2022
DOI: 10.1007/978-3-031-06764-8_23
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Privacy Protection of Cross-Chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 63 publications
0
6
0
Order By: Relevance
“…To this end, designing the rules is of utmost importance, likely to be an interactive process involving different stakeholders; another consideration is that sometimes the events that are checked against rules are not controlled by the bridge operators -leaving a wide attack surface for hackers. Regarding privacy, there are multiple views on the interoperability literature [46]- [49]. It seems that the main property for cross-chain transactions is unlinkability: the inability of an external observer to link the lock to the mint transactions.…”
Section: E Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…To this end, designing the rules is of utmost importance, likely to be an interactive process involving different stakeholders; another consideration is that sometimes the events that are checked against rules are not controlled by the bridge operators -leaving a wide attack surface for hackers. Regarding privacy, there are multiple views on the interoperability literature [46]- [49]. It seems that the main property for cross-chain transactions is unlinkability: the inability of an external observer to link the lock to the mint transactions.…”
Section: E Discussionmentioning
confidence: 99%
“…Lee et al explored a systematization of cross-chain bridge hacks that supports our modeling of double spend [43]. Although some work on bridge security has been done recently [46], [49]- [54], the space still needs systematization. Our work puts forward the cross-chain model, a concept that unites several efforts in the area.…”
Section: A Bridge Hacks and Monitoringmentioning
confidence: 97%
“…To this end, designing the rules is of utmost importance, likely to be an interative process involving different stakeholders; other consideration is that sometimes the events that are checked against rules are not controlled by the bridge operators -leaving a wide attack surface for hackers. Regarding privacy, there are multiple views on the interoperability literature [44]- [47]. It seems that the main property for cross-chain transactions is unlinkeability: the inability of an external observer to link the lock to the mint transactions.…”
Section: E Discussionmentioning
confidence: 99%
“…Lee et al explored a systematization of cross-chain bridge hacks that supports our modelling of double spend [41]. Although some work on bridge security has been done recently [44], [47]- [52], the space still needs systematization. Our work puts forward the cross-chain model, a concept that unites the several efforts in the area.…”
Section: A Bridge Hacks and Monitoringmentioning
confidence: 99%
“…However, the current relay chain solution faces some practical problems. In recent years, to perform necessary data interactions and asset transfers during cross-chain transactions, the cross-chain network poses security issues such as privacy leakage and loss of property [6]. An attack by malicious users cost the Value DeFi protocol $6 million on November 15, 2020 [7].…”
Section: Introductionmentioning
confidence: 99%