Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigati...Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigating M_(2)N_(2)(M=Nb,Ta)with DLHC structure using first-principles calculations.Our results show that M_(2)N_(2)are stable and metallic,exhibiting superconducting behavior.Specifically,Nb_(2)N_(2)and Ta_(2)N_(2)display superconducting transition temperatures of 6.8 K and 8.8 K,respectively.Their electron-phonon coupling is predominantly driven by the coupling between metal d-orbitals and low-frequency metal-dominated vibration modes.Interestingly,two compounds also exhibit non-trivial band topology.Thus,M_(2)N_(2)are promising platforms for studying the interplay between topology and superconductivity and fill the gap in superconductivity research for DLHC materials.展开更多
This paper proposes a type of double-layer charge liner fabricated using chemical vapor deposition(CVD)that has tungsten as its inner liner.The feasibility of this design was evaluated through penetration tests.Double...This paper proposes a type of double-layer charge liner fabricated using chemical vapor deposition(CVD)that has tungsten as its inner liner.The feasibility of this design was evaluated through penetration tests.Double-layer charge liners were fabricated by using CVD to deposit tungsten layers on the inner surfaces of pure T2 copper liners.The microstructures of the tungsten layers were analyzed using a scanning electron microscope(SEM).The feasibility analysis was carried out by pulsed X-rays,slug-retrieval test and static penetration tests.The shaped charge jet forming and penetration law of inner tungsten-coated double-layer liner were studied by numerical simulation method.The results showed that the double-layer liners could form well-shaped jets.The errors between the X-ray test results and the numerical results were within 11.07%.A slug-retrieval test was found that the retrieved slug was similar to a numerically simulated slug.Compared with the traditional pure copper shaped charge jet,the penetration depth of the double-layer shaped charge liner increased by 11.4% and>10.8% respectively.In summary,the test results are good,and the numerical simulation is in good agreement with the test,which verified the feasibility of using the CVD method to fabricate double-layer charge liners with a high-density and high-strength refractory metal as the inner liner.展开更多
The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petrolife...The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petroliferous sedimentary basin in China because of its continual annual oil and gas equivalent production of tens of millions of tons(ca.220–440 million barrels per year)since 1959.The SLB was previously thought to have developed on Hercynian basement and accumulated continuous sedimentary deposits during the Late Jurassic and Cretaceous(Wan et al.,2013;Wang et al.,2016).展开更多
The high specific capacity and low negative electrochemical potential of lithium metal anodes(LMAs),may allow the energy density threshold of Li metal batteries(LMBs)to be pushed higher.However,the existing detrimenta...The high specific capacity and low negative electrochemical potential of lithium metal anodes(LMAs),may allow the energy density threshold of Li metal batteries(LMBs)to be pushed higher.However,the existing detrimental issues,such as dendritic growth and volume expansion,have hindered the practical implementation of LMBs.Introducing three-dimensional frameworks(e.g.,copper and nickel foam),have been regarded as one of the fundamental strategies to reduce the local current density,aiming to extend the Sand'time.Nevertheless,the local environment far from the skeleton is almost the same as the typical plane Li,due to macroporous space of metal foam.Herein,we built a double-layered 3D current collector of Li alloy anchored on the metal foam,with micropores interconnected macropores,via a viable thermal infiltration and cooling strategy.Due to the excellent electronic and ionic conductivity coupled with favorable lithiophilicity,the Li alloy can effectively reduce the nucleation barrier and enhance the Li^(+)transportation rate,while the metal foam can role as the primary promotor to enlarge the surface area and buffer the dimensional variation.Synergistically,the Li composite anode with hierarchical structure of primary and secondary scaffolds realized the even deposition behavior and minimum volume expansion,outputting preeminent prolonged cycling performances under high rate.展开更多
Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material co...Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material combining the solvent evaporation method and spray drying method.The protection by the outer capsule wall was used to prolong the service life of the corrosion inhibitor.The dispersion,encapsulation,thermal stability of microcapsules,and the degradation rate of capsule wall in concrete pore solution were analyzed by ultra-deep field microscopy,scanning electron microscopy,thermal analyzer,and sodium ion release rate analysis.The microcapsules were incorporated into mortar samples containing steel reinforcement,and the effects of double-layered microcapsule corrosion inhibitors on the performance of the cement matrix and the actual corrosion-inhibiting effect were analyzed.The experimental results show that the double-layered microcapsules have a moderate particle size and uniform distribution,and the capsules were completely wrapped.The microcapsules as a whole have good thermal stability below 230 ℃.The monolayer membrane structure microcapsules completely broke within 1 day in the simulated concrete pore solution,and the double-layer membrane structure prolonged the service life of the microcapsules to 80 days in the simulated concrete pore solution before the core material was completely released.The mortar samples containing steel reinforcement incorporated with the double-layered microcapsule corrosion inhibitors still maintained a higher corrosion potential than the monolayer microcapsule corrosion inhibitors control group at 60 days.The incorporation of double-layered microcapsules into the cement matrix has no significant adverse effect on the setting time and early strength.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of...Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications.展开更多
