skip to main content
10.1145/3532640.3532649acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article

Research on cross-chain method based on distributed Digital Identity

Published:07 July 2022Publication History

ABSTRACT

With the rapid development of blockchain technology and increasingly rich application scenarios, it is very important to use cross-chain technology to promote the interconnection between blockchain. Cross-chain data transmission and cross-chain asset transfer are important cross-chain scenarios, which have high requirements for cross-chain transaction efficiency. However, the existing high-performance cross-chain mode side chain and notary mode cannot meet the trust requirements in these scenarios. DID (distributed digital Identity) does not depend on the central identity provider, in distributed scenarios, each user is given the ability to control and use digital identity independently, improve the credibility of side chain and notary mode, and then use high-performance cross-chain mode to meet the requirements of cross-chain transaction efficiency. In this paper, we discuss the feasibility of combining distributed digital identity and cross-chain technology, design a cross-chain model based on distributed digital identity, and explain how to introduce distributed digital identity in the key steps of cross-chain interaction, access control, cross-chain transactions and so on. A cross-chain transaction process based on distributed digital identity is formed, including transaction algorithm process, example and cross-chain transaction voucher format based on distributed digital identity. In the experiment, in the case of cross-chain data transmission and cross-chain asset transaction, compared with the current mainstream relay chain mode with high credibility, it is concluded that the cross-chain method based on distributed digital identity has obvious performance advantages under the premise of ensuring trust.

