1. Introduction
Geological information, serving as fundamental data for natural resource surveys, energy exploration, and mineral development [
1,
2], directly influences industrial progress due to its authenticity and security. With the progress of geological information digitization, geological institutions and research institutes at various levels have accumulated massive data resources [
3]. However, these data are distributed and stored in different bureaus or business systems, lacking effective collaboration mechanisms and serious data silos. Traditional cloud-based geological data sharing platforms rely on a centralized trust model, where a single service provider controls the storage, access management, and logging mechanisms. Even if cloud data is encrypted, this centralized architecture still creates a single point of failure and an attractive target for attacks or internal misuse. In addition, conventional authorization mechanisms typically grant users full data access once permission is issued, resulting in coarse-grained control and potential privacy exposure, especially in multi-organization geological data sharing.
Blockchain establishes a new trust foundation for geological data sharing [
4]. Its decentralization and immutability enable multiple parties to achieve data sharing without relying on central authorities. Current research has attempted to apply blockchain to geological information management and research outcomes sharing scenarios, achieving data authorization and sharing through smart contracts [
5]. However, the differences in trust models, access policies, and privacy-preserving mechanisms among different geological blockchain systems (such as scientific research chains, provincial bureau chains, and industry chains) pose challenges for data sharing among multiple blockchains.
Currently, some mainstream cross-chain schemes have been proposed [
6,
7,
8,
9], such as sidechain [
10,
11], notary mechanism [
12,
13], hash-locking [
14,
15], and relay chain [
16]. These schemes achieve cross-chain collaboration by connecting independent blockchain networks, thereby alleviating the issues of single-chain performance and business interaction [
17,
18]. BitXHub [
19], a cross-chain solution based on sidechain, supports asset transfer and information sharing across different blockchains. However, cross-chain data sharing requires exposing the data to all participants, which can lead to data privacy issues [
20,
21]. Wecross [
22] proposed a simple and secure cross-chain scheme that adopts a gateway-like cross-chain architecture to enable interoperability. The gateway model still suffers from the drawbacks of centralized control [
23], and the routing proxy node can access detailed information about cross-chain transactions, making its credibility a vulnerability that affects cross-chain security [
24]. Therefore, most existing cross-chain solutions overlook the requirement for privacy protection and face the issue of sensitive data exposure [
25,
26], which may hinder business collaboration between multiple blockchains.
Since geological data involves national secrets, data privacy protection has become a key challenge in data sharing among multiple geological blockchains. On the one hand, the absence of a unified access control and authorization mechanism makes cross-chain data sharing subject to unauthorized access. On the other hand, the process of cross-chain data sharing may expose geological data and pose a risk of privacy leakage [
27]. In addition, the proxy node that cross-chain communication relies on still faces issues such as trust opacity and unfair elections [
28], making it difficult to ensure the security and reliability of data sharing.
In this work, to tackle the aforementioned issues, we propose GeoCross, a cross-chain geological data sharing scheme that enables fine-grained authorization and privacy protection. In contrast, GeoCross introduces zero-knowledge proofs (ZKP) based on Groth16, aiming to achieve privacy protection for cross-chain data. Furthermore, existing attribute-based encryption schemes are typically only applicable within a single governance domain and cannot directly handle cross-domain authorization needs between independent blockchains. Although some improved attribute-based encryption methods optimize performance, they still do not consider fine-grained authorization management for cross-chain access. GeoCross’s proposed hierarchical hybrid encryption mechanism decouples data encryption from authorization strategies, making it more suitable for cross-institutional and cross-chain data sharing environments. Moreover, existing cross-chain routing mechanisms generally employ fixed proxies or probabilistic selection strategies based on PoW/PoS, making them vulnerable to centralized, manipulated, or coordinated attacks. RNRS incorporates reputation values and verifiable random function (VRF) to achieve non-interactive agent election, improving the robustness and fairness of cross-chain routing. First, aiming at the complexities of cross-chain access authorization and the resulting privacy leakage, we propose a hierarchical access control mechanism for cross-chain geological data sharing. The hierarchical mechanism employs symmetric encryption (SE) at the data layer to secure data storage and sharing, and ciphertext-policy attribute-based encryption (CP-ABE) at the authorization layer to enable fine-grained management of cross-chain data access credentials, which effectively separates and coordinates data privacy protection and access policy control. Second, to balance trustworthiness and privacy protection during cross-chain data sharing, this paper proposes a cross-chain data verifiable mechanism based on ZKP. By constructing the Groth16 proof circuit [
