Electronics 14 01185
Electronics 14 01185
Article
1 College of Management, Xian University of Architecture and Technology, Xi’an 710055, China;
[email protected] (L.J.); [email protected] (B.S.)
2 College of Information and Control Engineering, Xian University of Architecture and Technology,
Xi’an 710055, China
* Correspondence: [email protected]
Abstract: With consortium blockchain becoming the mainstream form of blockchain ap-
plied to various industries, the proportion of nonasset data in blockchain applications is
gradually increasing. However, there is currently no cross-chain solution for nonasset data.
The aim of this study is to explore the cross-chain problem of nonasset data and design a
cross-chain solution that is suitable for the application scenarios of consortium blockchains.
We achieved cross-chain identity authentication through an integrated distributed trust
model. We then proposed cross-chain anchor nodes as alternatives to traditional routing,
eliminating third-party Relay risks while ensuring secure information transmission through
smart contracts. Finally, on the basis of ensuring the timeliness and reliability of data trans-
mission, combined with the consortium blockchain organizational structure, cross-chain
technology is more in line with the characteristics of data element circulation. This study
provides an effective and secure solution for cross-chain interaction and application data
flow in consortium blockchains through comprehensive smart contract protection mecha-
nisms and rigorous access controls. The proposed approach is expected to promote the safe
application and development of consortium blockchain technology in various industries.
approaches either rely on trusted third parties, introducing security risks and performance
bottlenecks, or implement complex routing mechanisms that add significant overhead [5].
Consortium blockchain environments urgently need lightweight, secure, and efficient
cross-chain solutions. Current blockchain implementations create isolated data islands,
significantly reducing the value of interconnected data [6]. The blockchain is actually a
decentralized de-trust network, which guarantees the credibility of data on a single chain
through mechanisms like consensus algorithms, but cannot guarantee the credibility of
inter-chain data in the process of interconnection, which greatly reduces the use value of
blockchain applications. Cross-chain technology has become a key issue to promote the
integration and development of the blockchain ecosystem [7].
Current cross-chain solutions primarily target asset transfer scenarios but inadequately
address the growing demand for efficient and secure nonasset data exchange between
consortium blockchains. Existing approaches either perform the following:
1 Rely on trusted third parties, introducing security vulnerabilities and perfor-
mance bottlenecks.
2 Implement complex routing mechanisms that create significant operational overhead.
3 Lack specialized protocols for handling diverse data types beyond digital assets.
This creates a pressing need for lightweight, secure, and efficient cross-chain solu-
tions tailored to consortium blockchain environments. As blockchain technology expands
beyond financial applications into government services, supply chain management, and in-
dustrial applications, isolated blockchain networks increasingly restrict the value potential
of interconnected data systems.
This study aims to develop a cross-chain mechanism that facilitates secure nonasset
data exchange between consortium blockchains while maintaining their inherent security
properties. Specifically, we seek to achieve the following:
1 Design a distributed trust model based on identity authentication that eliminates
dependency on third-party intermediaries.
2 Develop lightweight alternatives to traditional cross-chain routing mechanisms.
3 Create a comprehensive framework for secure cross-chain data exchange that preserves
blockchain independence.
We make the following three major innovative contributions in the field of alliance
chain cross-chain technology:
(1) Cross-chain Identity Authentication Framework: We propose a novel authentication
scheme based on a distributed trust model that leverages the inherent trust charac-
teristics of consortium blockchains. This eliminates security risks and performance
constraints associated with third-party intermediaries, enabling direct cross-chain
communication while maintaining robust security.
(2) Cross-chain Anchor Node Architecture: We introduce the concept of cross-chain
anchor nodes as a lightweight alternative to traditional cross-chain routing. This
architectural design enhances data transfer efficiency while preserving the security
properties of the underlying blockchain networks, particularly benefiting consortium
environments with established organizational trust relationships.
(3) Smart Contract-based Exchange Framework: We develop a comprehensive smart
contract framework for cross-chain identity authentication and data exchange. This
includes specialized certificate verification, data encryption, and operational logging
contracts that provide end-to-end security for cross-chain interactions while signifi-
cantly improving performance metrics.
The remainder of this paper is structured as follows: Section 2 reviews related work on
blockchain interoperability and cross-chain technologies; Section 3 presents our distributed
Electronics 2025, 14, 1185 3 of 34
trust model; Section 4 describes the cross-chain interaction mechanisms; Section 5 details
the implementation of our smart contract framework; Section 6 provides experimental
validation and performance analysis; and Section 7 concludes with implications and future
research directions.
2. Related Work
2.1. Blockchain Application Development Status
As the key technology of Web 3.0, blockchain has attracted worldwide attention
and achieved considerable development. Blockchain has grown from a virtual currency
represented by Bitcoin [8] to a financial application represented by Ethereum [4]. Finally, it
has further expanded its scope of use to become a technical means to solve the problem of
mutual trust and data transmission security in all trades and professions. Blockchain has
become a strategic technology to support the development of the digital economy.
The development of digital native applications based on the public chain is very boom-
ing. Based on the fundamental applications of cryptocurrency and NonFungible Tokens
(NFTs), blockchain technology has expanded to support various extended applications,
including asset issuance, asset confirmation, payment, and settlement systems [9,10].
