{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:36:01Z","timestamp":1776414961018,"version":"3.51.2"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Major Scientific and Technological Projects in Yunnan Province","award":["202002AB080001-8"],"award-info":[{"award-number":["202002AB080001-8"]}]},{"name":"Yunnan Key Laboratory of Blockchain Application Technology","award":["202105AG070005, YNB202109, and YNB202115"],"award-info":[{"award-number":["202105AG070005, YNB202109, and YNB202115"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61971208"],"award-info":[{"award-number":["61971208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Yunnan Reserve Talents of Young and Middle-Aged Academic and Technical Leaders","award":["2019HB005"],"award-info":[{"award-number":["2019HB005"]}]},{"name":"Yunnan Young Top Talents of Ten thousand Plan","award":["2018 73"],"award-info":[{"award-number":["2018 73"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,3,31]]},"abstract":"<jats:p>Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different blockchain protocols make network interoperability and cross-platform more complex. Relay chain is a promising cross-chain technology that solves the complexity and compatibility issues associated with blockchain cross-chain transactions by utilizing relay blockchains as cross-chain connectors. Yet relay chain cross-chain transactions need to collect asset information and implement asset transactions via two-way peg. Due to the release of user transaction information, there is the issue of privacy leakage. In this article, we propose a cross-chain privacy protection protocol based on the Groth16 zero-knowledge proof algorithm and coin-mixing technology, which changes the authentication mechanism and uses a combination of generating functions to map virtual external addresses in transactions. It allows fast cross-chain anonymous transactions while hiding the genuine user\u2019s address. The experiment shows that, in a zero-trust IoT context, our scheme can effectively protect user privacy information, accomplish controlled transaction traceability operations, and guarantee cross-chain transaction security.<\/jats:p>","DOI":"10.1145\/3583073","type":"journal-article","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T12:20:52Z","timestamp":1680265252000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1113-2629","authenticated-orcid":false,"given":"Yinghong","family":"Yang","sequence":"first","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology; Yunnan Key Laboratory of Computer Technology Applications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2505-0288","authenticated-orcid":false,"given":"Fenhua","family":"Bai","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology; Yunnan Key Laboratory of Computer Technology Applications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2185-3948","authenticated-orcid":false,"given":"Zhuo","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Zhongdian Puhua Information Technology Company, Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1273-7950","authenticated-orcid":false,"given":"Tao","family":"Shen","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology; Yunnan Key Laboratory of Computer Technology Applications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0298-9257","authenticated-orcid":false,"given":"Yingli","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology; Yunnan Key Laboratory of Computer Technology Applications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3188-3531","authenticated-orcid":false,"given":"Bei","family":"Gong","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Beijing University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3058125"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00562-7"},{"issue":"2","key":"e_1_3_1_4_2","first-page":"26","article-title":"Evaluation model of cross-chain notary mechanism based on improved pagerank algorithm","volume":"47","author":"Bingrong Dai","year":"2021","unstructured":"Dai Bingrong, Jiang Shengming, Li Dunwei, et\u00a0al. 2021. Evaluation model of cross-chain notary mechanism based on improved pagerank algorithm. Comput. Eng. 47, 2 (2021), 26\u201331.","journal-title":"Comput. Eng."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECIE52353.2021.00063"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA50127.2020.9181875"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149326"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6637402"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3060508"},{"key":"e_1_3_1_10_2","volume-title":"International conference on edge computing","unstructured":"Liping Deng, Huan Chen, Jing Zeng, and Liang-Jie Zhang. 2018. Research on cross-chain technology based on sidechain and hash-locking. In International conference on edge computing, Vol. 10973. Springer, Springer International Publishing, Cham, 144--151."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_38"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.06.006"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95384-3_43"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICET49382.2020.9119602"},{"key":"e_1_3_1_15_2","article-title":"An Inclusive Cryptofinance Platform Based on Blockchain","author":"Foundation Fusion","year":"2018","unstructured":"Fusion Foundation. 2018. An Inclusive Cryptofinance Platform Based on Blockchain. Fusion Whitepaper (2018). Retrieved from https:\/\/whitepaper.io\/document\/55\/fusion-whitepaper.","journal-title":"Fusion Whitepaper"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00032"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"issue":"1","key":"e_1_3_1_18_2","first-page":"206","article-title":"Security problems on blockchain: The state of the art and future trends","volume":"45","author":"Han Xuan","year":"2019","unstructured":"Xuan Han, Yong Yuan, and Fei-Yue Wang. 2019. Security problems on blockchain: The state of the art and future trends. Acta Autom. Sin. 45, 1 (2019), 206\u2013225.","journal-title":"Acta Autom. Sin."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6476274"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.005741"},{"key":"e_1_3_1_22_2","unstructured":"J. Huazhong Univ. Sci. Technol. (Natural Science Edition)"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10199-5"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA52658.2021.00083"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20113268"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3157996"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089603"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00019"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00864-9"},{"issue":"06","key":"e_1_3_1_31_2","first-page":"300","article-title":"BitXHub: Side-relay chain based heterogeneous blockchain interoperable platform","volume":"47","author":"Shao-Jie YE","year":"2020","unstructured":"YE Shao-Jie, Wang Xiao-Yi, Xu Cai-Chao, et\u00a0al. 2020. BitXHub: Side-relay chain based heterogeneous blockchain interoperable platform. Comput. Sci. 47, 06 (2020), 300\u2013308.","journal-title":"Comput. Sci."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3029766"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100579"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.002"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958097"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02453-9"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00111"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100081"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.11772\/j.issn.1001-9081.2021020353"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.04.012"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00062"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6920"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/CISAI54367.2021.00198"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA53709.2022.9719075"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:47Z","timestamp":1750182527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,9]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,31]]}},"alternative-id":["10.1145\/3583073"],"URL":"https:\/\/doi.org\/10.1145\/3583073","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,9]]},"assertion":[{"value":"2022-08-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}