References

  1. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf, 2019-4-9.Google ScholarGoogle Scholar
  2. WOOD G. Ethereum: A Secure Decentralised Generalised TransactionLedger[EB/OL].https://gavwood.com/paper.pdf, 2019-4-11.Google ScholarGoogle Scholar
  3. Buterin V. On public and private blockchains. https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchainsGoogle ScholarGoogle Scholar
  4. Schwartz D, Youngs N, Britto A. The Ripple protocol consensus algorithm. https://ripple.com/files/ripple_consensus_whitepaper. pdfGoogle ScholarGoogle Scholar
  5. ConsenSys. BTC Relay's documentation. http://btc-relay.readthedocs.io/en/latest/Google ScholarGoogle Scholar
  6. KWON J.BUCHMAN E.A Network of Distributed Ledgers Cosmos[EB/OL],https://static.coinpaper.io/files/whitepapers/atoms/atom-comos_whitepaper.pdf.Google ScholarGoogle Scholar
  7. Poon J, Dryja T. The Bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network- paper.pdfGoogle ScholarGoogle Scholar
  8. LU A T, ZHAO K, YANG J Y, Research on Blockchain Cross-chain Technology[J]. Information Network Security, 2019, 000(008):83-90.Google ScholarGoogle Scholar
  9. LI F, ZHAO Z R, et.al. Research on the Progress in Cross-chain Technology of Blockchains[J]. Journal of Software,2019, Vol.30Issue(6):1649-1660Google ScholarGoogle Scholar
  10. Campbell Verduyn Malcolm and Hütten Moritz. The Formal, Financial and Fraught Route to Global Digital Identity Governance[J]. Frontiers in Blockchain, 2021,5,(04):23-25Google ScholarGoogle Scholar
  11. Jing Yue, Li Jingxuan, Liu Weiwei Independent identity concept and key elements analysis [J]. Information security and communication security,2021(05):112-118.(in Chinese)Google ScholarGoogle Scholar
  12. Boysen Andre. Decentralized, Self-Sovereign, Consortium: The Future of Digital Identity in Canada [J]. Frontiers in Blockchain, 2021,5,(04):11-12Google ScholarGoogle Scholar
  13. Emre E. Korkmaz. Digital Identity, Virtual Borders and Social Media:A Panacea for Migration Governance[M].1rd ed, Edward Elgar Publishing, 2021,160-165Google ScholarGoogle ScholarCross RefCross Ref
  14. Masiero Silvia and Bailur Savita. Digital identity for development: The quest for justice and a research agenda[J]. Information Technology for Development, 2021, 27(1) : 1-12.Google ScholarGoogle ScholarCross RefCross Ref
  15. Cui Jiuqiang, Lv Yao, Wang Hu. Development Status of Digital Identity Based on Blockchain [J]. Cyberspace Security,2020,11(06):25-29.(in Chinese)Google ScholarGoogle Scholar
  16. ZHAO Yang, QIAO Zhi-fu. Research on the Development and Tracking of Foreign Online Identity Management [J]. Police Technology,2020(03):30-32.(in Chinese)Google ScholarGoogle Scholar
  17. Ma Chong, Zou Nan. Blockchain governance and digital identity [J]. New Economy,2020(Z1):95-98.(in Chinese)Google ScholarGoogle Scholar
  18. Wang Baihua, Sun Changjie, Li Zhaochuan, Wang Weibing. Identity authentication method based on block chain technology in telecommuting [J]. Information Security Research,2020,6(04):317-326.(in Chinese)Google ScholarGoogle Scholar
  19. Hasnae L'Amrani and Younès El Bouzekri El Idrissi and Rachida Ajhoun. Technical Interoperability to Solve Cross-Domain Issues Among Federation Systems[J]. International Journal of Smart Security Technologies (IJSST), 2020, 7(1) : 21-40.Google ScholarGoogle ScholarCross RefCross Ref
  20. Merija Jirgensons and Jānis Kapenieks. Blockchain and the Future of Digital Learning Credential Assessment and Management[J]. Journal of Teacher Education for Sustainability, 2018, 20(1) : 145-156.Google ScholarGoogle ScholarCross RefCross Ref
  21. Chien-Hua Tsai and Pin-Chang Su and Angelos Antonopoulos. An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents[J]. Security and Communication Networks, 2017, 2017:14-17Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. ]Thomas S, Schwartz E. A protocol for interledger payments. https://interledger.org/interledger.pdf.Google ScholarGoogle Scholar
  23. ZHANG Shitong, QIN Bo, ZHENG Haibin. Research onGoogle ScholarGoogle Scholar
  24. Multi-party Cross-chain Protocol Based on Hash Locking[J]. Cyberspace Security, 2018, 9(11): 57-62, 67.Google ScholarGoogle Scholar
  25. ]BUCHMAN E,KWON J,MILOSEVIC Z. The latest gossip on BFT consensus[J], arXiv: 1807, 04756, 2019.Google ScholarGoogle Scholar
  26. [16]YE SJ, WANG X Y, XU C C, et.al. BitXHub: Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform[J]. Computer Science, 2020, v.47(06):300-308.Google ScholarGoogle Scholar
  27. Cachin C. Architecture of the hyperledger blockchain fabric. In: Proc. of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016.Google ScholarGoogle Scholar