In addition, blockchain continues to expand its application in other fields, but it
encounters some obstacles in commercial operation and promotion. The main reason for
the problem is that the current blockchain is mainly based on public blockchain digital
native applications, which have significant differences from existing network applications.
Some of the problems currently existing in public blockchain limit the construction of
the blockchain ecosystem [11]. For example, public chain applications based on Proof of
Work (POW) consensus mechanisms have caused significant resource waste, leading to
sustainability concerns in blockchain implementations. And the adoption of blockchain
into the mainstream includes its widespread association with cryptocurrencies, which
makes it susceptible to fraud in the minds of many [12].
As a result, although blockchain technology has demonstrated significant advantages,
a single application scenario cannot achieve the vision of Web 3.0 to establish an open
Internet ecosystem. The digital application of the real economy based on the consortium
blockchain is the main way to solve this problem. Therefore, the blockchain has gradu-
ally formed a digital application of the real economy corresponding to the digital native
application around the consortium blockchain system [13].
Although the application based on consortium blockchain sacrifices some decen-
tralization characteristics, it is more in line with the current development direction of
network applications. Consortium blockchain can integrate or supplement current network
applications, such as P2P file storage and sharing [14], data integrity detection [15], cross-
domain authentication [16] in the Internet of Things, and logistics traceability in the supply
chain [17].
China has even proposed the concept of an open consortium blockchain platform
based on consortium blockchain technology, combining public blockchain with traditional
consortium blockchain, allowing a wider range of participants to join the network while
retaining a certain degree of access control and privacy protection mechanisms.
ments three key innovations: concurrent transaction validation, adjustable block size, and
dedicated layer-2 scaling. Performance improvements include 65% higher transaction
processing capacity, 40% reduced congestion during peak traffic, and 30% faster validation
while maintaining security standards.
The latest studies reveal the revolutionary merging of Web 3.0 with identity verification
via blockchain, leading to substantial progress in decentralized frameworks. Research has
demonstrated these advancements by several means, like Ethereum-driven authentication
using wallet addresses, zero-knowledge proof systems, and incentive-based verification
systems. Such advancements have yielded quantifiable improvements such as 40% faster
processing speeds, 48–54% increased network value, and 35% greater participation in
systems with altruistic and profit-oriented incentives. Nonetheless, persistent issues related
to technical skill sets, security weaknesses, and scalability during peak network activities
suggest a need for ongoing fine-tuning to attain widespread acceptance.
deployment and upkeep, and merging data in extensive data cases could add further
computational load, an aspect of its practical application.
AlSobeh et al. [28] introduced BlockASP: a framework for an AOP-based model
checking blockchain system. BlockASP represents a methodological framework that in-
tegrates aspect-oriented programming with model checking for blockchain systems veri-
fication. The approach employs a four-layer architecture to analyze dynamic blockchain
behaviors through formal logic verification processes. Its primary advantages include
enhanced security through decentralization, effective modularization of cross-cutting
concerns, and real-time monitoring capabilities that enable comprehensive state verifi-
cation. However, the framework demonstrates computational complexity comparable to
traditional object-oriented methods and lacks robust empirical validation across diverse
blockchain implementations, limiting conclusive evidence of its performance advantages
in practical applications.
Hasan et al. [29] proposed a blockchain-based national digital identity framework
for Palestine, presenting a methodologically sound approach that integrates decentralized
ledger technology with identity management principles. The framework employs a four-
tier architectural design—blockchain network, digital wallets, identity proofing services,
and authentication mechanisms—while implementing graduated identity assurance levels
(IP1–IP3) to accommodate service-specific security requirements. The system’s primary
advantages include enhanced user autonomy through self-sovereign identity principles,
cryptographic security protocols, modular scalability, and QR-based offline authentica-
tion capabilities that address infrastructure limitations. However, the framework exhibits
notable limitations including occupation-related implementation constraints, substantial
initial deployment costs (approximately 0.6% of GDP), and blockchain expertise deficien-
cies. While the conceptual model demonstrates theoretical robustness through qualitative
assessment, it lacks empirical validation through quantitative performance metrics and sys-
tematic load testing, highlighting the necessity for future experimental studies to establish
operational viability in the Palestinian context.
Recent research in blockchain-based identity management for IoT environments has
developed several innovative approaches combining distributed ledger technology with
advanced cryptographic techniques. While these solutions enhance security and trust
through decentralized verification, they consistently face challenges in scalability and
practical implementation. Success requires carefully balancing robust security features with
system performance and resource constraints.
via BLS threshold and Merkle proof, ensuring its completeness through incentive methods.
Concurrently, its security effectiveness is confirmed with formal evidence. Overall, this
scheme’s capacity for cross-chain asset transfer ensures uniformity and decentralization,
thus addressing all aspects of blockchain interoperability.
The study by Augusto et al. [34] suggests the introduction of SoK. The research
indicates that existing blockchain systems for interoperability grapple with notable compro-
mises in security, speed, and scalability. It emphasizes that in the context of security, 65.8%
of the funds pilfered come from bridges in permissioned networks, highlighting critical
vulnerabilities despite theoretical security benefits. In the realm of cross-chain speed, while
employing methods like validity proofs and native state validation shows encouraging
potential, their scalability is hindered by computational demands. Presently, the scalability
of these systems is constrained, with a mere 29% of analyzed systems enabling broad
data transfers between various chains. Recent methods, such as zero-knowledge proofs,
may improve privacy and scalability, but they demand significant progress in generating
proof efficiency and meeting trusted setup standards. The study concludes that finding a
balanced solution in these aspects is still challenging, with existing ones frequently at the
expense of other aspects.
