{"id":"https://openalex.org/W4292974225","doi":"https://doi.org/10.1109/scc55611.2022.00033","title":"A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking","display_name":"A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4292974225","doi":"https://doi.org/10.1109/scc55611.2022.00033"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/scc55611.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089371917","display_name":"Yangyang Sun","orcid":"https://orcid.org/0000-0003-0429-2146"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Sun","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020641129","display_name":"Longyang Yi","orcid":"https://orcid.org/0000-0003-0142-0755"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longyang Yi","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019931070","display_name":"Li Duan","orcid":"https://orcid.org/0000-0002-1825-7416"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Duan","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":9.392,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9793,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.42058727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7321492},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.72340274},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6401338},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6116393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5663399},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.5355788},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5181383},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.48361745},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.42058727},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3675139},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.15804476},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10088512},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07897726},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/scc55611.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W2775476012","https://openalex.org/W2793423901","https://openalex.org/W2984747683","https://openalex.org/W3003036212","https://openalex.org/W3112186396","https://openalex.org/W3153927914","https://openalex.org/W3155347870","https://openalex.org/W3157402426","https://openalex.org/W3183263354","https://openalex.org/W3202887189","https://openalex.org/W3210715031","https://openalex.org/W3211806062","https://openalex.org/W3212798537","https://openalex.org/W3213540232","https://openalex.org/W4213385795"],"related_works":["https://openalex.org/W4387913918","https://openalex.org/W4200497776","https://openalex.org/W3020097167","https://openalex.org/W2992265088","https://openalex.org/W2509647301","https://openalex.org/W2170400499","https://openalex.org/W2154676777","https://openalex.org/W2103190493","https://openalex.org/W2070561595","https://openalex.org/W2031332375"],"abstract_inverted_index":{"With":[0],"the":[1,19,35,76,98,110,149,158,163,169,182],"rapid":[2],"development":[3],"of":[4,21,67,112,151],"blockchain":[5,36],"technology,":[6],"its":[7],"applications":[8],"have":[9],"been":[10],"extended":[11],"to":[12,32,54,102,141],"various":[13],"fields":[14],"such":[15],"as":[16,154,156],"supply":[17],"chains,":[18],"internet":[20],"things,":[22],"and":[23,57,63,71,97,119,131,134,147,162,172,185],"finance.":[24],"However,":[25],"different":[26,50],"blockchains":[27],"cannot":[28],"directly":[29],"interconnect":[30],"due":[31],"discrepancies":[33],"in":[34,39,81,104,143],"architecture,":[37],"resulting":[38],"data":[40,56],"islands.":[41],"Cross-chain":[42],"technologies":[43,66],"are":[44],"services":[45],"that":[46,75,89,176],"provide":[47],"interoperability":[48],"for":[49,94],"blockchains,":[51],"enabling":[52],"them":[53],"exchange":[55],"transfer":[58],"assets.":[59],"This":[60,136],"paper":[61],"summarizes":[62],"analyzes":[64],"cross-chain":[65,122],"notary":[68,77,82,127],"schemes,":[69],"hash-locking,":[70,130],"relays.":[72],"We":[73],"find":[74],"may":[78],"be":[79,92],"evil":[80,152],"schemes.":[83],"Furthermore,":[84],"hash-locking":[85],"limits":[86],"application":[87],"scenarios":[88],"can":[90],"only":[91],"used":[93],"assets":[95],"exchange,":[96],"relay":[99],"is":[100,139,178,186],"difficult":[101],"deploy":[103,142],"a":[105,117,144],"real":[106,145],"scenario.":[107],"To":[108],"overcome":[109],"drawbacks":[111],"existing":[113],"technologies,":[114],"we":[115,167],"design":[116],"secure":[118],"fully":[120],"functional":[121],"service":[123],"protocol,":[124],"which":[125],"combines":[126],"schemes":[128],"with":[129],"introduces":[132],"rewards":[133],"punishments.":[135],"proposed":[137,170],"protocol":[138,171],"easy":[140],"scenario":[146],"solves":[148],"problem":[150],"notaries,":[153],"well":[155],"prevents":[157],"sore":[159],"loser":[160],"attack":[161],"wormhole":[164],"attack.":[165],"Finally,":[166],"evaluate":[168],"experimental":[173],"results":[174],"illustrate":[175],"it":[177],"more":[179],"efficient":[180],"than":[181],"BitXHub":[183],"project,":[184],"also":[187],"fault-tolerant.":[188]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4292974225","counts_by_year":[{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1}],"updated_date":"2024-12-31T09:31:21.235841","created_date":"2022-08-24"}