CN109347838A - A kind of across chain exchange method of Distributed Computing Platform - Google Patents

A kind of across chain exchange method of Distributed Computing Platform Download PDF

Info

Publication number
CN109347838A
CN109347838A CN201811251599.0A CN201811251599A CN109347838A CN 109347838 A CN109347838 A CN 109347838A CN 201811251599 A CN201811251599 A CN 201811251599A CN 109347838 A CN109347838 A CN 109347838A
Authority
CN
China
Prior art keywords
recipient
sender
contract account
random number
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811251599.0A
Other languages
Chinese (zh)
Inventor
王堃
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yuanshi Science And Technology Co Ltd
Original Assignee
Shenzhen Yuanshi Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yuanshi Science And Technology Co Ltd filed Critical Shenzhen Yuanshi Science And Technology Co Ltd
Priority to CN201811251599.0A priority Critical patent/CN109347838A/en
Publication of CN109347838A publication Critical patent/CN109347838A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Abstract

The present invention relates to a kind of across the chain exchange methods of Distributed Computing Platform, comprising the following steps: sets at least one sender SXWith a recipient RX;It and is each pair of sender SXWith recipient RXGenerate a contract account;Each sender SXResource, each recipient R are sent to contract accountXGenerate its corresponding secret random number nXIt is sent to contract account;All sender SXAssets be all sent to contract account after, each recipient RXThe secret random number n of oneself is all disclosedx;As all secret random number nxAfter all disclosing, each recipient RXThe sum of secret random number is calculated, and has the backward recipient R of m participant's signatureXTransferring resource;After time-out time reaches, secret random number n still can not be calculatedxThe sum of, then contract account is to sender SXCancel resource.Compared with the prior art, the present invention realizes that multiple participants carry out Resource Exchange between different blocks chain, and guarantees all steps whole success or failure in whole process.