The summary of the above five methods is shown in Table 1.
Analyzing six cross-chain options reveals significant trends and compromises in
blockchain’s interoperability realm. WeCross and Relays excel in speed and expandability,
utilizing their advanced structures for effective cross-chain transactions and ensuring
solid security. Conversely, SmartSync and Atomic Cross-chain Transactions emphasize
security, using advanced cryptographic methods like Merkle proofs and BLS threshold
signatures, though with trade-offs for reduced transaction speed. The decentralized transfer
model offers a fair balance, ensuring moderate success across all metrics, whereas the
distributed private key control system primarily concentrates on security via its specialized
key management. This study uncovers a steady balance between security and effectiveness
in cross-chain systems, underscoring the necessity for choosing solutions tailored to each
use case’s unique needs and priorities. Importantly, all systems preserve fundamental
interoperability characteristics for asset exchange, signifying a developed base for cross-
chain dialogue, even with diverse implementation strategies.
With the increase in cross-chain data interaction scenarios, the huge amount of data
causes performance problems in the Relay mechanism. In the traditional cross-chain
scheme, the Relay chain as an intermediate medium needs to verify the transaction infor-
mation of the application chain, which means that the interaction process between parallel
chains actually needs to experience two interactions between parallel chains and Relay
chains. Cross-blockchain routing also introduces a third party, which has certain security
risks. Therefore, in the Web 3.0 era, the goal of cross-chain is not only limited to the data or
assets transfer but also provides services between different blockchains, especially in the
field of blockchain information platforms based on consortium blockchain. Therefore, this
study designs a cross-chain scheme in the form of a direct connection to meet the needs of
data cross-chain efficiency.
through this relationship. Based on ensuring sufficient certificate processing ability, this
trust model is more convenient for generating a certificate chain and building a trust path.
In addition to the hierarchical model, there is also a trust model called a Certificate
Trust Lists (CTL), which is a data structure that contains a list of ’ trusted certification
authorities’ after signing, including a set of trusted CA lists, which is a commonly used
method to verify the credibility of other’s certificates. In the multi-chain scenario, the
Root CA of each chain can be added to the trust list to form a cross-chain trust system
based on the trust list, and on this basis, combined with the hierarchical trust system in the
chain to achieve multi-chain trust domain integration. It not only lays the foundation for
cross-chain identity authentication but also flexibly adjusts the communication structure
between chains by modifying the trust list. The trust model between chains is shown in
Figure 2.
After the cross-chain distributed trust model is formed, the trust transfer can be
achieved among the consortium blockchains, hereby the cross-chain trusted communi-
cation can be realized. The common blockchain hierarchical structures include a data
layer, network layer, consensus layer, incentive layer, contract layer, and application layer.
Because this study is oriented to the consortium blockchain, the consortium blockchain will
not adopt the consensus algorithm of an incentive nature such as Proof of Work (POW),
there is no incentive layer. The consensus algorithm is regional, so usually the cross-chain
scheme does not involve the integration of the consensus layer, and there is no design of
the consensus layer in this study. This study focuses on certificate reception and cross-chain
identity verification, mainly on the contract layer and application layer. The model is
shown in Figure 3.
We called the chain of the request data source chain and the data located chain called
the target chain in this study. Chain A is the source chain and Chain B is the target chain
in this figure. The users of Chain A obtain their certificates from themselves, request
cross-chain communication from Chain B, and use Chain B as the verifier for cross-chain
certificate authentication. After the application layer of Chain B receives it, it is verified by
the Certificate Verification Smart Contract (CVSC), and the verified certificate is stored in
the Communication Certificates Trust List (CCTL). The specific process of CVSC is shown
in Algorithm 1.
Certificate Certification Smart Contract (Algorithm 1) implements a comprehensive
certificate validation mechanism for cross-chain authentication in consortium blockchain
environments. The contract processes three essential input parameters: a root certificate
in PEM format, a user certificate byte stream (UcertBytes), and a user identifier (userId).
The validation process follows a systematic workflow that commences with computing a
cryptographic hash of the root certificate, followed by querying the blockchain state to verify
the root certificate’s existence and validity. Upon successful root certificate validation, the
contract proceeds to parse the user certificate and store the validated certificate information
in the blockchain’s state database using the provided user identifier. This implementation
ensures robust certificate management and establishes a foundational trust layer for cross-
chain operations, with comprehensive error handling mechanisms to maintain system
integrity throughout the certification process.
The trusted communication certificate list is different from the trusted trust list. CTL
is a predefined list of items signed by trusted entities which is a certificate hash table or file
name list and does not store certificate entities. CCTL is mainly used to store and verify the
passed certificate entity. It uses inert deletion and the Least Recently Used (LRU) algorithm
to realize fixed-length trusted certificate data storage, which is convenient for signature
verification in subsequent cross-chain requests. Both of them are stored on the blockchain,
which facilitates the use of smart contracts and ensures their security.