  28. Bharat Bhushan,Aditya Khamparia,K. Martin Sagayam,Sudhir Kumar Sharma,Mohd Abdul Ahad,Narayan C. Debnath. Blockchain for smart cities: A review of architectures, integration trends and future research directions[J]. Sustainable Cities and Society,2020,61.Google ScholarGoogle Scholar
  29. Huanhuan Feng,Xiang Wang,Yanqing Duan,Jian Zhang,Xiaoshuan Zhang. Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges[J]. Journal of Cleaner Production,2020,260.Google ScholarGoogle Scholar
  30. Technology - Blockchain Technology; Data from University of Turku Advance Knowledge in Blockchain Technology (A Critical Review of Concepts, Benefits, and Pitfalls of Blockchain Technology Using Concept Map)[J]. Journal of Engineering,2020.Google ScholarGoogle Scholar
  31. Paul J. Taylor,Tooska Dargahi,Ali Dehghantanha,Reza M. Parizi,Kim-Kwang Raymond Choo. A systematic literature review of blockchain cyber security[J]. Digital Communications and Networks,2020,6(2).Google ScholarGoogle Scholar
  32. Julie Frizzo-Barker,Peter A. Chow-White,Philippa R. Adams,Jennifer Mentanko,Dung Ha,Sandy Green. Blockchain as a disruptive technology for business: A systematic review[J]. International Journal of Information Management,2020,51.Google ScholarGoogle Scholar
  33. T. Benil,J. Jasper. Cloud based security on outsourcing using blockchain in E-health systems[J]. Computer Networks,2020,178.Google ScholarGoogle Scholar
  34. Expert Systems; Findings on Expert Systems Reported by Investigators at University of Malta (Detection of Illicit Accounts Over the Ethereum Blockchain)[J]. Journal of Engineering,2020.Google ScholarGoogle Scholar
  35. Susanne Köhler,Massimo Pizzol. Technology assessment of blockchain-based technologies in the food supply chain[J]. Journal of Cleaner Production,2020,269.Google ScholarGoogle Scholar
  36. Lin Liu,Wei-Tek Tsai,Md Zakirul Alam Bhuiyan,Dong Yang. Automatic blockchain whitepapers analysis via heterogeneous graphGoogle ScholarGoogle Scholar
  37. Technology - Blockchain Technology; Reports from University Pendidikan Sultan Idris Advance Knowledge in Blockchain Technology (Blockchain Authentication of Network Applications: Taxonomy, Classification, Capabilities, Open Challenges, Motivations, Recommendations and Future ...)[J]. Journal of Engineering,2020.Google ScholarGoogle Scholar
  38. Information Technology - Cloud Computing; Reports from Xidian University Provide New Insights into Cloud Computing (A Collaborative Auditing Blockchain for Trustworthy Data Integrity In Cloud Storage System)[J]. Computers, Networks & Communications,2020.Google ScholarGoogle Scholar
  39. Qianren Liu, Miao Xue, Mengxuan Ren, Guangquan Wang. Application and Research of Digital Identity Based on Blockchain [J]. Design Technology of Posts and Telecommunications,2019(04):81-85.(in Chinese)Google ScholarGoogle Scholar
  40. Xie Renchao A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things[J]. Science China Information Sciences, 2021, 64(8):21-34Google ScholarGoogle Scholar
  41. Wang Lang. Design of Unified Campus Identity Management System Based on NFC Technology[J]. Scientific Journal of Intelligent Systems Research, 2021, 3(2):35-38Google ScholarGoogle Scholar
  42. Liu Nianzu and Guo Bing. Research on Multi-party Cooperative Secure Identity Authentication Mechanism Based on Blockchain[J]. Journal of Physics: Conference Series, 2021, 1873(1): 012087Google ScholarGoogle ScholarCross RefCross Ref
  43. Grech Alex and Sood Ira and Ariño Lluís. Blockchain, Self-Sovereign Identity and Digital Credentials: Promise Versus Praxis in Education[J]. Frontiers in Blockchain, 2021,5,(04):7-11Google ScholarGoogle Scholar
  44. Xiuxia Tian and Xi Chen and Siqian Li. An Identity Authentication Scheme of Energy Internet Based on Blockchain[J]. International Journal of Network Security, 2021, 23(2) : 261-269.Google ScholarGoogle Scholar
  45. Yang Xiaohui and Li Wenjie. A zero-knowledge-proof-based digital identity management scheme in blockchain[J]. Computers & Security, 2020, 99 : 102050-.Google ScholarGoogle ScholarCross RefCross Ref
  46. Schoemaker Emrys Identity at the margins: data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda[J]. Information Technology for Development, 2021, 27(1) : 13-36.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICBCT '22: Proceedings of the 2022 4th International Conference on Blockchain Technology
    March 2022
    177 pages
    ISBN:9781450395762
    DOI:10.1145/3532640

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 July 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format