{"id":"https://openalex.org/W4415481593","doi":"https://doi.org/10.1109/tifs.2025.3615418","title":"Secure and Efficient Data Interoperability Protocols for Multi-Blockchains Systems","display_name":"Secure and Efficient Data Interoperability Protocols for Multi-Blockchains Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415481593","doi":"https://doi.org/10.1109/tifs.2025.3615418"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3615418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3615418","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069488119","display_name":"Teng Yu","orcid":"https://orcid.org/0000-0002-9205-2398"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Teng Yu","raw_affiliation_strings":["Faculty of Engineering, The University of Sydney, Sydney, Australia","Faculty of Engineering, The University of Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042415302","display_name":"Fengji Luo","orcid":"https://orcid.org/0000-0003-4041-6062"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fengji Luo","raw_affiliation_strings":["Faculty of Engineering, The University of Sydney, Sydney, Australia","Faculty of Engineering, The University of Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065103253","display_name":"Gianluca Ranzi","orcid":"https://orcid.org/0000-0003-4603-8349"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gianluca Ranzi","raw_affiliation_strings":["Faculty of Engineering, The University of Sydney, Sydney, Australia","Faculty of Engineering, The University of Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028040934","display_name":"Jianzhong Wu","orcid":"https://orcid.org/0000-0001-7928-3602"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jianzhong Wu","raw_affiliation_strings":["School of Engineering, Cardiff University, Cardiff, U.K","School of Engineering, Cardiff University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Cardiff University, Cardiff, U.K","institution_ids":["https://openalex.org/I79510175"]},{"raw_affiliation_string":"School of Engineering, Cardiff University, United Kingdom","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069488119"],"corresponding_institution_ids":["https://openalex.org/I129604602"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45582608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"11401","last_page":"11416"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6251000165939331},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6244999766349792},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5813000202178955},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5509999990463257},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.3659999966621399},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.349700003862381},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.3239000141620636},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3188999891281128},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3147999942302704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.882099986076355},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6251000165939331},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6244999766349792},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5813000202178955},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5730000138282776},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5509999990463257},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4814000129699707},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.349700003862381},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.3239000141620636},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3147999942302704},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C75114861","wikidata":"https://www.wikidata.org/wiki/Q594324","display_name":"General Inter-ORB Protocol","level":5,"score":0.29980000853538513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2962000072002411},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.29030001163482666},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.2822999954223633},{"id":"https://openalex.org/C115067241","wikidata":"https://www.wikidata.org/wiki/Q1639854","display_name":"Token passing","level":3,"score":0.2750000059604645},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C21853045","wikidata":"https://www.wikidata.org/wiki/Q2634565","display_name":"Protocol data unit","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.2680000066757202},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2025.3615418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3615418","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:182076","is_oa":false,"landing_page_url":"https://orca.cardiff.ac.uk/view/cardiffauthors/A131368Q.