Root CA acts as the trust hub and issuer. Blockchain B features a tri-layer design: The Ap-
plication Layer manages certificate acceptance and identity authentication mechanisms; the
Contract Layer verifies certificate verification via smart agreements; and the Data Layer up-
holds both the Certificate Trust List (CTL) and Communication Certificate Trust List (CCTL)
for solid trust administration. This tiered arrangement guarantees secure and effective
cross-chain authentication, preserving the independence of separate blockchain networks.
To enhance this system, there are three distinct smart contracts that collaborate in
managing various elements of inter-chain interactions. The Certificate Verification Smart
Contract (CVSC) facilitates identity verification via a PKI-dependent system, guaranteeing
the correct authentication of participating parties prior to their cross-chain actions. Data
Encryption Smart Contract (DESC) ensures safe data exchange between chains, adopting
robust cryptographic methods for data preservation and privacy in transit. Operation
Record Smart Contract (ORSC) upholds an extensive audit history for all cross-chain
transactions, ensuring complete tracking and responsibility of these operations.
This unified method successfully tackles major issues in cross-chain communications
such as building trust, safeguarding data, and tracking operations. It merges strict control
systems with tailor-made smart contracts to offer a protective and effective system for
cross-chain data exchange, ensuring the independence and safety standards of consortium
blockchain settings.
This approach shows major benefits over conventional cross-chain methods, especially
in cutting down on third-party reliance and security hazards. Performance assessments
reveal greater effectiveness in cross-chain activities, evidenced by lower delays and higher
throughput than standard Relay-driven methods. Consortium blockchains leverage this
method to secure proficient cross-chain communication while preserving their natural
security attributes and operational autonomy.
Before initiating a cross-chain request, the data requester should know the requested
data and the corresponding contract address. Therefore, a Cross-chain Smart Contract List
(CB-SCL) should be maintained in the cross-chain organization. The data in the list should
include the address of the smart contract, the functional description of the contract, the
description of the relevant data, the channel, and the parameters attached instructions.
This list can also ensure that the source chain can obtain the latest accessing interface in
time. After the cross-chain calling smart contract is completed, the smart contract is used
to store the requester’s signature, request information, and return results in the channel
to which the contract belongs and the identity information in the identity authentication
process will also be retained. The organization in the same channel accesses the request
data according to the endorsement strategy of the channel to achieve access control of
cross-chain operations. The interaction process of each layer in Chain B is shown in Figure 5.
Chain B as the receiver of the request calls the smart contract through the application
layer to operate cross-chain requests. There are four operations in the contract layer in the
Figure Contract execution refers to the invocation of the contract in the cross-chain request.
The invoked contract does not hold a clear direction and does not depend on certain data.
The cross-chain request only calls the contract execution algorithm. In addition, Chain B
also needs to run signature verification, data result encryption, and operation records at the
contract layer, which are Signature Verification Smart Contract (SVSC), Data Encryption
Smart Contract (DESC), and Operation Record Smart Contract (ORSC).
The CB-SCL operates through three methodically designed layers. This structure en-
sures effective contract administration and secure implementation. Initially, the registering
interface introduces a unique protocol for registering new smart contracts, necessitating
verification by multiple parties from entities and ensuring automatic version control and
compatibility affirmation. The intermediary access control tier governs access rights for
organizations via channel-dependent endorsement tactics, verifying smart contract requests
against pre-established organizational authorizations. The execution tier orchestrates con-
tract activities across various chains, guaranteeing adherence to consensus regulations
while preserving extensive transaction logs within each organizational pathway.
The Signature Verification Smart Contract (Algorithm 2) extends the security frame-
work by implementing cryptographic signature validation for cross-chain communications.
The contract operates on three critical inputs: request metadata (m), signature components
(r&s), and a user identifier (userId). It initiates the verification process by retrieving the
previously stored certificate from the blockchain state, incorporating certificate expiration
verification as an integral security measure. The core functionality leverages the ECDSA
(Elliptic Curve Digital Signature Algorithm) for cryptographic validation, utilizing the
public key extracted from the retrieved certificate to verify the signature’s authenticity
against the provided data. This implementation ensures the integrity and authenticity of
cross-chain communications while maintaining atomic operation consistency throughout
the verification process, thereby establishing a secure foundation for trusted cross-chain
interactions in consortium blockchain networks.
Signature verification is used in the contract using an ECDSA-based verification
algorithm. The parameter set has been obtained during the process of parsing the certificate
and can also be requested from the user’s root CA. After the signature verification is passed,
the information of the contract and the parameters of the calling contract are written to
the request, so the smart contract can be called by parsing the request information. As
the smart contract runs automatically, the execution result of the contract is accurate, and
the application layer is carried on the node provided by Chain A, so the correctness of the
execution result of the contract can be guaranteed.
By adding cross-chain anchor nodes to the chain and updating the open nodes and
CTLs outside the chain, cross-chain communication can be achieved with other chains. It
truly achieves a lightweight and pluggable efficient consortium blockchain cross-chain
scheme without a third party. In addition, because the scheme of this study mainly
uses smart contracts and application layer services, this scheme can meet the cross-chain
requirements between various heterogeneous consortium blockchains.
