Z (2019) Agentchain: A decentralized cross-chain exchange system. In: Proceedings of the 18th International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom), August 5-8, pp. 491–498. IEEE, Rotorua, New Zealand
Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network-paper.pdf
Hao W, Xiangfu S, Junming K, Qiuliang X (2017) Blockchain in digital currency and its privacy protection mechanism. Information Network Security. 7:32–39
Silva Vanin FN, Policarpo LM, Rosa Righi R, Heck SM, Silva VF, Goldim JR, Costa CA (2023) A blockchain-based end-to-end data protection model for personal health records sharing: A fully homomorphic encryption approach. Sensors. 23(1):14
Wang Y, Wang W, Zeng Y, Yang T (2023) Gradingshard: A new sharding protocol to improve blockchain throughput. Peer Peer Netw. Appl. 16(3):1327–1339
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 2-6, vol. 1592, pp. 223–238. Springer, Prague, Czech Republic
Funding
This work was funded by the Key Research and Development Program of Jiangsu Province (under no.BE2021002-3).
Author information
Authors and Affiliations
Contributions
Dongyu Cao and Jingyuan Cai performed the methodology, validation, and writing. Bixin Li supervised the research paper, secured funding, and critically reviewed and edited the manuscript.
Corresponding author
Ethics declarations
Ethics approval
This work does not contain any studies with human participants and/or animals performed by any of the authors.
Conflict of Interest
The authors declare that they have no conflict of interest in the submitted work.
Consent to publish
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: 3 - Track on Blockchain Guest Editor: Haojin Zhu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Cao, D., Li, B. & Cai, J. A privacy-preserving method for cross-chain interoperability using homomorphic encryption. Peer-to-Peer Netw. Appl. 18, 48 (2025). https://doi.org/10.1007/s12083-024-01813-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-024-01813-9