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W2913353093","https://openalex.org/W2968654610","https://openalex.org/W2974125212","https://openalex.org/W2975871742","https://openalex.org/W2985948189","https://openalex.org/W3094114357","https://openalex.org/W3137780963","https://openalex.org/W3177492523","https://openalex.org/W3177820985","https://openalex.org/W3183263354","https://openalex.org/W3184158691","https://openalex.org/W3195415037","https://openalex.org/W3199317834","https://openalex.org/W3200397498","https://openalex.org/W3203860750","https://openalex.org/W4200236167","https://openalex.org/W4224261393","https://openalex.org/W4226518298","https://openalex.org/W4283370543","https://openalex.org/W4288057768","https://openalex.org/W4300127641","https://openalex.org/W4308391550","https://openalex.org/W4308409811","https://openalex.org/W4308641862","https://openalex.org/W4308642224","https://openalex.org/W4308642232","https://openalex.org/W4315783896","https://openalex.org/W4319342003","https://openalex.org/W4319594769","https://openalex.org/W4365151009","https://openalex.org/W4386590864","https://openalex.org/W4388101229","https://openalex.org/W4390603856","https://openalex.org/W4396759381","https://openalex.org/W4399511400","https://openalex.org/W4401213276","https://openalex.org/W4402264295","https://openalex.org/W4405350940","https://openalex.org/W4410088823"],"related_works":[],"abstract_inverted_index":{"The":[0,55,111,228,245],"proliferation":[1],"of":[2,81,203],"decentralized":[3],"applications":[4],"across":[5],"different":[6],"autonomous":[7],"blockchains":[8],"raises":[9],"the":[10,79,169,201,222],"need":[11],"to":[12,36,46,77,93,116,126,142,182,188,220,238],"enable":[13],"cross-chain":[14,56],"data":[15,139,155,175,186,205],"interoperability":[16],"(CCDI).":[17],"However,":[18],"prior":[19,249],"approaches":[20],"for":[21,61],"supporting":[22],"CCDI":[23,51,112,119,129,170,209,246],"often":[24],"hit":[25],"scalability":[26],"bottlenecks":[27],"regarding":[28],"critical":[29],"metrics,":[30],"e.g.,":[31],"memory,":[32],"or":[33],"remain":[34],"prone":[35],"withholding":[37,86,213],"and":[38,49,74,102,136,146,191,264],"censorship":[39,104],"attacks.":[40,87,214],"This":[41],"paper":[42],"proposes":[43],"two":[44,223],"protocols":[45,224,240],"implement":[47],"secure":[48],"efficient":[50],"under":[52,85,212,241],"adversarial":[53],"conditions.":[54],"token":[57,82,96,109],"exchange":[58],"(CCTE)":[59],"protocol":[60,113,171,230,247],"atomic":[62],"swaps":[63],"is":[64,114],"proposed.":[65],"It":[66,88,121,132],"adopts":[67],"a":[68,71,90,123,134,150,158,173,180,193,208],"deposit":[69],"mechanism,":[70],"blockchain-of-blockchains":[72],"(BoB),":[73],"Merkle":[75],"proofs":[76],"ensure":[78],"completion":[80],"exchanges":[83],"even":[84,211],"utilizes":[89],"parallelized":[91],"design":[92],"support":[94,117],"concurrent":[95],"exchanges,":[97],"thereby":[98],"improving":[99],"its":[100,144,153,184],"efficiency":[101],"avoiding":[103],"attacks":[105],"that":[106],"target":[107],"sequential":[108],"exchanges.":[110],"proposed":[115],"any":[118,163],"application.":[120],"authorizes":[122],"unique":[124],"BoB":[125],"execute":[127],"arbitrary":[128],"application":[130],"logic.":[131],"integrates":[133,172],"\u201ctransfer":[135],"in":[137,207],"place":[138],"update\u201d":[140],"mechanism":[141,148],"improve":[143],"efficiency,":[145],"this":[147],"enables":[149,200],"blockchain":[151],"update":[152],"state":[154,174,185,204],"items":[156,206],"using":[157],"single":[159],"transaction,":[160],"without":[161],"requiring":[162],"information":[164],"from":[165],"other":[166],"blockchains.":[167],"Moreover,":[168],"migration":[176],"scheme,":[177,198],"which":[178,199],"supports":[179],"user":[181,195],"migrate":[183],"item":[187],"censorship-resilient":[189],"blockchains,":[190],"incorporates":[192],"malicious":[194],"nodes":[196],"elimination":[197],"updates":[202],"process":[210],"Systematic":[215],"performance":[216],"evaluations":[217],"are":[218],"conducted":[219],"compare":[221],"with":[225],"existing":[226,239],"ones.":[227],"CCTE":[229],"reduces":[231],"latency":[232,265],"by":[233,254,258,262,267],"at":[234],"least":[235],"52%":[236],"compared":[237],"probabilistic":[242],"consensus":[243],"setting.":[244],"outperforms":[248],"protocols,":[250],"lowering":[251],"communication":[252],"cost":[253,266],"59%,":[255],"computation":[256],"overhead":[257],"41%,":[259],"memory":[260],"burden":[261],"12%,":[263],"33%.":[268]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-23T00:00:00"}
