{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:01:12Z","timestamp":1764831672956,"version":"3.46.0"},"reference-count":131,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.070413","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T08:47:26Z","timestamp":1757580446000},"page":"2579-2624","source":"Crossref","is-referenced-by-count":0,"title":["Security and Privacy in Permissioned Blockchain Interoperability: A Systematic Review"],"prefix":"10.32604","volume":"85","author":[{"given":"Alsoudi","family":"Dua","sequence":"first","affiliation":[]},{"given":"Tan Fong","family":"Ang","sequence":"additional","affiliation":[]},{"given":"Chin Soon","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Okmi","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jiahui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Lip Yee","family":"Por","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"109343","DOI":"10.1016\/j.compeleceng.2024.109343","article-title":"B-LPoET: a middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology","volume":"118","author":"Khan","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"77852","DOI":"10.1109\/ACCESS.2024.3407521","article-title":"Preventing 51% attack by using consecutive block limits in bitcoin","volume":"12","author":"Mahmood Babur","year":"2024","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"109838","DOI":"10.1016\/j.engappai.2024.109838","article-title":"BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things","volume":"141","author":"Khan","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"82443","DOI":"10.1109\/ACCESS.2024.3404778","article-title":"Securing the IoT cyber environment: enhancing intrusion anomaly detection with vision transformers","volume":"12","author":"Sana","year":"2024","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"89024","DOI":"10.1109\/ACCESS.2023.3306607","article-title":"Enabling IoT service classification: a machine learning-based approach for handling classification issues in heterogeneous IoT services","volume":"11","author":"Abbasi","year":"2023","journal-title":"IEEE Access"},{"key":"ref6","first-page":"13","article-title":"Artificial intelligence, internet of things, and blockchain empowering future vehicular developments: a comprehensive multi-hierarchical lifecycle review","volume":"15","author":"Khan","year":"2025","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"6835","DOI":"10.3390\/s24216835","article-title":"Blockchain Factors in the design of smart-media for e-healthcare management","volume":"24","author":"Shah","year":"2024","journal-title":"Sensors"},{"key":"ref8","first-page":"1","article-title":"Exploring blockchains interoperability: a systematic survey","volume":"55","author":"Wang","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"12750","DOI":"10.1109\/TKDE.2023.3275220","article-title":"Interoperability in blockchain: a survey","volume":"35","author":"Ren","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref10","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"2444","article-title":"SoK: decentralized finance (DeFi) attacks","author":"Zhou","year":"2023"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1049\/cmu2.12594","article-title":"Blockchain interoperability: the state of heterogenous blockchain-to-blockchain communication","volume":"17","author":"Kotey","year":"2023","journal-title":"IET Commun"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3573896","article-title":"A survey on cross-chain technologies","volume":"2","author":"Han","year":"2023","journal-title":"Distributed Ledger Technol Res Pract"},{"key":"ref13","series-title":"The International Conference on Evaluation and Assessment in Software Engineering 2022","first-page":"347","article-title":"Security and privacy challenges in blockchain interoperability\u2014a multivocal literature review","author":"Haugum","year":"2022"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/JAS.2023.123642","article-title":"Attacks against cross-chain systems and defense approaches: a contemporary survey","volume":"10","author":"Duan","year":"2023","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"11077","DOI":"10.3390\/app142311077","article-title":"A systematic literature review on the revolutionary impact of blockchain in modern business","volume":"14","author":"Mohammed","year":"2024","journal-title":"Appl Sci"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"102892","DOI":"10.1016\/j.sysarc.2023.102892","article-title":"A survey on privacy preservation techniques for blockchain