2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS) 2020
DOI: 10.1109/iceccs51672.2020.00021
|View full text |Cite
|
Sign up to set email alerts
|

The Burn-to-Claim cross-blockchain asset transfer protocol

Abstract: The future of multi-blockchain architecture depends on the emergence of new protocols that achieve communication between trustless cross-chain participants. However, interoperability between blockchains remains an open problem. Existing approaches provide integration through solutions using a middleware system, which makes it harder to gain confidence mainly in terms of security and correctness of the process. A crosschain protocol needs to provide a self-verifiable state-proof that embeds trust in the transfe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 5 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…Babu et al [14] formalises the Burn-to-Claim protocol, an asset transfer protocol between two blockchains. The authors developed the model using the CSP# language and verified it with the PAT model checker.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Babu et al [14] formalises the Burn-to-Claim protocol, an asset transfer protocol between two blockchains. The authors developed the model using the CSP# language and verified it with the PAT model checker.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Recent studies have formalised specific interoperability solutions using the TLA+ and PAT methods [12]- [14], although the gateway-based approach has not yet been formalised. Fur-thermore, the Event-B method has not been used to formalise interoperability solutions, although it enables verification of safety properties and verification of functional correctness of a system according to a specification [15].…”
Section: Introductionmentioning
confidence: 99%
“…It gives the guarantee that the token is permanently destroyed before being transferred onto another network [43]. We refer to our previous work for details on a burn-to-claim protocol [44], [45].…”
Section: ) Burn and Mint Protocolmentioning
confidence: 99%
“…Integration systems aim to address this problem by implementing different protocols to accomplish the composability of cross-blockchain transactions between integrating networks. Consequently, there exist a range of cross-blockchain protocols such as atomic swap, lock/unlock, burn/mint to be used based on the use-cases [10], [12], [13], [44].…”
Section: Cross-blockchain Protocolmentioning
confidence: 99%
“…Melanie Swan defined the development of blockchain technology at three levels [4]: blockchain 1.0 (currency interconnection), mainly bitcoin and other virtual currencies; Blockchain 2.0 (asset interconnection) takes smart contracts as the basic feature and can develop decentralized application DAPP as required; Blockchain 3.0 (Internet of Things), the applica-tion field of blockchain technology extends to education, government management, medical care, transportation, etc. It can confirm, measure and store the property rights of the valuable information contained in the blockchain and quickly establish credit, making the work more convenient and efficient [5].…”
Section: Introductionmentioning
confidence: 99%