29], the owner chain can prove the existence, correctness, and accessibility of the data to the requester chain without revealing the plaintext data, thereby verifying the legitimacy of data before cross-chain interaction. This mechanism achieves “verifiable but invisible” privacy protection in cross-chain sharing, reducing the risk of privacy leakage and unnecessary communication overhead. Finally, to address the trust issues in cross-chain data sharing, this paper proposes RNRS. By combining node reputation with a random timer generation strategy, this mechanism autonomously elects proxy nodes without requiring interaction, thereby enhancing the trustworthiness of cross-chain relays. GeoCross facilitates secure and trustworthy data sharing between geological blockchains, fulfills the requirements for cross-chain collaboration with multi-source geological information. The main contributions of this paper are as follows:
We propose a hierarchical hybrid encryption mechanism for cross-chain geological data sharing. At the data layer, SE is employed to enhance the efficiency of encrypting large-scale geological datasets, while at the authorization layer, CP-ABE is integrated to achieve fine-grained access control. By decoupling encryption from authorization, the mechanism enables fine-grained authorization and minimizes data exposure.
We design a cross-chain data-verifiable and privacy-preserving scheme based on ZKP, which employs a Groth16 proof circuit to enable the requester chain to verify the existence, correctness, and availability of owner chain data during cross-chain interactions without accessing any data.
We introduce a random RNRS based on reputation value and VRF. This mechanism utilizes dynamic updates of reputation and a VRF to achieve random and reliable agent election, improving the reliability of cross-chain routing.
We conduct a security analysis focusing on data confidentiality and authorization correctness, and evaluate its performance in a multi-chain environment. The experimental results demonstrate the feasibility of GeoCross in geological data sharing scenarios.
The rest of this paper is organized as follows.
Section 2 reviews related work. In
Section 3, we present the system model, security model, and design goals.
Section 4 presents the details of GeoCross.
Section 5 and
Section 6 discuss security analysis and performance evaluation, respectively. Finally, in
Section 7, we conclude this paper.
2. Related Work
In recent years, blockchain technology has been gradually introduced into the field of geological data sharing due to its decentralization, immutability and traceability, to solve problems such as data silos, tampering risks and privacy leakage in centralized geological data management. Li et al. [
30] investigated the application potential of blockchain in geological data sharing and believed that blockchain can effectively improve the credibility and tamper-resistance of geological data during storage and sharing processes. In response to the common problems of “duplicate collection” and “information silos” in current geological data sharing, Li et al. [
31] proposed a sharing model that integrates geological data indexing and blockchain, putting an index on the chain to achieve secure sharing and traceable management. Zhou et al. [
32] built a geological data sharing platform based on blockchain. By writing verified geological information and its ciphertext index into the blockchain and introducing a random competitive allocation mechanism, they ensured that the shared data could not be reverse-parsed under the premise of verifiability, thereby improving the security and fairness of the data sharing process.
Existing research indicates that blockchain has significant advantages in improving the security, transparency, and credibility of geological data sharing. Existing studies demonstrate that blockchain provides significant advantages in enhancing the security, transparency, and trustworthiness of geological data sharing. Razzaq et al. [
33] proposed a decentralized blockchain-based architecture for managing remote-sensing big-data documents, supporting secure sharing, version control, and integrity protection without relying on a central authority. However, the framework is designed primarily for document-level remote-sensing data and focuses on immutability and availability, confidentiality is handled only via conventional encryption, and access policies cannot be defined or enforced in a fine-grained manner. Zhang et al. [
34] developed a blockchain-based management scheme for Earth-observation products to improve decentralization, traceability, and tamper resistance of provenance metadata. Nevertheless, this solution is mainly concerned with provenance management rather than data privacy, and it does not address fine-grained authorization or cross-chain access, particularly in heterogeneous environments where different organizations operate independent blockchains and cloud platforms.