interoperability","volume":"140","author":"Yin","year":"2023","journal-title":"J Syst Archit"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"100286","DOI":"10.1016\/j.bcra.2025.100286","article-title":"Towards blockchain interoperability: a comprehensive survey on cross-chain solutions","author":"Li","year":"2025","journal-title":"Blockchain Res Appl"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"n71","DOI":"10.1136\/bmj.n71","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref19","unstructured":"Quan Nha H. Mixed Methods Appraisal Tool (MMAT) Version 8 n.d. [cited 2025 Mar 31]. Available from: http:\/\/mixedmethodsappraisaltoolpublic.pbworks.com\/w\/file\/fetch\/127916259\/MMAT_2018_criteria-manual_2018-08-01_ENG.pdf."},{"key":"ref20","unstructured":"Buterin V. Ethereum: a Next-generation smart contract and decentralized application platform (White paper); 2014. p. 1\u201336. [cited 2025 Mar 31]. Available from: https:\/\/ethereum.org\/content\/whitepaper\/whitepaper-pdf\/Ethereum_Whitepaper_-_Buterin_2014.pdf."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"100344","DOI":"10.1016\/j.dajour.2023.100344","article-title":"A comprehensive review of blockchain technology: underlying principles and historical background with future challenges","volume":"9","author":"Tripathi","year":"2023","journal-title":"Decis Anal J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"e1705","DOI":"10.7717\/peerj-cs.1705","article-title":"Blockchain technology and application: an overview","volume":"9","author":"Dong","year":"2023","journal-title":"PeerJ Comput Sci"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks","volume":"8","author":"Fernandez-Carames","year":"2020","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MCE.2023.3248872","article-title":"Blockchain technology: a framework for endless applications","volume":"13","author":"Zantalis","year":"2024","journal-title":"IEEE Consum Electron Mag"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s11416-023-00466-1","article-title":"Zero knowledge proof and ZK-SNARK for private blockchains","volume":"19","author":"Konkin","year":"2023","journal-title":"J Comput Virol Hacking Tech"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578581","article-title":"Incentive mechanisms in peer-to-peer networks\u2014a systematic literature review","volume":"55","author":"Ihle","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref27","series-title":"Proceedings of the Thirteenth EuroSys Conference","first-page":"1","article-title":"Hyperledger fabric","author":"Androulaki","year":"2018"},{"key":"ref28","series-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers. Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL 2016)","first-page":"1","article-title":"Architecture of the hyperledger blockchain fabric","author":"Cachin","year":"2016"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"13401","DOI":"10.3390\/su151813401","article-title":"Blockchain technology and related security risks: towards a seven-layer perspective and taxonomy","volume":"15","author":"Mollajafari","year":"2023","journal-title":"Sustainability"},{"key":"ref30","unstructured":"Baliga A, Subhod I, Kamat P, Chatterjee S. Performance evaluation of the quorum blockchain platform. arXiv:1809.03421. 2018."},{"key":"ref31","first-page":"1","article-title":"The corda platform: an introduction","author":"Brown","year":"2018","journal-title":"Corda Platform White Paper"},{"key":"ref32","unstructured":"Multichain-cross chain router protocol. Multichain. [cited 2025 Jun 1]. Available from: https:\/\/app.multichain.org\/#\/router."},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1002\/spe.70008","article-title":"Bridging the gap: achieving seamless interoperability between ethereum-based blockchains using inter-blockchain communication protocols","author":"Delgado-von-Eitzen","year":"2025","journal-title":"Softw Pract Exp"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3638045","article-title":"Cross-chain smart contract invocations: a systematic multi-vocal literature review","volume":"56","author":"Falazi","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref35","first-page":"1","article-title":"Cosmos Whitepaper: a network of distributed ledgers [Internet]","author":"Kwon","year":"2017","journal-title":"Cosmos Network"},{"key":"ref36","first-page":"4662","article-title":"Polkadot: vision for a heterogeneous multi-chain framework","volume":"21","author":"Wood","year":"2016","journal-title":"White Paper"},{"key":"ref37","unstructured":"Verdian G, Tasca P, Paterson C, Mondelli G. Quant Overledger: Whitepaper v0.1. Technical Report. London, UK: UCL Discovery; 2018."