The CB-SCL’s technical deployment utilizes an advanced data structure framework
aimed at enhancing contract management and access control checks. Its primary structure
revolves around a ContractMetadata framework, which incorporates crucial operational
elements. This framework upholds key data fields, including an address identifier for
Electronics 2025, 14, 1185 20 of 34
accurate contract positioning, a chain identifier represented as a 32-byte value for distinct
chain identification, and a timestamp for version control and timing tracking. This sys-
tem includes a dynamic authorization mapping mechanism, correlating organizational
addresses to boolean access permissions, thus offering detailed control over inter-chain
communication. Moreover, it preserves a range of supported procedures represented as
32-byte values, aiding in thorough operation monitoring and validation.
Implementation of the contract registry system involves a mapping framework, link-
ing distinct identifiers with each ContractMetadata instance. This architecture facilitates
effective contract retrieval processes while maintaining robust access control verification
systems. The registry system streamlines cross-chain operations by fine-tuning data access
patterns and organized metadata management protocols, allowing the CB-SCL to handle
the intricacies of cross-chain interactions efficiently, all the while adhering to stringent
security and autonomy standards.
The architectural design of this system guarantees operational effectiveness and se-
curity throughout the network, establishing a solid base for inter-chain interaction and
managing contracts. It shows a focus on scalability and security needs, ensuring the
adaptability required for various cross-chain situations.
where MaxNodes is the maximum number of anchor nodes allowed per organization.
Ultimately, a flexible trust assessment method has been set up for anchor nodes: For
each node labeled k, its trust metric Tk is computed using the formula
where U pTimek represents the node’s modified online duration, ResponseRatek the stan-
dardized response rate, SuccessRatek the node’s transaction success rate, α, β, γ the weight
coefficients, and the total of α + β + γ equals 1.
The update strategy of trust score adopts a dual-track system: (1) Periodic update
based on time, triggering the whole network credit reassessment with a fixed block interval
(for example, after every 1000 blocks are generated). (2) Event-based triggered update,
when there is an obvious anomaly in node behavior (such as continuous failed transactions
exceeding the preset threshold), the trust re-calculation is performed immediately. To
prevent malicious nodes from manipulating the trust score, all trust updates must be
verified by multi-organization consensus, requiring at least m organizations to sign for
Electronics 2025, 14, 1185 21 of 34
confirmation (where m > 2n/3, n is the total number of organizations), thus ensuring the
fairness of the scoring process.
The node’s cross-chain service qualification is determined by its trust score according
to Equation:
Active, if Tk ≥ Tthreshold
Status( Nodek ) = (3)
Suspended, if Tk < Tthreshold
When a new node joins the alliance chain network, the system adopts the progressive
trust establishment mechanism, initially puts the node in the trial state with limited permis-
sions, and assigns the initial trust value of the lowest acceptable threshold Tthreshold . The
access process requires the new node to provide an identity certificate signed and endorsed
by at least kof existing high-trust nodes (meeting the condition of k ≥ n/2 + 1), and then
the system performs a complete certificate chain verification on the certificate to ensure
its consistency with the existing CTL. The new node gradually accumulates trust value
through continuous and stable cross-chain service and can obtain formal node qualification
only after maintaining good performance for successive mevaluation cycles. In terms of
node exit management, the system supports two modes: In the normal exit process, the ex-
iting node actively initiates the certificate revocation request, and the certificate revocation
notice is broadcast on the whole network after the network consensus is confirmed. When
the node trust score continuously drops below the threshold of Tmin or malicious behaviors
occur, the system triggers a forced protocol exit. Regardless of the exit method, the up-
dated CTL and Communication Certificates Trust List (CCTL) will be synchronized to all
participating chains, and the complete behavior history of the exiting node will be retained
on the blockchain for subsequent audit and security analysis. Node states based on trust
scores are defined as three levels: Active (Tk ≥ Tthreshold ), Probation (Tmin ≤ Tk < Tthreshold ),
and Suspended (Tk < Tmin ). Nodes in different statuses have different configurations of
cross-chain permissions: only the Active node can perform all cross-chain operations, the
Probation node is limited to low-risk cross-chain read operations, and the Suspended node
suspends all cross-chain services. This complete node lifecycle management framework
and dynamic trust evaluation mechanism complement each other, and together constitute
the infrastructure of the distributed trust model in this paper, providing reliable security
for the alliance blockchain cross-chain identity authentication system.
Leveraging the consortium blockchain’s sanctioned status, this framework implements
measures at the organizational level and integrates a trust evaluation system for ongoing
monitoring at the nodes. The system’s seamless integration of static authorization control
with dynamic trust assessment successfully averts Sybil attacks while minimally hindering
standard cross-chain activities. Its layered defense approach guarantees that despite an
attacker registering numerous identities, sustained good behavior over an extended time is
essential for earning system trust, thereby greatly raising the expense and complexity of
initiating Sybil attacks.
Additionally, incorporating trust evaluation results into the cross-chain validation
process detailed in Section 2.4 enhances the system’s overall security and is consistent with
the distributed trust paradigm proposed in this study, thereby setting a sturdy security
groundwork for future cross-chain data exchanges.
