2022 IEEE International Conference on Services Computing (SCC) 2022
DOI: 10.1109/scc55611.2022.00033
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Hash-locking technology [44] is often used in conjunction with micro-payment channel technology (stateful channels), such as the Lightning Network, to collect cryptographic signature information by transferring transactions on the blockchain and interacting with participants in the corresponding payment channel. When the payment channel is closed, the final state will be on the chain, while the intermediate state will not be published in the chain of transactions between the two parties, and the problem of chain disputes may arise when it is closed [45].…”
Section: ) Hash-locking Technology Limitationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Hash-locking technology [44] is often used in conjunction with micro-payment channel technology (stateful channels), such as the Lightning Network, to collect cryptographic signature information by transferring transactions on the blockchain and interacting with participants in the corresponding payment channel. When the payment channel is closed, the final state will be on the chain, while the intermediate state will not be published in the chain of transactions between the two parties, and the problem of chain disputes may arise when it is closed [45].…”
Section: ) Hash-locking Technology Limitationsmentioning
confidence: 99%
“…The centralized notary method [44], which is also known as the single-signature notary, selects only one third-party node as the third-party notary, which is usually a designated organization, and the user sends the funds and information to the third-party notary, who realizes the cross-chain operation between A and B. This method is limited by the third-party centralized node, which ignores the decentralized nature of blockchain and affects the overall security of the blockchain system.…”
Section: ) Centralized Notarymentioning
confidence: 99%
See 2 more Smart Citations
“…Existing cross-chain systems are mainly based on notary scheme [ 3 ], hash-locking [ 11 ], sidechain [ 12 , 13 ] or relay chain [ 14 , 15 ]. Among them, the scheme based on relay chains has more application scenarios and better scalability.…”
Section: Introductionmentioning
confidence: 99%