Description

A kind of across chain exchange method of Distributed Computing Platform
Technical field
The present invention relates to block chain technical field, in particular to a kind of across chain exchange method of Distributed Computing Platform.
Background technique
Current block chain technology is in Rapid development stage, and the information isolation high degree between block chain limits The application space of block chain, across the chain interaction between block chain is very urgent demand.Such as in medical insurance field, hospital, Respectively there are the block chain of itself in insurance company, government tripartite;If you need to carry out the calculating of medical insurance big data using distributed computing, just It needs the Data Fusion on each chain.It is quasi- to be based on asymmetric encryption and hashing technique, propose that a kind of block chain is distributed Computing system model and other across chain interaction techniques of block chain, so that can interconnect between different blocks chain.
Existing technical solution: being referred to three kinds of schemes in the report that ether mill founder vitalik writes for R3, respectively It is notary's mechanism, side chain/Repeater-mode, Hash locking mode.But with advances in technology, one has been emerged in recent years A little new across chain solutions, such as distributed private key control technology, notary's mechanism+side chain hybrid technology;But existing skill In art, Resource Exchange is carried out between different blocks chain, all steps whole success or failure during not ensuring that.
Summary of the invention
The object of the present invention is to provide a kind of across the chain exchange method of Distributed Computing Platform, technical problems to be solved It is: carries out Resource Exchange between different blocks chain, all steps whole success or failure during not ensuring that.
The technical scheme to solve the above technical problems is that a kind of across chain exchange method of Distributed Computing Platform, The following steps are included:
At least one sender S is set in a block chainX, and in another block chain set at least one recipient RX;It and is each pair of sender SXWith recipient RXA contract account is generated, the public key of sender is stored in contract account, is connect Public key, time-out time and the configurable parameter of receipts person;
Each sender SXResource, each recipient R are sent to contract accountXGenerate its corresponding secret random number nXHair It send to contract account;All sender SXAssets be all sent to contract account after, each recipient RXThe secret of oneself is all disclosed Random number nx
As all secret random number nxAfter all disclosing, each recipient RXThe sum of secret random number is calculated, and has m ginseng With the backward recipient R of person's signatureXTransferring resource;After time-out time reaches, each recipient RXStill it can not calculate secret Close random number nxThe sum of, then contract account is to sender SXCancel resource.
Further, further comprising the steps of: all sender SXAssets be all sent to contract account after, all recipients RXSecret random number be all disclosed before, contract account is forbidden to recipient RXTransferring resource.
Further, comprising the following steps: after time-out time reaches, each recipient RXStill secret can not be calculated Random number nxThe sum of, sender SXThe assets in contract account are extracted with signature.
Further, each contract account receives resource, the input that the configurable parameter that resource carries is run as code Value.
Further, wherein | S | > 0, | R | > 0, and | S ∪ R |≤2, only one sender S in each pair of resource transactionXWith one A recipient recipient RX
Further, each recipient RxAll generate the secret random number n of oneselfx, set Nx=nxG, wherein G is ellipse Basic point on circular curve;Elliptic curve is the arbitrary curve in Elliptic Curve Cryptography;
To NxCarry out its summation:
Contract account are as follows:
It wherein include the public key S of senderi, the public key R of recipientj, time-out time t, m are the configurable of number of signatures Parameter.
The beneficial effects of the present invention are: realizing that multiple participants carry out Resource Exchange between different blocks chain, and guarantee All steps whole success or failure in whole process, guarantees the consistency of whole process;It is provided between different blocks chain Source exchange, and exchange of assets behavior is extended to any behavior.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of across the chain exchange method of Distributed Computing Platform of the present invention about embodiment 1;
Fig. 2 is a kind of schematic diagram of across the chain exchange method of Distributed Computing Platform of the present invention about embodiment 2.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
Embodiment 1:
As shown in Figure 1, a kind of across chain exchange method of Distributed Computing Platform, comprising the following steps:
At least one sender S is set in a block chainX, and in another block chain set at least one recipient RX;Wherein | S | > 0, | R | > 0, and | S ∪ R |≤2, only one sender S in each pair of resource transactionXReceive with a recipient Person RX;It and is each pair of sender SXWith recipient RXGenerate a contract account, be stored in contract account sender public key, Public key, time-out time and the configurable parameter of recipient;
Each recipient RxAll generate the secret random number n of oneselfx, and open Nx=nxG, wherein G is elliptic curve On basic point;Elliptic curve can be the arbitrary curve in Elliptic Curve Cryptography.
Obtain each Nx, sum
A contract account is generated for every a pair of of sender and recipient
Wherein
The inside includes the public key S of senderi, the public key R of recipientj, time-out time t, m are the configurable of number of signatures Parameter;
Each sender SXResource, each recipient R are sent to contract accountXGenerate its corresponding secret random number nXHair It send to contract account;All sender SXAssets be all sent to contract account after, each recipient RXThe secret of oneself is all disclosed Random number nx
As all secret random number nxAfter all disclosing, each recipient RXThe sum of secret random number is calculated, and has m ginseng With the backward recipient R of person's signatureXTransferring resource;After time-out time reaches, each recipient RXStill it can not calculate secret Close random number nxThe sum of, then contract account is to sender SXCancel resource;Wherein participant includes recipient RX
In above-described embodiment, contract accountIndicate recipient RXSignature, all Recipient RXThe sum of secret random numberAnd at least m parts of different recipient RXIt is rightSignature mention Take the resource in account, and sender SXThe assets in account are extracted after time-out time arrival using signature.
Each sender SXAll send resource in corresponding contract account, after all assets are all sent, Each recipient RXThe secret random number n of oneself is all disclosedx;In all secret random number nxBefore being all disclosed, anyone Can not transferring resource, as all secret random number nxAfter all disclosing, each recipient RXIt can calculateAnd by m's Recipient RXAfter signature can transferring resource, if time-out time arrival after can not still calculateThen exchange It can be revoked.
It realizes that multiple participants carry out Resource Exchange between different blocks chain, and guarantees all steps in whole process Whole success or failures guarantee the consistency of whole process;Carry out Resource Exchange between different blocks chain, and by exchange of assets row To be extended to any behavior.
Embodiment 2:
As shown in Fig. 2, a kind of across chain exchange method of Distributed Computing Platform, comprising the following steps:
Distributed transaction T is set, which is divided into multiple step T={ F1,F2..., Fn, each step F can be seen Make the state transition function S'=F (S) executed on block chain, S indicates reset condition, and S' indicates to pass through state transition function F State after conversion;
Each state transition function FiSplit into Fi=Pi,Ci,Ri, wherein PiFor preparation stage, CiFor presentation stage, RiFor rollback phase;The behavior for defining them is as follows:
S "=P (S, L, t),
S'=C (S ", K),
S=R (S "),
Wherein L and K is the status lock and key being mutually matched, and the state locked by corresponding L is needed using corresponding K submit.T indicates time-out time, and rollback phase R can be just entered only after time-out time arrival by state from S " It is reduced to reset condition S;
Across chain distributed transaction is executed, is needed first by each step F of distributed transaction TiIt is deployed in each block On chain, wherein T={ F1,F2..., Fn, step Fi∈T;A secret random number n is created for each step Fi, and open Ni =niG, wherein G is the basic point on elliptic curve;For each step FiCreate a key pair { Ki,ki, and open public key Ki;Obtain each NiAfterwards, it sums:
Execute the preparation stage P of each stepi, obtainWherein each step FiSplit into three phases Fi=Pi,Ci,Ri
As all preparation stage PiAfter being carried out successfully, each step FiThe secret random number n of oneself is all disclosedi
As all secret random number niAfter all disclosing, calculateEach step FiAll with the private key K of oneselfi To secret random number niThe sum of sign, obtain eiAnd openly;
After being collected into the signature of setting quantity, the presentation stage C of each step is executedi, it obtains:
Wherein number of signatures m is configurable parameterWithe1, e2..., emIt is the state being mutually matched Lock and key, by correspondingState to lock is needed using correspondinge1, e2..., emIt submits, The state lock function that block chain virtual machine provides can lock S " state for a period of time.After reaching time-out time, can not still it receive The signature for collecting preset quantity, then roll back to original state.
Multiple steps of affairs are dispersed on different block chains and execute in the present embodiment, and guarantee the consistent of entire affairs Property;This is a kind of extension to across chain exchange of assets agreement, and the behavior of exchange of assets is expanded into any behavior.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (6)