6. Program Analysis
6.1. Security Analysis
In this study, the security of the proposed cross-chain interaction scheme is analyzed
and evaluated comprehensively and systematically. The analysis process mainly focuses on
the two core dimensions of smart contract vulnerability and the integrity of the distributed
Electronics 2025, 14, 1185 22 of 34
trust model, as well as covering several key security factors in the implementation of an
alliance chain.
cryptography for data reliability via deterministic verification processes. Moreover, the
implementation of a Signature Verification Smart Contract (SVSC) alongside a Data En-
cryption Smart Contract (DESC) guarantees the maintenance of data integrity and secrecy
during the entire transmission process. Additionally, the Operation Record Smart Contract
(ORSC) ensures total imperviousness by keeping confirmable operational logs in decentral-
ized record systems, thus maintaining data integrity through cryptographically protected
audit trails. This holistic method for data integrity safety shows tangible benefits compared
with standard Relay-driven methods, as shown by its excellent performance in decreasing
delay and boosting throughput in controlled experimental scenarios.
To sum up, our proposed scheme can effectively solve important security problems.
Theoretical examination reveals that this system’s scalability and efficacy are attainable,
safeguarding inter-diverse blockchain interactions by employing a distributed trust model,
smart contract framework, and a cross-chain anchor node model in its entirety. The design
thoroughly takes into account the structural features of the alliance chain, harmonizing
cross-chain technology with the dynamics of data element movement.
Term Parameter
Operating System Ubuntu 18.04 LTS
CPU Intel® CoreTM i7-11700 @ 2.50 GHz
Memory 32 GB
Hyperledger Fabric 2.2
Docker 20.10.17
Hash Algorithm SHA256
Elliptic Curve secp256k1
Consensus Algorithm Raft
Block Generation Strategy 2 s/4 M/500 T
The block generation strategy stipulates the rules of block generation. When the
number of transactions does not exceed 500 and the total data size of the transaction does
not reach 4 M, the block is generated every 2 s. Under this rule, when the amount of write
operation requests or the amount of data is small, the block generation of the blockchain is
at a fixed time, which will make a great impact on the requests sent per unit time, which
is not convenient for experimental comparison. Therefore, in the experimental process,
it is necessary to reduce the impact of the block generation strategy on the experimen-
tal results as much as possible and select the appropriate request amount interval and
concurrency granularity.
The Fabric network and BCOS network of this experiment are built on a host each,
simulated by docker, and linked by LAN. There is only one channel in the organizational
structure of the Fabric chain. The channel contains an Orderer organization, a cross-chain
organization, and two ordinary organizations, and each organization node is equipped
with four nodes and an intermediate CA. The entire chain only has a root CA.
Cross-chain interaction is the interaction between two systems, so the performance of
the cross-chain scheme also depends on the performance and organizational structure of
the blockchain itself. The smart contract of Fabric is attached to the node, and to reduce the
impact of the blockchain node itself on the experimental results, it is necessary to use the
single-node performance test of Fabric under the experimental environment. Hyperledger
Caliper is used to test the single-node performance of Fabric.
Verification of the suggested cross-chain models uses a dual-network framework with
Hyperledger Fabric v2.2 and FISCO BCOS platforms. This version is made up of a single
ordering service node with a Raft agreement and four nodes in each organization. It
incorporates certificate-based identity management and policies for multi-organizational
endorsements, necessitating bidirectional validation of transaction confirmations.
Electronics 2025, 14, 1185 27 of 34
FISCO BCOS network runs using four consensus nodes that apply the PBFT (Practical
Byzantine Fault Tolerance) algorithm, which integrates with distributed storage nodes and
cross-chain authentication units. Solidity v0.4.25 is used in the smart contract setting for
cross-chain logical execution. The cross-chain system integrates ECDSA-secp256k1 for
cryptographic safeguards and specialized anchor nodes possessing load balancing abilities.
TLS 1.3 protocol ensures the security of inter-chain communications.
number of tests is 20 groups, and each group is tested three times. We take the average as a
record. The results are shown in Figures 7 and 8.
From the comparison results of the read operation, the scheme in this study shows
some advantages in terms of delay and throughput compared with WeCross. The delay
fluctuates slightly with the slow increase in the number of requests. Compared with
WeCross, the scheme in this study always maintains the advantage of 5–7 ms, but it is
about 52 ms slower than single-chain reading, which is mainly due to the consumption
of network communication. The throughput increases significantly with the increase in
the number of requests, this change is more obvious. It is mainly affected by network
consumption and cannot achieve maximum performance at the beginning. In addition,
cross-chain requests can be executed by multiple nodes. Although the delay increases, the
throughput is significantly improved with the help of the load balancer. In the initial stage,
the advantage of this scheme is not obvious. The throughput is in the growth stage but the
gap is small before the request amount reaches 1000, After that, the gap gradually increases,
and the maximum throughput gap is 58TPS.
The performance experiment of cross-chain write operation also tests the performance
of nodes by changing the total amount of requests. The fixed throughput is 10, and each
group was tested three times to take the average as a record. The total number of requests
increased by 250 at a time, from 1000 to 5000. The total number of tests was 17 groups,
and each group was tested three times to take the average as a record. The efficiency
comparison results of the write operation are shown in Figures 9 and 10.
Electronics 2025, 14, 1185 29 of 34
and efficient blockchain cross-chain alliance strategy in reducing computing costs and
network traffic.
From the experimental results, it can be seen that the scheme in this study has a greater
advantage compared with WeCross, and the scheme is based on the organizational structure
of the chain itself for lightweight consideration, so the scheme is more lightweight.
Table 4. Comparative Analysis of Scalability Metrics between WeCross and Proposed Approach at
Maximum Transaction Volume (50,000Concurrent Requests).