},{"key":"ref38","unstructured":"Thorchain. [cited 2025 Jul 31]. Available from: https:\/\/thorchain.org\/."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/jrsm.1378","article-title":"Which academic search systems are suitable for systematic reviews or meta-analyses? Evaluating retrieval qualities of Google Scholar, PubMed, and 26 other resources","volume":"11","author":"Gusenbauer","year":"2020","journal-title":"Res Synth Methods"},{"key":"ref40","series-title":"2024 IEEE International Conference on Blockchain (Blockchain)","first-page":"464","article-title":"Comparative analysis of permissioned blockchains: cosmos, hyperledger fabric, quorum, and XRPL","author":"Correia","year":"2024"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"5050","DOI":"10.3390\/electronics13245050","article-title":"Unleashing the potential of permissioned blockchain: addressing privacy, security, and interoperability concerns in healthcare data management","volume":"13","author":"Hossain","year":"2024","journal-title":"Electronics"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1007\/s11365-020-00635-4","article-title":"The art of crafting a systematic literature review in entrepreneurship research","volume":"16","author":"Kraus","year":"2020","journal-title":"Int Entrep Manag J"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/3648607","article-title":"A brief history of blockchain interoperability","volume":"67","author":"Belchior","year":"2024","journal-title":"Commun ACM"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1007\/s11135-020-01059-6","article-title":"The ABC of systematic literature review: the basic methodological guidance for beginners","volume":"55","author":"Mohamed Shaffril","year":"2021","journal-title":"Qual Quant"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jclinepi.2019.10.011","article-title":"Excluding non-English publications from evidence-syntheses did not change conclusions: a meta-epidemiological study","volume":"118","author":"Nussbaumer-Streit","year":"2020","journal-title":"J Clin Epidemiol"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jbusres.2021.04.070","article-title":"How to conduct a bibliometric analysis: an overview and guidelines","volume":"133","author":"Donthu","year":"2021","journal-title":"J Bus Res"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"103632","DOI":"10.1016\/j.ijnurstu.2020.103632","article-title":"Abstraction and interpretation during the qualitative content analysis process","volume":"108","author":"Lindgren","year":"2020","journal-title":"Int J Nurs Stud"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.18637\/jss.v088.i02","article-title":"JASP: graphical statistical software for common statistical designs","volume":"88","author":"Love","year":"2019","journal-title":"J Stat Softw"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"813","DOI":"10.3758\/s13423-020-01798-5","article-title":"The JASP guidelines for conducting and reporting a Bayesian analysis","volume":"28","author":"van Doorn","year":"2021","journal-title":"Psychon Bull Rev"},{"key":"ref50","unstructured":"Pawczuk L, Walker R, Tanco CC. Deloitte\u2019s 2021 global blockchain survey: financial leaders see digital assets as the future. Deloitte Insights; 2021. [cited 2025 Jun 1]. Available from: https:\/\/www2.deloitte.com\/us\/en\/insights\/topics\/understanding-blockchain-potential\/global-blockchain-survey.html."},{"key":"ref51","unstructured":"Borasi P. Blockchain distributed ledger market expected to reach $137.29 billion by 2027. Allied Market Research 2021. [cited 2025 Jun 1]. Available from: https:\/\/www.alliedmarketresearch.com\/press-release\/blockchain-distributed-ledger-market.html#:~:text=According%20to%20a%20recent%20report,at%20%242.89%20billion%20in%202019%2C."},{"key":"ref52","series-title":"2024 IEEE Symposium on Security and Privacy (SP)","first-page":"3840","article-title":"SoK: security and privacy of blockchain interoperability","author":"Augusto","year":"2024"},{"key":"ref53","unstructured":"Ronin bridge. Chainlink CCIP. [cited 2025 Jun 1]. Available from: https:\/\/bridge.roninchain.com\/."},{"key":"ref54","unstructured":"Polybridge. Polynetwork. [cited 2025 Jun 1]. Available from: https:\/\/bridge.poly.network\/testnet."},{"key":"ref55","unstructured":"Binanc. BNB Chain. [cited 2025 Jun 1]. Available from: https:\/\/www.binance.org\/."},{"key":"ref56","unstructured":"Portal token bridge. Portal Wormhole. [cited 2025 Jun 1]. Available from: https:\/\/portalbridge.com\/."