2022
DOI: 10.36227/techrxiv.20025857.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Is My Perspective Better Than Yours? Blockchain Interoperability with Views

Abstract: <p>Distributed ledger technology (DLT) provides decentralized and tamper-resistant data storage, replicated among mutually untrusting participants. With the advancement of this technology, different privacy-preserving blockchains have been proposed, such as Corda, Hyperledger Fabric, and Digital Asset's Canton. These distributed ledgers only provide \emph{partial consistency}, which implies that participants can view the same ledger differently. </p> <p>A \emph{view} represents the states of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Cross-chain applications are structured as multi-step protocols with different types of agents. Agents are users (e.g., end-users, relayers [2], or protocol administrators) and smart contracts. Users take turns doing off-chain processing and interacting with one or more domains (e.g., submit transactions against smart contracts).…”
Section: A System Modelmentioning
confidence: 99%
“…Cross-chain applications are structured as multi-step protocols with different types of agents. Agents are users (e.g., end-users, relayers [2], or protocol administrators) and smart contracts. Users take turns doing off-chain processing and interacting with one or more domains (e.g., submit transactions against smart contracts).…”
Section: A System Modelmentioning
confidence: 99%
“…On the other hand, BUNGEE is a general-agnostic framework that inspires this work. In this paper, a tool that produces consolidated views over user activity on different blockchains [2] is proposed. Hephaestus can complement BUNGEE to generate metrics, protocol behavior patterns, and individual user activity.…”
Section: A Bridge Hacks and Monitoringmentioning
confidence: 99%
“…For the time being, gateways are assumed to be trusted. In order to relax this trust assumption, progress has been made paving the way for trustless gateways, leveraging the concept of blockchain views [10], [1], [28]. In this case, gateways exchange verifiable proofs to attest to the success of the operations performed in each ledger.…”
Section: Odap/satpmentioning
confidence: 99%