[1] Morrison R, Mazey N C H L, Wingreen S C. The DAO controversy: the case for a new species of corporate governance? [J]. Frontiers in Blockchain, 2020, 3: 24-25. [2] 田海博, 叶婉. 跨链数字资产风险管理策略及分析[J]. 计算机科学与探索, 2023, 17(9): 2219-2228. Tian H B, Ye W. Risk management policies and analysis of cross-chain digital assets [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(9): 2219-2228. (in Chinese) [3] Poon J, Dryja T. The bitcoin lightning network: scalable off-chain instant payments [EB/OL]. [2024-12-31]. https://lightning.network/lightning-network-paper.pdf. [4] Casey C M, Kartaltepe J S, Drakos N E, et al. COSMOS-Web: an overview of the JWST cosmic origins survey [J]. Astrophysical Journal, 2023, 954(1): 31. [5] Abbas H, Caprolu M, Di Pietro R. Analysis of Polkadot: architecture, internals, and contradictions [C]//5th IEEE International Conference on Blockchain, 2022: 61-70. [6] Zhu S, Chi C, Liu Y. A study on the challenges and solutions of blockchain interoperability [J]. China Communications, 2023, 20(6): 148-165. [7] Zabka P, Foerster K T, Schmid S, et al. Empirical evaluation of nodes and channels of the lightning network [J]. Pervasive and Mobile Computing, 2022, 83: 101584. [8] Yin L Y, Xu J, Tang Q. Sidechains with fast cross-chain transfers [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(6): 3925-3940. [9] Westerkamp M, Eberhardt J. zkRelay: facilitating sidechains using zkSNARK-based chainrelays [C]//5th IEEE European Symposium on Security and Privacy, 2020: 378-386. [10] Wpillai B, Biswas K, Hóu Z, et al. The burn-to-claim cross-blockchain asset transfer protocol [C]//25th International Conference on Engineering of Complex Computer Systems (ICECCS), 2020: 119-124. [11] Manevich Y, Akavia A. Cross chain atomic swaps in the absence of time via attribute verifiable timed commitments [C]//7th IEEE European Symposium on Security and Privacy, 2022: 606-625. [12] Malavolta G, Moreno-Sanchez P, Kate A, et al. Concurrency and privacy with paymentchannel networks [C]//24th ACM-SIGSAC Conference on Computer and Communications Security, 2017: 455-471. [13] Nadahalli T, Khabbazian M, Wattenhofer R. Grief-free atomic swaps [C]//4th IEEE International Conference on Blockchain and Cryptocurrency, 2022: 1-9. [14] 康博涵, 章宁, 朱建明. 基于区块链的智能服务交易跨链服务框架与通信机制[J]. 网络与信息安全学报, 2021, 7(3): 105-114. Kang B H, Zhang N, Zhu J M. Research on inter-blockchain service framework and communication mechanism based on smart service transaction [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 105-114. (in Chinese) [15] Zhang S B, Xie T X, Gai K K, et al. ARC: an asynchronous consensus and relay chain-based cross-chain solution to consortium blockchain [J]//9th IEEE International Conference on Cyber Security and Cloud Computing/8th IEEE International Conference on Edge Computing and Scalable Cloud, 2022: 86-92. [16] Tian H Y, Xue K P, Luo X Y, et al. Enabling cross-chain transactions: a decentralized cryptocurrency exchange protocol [J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 3928-3941. [17] Lin S F, Kong Y H, Nie S T. Overview of block chain cross chain technology [C]//13th International Conference on Measuring Technology and Mechatronics Automation, 2021: 357- 360. [18] Xiong A P, Liu G H, Zhu Q Y, et al. A notary group-based cross-chain mechanism [J]. Digital Communications and Networks, 2022, 8(6): 1059-1067. [19] Cao L F, Zhao S C, Gao Z S, et al. Cross-chain data traceability mechanism for cross-domain access [J]. The Journal of Supercomputing, 2023, 79(5): 4944-4961. [20] Hejazi-Sepehr S, Kitsis R, Sharif A. Transwarp conduit: interoperable blockchain application framework [DB/OL]. (2019-06-07) [2024-12-31]. https://arxiv.org/abs/1906.03256. [21] 闫树, 吕艾临. 隐私计算发展综述[J]. 信息通信技术与政策, 2021, 47(6): 1-11. Yan S, Lyu A L. Overview of the development of privacy preserving computing [J]. Information and Communications Technology and Policy, 2021, 47(6): 1-11. (in Chinese) [22] Wu Z H, Xiao Y, Zhou E Y, et al. A solution to data accessibility across heterogeneous blockchains [C]//26th IEEE International Conference on Parallel and Distributed Systems, 2020: 414-421. [23] Zamyatin A, Harz, D, Lind J, et al. XCLAIM: trustless, interoperable, cryptocurrency-backed assets [C]//40th IEEE Symposium on Security and Privacy, 2019: 193-210. [24] 蒋楚钰, 方李西, 朱建明. 基于PageRank改进的公证人节点信用排序算法[J]. 信息安全研究, 2022, 8(1): 9-18. Jiang C Y, Fang L X, Zhu J M. A credit ranking method of notary mechanism based on improved PageRank algorithm [J]. Journal of Information Security Research, 2022, 8(1): 9-18. (in Chinese) [25] Chen L F, Yao Z H, Si X M, et al. Three-stage cross-chain protocol based on notary group [J]. Electronics, 2023, 12(13): 2804. [26] Hei Y M, Li D W, Zhang C, et al. Practical AgentChain: a compatible cross-chain exchange system [J]. Future Generation Computer Systems, 2022, 130: 207-218. |