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu...Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili...The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.展开更多
Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this...Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this paper is to explore the potential applications of blockchain in supporting the achievement of these sustainability goals.Starting from a review of the relevant literature on this topic,the main fields in which blockchain can contribute to sustainable development will be identified.The main blockchain applications will then be analyzed and categorized according to these SDGs.This research will then critically present the main blockchain-based projects that emerged in the first stage of the study and were implemented by the United Nations.The main objectives and benefits of each project will be analyzed.This is where the originality of this paper lies.To the best of the author’s knowledge,this is one of the first attempts to present a comprehensive overview of the United Nations’projects related to SDGs 1,2,5,7,9,13,and 16.This paper,which bridges the gap between innovation management and the sustainability field,will contribute to the increasingly current debate on sustainability issues and be beneficial to scholars,practitioners,and policymakers alike.展开更多
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac...Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.展开更多
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a block...The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises.展开更多
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an...This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.展开更多
The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as...The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems.展开更多
Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a part...Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a particular concern.Nevertheless,there is a research gap that prevailing solutions focus primarily on data security using blockchain but ignore computational security,making the traditional ML process vulnerable to off-chain risks.Therefore,the research objective is to develop a novel ML on blockchain(MLOB)framework to ensure both the data and computational process security.The central tenet is to place them both on the blockchain,execute them as blockchain smart contracts,and protect the execution records on-chain.The framework is established by developing a prototype and further calibrated using a case study of industrial inspection.It is shown that the MLOB framework,compared with existing ML and BT isolated solutions,is superior in terms of security(successfully defending against corruption on six designed attack scenario),maintaining accuracy(0.01%difference with baseline),albeit with a slightly compromised efficiency(0.231 second latency increased).The key finding is MLOB can significantly enhances the computational security of engineering computing without increasing computing power demands.This finding can alleviate concerns regarding the computational resource requirements of ML-BT integration.With proper adaption,the MLOB framework can inform various novel solutions to achieve computational security in broader engineering challenges.展开更多
Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 ...Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain performance.However,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based SCF.To address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning algorithm.The proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF environment.Furthermore,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF scenarios.To evaluate the proposed framework,we conducted extensive experiments in a typical SCF scenario.The obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems.展开更多
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl...The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.展开更多
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in...As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality.展开更多
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst...Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12074213 and 11574108)the National Key R&D Program of China(Grant No.2022YFA1403103)+2 种基金the Major Basic Program of Natural Science Foundation of Shandong Province(Grant No.ZR2021ZD01)the Natural Science Foundation of Shandong Province(Grant No.ZR2023MA082)the Project of Introduction and Cultivation for Young Innovative Talents in Colleges and Universities of Shandong Province。
文摘Two-dimensional double-layer honeycomb(DLHC)materials are known for their diverse physical properties,but superconductivity has been a notably absent characteristic in this structure.We address this gap by investigating M_(2)N_(2)(M=Nb,Ta)with DLHC structure using first-principles calculations.Our results show that M_(2)N_(2)are stable and metallic,exhibiting superconducting behavior.Specifically,Nb_(2)N_(2)and Ta_(2)N_(2)display superconducting transition temperatures of 6.8 K and 8.8 K,respectively.Their electron-phonon coupling is predominantly driven by the coupling between metal d-orbitals and low-frequency metal-dominated vibration modes.Interestingly,two compounds also exhibit non-trivial band topology.Thus,M_(2)N_(2)are promising platforms for studying the interplay between topology and superconductivity and fill the gap in superconductivity research for DLHC materials.