},{"key":"ref57","series-title":"IEEE INFOCOM 2021\u2014IEEE Conference on Computer Communications","first-page":"1","article-title":"Leveraging public-private blockchain interoperability for closed consortium interfacing","author":"Ghosh","year":"2021"},{"key":"ref58","first-page":"100030","article-title":"Atomic crosschain transactions for ethereum private sidechains","volume":"3","author":"Robinson","year":"2022","journal-title":"Blockchain: Res Appl"},{"key":"ref59","series-title":"2021 IEEE International Conference on Blockchain (Blockchain)","first-page":"150","article-title":"InterTrust: towards an efficient blockchain interoperability architecture with trusted services","author":"Wang","year":"2021"},{"key":"ref60","series-title":"2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing (CCGrid)","first-page":"568","article-title":"CrossLedger: a pioneer cross-chain asset transfer protocol","author":"Vishwakarma","year":"2023"},{"key":"ref61","series-title":"Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems","first-page":"35","article-title":"Cross hyperledger fabric transactions","author":"Bu","year":"2020"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"18282","DOI":"10.1109\/JIOT.2023.3279693","article-title":"An architecture that enables cross-chain interoperability for next-gen blockchain systems","volume":"10","author":"Darshan","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref63","series-title":"2023 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","first-page":"64","article-title":"Secure, efficient, and privacy-protecting one-to-many cross-chain shared data consistency audit","author":"Li","year":"2023"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"3465","DOI":"10.1109\/TIFS.2022.3209546","article-title":"Bool network: an open, distributed, secure cross-chain notary platform","volume":"17","author":"Yin","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"103834","DOI":"10.1016\/j.csi.2024.103834","article-title":"HT2REP: a fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE","volume":"89","author":"Li","year":"2024","journal-title":"Comput Stand Interfaces"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.future.2021.11.004","article-title":"Hermes: fault-tolerant middleware for blockchain interoperability","volume":"129","author":"Belchior","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.future.2021.11.029","article-title":"Practical AgentChain: a compatible cross-chain exchange system","volume":"130","author":"Hei","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"7988","DOI":"10.1016\/j.jksuci.2022.07.015","article-title":"DCIV: decentralized cross-chain data integrity verification with blockchain","volume":"34","author":"Jiang","year":"2022","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"2273","DOI":"10.1109\/TCC.2022.3196937","article-title":"BeDCV: blockchain-enabled decentralized consistency verification for cross-chain calculation","volume":"11","author":"Zhang","year":"2023","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref70","series-title":"2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","first-page":"61","article-title":"General purpose atomic crosschain transactions","author":"Robinson","year":"2021"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.ins.2021.09.040","article-title":"Atomic cross-chain settlement model for central banks digital currency","volume":"580","author":"Lee","year":"2021","journal-title":"Inf Sci"},{"key":"ref72","series-title":"2022 Fourth International Conference on Blockchain Computing and Applications (BCCA)","first-page":"143","article-title":"BxTB: cross-chain exchanges of bitcoins for all Bitcoin wrapped tokens","author":"Barbara","year":"2022"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"101897","DOI":"10.1016\/j.jksuci.2023.101897","article-title":"A secure dynamic cross-chain decentralized data consistency verification model","volume":"36","author":"Zhao","year":"2024","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1002\/cpe.7656","article-title":"MP-HTLC: enabling blockchain interoperability through a multiparty implementation of the hash time-lock contract","volume":"35","author":"Barb\u00e0ra","year":"2023","journal-title":"Concurr Comput"},{"key":"ref75","series-title":"2022 IEEE Crosschain Workshop (ICBC-CROSS)","first-page":"1","article-title":"Bridging sapling: private cross-chain transfers","author":"Sanchez","year":"2022"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.3390\/electronics12245010","article-title":"Cross-chain