Author Contributions: Conceptualization, L.J.; Methodology, L.J.; Software, G.B.; Validation, L.J.;
Formal analysis, B.S.; Resources, B.S. and G.B.; Writing—original draft, L.J.; Writing—review &
editing, G.B.; Visualization, B.S.; Supervision, G.B.; Project administration, B.S.; Funding acquisition,
L.J. All authors have read and agreed to the published version of the manuscript.
Data Availability Statement: The data presented in this study are available on request from the
corresponding author.
Abbreviations
The following abbreviations are used in this manuscript:
AI Artificial Intelligence
BCOS Blockchain Open Source
CA Certificate Authority
CCTL Communication Certificates Trust List
CTL Certificate Trust Lists
CVSC Certificate Verification Smart Contract
DESC Data Encryption Smart Contract
FISCO Financial Services Consortium
IBC Inter-Blockchain Communication Protocol
IBTP Inter-Blockchain Transfer Protocol
LRU Least Recently Used
NFT NonFungible Token
ORSC Operation Record Smart Contract
PKI Public Key Infrastructure
POW Proof of Work
RAL Routing Address List
SVSC Signature Verification Smart Contract
References
1. Jiang, P.; Zhang, L.; You, S.; Van Fan, Y.; Tan, R.R.; Klemeš, J.J.; You, F. Blockchain technology applications in waste management:
Overview, challenges and opportunities. J. Clean. Prod. 2023, 421, 138466. [CrossRef]
2. Yu, H. Application of blockchain technology in the data processing security system of financial enterprises. Secur. Priv. 2023,
6, e230. [CrossRef]
3. Chowdhury, R.H. Blockchain and AI: Driving the future of data security and business intelligence. World J. Adv. Res. Rev. 2024.
4. Liu, F.; He, S.; Li, Z.; Li, Z. An overview of blockchain efficient interaction technologies. Front. Blockchain 2023, 6, 996070.
[CrossRef]
Electronics 2025, 14, 1185 33 of 34
5. Unhelkar, B.; Joshi, S.; Sharma, M.; Prakash, S.; Mani, A.K.; Prasad, M. Enhancing supply chain performance using RFID
technology and decision support systems in the industry 4.0—A systematic literature review. Int. J. Inf. Manag. Data Insights 2022,
2, 100084. [CrossRef]
6. Kang, J.; Ye, D.; Nie, J.; Xiao, J.; Deng, X.; Wang, S.; Xiong, Z.; Yu, R.; Niyato, D. Blockchain-based federated learning for industrial
metaverses: Incentive scheme with optimal aoi. In Proceedings of the 2022 IEEE International Conference on Blockchain
(Blockchain), Espoo, Finland, 22–25 August 2022; pp. 71–78.
7. Li, L.; Wu, J.; Cui, W. A review of blockchain cross-chain technology. IET Blockchain 2023, 3, 149–158. [CrossRef]
8. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=3440802 (accessed on 12 December 2023).
9. Habib, G.; Sharma, S.; Ibrahim, S.; Ahmad, I.; Qureshi, S.; Ishfaq, M. Blockchain technology: Benefits, challenges, applications,
and integration of blockchain technology with cloud computing. Future Internet 2022, 14, 341. [CrossRef]
10. Guo, H.; Yu, X. A survey on blockchain technology and its security. Blockchain: Res. Appl. 2022, 3, 100067. [CrossRef]
11. China Academy of Information and Communications Technology. White Papers on Blockchain. 2022. Available online:
https://www.caict.ac.cn/english/research/whitepapers/202312/P020231212292399965314.pdf (accessed on 12 December 2023).
12. Scheid, E.J.; Kiechl, P.; Franco, M.; Rodrigues, B.; Killer, C.; Stiller, B. Security and standardization of a notary-based blockchain
interoperability API. In Proceedings of the 2021 Third International Conference on Blockchain Computing and Applications
(BCCA), Tartu, Estonia, 15–17 November 2021; pp. 42–48.
13. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R.; Khan, S. A review of Blockchain Technology applications for financial services.
Benchcouncil Trans. Benchmarks Stand. Eval. 2022, 2, 100073. [CrossRef]
14. Peng, S.; Bao, W.; Liu, H.; Xiao, X.; Shang, J.; Han, L.; Wang, S.; Xie, X.; Xu, Y. A Peer-to-Peer File Storage and Sharing System Based
on Consortium Blockchain; Elsevier: Amsterdam, The Netherlands, 2023; Volume 141, pp. 197–204.
15. Syaefudin, A.; Setiawan, N.A.; Rizal, M.N. Blockchain Technology to Maintain Data Integrity: A Systematic Literature Review. In
Proceedings of the 2024 International Conference on Smart Computing, IoT and Machine Learning (SIML), Surakarta, Indonesia,
6–7 June 2024; pp. 303–308.
16. Chen, Y.; Zhang, J.; Wei, X.; Wang, Y.; Cui, J. Cross-domain authentication scheme for vehicles based on given virtual identities.
IEEE Internet Things J. 2024, 11, 15869–15879. [CrossRef]
17. Webank. White Papers on WeCross Technology. 2022. Available online: https://docs.huihoo.com/blockchain/ (accessed on 15
February 2022).
