Three-Stage Cross-Chain Protocol Based on Notary Group
نویسندگان
چکیده
With the continuous development of blockchain technology and economy, applications have been well developed in multiple key areas. The demand for interoperability between different blockchains is also increasing. Cross-chain protocol has become a major approach to solve cross-chain problems by defining series processes standards. In response long transaction time, high costs, degree centralization most protocols, this paper proposes three-stage based on notary groups verification groups. Without increasing costs problem mechanism solved, realizing secure fast interaction blockchains. Experimental results show that as malicious nodes group do not exceed one-third, can effectively ensure security transactions problem.
منابع مشابه
Blockchain-based TLS Notary Service
The Transport Layer Security (TLS) protocol is a de facto standard of secure client-server communication on the Internet. Its security can be diminished by a variety of attacks that leverage on weaknesses in its design and implementations. An example of a major weakness is the public-key infrastructure (PKI) that TLS deploys, which is a weakest-link system and introduces hundreds of links (i.e....
متن کاملChain-Chain Based Routing Protocol
Wireless sensor network (WSN) is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and secur...
متن کاملVariations on Kak's Three Stage Quantum Cryptography Protocol
This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.
متن کاملClassical Authentication Aided Three-Stage Quantum Protocol
This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...
متن کاملImplementing the Three-Stage Quantum Cryptography Protocol
We present simple implementations of Kak’s three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at one time is also examined.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12132804