2022
DOI: 10.1016/j.dcan.2022.04.012
|View full text |Cite
|
Sign up to set email alerts
|

A notary group-based cross-chain mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…There are multiple trustless and privacy securing bridging solutions such as Falazi et al [17], A. Xiong et al [34], Horizon [23], Stone D. [31], and Bridging Sapling [29]. These solutions, integrated into the Public Connectors category, are either focused on permissionless blockchains supporting cryptocurrencies or do not have working implementations of the protocols.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are multiple trustless and privacy securing bridging solutions such as Falazi et al [17], A. Xiong et al [34], Horizon [23], Stone D. [31], and Bridging Sapling [29]. These solutions, integrated into the Public Connectors category, are either focused on permissionless blockchains supporting cryptocurrencies or do not have working implementations of the protocols.…”
Section: Related Workmentioning
confidence: 99%
“…We also discard solutions that require both ledgers to have access to each other (e.g. SPV-like solutions), or that allow any user to become a bridging validator given the permissioned nature of our use-case (e.g., a group of validators running a consensus mechanism in order to accept/reject a cross-chain transaction, where anyone can run a node [34]).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are multiple trustless and privacy securing bridging solutions such as Falazi et al [18], A. Xiong et al [34], Horizon [23], Stone D. [31], and Bridging Sapling [29]. These solutions, integrated into the Public Connectors category, are either focused on permissionless blockchains that support cryptocurrencies or do not have working implementations of the protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Each Cacti Node can be composed of multiple API Servers, hence our solution comprises two (Figure 1), each targeting a different side of the bridge. We use both Fabric and Besu ledger connectors 34 as means to access the ledgers; IPFS connectors allowing communication with an IPFS network that, as explained before, acts as decentralized log storage for integrity, accountability and auditability purposes; finally, the SATP business logic plugin 5 . The SATP plugin includes the gateway logic and exposes an API that is accessible to the end users to trigger bridging operations -bridging out or bridging back CBDC.…”
Section: A Bridging Modelmentioning
confidence: 99%