18. Petcu, A.; Pahontu, B.; Frunzete, M.; Stoichescu, D.A. A secure and decentralized authentication mechanism based on web 3.0
and ethereum blockchain technology. Appl. Sci. 2023, 13, 2231. [CrossRef]
19. Nita, S.L.; Mihailescu, M.I. A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context
of Web 3.0. Electronics 2024, 13, 1137. [CrossRef]
20. Doe, D.M.; Li, J.; Dusit, N.; Gao, Z.; Li, J.; Han, Z. Promoting the sustainability of blockchain in web 3.0 and the metaverse
through diversified incentive mechanism design. IEEE Open J. Comput. Soc. 2023, 4, 171–184. [CrossRef]
21. Fan, S.; Min, T.; Wu, X.; Cai, W. Altruistic and profit-oriented: Making sense of roles in web3 community from airdrop perspective.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, Hamburg, Germany, 23–28 April 2023;
pp. 1–16.
22. Tennakoon, D.; Hua, Y.; Gramoli, V. Smart redbelly blockchain: Reducing congestion for web3. In Proceedings of the 2023 IEEE
International Parallel and Distributed Processing Symposium (IPDPS), St. Petersburg, FL, USA, 15–19 May 2023; pp. 940–950.
23. Sadique, K.M.; Rahmani, R.; Johannesson, P. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT)
Devices. Sensors 2023, 23, 4046. [CrossRef]
24. Kairaldeen, A.R.; Abdullah, N.F.; Abu-Samah, A.; Nordin, R. Peer-to-Peer User Identity Verification Time Optimization in IoT
Blockchain Network. Sensors 2023, 23, 2106. [CrossRef]
25. Gupta, S.; Bairwa, A.K.; Kushwaha, S.S.; Joshi, S. Decentralized Identity Management System using the amalgamation of
Blockchain Technology. In Proceedings of the 2023 3rd International Conference on Intelligent Communication and Computational
Techniques (ICCT), Jaipur, India, 19–20 January 2023; pp. 1–6.
26. Luong, D.A.; Park, J.H. Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK. IEEE Access 2023,
11, 1840–1853. [CrossRef]
27. Tian, Y.; Tan, H.; Shen, J.; Pandi, V.; Gupta, B.B.; Arya, V. Efficient identity-based multi-copy data sharing auditing scheme with
decentralized trust management. Inf. Sci. 2023, 644, 119255. [CrossRef]
28. AlSobeh, A.M.R.; Magableh, A.A. BlockASP: A Framework for AOP-Based Model Checking Blockchain System. IEEE Access
2023, 11, 115062–115075. [CrossRef]
29. Hasan, F.A.; Ashqar, H.I.; AlSobeh, A.; Darwish, O. Blockchain-Based National Digital Identity Framework—Case of Palestine. In
Proceedings of the 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS),
Dubrovnik, Croatia, 24–27 September 2024; pp. 76–83.
Electronics 2025, 14, 1185 34 of 34
30. Guo, Z.; Guo, S.; Zhang, S.; Song, L.; Wang, H. Analysis of cross-chain technology of blockchain. Chin. J. Internet Things 2020,
4, 35–48.
31. Westerkamp, M.; Küpper, A. SmartSync: Cross-Blockchain Smart Contract Interaction and Synchronization. In Proceedings of
the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2–5 May 2022; pp. 1–9.
32. Robinson, P.; Ramesh, R.; Johnson, S. Atomic Crosschain Transactions for Ethereum Private Sidechains. Blockchain: Res. Appl.
2022, 3, 100030. [CrossRef]
33. Sober, M.; Sigwart, M.; Frauenthaler, P.; Spanring, C.; Kobelt, M.; Schulte, S. Decentralized cross-blockchain asset transfers with
transfer confirmation. Clust. Comput. 2023, 26, 2129–2146. [CrossRef]
34. Augusto, A.; Belchior, R.; Correia, M.; Vasconcelos, A.; Zhang, L.; Hardjono, T. SoK: Security and Privacy of Blockchain Interop-
erability. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024;
pp. 3840–3865.
35. Ou, W.; Huang, S.; Zheng, J.; Zhang, Q.; Zeng, G.; Han, W. An overview on cross-chain: Mechanism, platforms, challenges and
advances. Comput. Netw. 2022, 218, 109378. [CrossRef]
36. Hart, S.; Manian, Z.; Tremback, J. The Cosmos Hub. 2022. Available online: https://gateway.pinata.cloud/ipfs/QmWXkzM7
4FCiERdZ1WrU33cqdStUK9dz1A8oEvYcnBAHeo (accessed on 17 July 2022).
37. Gallersdörfer, U.; Strugala, J.N.; Matthes, F. Efficient Onboarding and Management of Members in Permissioned Blockchain
Networks Utilizing TLS Certificates. Front. Blockchain 2021, 4, 739431. [CrossRef]
38. Zhou, Y.; Bai, Y.; Liu, Z.; Gao, H.; Liu, C.; Lei, H. Exploring Cross-Chain Mechanisms and Projects in Blockchain: A Compre-
hensive Summary. In Proceedings of the International Conference on Computer Engineering and Networks, Wuxi, China, 3–5
November 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 421–431.
39. Zheng, P.; Xu, Q.; Zheng, Z.; Zhou, Z.; Yan, Y.; Zhang, H. Meepo: Sharded consortium blockchain. In Proceedings of the 2021
IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 19–22 April 2021; pp. 1847–1852.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.