This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm
by
Yichuan Wang
Yichuan Wang 1,2
,
Yiliang Yan
Yiliang Yan 1,
Yaling Zhang
Yaling Zhang 1,*,
Mengjie Tian
Mengjie Tian 1 and
Xiaoxue Liu
Xiaoxue Liu 1
1
Cyberspace Security Research Institute, Xi’an University of Technology, Xi’an 710048, China
2
Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710121, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(15), 2978; https://doi.org/10.3390/electronics13152978 (registering DOI)
Submission received: 3 June 2024
/
Revised: 15 July 2024
/
Accepted: 24 July 2024
/
Published: 28 July 2024
Abstract
As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-chain-secure transmission technique, incorporating the Trusted Platform Module (TPM) and the SM algorithm, which is based on trusted roots. This research paper elaborates on the design and implementation of the cross-chain-secure transmission technique based on TPM and the SM algorithm, emphasizing the academic rigor necessary for addressing the security requirements of cross-chain interactions. The research shows that compared with the previous method, the throughput of production capacity is not significantly different from that before and after adding the network delay, and the success rate of preventing attacks is increased by 46.9% by simulating related attacks. After multiple rounds of experiments, the effectiveness and feasibility of this technology in protecting cross-chain communication data are verified.
Share and Cite
MDPI and ACS Style
Wang, Y.; Yan, Y.; Zhang, Y.; Tian, M.; Liu, X.
Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics 2024, 13, 2978.
https://doi.org/10.3390/electronics13152978
AMA Style
Wang Y, Yan Y, Zhang Y, Tian M, Liu X.
Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics. 2024; 13(15):2978.
https://doi.org/10.3390/electronics13152978
Chicago/Turabian Style
Wang, Yichuan, Yiliang Yan, Yaling Zhang, Mengjie Tian, and Xiaoxue Liu.
2024. "Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm" Electronics 13, no. 15: 2978.
https://doi.org/10.3390/electronics13152978
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.