From a broader geospatial perspective, Chafiq et al. [
35] conducted a comprehensive survey on blockchain applications in geospatial data sharing, highlighting its potential for secure storage, property rights management, and traceability, as well as key challenges such as scalability, privacy, interoperability, and regulatory constraints; however, most of these efforts remain conceptual. In more specific geological use cases, Aufaristama [
36] explored the use of non-fungible tokens (NFTs) on public blockchains for geological data dissemination and digital asset management. Nevertheless, this work emphasizes openness and public dissemination rather than controlled sharing of sensitive geological information.
However, blockchain still has shortcomings in the field of geological data sharing [
37,
38]. First, most existing work focuses on data tamper-resistance and traceability, while paying insufficient attention to data confidentiality and access control mechanisms. Second, geological data often spans multiple departments and systems, and cross-institutional trust and privacy protection mechanisms remain not sound. The consensus efficiency and access permission of consortium blockchain under multi-node collaboration still exist. Furthermore, current research primarily focuses on on-chain data storage or indexing on chain, while further research is needed on the collaboration between encryption technologies and original data management methods such as blockchain and geological clouds.
4. Detail of Our Proposed Scheme
4.1. System Initialization
Trusted Setup Phase: In this phase, the authority (e.g., the China Geological Survey) generates the proving key and verification key for geological blockchains (both data owners and data users), which are related to the verification of geological data. The produced in this phase contains the bilinear group parameters and essential secret parameters . All these parameters are stored within the Relay Chain.
Applying the ABE scheme in inter-blockchain data sharing requires a Key Generation Center (KGC) to initialize system parameters. The KGC serves as a trusted third-party authority responsible for executing the initialization algorithm that generates the cryptographic parameters required.
The KGC employs a hash function H to compute the public parameters. The function H maps arbitrary binary strings to elements of group G:H:. In GeoCross, H takes two types of inputs: , where x is an arbitrary string; , where j is a positive integer. Here, and . For brevity, these inputs are denoted as and , respectively. The detailed process and resulting outputs of the KGC are as follows:
: The authority creates a bilinear pairing tuple and selects a hash function : involved in the encryption process to compute the public parameters, which maps any binary string to an element in group G. In this scheme, H has two types of inputs, namely and , where x is an arbitrary string, j is any positive integer, , and . We denote these two inputs as and . In the security analysis, these hash functions are regarded as random functions. Furthermore, by randomly selecting and , the global public parameters are obtained as .
: In this process, the initialization function randomly selects parameters
and
and
from a cyclic group of prime order
p, and parameters
from
. Then,
Setup uses the global parameters to generate the public key
and master private key
for the ABE scheme [
42].
. For each data user with attribute set , the authority uses the KeyGen algorithm to generate the attribute-based private key , taking the master private key and the node’s attribute set S as input. The KGC first randomly selects parameters and from , and then computes the partial private key .
Then, for each
and
, the authority uses the corresponding parameters
from
to compute the partial private keys
for different attributes.
Then, compute the partial private key , where a random value is selected from . And authority computes , for t=1,2, , . Finally, the secret key of data user is .
4.2. Proxy Node Selection
To enable cross-chain data access, data sharing between geological blockchains and the Relay Chain is carried out through proxy nodes. The proxy’s public key is registered on the Relay Chain via a signed blockchain transaction. Since all chains obtain this public key directly from the immutable ledger rather than through off-chain message exchange, the process is inherently resistant to man-in-the-middle attacks. We propose RNRS to elect proxy nodes for each geological blockchain. All nodes are eligible to participate in the election. RNRS divides the election process into multiple epochs, each containing a fixed number blocks. A portion of these blocks ( to , ) is reserved for the election phase. Each candidate node combines its reputation value with the latest checkpoint block hash to generate a random number using a VRF, which determines its waiting timer length L. The node whose timer expires first becomes the proxy node for this epoch, broadcasts the election result, and other nodes stop their timers.
In RNRS, each node’s reputation value is maintained and updated uniformly on the blockchain. Initially, all nodes are assigned the same reputation value , a node’s reputation increases by 1 point each time it successfully participates in an intra-chain consensus. If a node is absent during consensus, 2 points are deducted. When a node’s reputation value drops to zero, it loses its eligibility to participate in subsequent elections. To prevent any single node from the proxy for extended periods, the reputation value of a node is immediately halved upon election, thereby increasing the likelihood that other nodes will be selected in future rounds.
