Cross-Chain Identity Authentication Method Based on Relay Chain

The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there i...

Full description

Saved in:
Bibliographic Details
Main Authors: Qipeng Huang, Minsheng Tan, Wenlong Tian
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/16/1/27
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832588372995997696
author Qipeng Huang
Minsheng Tan
Wenlong Tian
author_facet Qipeng Huang
Minsheng Tan
Wenlong Tian
author_sort Qipeng Huang
collection DOAJ
description The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. We design and propose a cross-chain identity privacy protection method based on relay chains to address these issues. In this method, the decentralized nature of relay chains ensures that the cross-chain authentication process is not subject to subjective manipulation, guaranteeing the authenticity and reliability of the data. Regarding the compatibility issue, we unify the user keys according to the identity manager organization, storing them on the relay chain and eliminating the need for users to configure identical key systems. Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. This method ensures full compatibility while protecting user privacy. Moreover, we introduce Zero-Knowledge Proof (ZKP) technology, ensuring that audit nodes cannot trace the user’s identity information with malicious intent. Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.
format Article
id doaj-art-ccf62808619e40e5a7f2e470124b8c5d
institution Kabale University
issn 2078-2489
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Information
spelling doaj-art-ccf62808619e40e5a7f2e470124b8c5d2025-01-24T13:35:12ZengMDPI AGInformation2078-24892025-01-011612710.3390/info16010027Cross-Chain Identity Authentication Method Based on Relay ChainQipeng Huang0Minsheng Tan1Wenlong Tian2School of Computer Science, University of South China, Hengyang 421001, ChinaSchool of Computer Science, University of South China, Hengyang 421001, ChinaSchool of Computer Science, University of South China, Hengyang 421001, ChinaThe cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. We design and propose a cross-chain identity privacy protection method based on relay chains to address these issues. In this method, the decentralized nature of relay chains ensures that the cross-chain authentication process is not subject to subjective manipulation, guaranteeing the authenticity and reliability of the data. Regarding the compatibility issue, we unify the user keys according to the identity manager organization, storing them on the relay chain and eliminating the need for users to configure identical key systems. Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. This method ensures full compatibility while protecting user privacy. Moreover, we introduce Zero-Knowledge Proof (ZKP) technology, ensuring that audit nodes cannot trace the user’s identity information with malicious intent. Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.https://www.mdpi.com/2078-2489/16/1/27relay chaincross-chain authenticationprivacy protectionhomomorphic encryptionZero-Knowledge Proof (ZKP)InterPlanetary File System (IPFS)
spellingShingle Qipeng Huang
Minsheng Tan
Wenlong Tian
Cross-Chain Identity Authentication Method Based on Relay Chain
Information
relay chain
cross-chain authentication
privacy protection
homomorphic encryption
Zero-Knowledge Proof (ZKP)
InterPlanetary File System (IPFS)
title Cross-Chain Identity Authentication Method Based on Relay Chain
title_full Cross-Chain Identity Authentication Method Based on Relay Chain
title_fullStr Cross-Chain Identity Authentication Method Based on Relay Chain
title_full_unstemmed Cross-Chain Identity Authentication Method Based on Relay Chain
title_short Cross-Chain Identity Authentication Method Based on Relay Chain
title_sort cross chain identity authentication method based on relay chain
topic relay chain
cross-chain authentication
privacy protection
homomorphic encryption
Zero-Knowledge Proof (ZKP)
InterPlanetary File System (IPFS)
url https://www.mdpi.com/2078-2489/16/1/27
work_keys_str_mv AT qipenghuang crosschainidentityauthenticationmethodbasedonrelaychain
AT minshengtan crosschainidentityauthenticationmethodbasedonrelaychain
AT wenlongtian crosschainidentityauthenticationmethodbasedonrelaychain