asset transaction method based on ring signature for identity privacy protection","volume":"12","author":"Zhang","year":"2023","journal-title":"Electronics"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDCF.302876","article-title":"A privacy protection scheme for cross-chain transactions based on group signature and relay chain","volume":"14","author":"Liang","year":"2022","journal-title":"Int J Digit Crime Forensics"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.jpdc.2022.07.008","article-title":"ZeroCross: a sidechain-based privacy-preserving cross-chain solution for Monero","volume":"169","author":"Li","year":"2022","journal-title":"J Parallel Distrib Comput"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-030-43725-1_3","author":"Kiayias","year":"2020","journal-title":"Financial cryptography and data security"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/3029039","article-title":"Improved method of blockchain cross-chain consensus algorithm based on weighted PBFT","volume":"2022","author":"Lei","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"101968","DOI":"10.1016\/j.jksuci.2024.101968","article-title":"A framework for efficient cross-chain token transfers in blockchain networks","volume":"36","author":"Guo","year":"2024","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref82","series-title":"2022 IEEE International Conference on Blockchain (Blockchain)","first-page":"61","article-title":"Analysis of Polkadot: architecture, internals, and contradictions","author":"Abbas","year":"2022"},{"key":"ref83","series-title":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","first-page":"606","article-title":"Cross-chain atomic swaps without time locks","author":"Dwivedi","year":"2023"},{"key":"ref84","series-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","first-page":"3003","article-title":"zkBridge","author":"Xie","year":"2022"},{"key":"ref85","series-title":"2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","first-page":"1","article-title":"Verilay: a verifiable proof of stake chain relay","author":"Westerkamp","year":"2022"},{"key":"ref86","series-title":"2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)","first-page":"414","article-title":"A solution to data accessibility across heterogeneous blockchains","author":"Wu","year":"2020"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1049\/blc2.12047","article-title":"ChainKeeper: a cross-chain scheme for governing the chain by chain","volume":"3","author":"Xu","year":"2023","journal-title":"IET Blockchain"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.1007\/s11280-021-00870-x","article-title":"XChange: a universal mechanism for asset exchange between permissioned blockchains","volume":"24","author":"de Vos","year":"2021","journal-title":"World Wide Web"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"102102","DOI":"10.1016\/j.sysarc.2021.102102","article-title":"AucSwap: a Vickrey auction modeled decentralized cross-blockchain asset transfer protocol","volume":"117","author":"Liu","year":"2021","journal-title":"J Syst Archit"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"6033","DOI":"10.3390\/s23136033","article-title":"A trusted reputation management scheme for cross-chain transactions","volume":"23","author":"Chen","year":"2023","journal-title":"Sensors"},{"key":"ref91","series-title":"2021 IEEE International Conference on Blockchain (Blockchain)","first-page":"160","article-title":"A voting-based blockchain interoperability oracle","author":"Sober","year":"2021"},{"key":"ref92","series-title":"2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom)","first-page":"86","article-title":"ARC: an asynchronous consensus and relay chain-based cross-chain solution to consortium blockchain","author":"Zhang","year":"2022"},{"key":"ref93","series-title":"2022 IEEE International Conference on Services Computing (SCC)","first-page":"152","article-title":"A Decentralized cross-chain service protocol based on notary schemes and hash-locking","author":"Sun","year":"2022"},{"key":"ref94","series-title":"2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC\/CIT\/DSCI\/SmartCNS)","first-page":"150","article-title":"Cross-chain jamming attack with light client verification clash in IBC protocol","author":"Zhang","year":"2022"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1016\/j.dcan.2022.04.012","article-title":"A notary group-based cross-chain mechanism","volume":"8","author":"Xiong","year":"2022","journal-title":"Digit Commun