Next Article in Journal
Joint Extraction Method for Hydraulic Engineering Entity Relations Based on Multi-Features
Previous Article in Journal
Compact Switched-Inductor Power Supplies: Design Optimization with Second-Order Core Loss Model
Previous Article in Special Issue
A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm

1
Cyberspace Security Research Institute, Xi’an University of Technology, Xi’an 710048, China
2
Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710121, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(15), 2978; https://doi.org/10.3390/electronics13152978 (registering DOI)
Submission received: 3 June 2024 / Revised: 15 July 2024 / Accepted: 24 July 2024 / Published: 28 July 2024
(This article belongs to the Special Issue Recent Advances and Applications of Network Security and Cryptography)

Abstract

As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-chain-secure transmission technique, incorporating the Trusted Platform Module (TPM) and the SM algorithm, which is based on trusted roots. This research paper elaborates on the design and implementation of the cross-chain-secure transmission technique based on TPM and the SM algorithm, emphasizing the academic rigor necessary for addressing the security requirements of cross-chain interactions. The research shows that compared with the previous method, the throughput of production capacity is not significantly different from that before and after adding the network delay, and the success rate of preventing attacks is increased by 46.9% by simulating related attacks. After multiple rounds of experiments, the effectiveness and feasibility of this technology in protecting cross-chain communication data are verified.
Keywords: trusted computing; cross-chain; TPM; SM algorithm; blockchain security; network security trusted computing; cross-chain; TPM; SM algorithm; blockchain security; network security

Share and Cite

MDPI and ACS Style

Wang, Y.; Yan, Y.; Zhang, Y.; Tian, M.; Liu, X. Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics 2024, 13, 2978. https://doi.org/10.3390/electronics13152978

AMA Style

Wang Y, Yan Y, Zhang Y, Tian M, Liu X. Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics. 2024; 13(15):2978. https://doi.org/10.3390/electronics13152978

Chicago/Turabian Style

Wang, Yichuan, Yiliang Yan, Yaling Zhang, Mengjie Tian, and Xiaoxue Liu. 2024. "Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm" Electronics 13, no. 15: 2978. https://doi.org/10.3390/electronics13152978

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop