{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:07:01Z","timestamp":1766621221691,"version":"3.48.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:00:00Z","timestamp":1766620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:00:00Z","timestamp":1766620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In the realm of blockchains, synchronization challenges are two-folded. First, smart contracts from different blockchains cannot communicate with each other, making it hard to establish a trustworthy communication channel to share and maintain a universal state between each other. Second, transactions on different blockchains can hardly be ordered. Hence interference is expected. We need a novel way to handle interference. Traditional solutions involving third parties have safety and liveness issues and thus compromise between safety, permissionless, and liveness. ZK Multi-Blockchain Aggregatoris a multi-blockchain execution layer that leverages the power of zero-knowledge proof to minimize the trust base of multi-blockchain communication, which does not compromise safety, liveness, permissionless, and atomicity. In contrast to traditional blockchain bridges performing transactions on different blockchains separately and using a relay system to enforce the order of transactions and prevent interference, our method uses an entirely new approach, such that for each multi-blockchain transaction, it simulates the multi-blockchain transaction in its aggregator chain. Our aggregator uses zero-knowledge proofs of the simulation to convince involved blockchains to update their local state accordingly. On top of this layer, rich applications over multi-blockchains can run safely and efficiently.<\/jats:p>","DOI":"10.1186\/s42400-025-00395-0","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:02:50Z","timestamp":1766620970000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A ZK-based multi-blockchain transaction layer for minimal trust base"],"prefix":"10.1186","volume":"8","author":[{"given":"Sinka","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9005-7112","authenticated-orcid":false,"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,25]]},"reference":[{"key":"395_CR1","unstructured":"Anati I, Gueron S, Johnson S, Scarlata V (2013) Innovative technology for cpu based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 13. ACM New York, NY, USA"},{"key":"395_CR2","unstructured":"Becker G (2008) Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Tech. Rep 12, 19"},{"issue":"8","key":"395_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3471140","volume":"54","author":"R Belchior","year":"2021","unstructured":"Belchior R, Vasconcelos A, Guerreiro S, Correia M (2021) A survey on blockchain interoperability: past, present, and future trends. ACM Comput Surv (CSUR) 54(8):1\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"key":"395_CR4","unstructured":"Ben-Sasson E, Bentov I, Horesh Y, Riabzev M (2018) Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive"},{"key":"395_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Drake J, Fisch B, Gabizon A (2020) Halo infinite: Recursive zk-snarks from any additive polynomial commitment scheme. Cryptology ePrint Archive","DOI":"10.1007\/978-3-030-84242-0_23"},{"key":"395_CR6","unstructured":"Boneh D, Drake J, Fisch B, Gabizon A (2020) Efficient polynomial commitment schemes for multiple points and polynomials. Cryptology ePrint Archive"},{"key":"395_CR7","doi-asserted-by":"crossref","unstructured":"Cao L, Wan Z (2020) Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. In: 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), pp. 371\u2013374. IEEE","DOI":"10.1109\/ICAICA50127.2020.9181875"},{"key":"395_CR8","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. In: OSDI 99:173\u2013186","journal-title":"In: OSDI"},{"key":"395_CR9","doi-asserted-by":"publisher","first-page":"00151","DOI":"10.1016\/j.jbvi.2019.e00151","volume":"13","author":"Y Chen","year":"2020","unstructured":"Chen Y, Bellavitis C (2020) Blockchain disruption and decentralized finance: the rise of decentralized business models. J Bus Ventur Insights 13:00151","journal-title":"J Bus Ventur Insights"},{"key":"395_CR10","doi-asserted-by":"crossref","unstructured":"Chen W, Xu Z, Shi S, Zhao Y, Zhao J (2018) A survey of blockchain applications in different domains. In: Proceedings of the 2018 International Conference on Blockchain Technology and Application, pp. 17\u201321","DOI":"10.1145\/3301403.3301407"},{"key":"395_CR11","doi-asserted-by":"crossref","unstructured":"Chiesa A, Hu Y, Maller M, Mishra P, Vesely N, Ward N (2020) Marlin: preprocessing zksnarks with universal and updatable srs. