Tech »  Topic »  How Cross-Chain Transfer Protocols Ensure Safe and Smooth Transactions

How Cross-Chain Transfer Protocols Ensure Safe and Smooth Transactions


How Cross-Chain Transfer Protocols Ensure Safe and Smooth Transactions by @escholar

The paper outlines key proofs for a transfer protocol in cross-chain transactions, demonstrating liveness, safety, and isolation. It highlights how holder and writer positions can be transferred securely and concurrently without interference.

Table of Links

A. Codes

B. Proofs

B.1 Transfer Protocol Proofs

Lemma 9. The holder transfer procedure of Protocol 4.2.1 does not require Bob’s participation.

Proof. It is evident that, Alice does not own the exercise secret, holder’s transfer is required to replace the holder address and transfer public key, and the inconsistency of two chains will not harm the interest of Bob. According to the Protocol 4.1, Bob cannot use the transfer private key of Alice, i.e. 𝑠𝑘𝐴 to claim assets. Therefore, during the reveal phase and consistency phase, Bob is not required to participate and not allowed to ...


Copyright of this story solely belongs to hackernoon.com . To see the full text click HERE