Three-Stage Cross-Chain Protocol Based on Notary Group

نویسندگان

چکیده

With the continuous development of blockchain technology and economy, applications have been well developed in multiple key areas. The demand for interoperability between different blockchains is also increasing. Cross-chain protocol has become a major approach to solve cross-chain problems by defining series processes standards. In response long transaction time, high costs, degree centralization most protocols, this paper proposes three-stage based on notary groups verification groups. Without increasing costs problem mechanism solved, realizing secure fast interaction blockchains. Experimental results show that as malicious nodes group do not exceed one-third, can effectively ensure security transactions problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Blockchain-based TLS Notary Service

The Transport Layer Security (TLS) protocol is a de facto standard of secure client-server communication on the Internet. Its security can be diminished by a variety of attacks that leverage on weaknesses in its design and implementations. An example of a major weakness is the public-key infrastructure (PKI) that TLS deploys, which is a weakest-link system and introduces hundreds of links (i.e....

متن کامل

Chain-Chain Based Routing Protocol

Wireless sensor network (WSN) is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and secur...

متن کامل

Variations on Kak's Three Stage Quantum Cryptography Protocol

This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

متن کامل

Classical Authentication Aided Three-Stage Quantum Protocol

This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...

متن کامل

Implementing the Three-Stage Quantum Cryptography Protocol

We present simple implementations of Kak’s three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at one time is also examined.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12132804