Cross-Chain Identity Authentication Method Based on Relay Chain
The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there i...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/16/1/27 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832588372995997696 |
---|---|
author | Qipeng Huang Minsheng Tan Wenlong Tian |
author_facet | Qipeng Huang Minsheng Tan Wenlong Tian |
author_sort | Qipeng Huang |
collection | DOAJ |
description | The cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. We design and propose a cross-chain identity privacy protection method based on relay chains to address these issues. In this method, the decentralized nature of relay chains ensures that the cross-chain authentication process is not subject to subjective manipulation, guaranteeing the authenticity and reliability of the data. Regarding the compatibility issue, we unify the user keys according to the identity manager organization, storing them on the relay chain and eliminating the need for users to configure identical key systems. Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. This method ensures full compatibility while protecting user privacy. Moreover, we introduce Zero-Knowledge Proof (ZKP) technology, ensuring that audit nodes cannot trace the user’s identity information with malicious intent. Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. Therefore, our method demonstrates superior security and performance in cross-chain privacy protection. |
format | Article |
id | doaj-art-ccf62808619e40e5a7f2e470124b8c5d |
institution | Kabale University |
issn | 2078-2489 |
language | English |
publishDate | 2025-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Information |
spelling | doaj-art-ccf62808619e40e5a7f2e470124b8c5d2025-01-24T13:35:12ZengMDPI AGInformation2078-24892025-01-011612710.3390/info16010027Cross-Chain Identity Authentication Method Based on Relay ChainQipeng Huang0Minsheng Tan1Wenlong Tian2School of Computer Science, University of South China, Hengyang 421001, ChinaSchool of Computer Science, University of South China, Hengyang 421001, ChinaSchool of Computer Science, University of South China, Hengyang 421001, ChinaThe cross-chain identity authentication method based on relay chains provides a promising solution to the issues brought by the centralized notary mechanism. Nonetheless, it continues to encounter numerous challenges regarding data privacy, security, and issues of heterogeneity. For example, there is a concern regarding the protection of identity information during the cross-chain authentication process, and the incompatibility of cryptographic components across different blockchains during cross-chain transactions. We design and propose a cross-chain identity privacy protection method based on relay chains to address these issues. In this method, the decentralized nature of relay chains ensures that the cross-chain authentication process is not subject to subjective manipulation, guaranteeing the authenticity and reliability of the data. Regarding the compatibility issue, we unify the user keys according to the identity manager organization, storing them on the relay chain and eliminating the need for users to configure identical key systems. Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). To address privacy concerns, we enable pseudonym updates based on the user’s public key during cross-chain transactions. This method ensures full compatibility while protecting user privacy. Moreover, we introduce Zero-Knowledge Proof (ZKP) technology, ensuring that audit nodes cannot trace the user’s identity information with malicious intent. Our method offers compatibility while ensuring unlinkability and anonymity through thorough security analysis. More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.https://www.mdpi.com/2078-2489/16/1/27relay chaincross-chain authenticationprivacy protectionhomomorphic encryptionZero-Knowledge Proof (ZKP)InterPlanetary File System (IPFS) |
spellingShingle | Qipeng Huang Minsheng Tan Wenlong Tian Cross-Chain Identity Authentication Method Based on Relay Chain Information relay chain cross-chain authentication privacy protection homomorphic encryption Zero-Knowledge Proof (ZKP) InterPlanetary File System (IPFS) |
title | Cross-Chain Identity Authentication Method Based on Relay Chain |
title_full | Cross-Chain Identity Authentication Method Based on Relay Chain |
title_fullStr | Cross-Chain Identity Authentication Method Based on Relay Chain |
title_full_unstemmed | Cross-Chain Identity Authentication Method Based on Relay Chain |
title_short | Cross-Chain Identity Authentication Method Based on Relay Chain |
title_sort | cross chain identity authentication method based on relay chain |
topic | relay chain cross-chain authentication privacy protection homomorphic encryption Zero-Knowledge Proof (ZKP) InterPlanetary File System (IPFS) |
url | https://www.mdpi.com/2078-2489/16/1/27 |
work_keys_str_mv | AT qipenghuang crosschainidentityauthenticationmethodbasedonrelaychain AT minshengtan crosschainidentityauthenticationmethodbasedonrelaychain AT wenlongtian crosschainidentityauthenticationmethodbasedonrelaychain |