CN110766410B - Trusted cross-chain event construction and verification method and device based on Merker tree - Google Patents

Trusted cross-chain event construction and verification method and device based on Merker tree Download PDF

Info

Publication number
CN110766410B
CN110766410B CN201911021463.5A CN201911021463A CN110766410B CN 110766410 B CN110766410 B CN 110766410B CN 201911021463 A CN201911021463 A CN 201911021463A CN 110766410 B CN110766410 B CN 110766410B
Authority
CN
China
Prior art keywords
cross
chain
merck
tree
chain event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911021463.5A
Other languages
Chinese (zh)
Other versions
CN110766410A (en
Inventor
李伟
邱炜伟
尹可挺
汪小益
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qulian Technology Co Ltd
Original Assignee
Hangzhou Qulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qulian Technology Co Ltd filed Critical Hangzhou Qulian Technology Co Ltd
Priority to CN201911021463.5A priority Critical patent/CN110766410B/en
Publication of CN110766410A publication Critical patent/CN110766410A/en
Application granted granted Critical
Publication of CN110766410B publication Critical patent/CN110766410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application provides a trusted cross-chain event construction and verification method and device based on a merck tree, wherein the method comprises the following steps that (1) a system builds a cross-chain event tree of the merck structure for a blockchain platform needing cross-chain transaction; (2) The cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract; (3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted; (4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree; (5) The target blockchain platform verifies the trustworthiness of the cross-chain event based on the cross-chain event tree of the merck structure on the source blockchain and the associated proof of availability. The method starts from the serious difficulty of the cross-chain verification, captures the cross-chain event by means of an intelligent contract event, and realizes the credibility and the quick verification of the cross-chain event by means of constructing a merck tree and a merck path of the cross-chain event.