Each candidate node i constructs a timer by first obtaining its own and the total reputation value of all nodes R. Using the latest checkpoint block in the election as a random seed, the node generates a VRF random number and its proof , where is the private key of node i and the corresponding public key is registered on the blockchain.
Each candidate proxy node then uses the function to find the smallest timer value L that satisfies the condition, where d is a difficulty parameter. Nodes with higher have a wider range of valid counters, making them more likely to be selected as proxy nodes. Assuming the first block height of the election period is , where i is elected when the block at height is added to the ledger. Upon receiving node i’s election, upper-layer nodes verify the following conditions before confirming the election result: (a) whether satisfies the inequality above; (b) whether the current block height has exceeded ; (c) whether the proof correctly verifies that y was generated from the random seed . If checks pass and no other node has already been elected, node i is designated as the proxy node for this epoch, responsible for cross-chain interoperability until a new representative is elected or the next epoch begins. In exceptional cases where all candidates produce excessively large values L and no suitable proxy can be selected, the election is considered timed out, and the node with the highest reputation value is assigned as the proxy node.
The reputation mechanism ensures fairness in proxy selection and gradually eliminates malicious or inactive nodes. This approach provides a reliable transmission process for cross-chain data sharing among geological blockchains. Subsequent cross-chain data exchanges are securely forwarded through the elected proxy nodes.
4.3. Cross-Chain Data Request
Phase 1: Cross-chain Request Initiation. When a provincial bureau user (i.e., data user) attempts to initiate a data access to another geological blockchain on their chain (Provincial Bureau Chain), the access request is processed by invoking a cross-chain smart contract. The user submits its desired data identifier () as the target parameter of the request. Upon detecting the cross-chain request, the provincial chain’s proxy node triggers the corresponding cross-chain data access. Specifically, the proxy node first collects and verifies the user’s attributes. These attributes include the user’s identity information, role permissions, and so on. The proxy node then signs the access request, which consists of the request identifier (), the data identifier (), and the user’s attributes with the Provincial Bureau Chain’s private key. Finally, the proxy node forwards the request to the Relay Chain through the routing interface configured by the Relay Chain.
Phase 2: Data Existence Verification. When the access contract on the Relay Chain receives a cross-chain request from the Provincial Bureau Chain, it first performs integrity and validity verification of the request message. The Relay Chain’s nodes use the public key of the Provincial Bureau Chain to verify the digital signature submitted by the proxy node, ensuring that the message has not been tampered with and it was indeed initiated by a legitimate provincial-chain entity. If the signature verification succeeds, the access contract further reviews the request based on the fine-grained access control policy. The contract compares the requester’s user attributes with the policy associated with the target data . If satisfied, the Relay Chain routes the access request to the target proxy node of the Geological Institute Chain, which serves as the entry point for cross-chain communication. Otherwise, if the access policy is not satisfied, the request is rejected.
Then, the proxy node of the Geoscience Institute Chain queries its local state to confirm that exists and is accessible. To further prove the existence and accessibility of the geological data to the Provincial Bureau Chain, a ZKP must be generated. The Geoscience Institute Chain’s proxy node collects the private witness (including the Merkle path , status value = 1, etc.) and runs the Groth16 algorithm to prove possession and accessibility without revealing any geological information. The prover first converts the data verification circuit into a Quadratic Arithmetic Program (QAP), then uses together with the private inputs to generate the proof , where is the commitment to , is the commitment to , and contains the cross-checking for all constraints.
To compute and verify the ZKP, the scheme designs a core constraint logic circuit. The circuit takes the current public Merkle root of the Geoscience Institute Chain and the as public inputs; private inputs include the leaf hash of , = SHA-256 (, ), the Merkle path indices , sibling hashes , and the data accessibility status. Circuit constraints and computation flow:
Leaf verification: compute = SHA-256 and constrain = to ensure consistency with the leaf node.
Merkle path verification: starting from and , recursively compute each level according to until obtaining , and constrain = to prove that belongs to the chain’s Merkle tree.
Accessibility verification: constrain = 1 to confirm the data is accessible.
When all constraints hold, the circuit outputs 1, indicating that the verification passes and the proof is valid.
Then, the Geoscience Institute Chain routes the generated proof tuple to the Provincial Bureau Chain via the Relay Chain. In this process, the Relay Chain only performs message forwarding, ensuring the privacy of geological data. The proxy node of the Provincial Bureau Chain uses issued by the Geoscience Institute Chain to verify the validity of the proof .
After receiving the proof, the proxy of the Provincial Bureau Chain first extracts the target data identifier and the published Merkle root from the request, along with other public inputs provided by the Geoscience Institute Chain.
It uses the verification parameters contained in , the verifier encodes these public inputs into a group element , where each corresponds to a specific public input value. Finally, the verifier uses the verification function to check the proof correctness: .
If , the Provincial Bureau Chain confirms that the geological data exists and is accessible on the Geoscience Institute Chain, without learning any private information.
The proxy node of the Provincial Bureau Chain verifies the proof with by performing three bilinear pairing computations. First, it computes , then separately evaluates , , and . Only generated by the legitimate data owner satisfy , which confirms that the prover indeed possesses the claimed data. If the verification succeeds, the Provincial Bureau Chain is assured that the Geoscience Institute Chain truly holds the geological data and the data status is valid. If the verification fails, the Provincial Bureau Chain rejects the cross-chain request.
Phase 3: Owner-side Encryption and Token Issuance. After confirming that the requested data exists and is accessible, the data owner must ensure data confidentiality and fine-grained access control in cross-chain sharing. GeoCross employs a two-stage encryption mechanism combined with a defined access control policy to generate the corresponding access token.
First, the DO encrypts the original geological data using a symmetric key
to produce the ciphertext
, which is stored in a GCS. Then, to protect the
, the DO encrypts it using an ABE scheme. Using
, the access policy matrix
M, the DO computes:
This process ensures that only users whose attributes satisfy the access policy can decrypt and use the .
The specific steps are:
Step 1: Randomly select parameters from and compute the corresponding values used for key encryption.
Step 2: Given an attribute matrix M with and , compute that can be derived for each attribute dimension.
Step 3: Finally, compute , which represents the encryption of . Thus, the cross-chain ciphertext can be expressed as: .
This ciphertext is embedded in the cross-chain message and forwarded through the Relay Chain, ensuring data confidentiality and fine-grained access in the GeoCross.
After two stage encryption, the system designs a Data Ticket mechanism to enable controlled authorization. The Owner Chain issues a = {, , , }, where represents the identifier of the cross-chain request, represents the identifier of the target data, defines the token’s validity period, and represents the ciphertext location stored in the GCS.
4.4. Cross-Chain Data Access
Once the Requester Chain possesses a valid, unexpired data token (Data Ticket), it can retrieve the corresponding ciphertext from GCS based on the storage location provided in the token. Furthermore, the proxy node also retrieves
from the Relay Chain. After data retrieval, the requesting proxy node packages the request result {
,
,
, signature verification record} and writes it to the Requester Chain for on-chain recording. The actual
DU attempt to decrypt
with the
corresponding to its own attributes. Only if its attributes satisfy the access control conditions can the
DU recover the key and decrypt the original data; otherwise, the request is terminated.
Step 1: When the attribute sets accessing the blockchain satisfy the attribute matrix used for encryption, there will be a constant .
Step 2: According to the constant, we can compute:
The cross-chain data
can be decrypted. Finally,
can use
to decrypt the original geological data. The process of cross-chain data sharing is shown in
Figure 2.
5. Security Analysis
5.1. Data Confidentiality
Theorem 1. Data Confidentiality: GeoCross ensures data confidentiality and authorized access through a hybrid encryption policy combining symmetric encryption (SE) and attribute-based encryption (ABE). Specifically, the data owner encrypts the plaintext M using a randomly generated symmetric key to produce = . Then, is encrypted with an access policy Policy using ABE, get = . The ciphertext is expressed as ,), where is maintained off-chain, and is transferred across blockchains through the Relay Chain.
Proof. To demonstrate that no probabilistic polynomial-time (PPT) adversary can compromise data confidentiality with a non-negligible advantage, we construct a security game between the adversary and the challenger . This game models the confidentiality guarantees of GeoCross under adaptive attacks. Assume that achieves a non-negligible advantage in this game. The adversary selects a challenge matrix with each dimension bounded by q. is allowed to query any secret key that cannot be directly employed to decrypt the challenge ciphertext generated by . The detailed procedure is described as follows.
Setup: executes ABE.Setup to generate the public parameters and publishes the system configuration.
Query Phase I: Attribute Key Queries. may adaptively request the private key associated with any attribute set . If , provides the corresponding key .
Challenge Phase: submits a pair of equal-length plaintexts (,). selects a random bit , generates a random symmetric key , and computes: , . It returns the ciphertext pair to .
Query Phase II: may continue to request private keys for attribute sets that do not satisfy , and responds as before.
Guess Phase: Finally, outputs a guess . The adversary’s advantage is defined as: .
The scheme is IND-CPA secure under the chosen-policy model if is negligible for all PPT adversaries .
Hybrid Experiments
To verify the security of the proposed scheme, we employ a hybrid experiment to reduce the security of the algorithm.
: Real Game. The hybrid corresponds to the real security game , which accurately models the confidentiality properties of GeoCross under the defined threat model.
: In , the symmetric encryption operation is replaced by an ideal random oracle. If can distinguish and with non-negligible probability, it can be used to break the IND-CPA security of the ABE scheme under the chosen-policy attack. Therefore, .
: In , the ABE process is idealized. Instead of encrypting the symmetric key , the challenger encrypts a uniformly random value under a random policy : . If the adversary can distinguish and , an adversary can be built to break the security of the ABE scheme under the CPA model, which contradicts the security assumption.
: In , the ciphertext becomes statistically independent of the challenge plaintext . Finally, the adversary’s distinguishing advantage is zero. Therefore, the advantage of any PPT adversary against the GeoCross confidentiality model satisfies: , indicating that GeoCross achieves semantic security under standard cryptographic assumptions.
□
Lemma 1. In the GeoCross, any entity that fails to satisfy the predefined access policy, including passive eavesdroppers, off-chain storage servers (GCS), relay/proxy nodes, and unauthorized users, are unable to recover the or M, even with full access to both the off-chain ciphertext and cross-chain metadata.
Collusion-Resistance: If an attribute set does not satisfy the access policy Policy, the ABE scheme satisfying selective-policy IND-CPA security ensures that is indistinguishable to unauthorized entities, making pseudorandom to them. Furthermore, collusion among multiple users’ attribute private keys still cannot satisfy the access control policy, and thus cannot be recovered. Therefore, unauthorized users or colluding parties cannot compromise the ABE scheme.
Honest-but-Curious GCS/Relay/Proxy: Although the GCS, Relay Chain, and proxy nodes participate in the cross-chain data sharing, they can only observe (,) and the metadata. The proxy node merely forwards or authorized content generated through the relay process, while the GCS only stores encrypted data. They cannot recover or M. From the hybrid experiment, it follows that for any adversary A, the following holds: . Therefore, cross-chain data confidentiality is guaranteed under the unauthorized adversary model.
5.2. Data Correctness
Theorem 2. Cross-chain Data Correctness: To prove that owner chains (e.g., geological institute chains) can access data without revealing any content, GeoCross uses a ZKP-based method. In this section, we verify the completeness, knowledge soundness, and zero-knowledge properties of this method. The requesting chain can determine whether other chains possess accessible data solely from the tuple , while learning nothing about any private information contained in . Prove that the cross-chain data is verifiable and not exposed, which means the requester chain can determine whether owner chains possess accessible data based on , without obtaining any private information from the proof .
Assume are the trusted parameters of the zero-knowledge proof system. Let be the zero-knowledge defined in GeoCross, where the public input is and the private witness is w = (, , , , ). The relation holds if the following conditions are satisfied: (1) compute from ; (2) using and , reconstruct bottom-up the Merkle root and ensure ; (3) “” = 1. If and only if , the Groth16 proof could be verified, i.e., ; and it satisfies: completeness, knowledge soundness, and zero-knowledge.
Completeness: The data owner acts as the prover, possessing data access rights, and can successfully respond to verification requests initiated by a requester. To verify the completeness, we define a security game : the challenger generates , and the prover holds a relation . If outputs a proof such that , then wins the game, it possesses legitimate data access rights.