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 738\u2013768 . Springer","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"395_CR12","doi-asserted-by":"crossref","unstructured":"Cramer R, Damg\u00e5rd I (1998) Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? In: Annual International Cryptology Conference, pp. 424\u2013441. Springer","DOI":"10.1007\/BFb0055745"},{"key":"395_CR13","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I (1998) Commitment schemes and zero-knowledge protocols. In: School Organized by the European Educational Forum, pp. 63\u201386. Springer","DOI":"10.1007\/3-540-48969-X_3"},{"key":"395_CR14","doi-asserted-by":"crossref","unstructured":"Deng L, Chen H, Zeng J, Zhang L-J (2018) Research on cross-chain technology based on sidechain and hash-locking. In: International Conference on Edge Computing, pp. 144\u2013151. Springer","DOI":"10.1007\/978-3-319-94340-4_12"},{"key":"395_CR15","doi-asserted-by":"crossref","unstructured":"Ernstberger J, Chaliasos S, Kadianakis G, Steinhorst S, Jovanovic P, Gervais A, Livshits B, Orr\u00f9 M (2024) zk-bench: A toolset for comparative evaluation and performance benchmarking of snarks. In: International Conference on Security and Cryptography for Networks, pp. 46\u201372. Springer","DOI":"10.1007\/978-3-031-71070-4_3"},{"issue":"1","key":"395_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MNET.011.2000223","volume":"35","author":"C Feng","year":"2021","unstructured":"Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5g flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130\u2013137","journal-title":"IEEE Netw"},{"key":"395_CR17","doi-asserted-by":"crossref","unstructured":"Fiore D, Nitulescu A (2016) On the (in) security of snarks in the presence of oracles. In: Theory of Cryptography Conference, pp. 108\u2013138. Springer","DOI":"10.1007\/978-3-662-53641-4_5"},{"key":"395_CR18","doi-asserted-by":"crossref","unstructured":"Garoffolo A, Kaidalov D, Oliynykov R (2020) Zendoo: A zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1257\u20131262 . IEEE","DOI":"10.1109\/ICDCS47774.2020.00161"},{"key":"395_CR19","doi-asserted-by":"crossref","unstructured":"Gong Y, Jin Y, Li Y, Liu Z, Zhu Z (2022) Analysis and comparison of the main zero-knowledge proof scheme. In: 2022 International Conference on Big Data, Information and Computer Network (BDICN), pp. 366\u2013372. IEEE","DOI":"10.1109\/BDICN55575.2022.00074"},{"key":"395_CR20","doi-asserted-by":"crossref","unstructured":"Groth J (2016) On the size of pairing-based non-interactive arguments. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 305\u2013326 . Springer","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"395_CR21","unstructured":"Halo2: The Halo2 Book. Accessed on 2022-9-3 (2020). https:\/\/zcash.github.io\/halo2\/"},{"issue":"4","key":"395_CR22","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1111\/poms.13147","volume":"29","author":"GM Hastig","year":"2020","unstructured":"Hastig GM, Sodhi MS (2020) Blockchain for supply chain traceability: Business requirements and critical success factors. Prod Oper Manag 29(4):935\u2013954","journal-title":"Prod Oper Manag"},{"issue":"3","key":"395_CR23","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1145\/78969.78972","volume":"12","author":"M Herlihy","year":"1990","unstructured":"Herlihy M, Wing JM (1990) Linearizability: a correctness condition for concurrent objects. ACM Trans Program Lang Syst 12(3):463\u2013492. https:\/\/doi.org\/10.1145\/78969.78972","journal-title":"ACM Trans Program Lang Syst"},{"key":"395_CR24","doi-asserted-by":"publisher","first-page":"46","DOI":"10.7250\/csimq.2021-26.03","volume":"26","author":"JR Jensen","year":"2021","unstructured":"Jensen JR, Wachter V, Ross O (2021) An introduction to decentralized finance (defi). Complex Syst Inform Model Quart 26:46\u201354","journal-title":"Complex Syst Inform Model Quart"},{"key":"395_CR25","volume-title":"Polynomial commitments","author":"A Kate","year":"2010","unstructured":"Kate A, Zaverucha GM, Goldberg I (2010) Polynomial commitments. Tech, Rep"},{"key":"395_CR26","doi-asserted-by":"crossref","unstructured":"Kate A, Zaverucha GM, Goldberg I (2010) Constant-size commitments to polynomials and their applications. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 177\u2013194. Springer","DOI":"10.1007\/978-3-642-17373-8_11"},{"issue":"5","key":"395_CR27","first-page":"653","volume":"19","author":"I-C Lin","year":"2017","unstructured":"Lin I-C, Liao T-C (2017) A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5):653\u2013659","journal-title":"Int. J. Netw. Secur."},{"key":"395_CR28","doi-asserted-by":"crossref","unstructured":"Lys L, Micoulet A, Potop-Butucaru M (2021) R-swap: Relay based atomic cross-chain swap protocol. In: International Symposium on Algorithmic Aspects of Cloud Computing, pp. 18\u201337. Springer","DOI":"10.1007\/978-3-030-93043-1_2"},{"key":"395_CR29","unstructured":"Mayer H (2016) zk-snark explained: Basic principles. URL https:\/\/blog.coinfabrik.com\/wp-content\/uploads\/2017\/03\/zkSNARK-explained_basic_principles. pdf"},{"key":"395_CR30","first-page":"1","volume":"1","author":"D Minoli","year":"2018","unstructured":"Minoli D, Occhiogrosso B (2018) Blockchain mechanisms for iot security. Int Things 1:1\u201313","journal-title":"Int Things"},{"issue":"1","key":"395_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40854-021-00305-6","volume":"8","author":"V Mohan","year":"2022","unstructured":"Mohan V (2022) Automated market makers and decentralized exchanges: a defi primer. Finan. Innovat. 8(1):1\u201348","journal-title":"Finan. Innovat."},{"key":"395_CR32","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Tapia JL, Belles M, Isabel M, Rubio A, Baylina J (2022) CIRCOM: A Robust and Scalable Language for Building Complex Zero-Knowledge Circuits. TechRxiv","DOI":"10.36227\/techrxiv.19374986.v1"},{"key":"395_CR33","unstructured":"Nakamoto S (2008) Bitcoin whitepaper. URL: https:\/\/bitcoin. org\/bitcoin. pdf-(: 17.07. 