Description

Trusted cross-chain event construction and verification method and device based on Merker tree
Technical Field
The application relates to the technical field of blockchain communication, in particular to a method and equipment for constructing and verifying a trusted cross-chain event based on a merck tree.
Background
With the rapid development of blockchain application, the business requirements of various application scenes are increasingly complex, so that various blockchain platforms are promoted, and the popularization and ecological development of the blockchains are limited to a great extent due to the lack of interconnection mechanisms between the chains. For this, the cross-link technology has been developed, and the cross-link technology can be mainly divided into asset exchange and information exchange according to the difference of interactive contents. In terms of asset exchange, some blockchains (DLT, distributed Ledger Technology) employing the decentralized ledger technique are in fact still isolated from each other, and the value exchange between them is mainly done by means of centralized exchanges, and the asset value on the chain cannot be reasonably assessed. The information exchange is very complex due to the data synchronization and corresponding cross-link call between chains, so that the alliance between the industries can not share information at present, and the business intercommunication barrier is very high.
An important problem to be solved in cross-chain interaction is how to make the target blockchain verify the trust of the cross-chain transaction, and in the traditional cross-chain technology, a hash locking mode, an e-form relay mode and the like are adopted. However, the precondition of these cross-chain interactive verifications is the consistency of the cross-chain transactions and the isomorphism of the corresponding platforms, and how to construct a trusted proving mechanism supporting the rapid verification of heterogeneous blockchains is of great importance.
Disclosure of Invention
In view of the foregoing deficiencies or inadequacies of the prior art, it would be desirable to provide a fast verification method and apparatus for merck tree-based trusted cross-chain event construction and verification.
In a first aspect, the present application provides a method for constructing and verifying a trusted cross-chain event based on a merck tree, including: the method comprises the following steps of constructing a merck tree structure of a cross-chain event similar to an account book state tree, and constructing a trusted proof of the cross-chain event based on merck loop strength:
(1) For a blockchain platform needing to carry out cross-chain transaction, the system builds a cross-chain event tree of a merck structure;
(2) The cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract;
(3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted;
(4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and related credibility certification, if the verification is not passed, an illegal event rollback flow is executed, and if the verification is passed, a subsequent cross-link routing flow is executed.
Further, a cross-chain event tree of the merck structure constructed by the system is parallel to the account state merck tree, wherein the cross-chain event tree can be externally accessed in a public way, and the merck root of the cross-chain event tree and the merck root of the account state tree jointly form the merck root of the whole blockchain.
Further, the throwing or generating of the cross-chain event is necessarily realized through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through the whole network consensus of a consensus algorithm like a common blockchain transaction.
Further, the trusted verification of the cross-chain event is based on the merck path of the cross-chain event merck tree of the original blockchain in which the cross-chain event is located
In a second aspect, the present application also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a fast authenticated merck tree-based trusted cross-chain event structuring and authentication method provided in accordance with embodiments of the present application.
Advantageous effects of the application
The method starts from the serious difficulty of the cross-chain verification, captures the cross-chain event by means of an intelligent contract event, and realizes the credibility and the quick verification of the cross-chain event by means of constructing a merck tree and a merck path of the cross-chain event.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a method for quickly verifying a trusted cross-chain event structure and verification based on a merck tree according to an embodiment of the present application.
Fig. 2 is a cross-chain event tree based on the merck tree.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the application are shown in the drawings.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
Fig. 1 is a flowchart of a trusted across-chain event constructing and verifying method based on a merck tree according to an embodiment of the present application.
As shown in fig. 1, in this embodiment, a method for constructing and verifying a trusted across-chain event based on a merck tree is characterized in that a merck tree structure of the across-chain event similar to an account state tree is constructed, and a trusted proof of the across-chain event is constructed based on merck loop strength, and the method specifically includes the following steps:
(1) For a blockchain platform needing to perform cross-chain transactions, as shown in fig. 1, the system builds a cross-chain event tree of a merck structure by collecting related cross-chain transactions in the block generation stage;
(2) Under the call of the application service platform, the cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract;
(3) After the cross-chain event is packaged and arranged in the platform, a cross-chain event tree of the merck structure is inserted, and the blockchain platform signs the root of the whole cross-chain event tree after cross-chain consensus of each round;
(4) The block chain platform builds a credibility merck proof of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and related credibility certification, if the verification is not passed, an illegal event rollback flow is executed, and if the verification is passed, a subsequent cross-link routing flow is executed.
Preferably, as shown in fig. 2, the inter-chain event tree of the merck structure constructed by the system is parallel to the ledger tree of the ledger state, wherein the inter-chain event tree can be accessed externally and publicly, and the merck root of the inter-chain event tree and the merck root of the ledger tree together form the merck root of the whole blockchain.
Preferably, the throwing or generating of the cross-chain event is necessarily achieved through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through the whole network consensus of a consensus algorithm like a common blockchain transaction.
Preferably, the trusted verification of the cross-chain event is based on the merck path of the cross-chain event merck tree of the original blockchain in which the cross-chain event resides.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
As shown in fig. 3, as another aspect, the present application also provides an apparatus 700 including one or more Central Processing Units (CPUs) 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data required for the operation of the device 700 are also stored. The CPU701, ROM702, and RAM703 are connected to each other through a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments of the present disclosure, the merck tree-based trusted cross-chain event structuring and verifying method described in any of the embodiments above may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a merck tree-based trusted cross-chain event structuring and validation method. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711.
As still another aspect, the present application also provides a computer-readable storage medium, which may be a computer-readable storage medium contained in the apparatus of the above-described embodiment; or may be a computer-readable storage medium, alone, that is not assembled into a device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the merck tree based trusted cross-chain event structuring and validation method described in the present application.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present application may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, each of the units may be a software program provided in a computer or a mobile smart device, or may be separately configured hardware devices. Wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application referred to in the present application is not limited to the specific combinations of the technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the application. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (3)

1. The method for constructing and verifying the trusted cross-chain event based on the merck tree is characterized by constructing a cross-chain event merck tree structure and constructing a cross-chain event trusted proof based on a merck path, and specifically comprises the following steps of:
(1) For a blockchain platform needing to carry out cross-chain transaction, a system needs to construct a cross-chain event tree of a merck structure, wherein the cross-chain event tree of the merck structure constructed by the system is parallel to an account state merck tree, the cross-chain event tree is accessed in a public way, and the merck root of the cross-chain event tree and the merck root of the account state tree form the merck root of the whole blockchain together;
(2) The block chain platform throws out a cross-chain event by triggering a cross-chain intelligent contract;
(3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted;
(4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and the related credibility proof, if the verification is not passed, an illegal event rollback flow is executed, if the verification is passed, a subsequent cross-link routing flow is executed, and the verification of the credibility of the cross-chain event is realized based on the merck path of the cross-chain event merck tree of the original blockchain where the cross-chain event is located.
2. The merck tree based trusted cross-chain event constructing and verifying method of claim 1, wherein the throwing or generating of the cross-chain event is achieved through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through a common network consensus of a consensus algorithm as in a common blockchain transaction.
3. An apparatus, the apparatus comprising: one or more processors; a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-2.
CN201911021463.5A 2019-10-24 2019-10-24 Trusted cross-chain event construction and verification method and device based on Merker tree Active CN110766410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911021463.5A CN110766410B (en) 2019-10-24 2019-10-24 Trusted cross-chain event construction and verification method and device based on Merker tree