基金funded by the China Postdoctoral Science Foundation(Grant No.2022M721614)the opening project of State Key Laboratory of Explosion Science and Technology,Beijing Institute of Technology(Grant No.KFJJ23-07M)。
文摘This paper proposes a type of double-layer charge liner fabricated using chemical vapor deposition(CVD)that has tungsten as its inner liner.The feasibility of this design was evaluated through penetration tests.Double-layer charge liners were fabricated by using CVD to deposit tungsten layers on the inner surfaces of pure T2 copper liners.The microstructures of the tungsten layers were analyzed using a scanning electron microscope(SEM).The feasibility analysis was carried out by pulsed X-rays,slug-retrieval test and static penetration tests.The shaped charge jet forming and penetration law of inner tungsten-coated double-layer liner were studied by numerical simulation method.The results showed that the double-layer liners could form well-shaped jets.The errors between the X-ray test results and the numerical results were within 11.07%.A slug-retrieval test was found that the retrieved slug was similar to a numerically simulated slug.Compared with the traditional pure copper shaped charge jet,the penetration depth of the double-layer shaped charge liner increased by 11.4% and>10.8% respectively.In summary,the test results are good,and the numerical simulation is in good agreement with the test,which verified the feasibility of using the CVD method to fabricate double-layer charge liners with a high-density and high-strength refractory metal as the inner liner.
基金supports from the International Continental Scientific Drilling Programfunded by the National Natural Science Foundation of China(Grant Nos.41790453,41472304,42102129,42102135 and 41972313)+2 种基金Natural Science Foundation of Jilin Province(Grant No.20170101001JC)the National Key Research&Development Program of China(Grant No.2019YFC0605402)China Geological Survey(Grant No.DD20189702)。
文摘The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petroliferous sedimentary basin in China because of its continual annual oil and gas equivalent production of tens of millions of tons(ca.220–440 million barrels per year)since 1959.The SLB was previously thought to have developed on Hercynian basement and accumulated continuous sedimentary deposits during the Late Jurassic and Cretaceous(Wan et al.,2013;Wang et al.,2016).
基金supported by Huzhou Natural Science Foundation Project(Nos.2022YZ04 and 2022YZ21)S&T Special Program of Huzhou(No.2023GZ03)National Natural Science Foundation of China(No.52172184)。
文摘The high specific capacity and low negative electrochemical potential of lithium metal anodes(LMAs),may allow the energy density threshold of Li metal batteries(LMBs)to be pushed higher.However,the existing detrimental issues,such as dendritic growth and volume expansion,have hindered the practical implementation of LMBs.Introducing three-dimensional frameworks(e.g.,copper and nickel foam),have been regarded as one of the fundamental strategies to reduce the local current density,aiming to extend the Sand'time.Nevertheless,the local environment far from the skeleton is almost the same as the typical plane Li,due to macroporous space of metal foam.Herein,we built a double-layered 3D current collector of Li alloy anchored on the metal foam,with micropores interconnected macropores,via a viable thermal infiltration and cooling strategy.Due to the excellent electronic and ionic conductivity coupled with favorable lithiophilicity,the Li alloy can effectively reduce the nucleation barrier and enhance the Li^(+)transportation rate,while the metal foam can role as the primary promotor to enlarge the surface area and buffer the dimensional variation.Synergistically,the Li composite anode with hierarchical structure of primary and secondary scaffolds realized the even deposition behavior and minimum volume expansion,outputting preeminent prolonged cycling performances under high rate.
基金Fund by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China (No.2018YFD1101002-03)。
文摘Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material combining the solvent evaporation method and spray drying method.The protection by the outer capsule wall was used to prolong the service life of the corrosion inhibitor.The dispersion,encapsulation,thermal stability of microcapsules,and the degradation rate of capsule wall in concrete pore solution were analyzed by ultra-deep field microscopy,scanning electron microscopy,thermal analyzer,and sodium ion release rate analysis.The microcapsules were incorporated into mortar samples containing steel reinforcement,and the effects of double-layered microcapsule corrosion inhibitors on the performance of the cement matrix and the actual corrosion-inhibiting effect were analyzed.The experimental results show that the double-layered microcapsules have a moderate particle size and uniform distribution,and the capsules were completely wrapped.The microcapsules as a whole have good thermal stability below 230 ℃.The monolayer membrane structure microcapsules completely broke within 1 day in the simulated concrete pore solution,and the double-layer membrane structure prolonged the service life of the microcapsules to 80 days in the simulated concrete pore solution before the core material was completely released.The mortar samples containing steel reinforcement incorporated with the double-layered microcapsule corrosion inhibitors still maintained a higher corrosion potential than the monolayer microcapsule corrosion inhibitors control group at 60 days.The incorporation of double-layered microcapsules into the cement matrix has no significant adverse effect on the setting time and early strength.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.
文摘Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications.
基金supported by the National Key R&D Program of China(2022YFB2701500)the National Natural Science Foundation of China(62272385,62311540156)+2 种基金Shaanxi Distinguished Youth Project(2022JC-47)the Key Research and Development Program of Shaanxi(2021ZDLGY06-04)Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research(ZR2022ZD03).
文摘Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.