1. a kind of across chain exchange method of Distributed Computing Platform, which comprises the following steps:
At least one sender S is set in a block chainX, and at least one recipient R is set in another block chainX;And For each pair of sender SXWith recipient RXA contract account is generated, the public key of sender, recipient are stored in contract account Public key, time-out time and configurable parameter;
Each sender SXResource, each recipient R are sent to contract accountXGenerate its corresponding secret random number nXIt is sent to Contract account;All sender SXAssets be all sent to contract account after, each recipient RXThe secret for all disclosing oneself is random Number nx
As all secret random number nxAfter all disclosing, each recipient RXThe sum of secret random number is calculated, and has m participant The backward recipient R of signatureXTransferring resource;After time-out time reaches, each recipient RXStill can not calculate it is secret with Machine number nxThe sum of, then contract account is to sender SXCancel resource.
2. across the chain exchange method of a kind of Distributed Computing Platform according to claim 1, which is characterized in that including following step It is rapid: all sender SXAssets be all sent to contract account after, all recipient RXSecret random number be all disclosed before, Contract account is forbidden to recipient RXTransferring resource.
3. across the chain exchange method of a kind of Distributed Computing Platform according to claim 1, which is characterized in that including following step It is rapid: after time-out time reaches, each recipient RXStill secret random number n can not be calculatedxThe sum of, sender SXWith label Name extracts the assets in contract account.
4. across the chain exchange method of a kind of Distributed Computing Platform according to claim 1, which is characterized in that each contract account Receive resource, the input value that the configurable parameter that resource carries is run as code.
5. across the chain exchange method of a kind of Distributed Computing Platform according to claim 1, which is characterized in that wherein sender | Sx | > 0, recipient | Rx| > 0, and | Sx∪Rx|≤2, only one sender S in each pair of resource transactionXReceive with a recipient Person RX
6. across the chain exchange method of a kind of Distributed Computing Platform according to claim 5, which is characterized in that each recipient RxAll generate the secret random number n of oneselfx, set Nx=nxG, wherein G is the basic point on elliptic curve;Elliptic curve is ellipse Arbitrary curve in circular curve cryptography;
To NxCarry out its summation:
Contract accountAre as follows:
It wherein include the public key S of senderi, the public key R of recipientj, time-out time t, m are the configurable parameter of number of signatures.
CN201811251599.0A 2018-10-25 2018-10-25 A kind of across chain exchange method of Distributed Computing Platform Pending CN109347838A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811251599.0A CN109347838A (en) 2018-10-25 2018-10-25 A kind of across chain exchange method of Distributed Computing Platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811251599.0A CN109347838A (en) 2018-10-25 2018-10-25 A kind of across chain exchange method of Distributed Computing Platform