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911021463.5A CN110766410B (en) 2019-10-24 2019-10-24 Trusted cross-chain event construction and verification method and device based on Merker tree

Publications (2)

Publication Number Publication Date
CN110766410A CN110766410A (en) 2020-02-07
CN110766410B true CN110766410B (en) 2023-09-22

Family

ID=69333890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911021463.5A Active CN110766410B (en) 2019-10-24 2019-10-24 Trusted cross-chain event construction and verification method and device based on Merker tree

Country Status (1)

Country Link
CN (1) CN110766410B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339114B (en) * 2020-02-28 2023-05-09 百度在线网络技术(北京)有限公司 Data access method, device, equipment and storage medium
CN111488615A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 Cross-link realization method and device for service data block chain
CN111914021B (en) * 2020-07-02 2022-12-02 众连智能科技有限公司 Cross-block-chain interaction method, system, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909369A (en) * 2017-10-13 2018-04-13 布比(北京)网络技术有限公司 Based on the common recognition method, apparatus merchandised across chain and storage medium
CN108269190A (en) * 2018-01-17 2018-07-10 深圳四方精创资讯股份有限公司 Across chain method and its system based on across chain relaying platform
CN108881187A (en) * 2018-05-31 2018-11-23 杭州秘猿科技有限公司 A kind of across chain data transferring method and equipment suitable for permitting chain scene
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
CN109471744A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The more subchain system architectures of main chain adduction row based on block chain
CN110288345A (en) * 2019-06-26 2019-09-27 深圳市网心科技有限公司 Across chain communication means, device, main chain node and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909369A (en) * 2017-10-13 2018-04-13 布比(北京)网络技术有限公司 Based on the common recognition method, apparatus merchandised across chain and storage medium
CN108269190A (en) * 2018-01-17 2018-07-10 深圳四方精创资讯股份有限公司 Across chain method and its system based on across chain relaying platform
CN108881187A (en) * 2018-05-31 2018-11-23 杭州秘猿科技有限公司 A kind of across chain data transferring method and equipment suitable for permitting chain scene
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
CN109471744A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The more subchain system architectures of main chain adduction row based on block chain
CN110288345A (en) * 2019-06-26 2019-09-27 深圳市网心科技有限公司 Across chain communication means, device, main chain node and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Joseph Poon等.Plasma: Scalable Autonomous Smart Contracts.《White Paper》.2017,第1-47页. *
李芳 等.区块链跨链技术进展研究.《软件学报》.2019,第30卷(第6期),第1649-1660页. *

Also Published As

Publication number Publication date
CN110766410A (en) 2020-02-07

Similar Documents

Publication Publication Date Title
KR102652551B1 (en) Smart contract execution using distributed coordination
KR102586278B1 (en) Computer-implemented systems and methods for connecting blockchains to digital twins
US20220038289A1 (en) Multi-access edge computing node with distributed ledger
CN110046996B (en) Data processing method and device
CN110766410B (en) Trusted cross-chain event construction and verification method and device based on Merker tree
CN109146490B (en) Block generation method, device and system
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN112508566A (en) Alliance chain-based cross-chain private transaction method and equipment
CN113792347B (en) Federal learning method, device, equipment and storage medium based on block chain
CN112287033B (en) Data synchronization method, equipment and computer readable storage medium
CN113570479B (en) Block chain transmission method, system and storage medium for real estate transaction data
CN114567643B (en) Cross-blockchain data transfer method, device and related equipment
CN112311779B (en) Data access control method and device applied to block chain system
CN110992035A (en) Block chain link point management method, device and system
CN110400217A (en) The regular changing process method and device of intelligent contract
CN110187831A (en) The block data storage system and method for block chain alliance chain
JP2022539283A (en) A method and system for validating blockchain data stored in a storage format different from the blockchain
CN111597269A (en) Block chain-based contract implementation method, device and equipment
CN111640018A (en) Block chain transaction existence verification method and device
CN110033188A (en) Business scheduling method, device, calculating equipment and medium based on block chain
CN111311179A (en) Object processing method and device, electronic equipment and computer readable storage medium
CN111524010B (en) Parallel chain consensus method, apparatus and storage medium
CN116186786A (en) Block chain-based service processing method and device, electronic equipment and readable medium
CN116777631B (en) Transaction uplink method and device based on blockchain, equipment and medium
CN116708463B (en) Information processing method, device, equipment and medium based on multi-block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant