Cross-Chain Swaps

A cross-chain swap enables trading tokens across different blockchains, without using an intermediary party (e.g. an exchange service) in the process.


Atomic cross-chain swap between public and private network

In order to create a trustless environment for an exchange, a specific transaction type is required that is commonly referred to as Hashed TimeLock Contract (HTLC). Two additional components characterize this transaction type: hashlocks and timelocks. A thorough explanation can be found on the Bitcoin Wiki.

In other words, to reduce counterparty risk, the receiver of a payment needs to present a proof for the transaction to execute. Failing to do so, the locked funds are released after the deadline is reached, even if just one actor does not agree.


Alice and Bob want to exchange 10 alice tokens for 10 bob tokens. The problem is that they are not in the same blockchain: alice token is defined in NEM public chain, whereas bob token is only present in a private chain using Catapult technology.


NEM’s private and future public chain share the SDK. You could implement atomic cross-chain swap between blockchains that use different technologies if they permit the secret lock/proof mechanism.


Atomic cross-chain swap sequence diagram

  1. Alice generates a random set of bytes called proof. The proof should have a size between 10 and 1000 bytes.
  2. Alice hashes the obtained proof with one of the available algorithms to generate the secret.
  3. Alice defines the secret lock transaction TX1:
  • Mosaic: 10 alice token
  • Recipient: Bob’s address (Private Chain)
  • Algorithm: h
  • Secret: h(proof)
  • Duration: 96h
  • Network: Private Chain
  1. Alice announces TX1 to the private network and shares with Bob the secret.
  2. Bob defines announces the following secret lock transaction TX2 to the public network:
  • Mosaic: 10 bob token
  • Recipient: Alice’s address (Public Chain)
  • Algorithm: h
  • Secret: h(proof)
  • Duration: 84h
  • Network: Public Chain


The amount of time in which funds can be unlocked should be a smaller time frame than TX1’s. Alice knows the secret, so Bob must be sure he will have some time left after Alice releases the secret.

  1. Alice announces the secret proof transaction TX3 to the public network. This transaction defines the encrypting algorithm used, the original proof and the secret.
  2. Once TX3 is confirmed, the proof is revealed. TX2 transaction is unlocked and Alice receives the locked funds.
  3. Bob picks the proof and announces the secret proof transaction TX4 to the private network, receiving the locked funds from TX1.




Configuration parameters are editable . Public network configuration may differ.


Use a secret lock transaction to transfer mosaics between two accounts. The specified mosaics remain locked until a valid Secret Proof Transaction unlocks them.

If the transaction duration is reached without being proved, the locked amount goes back to the initiator of the secret lock transaction.

Version: 0x01

Entity type: 0x4152


Property Type Description
mosaic Mosaic Locked mosaic.
duration uint64 Duration is allowed to lie up to 30 days. If reached, the mosaics will be returned to the initiator.
hashAlgorithm LockHashAlgorithm The algorithm used to hash the proof.
secret 64 bytes (binary) The proof hashed.
recipient 25 bytes (binary) The address that receives the funds once unlocked.


Use a secret proof transaction to unlock secret lock transactions.

The transaction must prove that it knows the proof that unlocks the mosaics.

Version: 0x01

Entity type: 0x4252


Property Type Description
hashAlgorithm LockHashAlgorithm The algorithm used to hash the proof.
secret 64 bytes (binary) The proof hashed.
recipient 25 bytes (binary) The address that receives the funds once unlocked.
proofSize uint16 The proof size in bytes.
proof array(byte, proofSize) The original random set of bytes.


The list of supported hashing algorithms.

Enumeration: uint8

Id Description
0 (Op_Sha3_256) The proof is hashed using Sha-256.
1 (Op_Keccak_256) The proof is hashed using Keccak (ETH compatibility).
2 (Op_Hash_160) The proof is hashed twice: first with Sha-256 and then with RIPEMD-160 (bitcoin’s OP_HASH160).
3 (Op_Hash_256) The proof is hashed twice with Sha-256 (bitcoin’s OP_HASH256).