Netw"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"e28861","DOI":"10.1016\/j.heliyon.2024.e28861","article-title":"Secure cross-chain interaction solution in multi-blockchain environment","volume":"10","author":"Cheng","year":"2024","journal-title":"Heliyon"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"155014772110599","DOI":"10.1177\/15501477211059945","article-title":"Attack and protection schemes on fabric isomorphic crosschain systems","volume":"18","author":"Lv","year":"2022","journal-title":"Int J Distrib Sens Netw"},{"key":"ref98","article-title":"A Cross-chain mechanism based on hierarchically managed notary group","volume":"16","author":"Tian","year":"2025","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3390\/info16010027","article-title":"Cross-chain identity authentication method based on relay chain","volume":"16","author":"Huang","year":"2025","journal-title":"Information"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/TC.2025.3535830","article-title":"DataFly: a confidentiality-preserving data migration across heterogeneous blockchains","volume":"74","author":"Li","year":"2025","journal-title":"IEEE Trans Comput"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"104004","DOI":"10.1016\/j.ipm.2024.104004","article-title":"GAM: a scalable and efficient multi-chain data sharing scheme","volume":"62","author":"Wu","year":"2025","journal-title":"Inf Process Manag"},{"key":"ref102","first-page":"1","article-title":"IvyCross: a privacy-preserving and concurrency control framework for blockchain interoperability","author":"Li","year":"2015","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref103","first-page":"1","article-title":"Towards efficient consistency auditing of dynamic data in cross-chain interaction","volume":"2025","author":"Jiang","year":"2025","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.comcom.2024.05.012","article-title":"A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem","volume":"223","author":"Si","year":"2024","journal-title":"Comput Commun"},{"key":"ref105","series-title":"2024 2nd International Conference on Big Data and Privacy Computing (BDPC)","first-page":"82","article-title":"A technique for ensured cross chain IBC transactions using TPM","author":"Wang","year":"2024"},{"key":"ref106","series-title":"2024 IEEE International Conference on Blockchain (Blockchain)","first-page":"611","article-title":"Automated gateways: a smart contract-powered solution for interoperability across blockchains","author":"Khorasani","year":"2024"},{"key":"ref107","series-title":"2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC)","first-page":"265","article-title":"Cross-chain transaction tracking protocol based on multi-dimensional digital watermarking fingerprints","author":"Li","year":"2024"},{"key":"ref108","series-title":"2024 43rd International Symposium on Reliable Distributed Systems (SRDS)","first-page":"248","article-title":"Enabling complete atomicity for cross-chain applications through layered state commitments","author":"Cai","year":"2024"},{"key":"ref109","series-title":"2024 IEEE\/CIC International Conference on Communications in China (ICCC Workshops)","first-page":"214","article-title":"Enabling trustable financing: a verifiable privacy-preserving cross-chain protocol","author":"Lou","year":"2024"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.3390\/math12162562","article-title":"SMPTC3: secure multi-party protocol based trusted cross-chain contracts","volume":"12","author":"Mao","year":"2024","journal-title":"Mathematics"},{"key":"ref111","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.23919\/cje.2023.00.004","article-title":"XPull: a relay-based blockchain intercommunication framework achieving cross-chain state pulling","volume":"33","author":"Liang","year":"2024","journal-title":"Chin J Electron"},{"key":"ref112","series-title":"Proceedings of the 33rd USENIX Conference on Security Symposium","first-page":"6219","article-title":"zkCross: a novel architecture for cross-chain privacy-preserving auditing","author":"Guo","year":"2024"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"227945","DOI":"10.1109\/ACCESS.2020.3046025","article-title":"Non-interactive zero-knowledge for blockchain: a survey","volume":"8","author":"Partala","year":"2020","journal-title":"IEEE Access"},{"key":"ref114","series-title":"Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science","first-page":"124","article-title":"Algorithms for quantum computation: discrete logarithms and factoring","author":"Shor","year":"1994"},{"key":"ref115","series-title":"Proceedings