Proof. When the QAP constraints are satisfied, there exists a polynomial such that , where F (,) denotes the combination term of public input polynomials. If the GeoCross circuit correctly compiles the Merkle hash constraints and , then exists and the equality holds. Thus, the probability that the verification succeeds is: . Therefore, the verification is passed, the scheme completeness is proved. □
Knowledge-Soundness. The prover (i.e., the Owner Chain) must hold a correct witness to convince the verifier (i.e., the Requester Chain) that it holds a valid Merkle path with , which guarantees that the verifier accepts only when a valid witness w satisfying exists. To verify the knowledge soundness, we define the security game : A malicious forger attempts to generate a fake proof that convinces the verifier of the existence or accessibility of data with a invalid witness w. If can compute with such that , while no witness w exists for which , the forger wins the game.
Proof. Groth16 guarantees the existence of an efficient extractor
, whenever a malicious adversary
can generate a valid proof
,
can extract the corresponding witness w. We construct a reduction algorithm
as follows:
simulates the Setup phase, generates
, and sends
to
. The adversary outputs a forged pair
such that
, implying that it has created an apparently valid proof.
uses the extractor
to derive a witness
. If
, then
has successfully broken the soundness, hence:
This proof shows that if the verifier accepts , the system guarantees the existence of a Merkle proof path and a valid state. A malicious geological blockchain cannot forge proofs of false data existence or unauthorized access to deceive data requesters. □
Zero Knowledge. In GeoCross, the prover (e.g., a geological blockchain) can convince the verifier that a specific data exists and is in an accessible state without revealing any geological data. For any verifier V, there exists an efficient simulator capable of generating a simulated proof that is computationally indistinguishable from real proof , without accessing any private data. To verify the zero-knowledge, we define the security game : The challenger generates and selects a random bit b. If , the proof is generated by ; if , the simulator generates . The adversarial verifier is given and outputs a guess . The advantage of is defined as: .
Proof. Only the values (,) are publicly revealed, while all private inputs, such as the Merkle path and status are hidden. The proof consists of the . For any external observer, these commitments are indistinguishable from those generated in a real execution. According to the zero-knowledge of Groth16, the probability can be expressed as . Therefore, the adversarial verifier’s distinguishing advantage is negligible, namely . □
The proof demonstrates that the prover (the Owner Chain) can convincingly prove to the verifier (the Requester Chain) the existence and accessibility of geological data without disclosing any original data, achieving data privacy protection in cross-chain sharing. Furthermore, ZKP verification is a cubic bilinear pairing operation that can be completed with low latency, providing privacy protection for geologically sensitive data and adapting to the verification-authorization workflow in high-privacy scenarios such as geological results and remote sensing data.
5.3. Security Analysis of RNRS
GeoCross uses RNRS to elect proxy nodes for cross-chain relay. To verify the security of the proposed reputation-based non-interactive random node selection method, this section evaluates node behavior and election results. The experimental environment consists of 20 nodes, one-third of which are malicious and the rest are honest. The initial reputation of all nodes is set to 100. Each experiment runs for 20 epochs and each consisting of 100 blocks. The election is triggered after consensus is reached on the 50th block. We compare the proposed RNRS with three other selection methods: random selection, round-robin election, and proof of wait stake-based selection.
As shown in
Figure 3a, during the initial epochs, the election success rates of the various schemes varied little. As the number of epochs increased, the election success rate of this scheme increased rapidly, stabilizing at
after 20 epochs. This result demonstrates that RNRS can distinguish between honest and malicious nodes: honest nodes accumulate reputation through active participation in consensus, making them more likely to be elected as representatives in subsequent elections, while malicious nodes experience a decline in reputation due to refusal to participate or voting errors. This approach ensures the trust and secure selection of proxy nodes.
To further verify the security of RNRS, we simulated election results with a higher proportion of malicious nodes. As shown in
Figure 3b, with the proportion of malicious nodes increased from
to
, the RNRS election success rate only dropped from approximately
to
. Its reputation accumulation, combined with the random function mechanism, effectively prevents malicious nodes from gaining an unfair advantage through computing power or frequent participation, maintaining the randomness and decentralization of this election method.