Publications (1)

Publication Number Publication Date
CN109347838A true CN109347838A (en) 2019-02-15

Family

ID=65312171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811251599.0A Pending CN109347838A (en) 2018-10-25 2018-10-25 A kind of across chain exchange method of Distributed Computing Platform

Country Status (1)

Country Link
CN (1) CN109347838A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160028552A1 (en) * 2014-07-25 2016-01-28 Blockchain Technologies Corporation System and method for creating a multi-branched blockchain with configurable protocol rules
US20170017954A1 (en) * 2015-07-14 2017-01-19 Fmr Llc Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
CN106899698A (en) * 2017-04-11 2017-06-27 张铮文 A kind of across chain mutual operation method between block chain
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108600301A (en) * 2018-03-08 2018-09-28 青岛墨客区块链有限公司 A kind of across chain method between block chain and main block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160028552A1 (en) * 2014-07-25 2016-01-28 Blockchain Technologies Corporation System and method for creating a multi-branched blockchain with configurable protocol rules
US20170017954A1 (en) * 2015-07-14 2017-01-19 Fmr Llc Point-to-Point Transaction Guidance Apparatuses, Methods and Systems
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
CN106899698A (en) * 2017-04-11 2017-06-27 张铮文 A kind of across chain mutual operation method between block chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108600301A (en) * 2018-03-08 2018-09-28 青岛墨客区块链有限公司 A kind of across chain method between block chain and main block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
祝烈煌等: "区块链交易数据隐私保护机制", 《BIG DATA RESEARCH 大数据》 *

Similar Documents

Publication Publication Date Title
CN106899698B (en) Cross-chain interoperation method between block chains
US11614994B2 (en) Method, apparatus and electronic device for blockchain-based transaction consensus processing
US20210194759A1 (en) Changing a master node in a blockchain system
CN110059494A (en) A kind of method for secret protection and block catenary system of block chain transaction data
CN110266655A (en) A kind of across chain interconnected method, equipment and system based on block chain
CN111865918B (en) Optimized and improved block chain PBFT consensus method
CN111066285A (en) Method for recovering public key based on SM2 signature
CN110197433B (en) Numerical value transferring method, device and system
CN111339199B (en) Block chain key recovery method and device
CN112329051A (en) Safe and efficient consensus mechanism implementation method and system
JPWO2017099117A1 (en) PRE-COMPUTER DEVICE, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM, AND VECTOR MULTIPLY DEVICE, AND METHOD
CN109639439A (en) A kind of ECDSA digital signature method based on two sides collaboration
CN103220146B (en) Zero Knowledge digital signature method based on multivariate public key cryptosystem
CN109257179A (en) A kind of signature generating method and the block chain account management method using this method
CN110378151A (en) A kind of score management method of education block chain that supporting national secret algorithm
CN111046411B (en) Power grid data safe storage method and system
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
CN115733607A (en) Block chain-based Pedersen secret sharing multi-party aggregation access control method
CN115169576A (en) Model training method and device based on federal learning and electronic equipment
CN114760023A (en) Model training method and device based on federal learning and storage medium
US20230231908A1 (en) Computer-implemented system and method for controlling processing steps of a distributed system
CN109347838A (en) A kind of across chain exchange method of Distributed Computing Platform
CN108768634B (en) Verifiable cryptographic signature generation method and system
CN109286485A (en) General Identity Proxy label decryption method that can be compound
Shuang et al. A new identity based blind signature scheme and its application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190215

WD01 Invention patent application deemed withdrawn after publication