of the Annual ACM Symposium on Theory of Computing","first-page":"212","article-title":"A fast quantum mechanical algorithm for database search","author":"Grover","year":"1996"},{"key":"ref116","doi-asserted-by":"crossref","first-page":"41382","DOI":"10.1109\/ACCESS.2025.3545943","article-title":"PP-PQB: privacy-preserving in post-quantum blockchain-based systems: a systematization of knowledge","volume":"13","author":"Bugra Sezer","year":"2025","journal-title":"IEEE Access"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MITP.2020.2974690","article-title":"Quantum pliers cutting the blockchain","volume":"22","author":"Giusto","year":"2020","journal-title":"IT Prof"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"238","DOI":"10.46586\/tches.v2018.i1.238-268","article-title":"Crystals-dilithium: a lattice-based digital signature scheme","volume":"2018","author":"Ducas","year":"2018","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref119","series-title":"2018 IEEE European Symposium on Security and Privacy (Euro S & P)","first-page":"353","article-title":"CRYSTALS -Kyber: a CCA-secure module-lattice-based KEM","author":"Bos","year":"2018"},{"key":"ref120","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","first-page":"2129","article-title":"The SpHiNCS+ signature framework","author":"Bernstein","year":"2019"},{"key":"ref121","doi-asserted-by":"crossref","first-page":"164556","DOI":"10.1109\/ACCESS.2020.3021502","article-title":"Model-based software design and testing in blockchain smart contracts: a systematic literature review","volume":"8","author":"Sanchez-Gomez","year":"2020","journal-title":"IEEE Access"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.dcan.2023.07.008","article-title":"Technologies of blockchain interoperability: a survey","volume":"11","author":"Yuan","year":"2025","journal-title":"Digit Commun Netw"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3471140","article-title":"A survey on blockchain interoperability: past, present, and future trends","volume":"54","author":"Belchior","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"174","DOI":"10.3390\/bdcc8120174","article-title":"Exploring IoT and blockchain: a comprehensive survey on security, integration strategies, applications and future research directions","volume":"8","author":"Obaidat","year":"2024","journal-title":"Big Data Cogn Comput"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"187","DOI":"10.58496\/MJCS\/2025\/013","article-title":"Internet of things for smart building security: leveraging a blockchain for enhanced IoT security","volume":"5","author":"Al Karkouri","year":"2025","journal-title":"Mesop J CyberSecur"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"5660","DOI":"10.3390\/su15075660","article-title":"An overview of blockchain and IoT integration for secure and reliable health records monitoring","volume":"15","author":"Alam","year":"2023","journal-title":"Sustainability"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"16002","DOI":"10.3390\/su142316002","article-title":"Integrating blockchain with artificial intelligence to secure IoT networks: future trends","volume":"14","author":"Alharbi","year":"2022","journal-title":"Sustainability"},{"key":"ref128","first-page":"1","article-title":"IoT-driven skin cancer detection: active learning and hyperparameter optimization for enhanced accuracy","volume":"2025","author":"Yang","year":"2025","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"5362","DOI":"10.3390\/su15065362","article-title":"Artificial intelligence-enabled game-based learning and quality of experience: a novel and secure framework (B-AIQoE)","volume":"15","author":"Wagan","year":"2023","journal-title":"Sustainability"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"100685","DOI":"10.1016\/j.cosrev.2024.100685","article-title":"Unleashing the prospective of blockchain-federated learning fusion for IoT security: a comprehensive review","volume":"54","author":"Gupta","year":"2024","journal-title":"Comput Sci Rev"},{"key":"ref131","first-page":"2899","article-title":"Interoperability of blockchain technology in 5G enabled IoT","volume":"9","author":"Abhang","year":"2021","journal-title":"Int J Creat Res Thoughts"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_70413\/TSP_CMC_70413.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:35Z","timestamp":1764826535000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":131,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.070413","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}