文摘The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.
文摘Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this paper is to explore the potential applications of blockchain in supporting the achievement of these sustainability goals.Starting from a review of the relevant literature on this topic,the main fields in which blockchain can contribute to sustainable development will be identified.The main blockchain applications will then be analyzed and categorized according to these SDGs.This research will then critically present the main blockchain-based projects that emerged in the first stage of the study and were implemented by the United Nations.The main objectives and benefits of each project will be analyzed.This is where the originality of this paper lies.To the best of the author’s knowledge,this is one of the first attempts to present a comprehensive overview of the United Nations’projects related to SDGs 1,2,5,7,9,13,and 16.This paper,which bridges the gap between innovation management and the sustainability field,will contribute to the increasingly current debate on sustainability issues and be beneficial to scholars,practitioners,and policymakers alike.
文摘Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.
基金supported in part by the National Natural Science Foundation of China(62273310)the Natural Science Foundation of Zhejiang Province of China(LY22F030006,LZ24F030009)
文摘The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises.
文摘This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.
基金funded by the University of Macao(file no.MYRG2022-00162-FST and MYRG2019-00136-FST).
文摘The rapid growth of blockchain and Decentralized Finance(DeFi)has introduced new challenges and vulnerabilities that threaten the integrity and efficiency of the ecosystem.This study identifies critical issues such as Transaction Order Dependence(TOD),Blockchain Extractable Value(BEV),and Transaction Importance Diversity(TID),which collectively undermine the fairness and security of DeFi systems.BEV-related activities,including sandwich attacks,liquidations,transaction replay etc.have emerged as significant threats,collectively generating$540.54 million in losses over 32 months across 11,289 addresses,involving 49,691 cryptocurrencies and 60,830 on-chain markets.These attacks exploit transaction mechanics to manipulate asset prices and extract value at the expense of other participants,with sandwich attacks being particularly impactful.Additionally,the growing adoption of blockchain in traditional finance highlights the challenge of TID,wherein high transaction volumes can strain systems and compromise time-sensitive operations.To address these pressing issues,we propose a novel Distributed Transaction Sequencing Strategy(DTSS)that integrates forking mechanisms with an Analytic Hierarchy Process(AHP)to enforce fair and transparent transaction ordering in a decentralized manner.Our approach is further enhanced by an optimization framework and the introduction of a Normalized Allocation Disparity Metric(NADM)that ensures optimal parameter selection for transaction prioritization.Experimental evaluations demonstrated that the DTSS effectively mitigated BEV risks,enhanced transaction fairness,and significantly improved the security and transparency of DeFi ecosystems.
文摘Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a particular concern.Nevertheless,there is a research gap that prevailing solutions focus primarily on data security using blockchain but ignore computational security,making the traditional ML process vulnerable to off-chain risks.Therefore,the research objective is to develop a novel ML on blockchain(MLOB)framework to ensure both the data and computational process security.The central tenet is to place them both on the blockchain,execute them as blockchain smart contracts,and protect the execution records on-chain.The framework is established by developing a prototype and further calibrated using a case study of industrial inspection.It is shown that the MLOB framework,compared with existing ML and BT isolated solutions,is superior in terms of security(successfully defending against corruption on six designed attack scenario),maintaining accuracy(0.01%difference with baseline),albeit with a slightly compromised efficiency(0.231 second latency increased).The key finding is MLOB can significantly enhances the computational security of engineering computing without increasing computing power demands.This finding can alleviate concerns regarding the computational resource requirements of ML-BT integration.With proper adaption,the MLOB framework can inform various novel solutions to achieve computational security in broader engineering challenges.
基金supported by the National Key Research and Development Program of China (2022YFC3302300)National Natural Science Foundation of China under Grant (No.61873309,No.92046024,No.92146002)Shanghai Science and Technology Project under Grant (No.22510761000)。
文摘Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain performance.However,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based SCF.To address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning algorithm.The proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF environment.Furthermore,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF scenarios.To evaluate the proposed framework,we conducted extensive experiments in a typical SCF scenario.The obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems.
文摘The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.
基金supported by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology and Natural Science Foundation of Shandong Province,China(Grant no.ZR202111230202).
文摘As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality.
基金supported by the International Scientific and Technological Cooperation Project of Huangpu and Development Districts in Guangzhou(2023GH17)the National Science and Technology Council in Taiwan under grant number NSTC-113-2224-E-027-001,Private Funding(PV009-2023)the KW IPPP(Research Maintenance Fee)Individual/Centre/Group(RMF1506-2021)at Universiti Malaya,Malaysia.
文摘Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.