2019)"},{"key":"395_CR34","unstructured":"Petkus M (2019) Why and how zk-snark works. arXiv preprint arXiv:1906.07221"},{"key":"395_CR35","unstructured":"Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paper, 1\u201347"},{"key":"395_CR36","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments"},{"key":"395_CR37","unstructured":"Qin K, Gervais A (2018) An overview of blockchain scalability, interoperability and sustainability. Hochschule Luzern Imperial College London Liquidity Network"},{"issue":"1","key":"395_CR38","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/JSYST.2020.2968614","volume":"15","author":"PP Ray","year":"2020","unstructured":"Ray PP, Kumar N, Dash D (2020) Blwn: blockchain-based lightweight simplified payment verification in iot-assisted e-healthcare. IEEE Syst J 15(1):134\u2013145","journal-title":"IEEE Syst J"},{"key":"395_CR39","doi-asserted-by":"publisher","first-page":"e30","DOI":"10.1017\/S0269888920000296","volume":"35","author":"P Robinson","year":"2020","unstructured":"Robinson P (2020) The merits of using ethereum mainnet as a coordination blockchain for ethereum private sidechains. Knowledge Eng. Rev. 35:e30","journal-title":"Knowledge Eng. Rev."},{"key":"395_CR40","doi-asserted-by":"publisher","first-page":"108488","DOI":"10.1016\/j.comnet.2021.108488","volume":"200","author":"P Robinson","year":"2021","unstructured":"Robinson P (2021) Survey of crosschain communications protocols. Comput Netw 200:108488","journal-title":"Comput Netw"},{"key":"395_CR41","doi-asserted-by":"crossref","unstructured":"Robinson P, Brainard J (2019) Anonymous state pinning for private blockchains. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 827\u2013834. IEEE","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00120"},{"key":"395_CR42","doi-asserted-by":"crossref","unstructured":"Setty S (2020) Spartan: Efficient and general-purpose zksnarks without trusted setup. In: Annual International Cryptology Conference, pp. 704\u2013737 . Springer","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"395_CR43","doi-asserted-by":"publisher","first-page":"102471","DOI":"10.1016\/j.jnca.2019.102471","volume":"149","author":"A Singh","year":"2020","unstructured":"Singh A, Click K, Parizi RM, Zhang Q, Dehghantanha A, Choo K-KR (2020) Sidechain technologies in blockchain networks: an examination and state-of-the-art review. J Netw Comput Appl 149:102471","journal-title":"J Netw Comput Appl"},{"key":"395_CR44","unstructured":"Substrate: Substrate Documentation. Accessed on 2022-9-3 (2014). https:\/\/docs.substrate.io\/"},{"issue":"6","key":"395_CR45","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MWC.001.2000134","volume":"27","author":"W Sun","year":"2020","unstructured":"Sun W, Wang L, Wang P, Zhang Y (2020) Collaborative blockchain for space-air-ground integrated networks. IEEE Wirel Commun 27(6):82\u201389","journal-title":"IEEE Wirel Commun"},{"key":"395_CR46","unstructured":"Warren W, Bandeali A (2017) 0x: An open protocol for decentralized exchange on the ethereum blockchain. URl: https:\/\/github.com\/0xProject\/whitepaper, 04\u201318"},{"key":"395_CR47","doi-asserted-by":"publisher","unstructured":"Westerkamp M, Eberhardt J (2020) zkrelay: Facilitating sidechains using zksnark-based chain-relays. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS and PW), pp. 378\u2013386 . https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00058","DOI":"10.1109\/EuroSPW51379.2020.00058"},{"key":"395_CR48","unstructured":"WhiteHat B, Baylina J, Bell\u00e9s M (2020) Baby jubjub elliptic curve. Ethereum Improvement Proposal, EIP-2494 29"},{"key":"395_CR49","doi-asserted-by":"crossref","unstructured":"Xie T, Zhang J, Cheng Z, Zhang F, Zhang Y, Jia Y, Boneh D, Song D (2022) zkbridge: Trustless cross-chain bridges made practical. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 3003\u20133017","DOI":"10.1145\/3548606.3560652"},{"issue":"2","key":"395_CR50","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1093\/jfr\/fjaa010","volume":"6","author":"DA Zetzsche","year":"2020","unstructured":"Zetzsche DA, Arner DW, Buckley RP (2020) Decentralized finance. J Finan Regulat 6(2):172\u2013203","journal-title":"J Finan Regulat"},{"key":"395_CR51","doi-asserted-by":"crossref","unstructured":"Zhang Q, Cao S, Zhang X (2021) Enabling auction-based cross-blockchain protocol for online anonymous payment. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), pp. 715\u2013722. IEEE","DOI":"10.1109\/ICPADS53394.2021.00095"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00395-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00395-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00395-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:02:55Z","timestamp":1766620975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00395-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,25]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["395"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00395-0","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,25]]},"assertion":[{"value":"5 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"95"}}