ABSTRACT
With the development of blockchain technology, people are safety and privacy guaranteed to own digital assets benefited from digital economy system. Meanwhile, the problems have risen that how can we make interactions between different digital economy systems, and, more importantly, how could our assets kept safe as it claims to be. To address this problem, we present our protocol based on a trusted root chain, Ethereum for example. Organization or Government agencies with independent digital economy systems are connected in a tree-like hierarchy with smart contracts to the root chain. User assets can freely flow from root chain to any digital economy system with safety guaranteed and timely withdraw strategy. We release the burden of root chain by periodic write headers through smart contracts. A fraud proof challenge solution and security deposit strategy are presented to solve the data access problem. With this protocol, diversity of digital assets system can be built without efforts to earn trusts from public, and the connections between them are easily implemented since they are inherited from the same root chain.
- Alberto Garoffolo, Dmytro Kaidalov, and Roman Oliynykov. 2020. Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains. 1257–1262. https://doi.org/10.1109/ICDCS47774.2020.00161Google Scholar
- Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 3–16.Google ScholarDigital Library
- Gagandeep Kaur and Charu Gandhi. 2020. Scalability in blockchain: Challenges and solutions. In Handbook of Research on Blockchain Technology. Elsevier, 373–406.Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review(2008), 21260.Google Scholar
- Sztorc Paul. 2018. Meditations on Fraud Proofs. https://www.truthcoin.info/blog/fraud-proofs/.Google Scholar
- Ilham A Qasse, Manar Abu Talib, and Qassim Nasir. 2019. Inter blockchain communication: A survey. In Proceedings of the ArabWIC 6th Annual International Conference Research Track. 1–6.Google ScholarDigital Library
- Amritraj Singh, Kelly Click, Reza M Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. Journal of Network and Computer Applications 149 (2020), 102471.Google ScholarDigital Library
- Gautam Srivastava, Ashutosh Dhar Dwivedi, and Rajani Singh. 2018. Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology.. In ICETE (2). 674–679.Google Scholar
- Gautam Srivastava, Ashutosh Dhar Dwivedi, and Rajani Singh. 2018. Phantom protocol as the new crypto-democracy. In IFIP International Conference on Computer Information Systems and Industrial Management. Springer, 499–509.Google ScholarCross Ref
- Harish Sukhwani, José M Martínez, Xiaolin Chang, Kishor S Trivedi, and Andy Rindos. 2017. Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). IEEE, 253–255.Google ScholarCross Ref
Index Terms
- MSCRC:Multi-layer Sidechain with Compressed Rootchain Blocks
Recommendations
Blockchain-based Supply Chain Financial Services Using Smart Contract
ICBTA '21: Proceedings of the 2021 4th International Conference on Blockchain Technology and ApplicationsSupply chain finance (SCF), a proposal to address financing problems of small and medium enterprises (SMEs), aims to make working capital optimized by utilizing credit and transaction information through cooperation between upstream and downstream in ...
Research on Cross-Chain Technology Based on Sidechain and Hash-Locking
Edge Computing – EDGE 2018AbstractBlockchain is a distributed ledger, which includes public blockchains, private blockchains, and consortium blockchains. How to realize the exchange and transfer of value between different blockchains is an important research topic for the ...
An Approach of Secure Two-Way-Pegged Multi-sidechain
Algorithms and Architectures for Parallel ProcessingAbstractAs a temper-resistant ledger, blockchain ensures integrity of transaction information among trust-less participants in peer to peer network. Thus, blockchain has attracted enormous research interests in the past decade due to its prior application ...
Comments