CN113242131A - Block chain cross-chain method and device, electronic equipment and storage medium - Google Patents

Block chain cross-chain method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113242131A
CN113242131A CN202110438195.8A CN202110438195A CN113242131A CN 113242131 A CN113242131 A CN 113242131A CN 202110438195 A CN202110438195 A CN 202110438195A CN 113242131 A CN113242131 A CN 113242131A
Authority
CN
China
Prior art keywords
node
evaluation
nodes
score
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110438195.8A
Other languages
Chinese (zh)
Other versions
CN113242131B (en
Inventor
李纯懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202110438195.8A priority Critical patent/CN113242131B/en
Publication of CN113242131A publication Critical patent/CN113242131A/en
Application granted granted Critical
Publication of CN113242131B publication Critical patent/CN113242131B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a block chain cross-chain method, a block chain cross-chain device, electronic equipment and a storage medium, wherein the block chain cross-chain method comprises the following steps: determining a first score for each first node in the blockchain system; the first score represents the trust level of the corresponding first node; based on the determined first score of each first node, performing notary node recommendation in all the first nodes; wherein, in the determining the first score for each first node in the blockchain system, the method comprises: obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system; determining a degree of trust T between a first node i and each second nodeij(ii) a According to the evaluation set AiConfidence T corresponding to each second nodeijA first score for the first node i is determined.

Description

Block chain cross-chain method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for crossing a blockchain, an electronic device, and a storage medium.
Background
Cross-chain Technology (Cross-chain Technology) is a Technology for value circulation across chains and barriers between chains. Due to the difference of the bottom-layer platforms of the block chain, cross-chain information interaction can be divided into bottom-layer isomorphism and bottom-layer isomorphism, and the common recognition algorithm, the safety mechanism and the like of the bottom-layer isomorphism are different, so that technical challenges such as performance, safety and the like are brought to a cross-chain technology.
In the related art, information interaction between heterogeneous block chains is performed through a Notary mechanism (notify schemes), and a third party serves as a Notary node, but the security and reliability of the Notary node are difficult to guarantee.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a block chain cross-chain method, an apparatus, an electronic device, and a storage medium, so as to solve at least the problem that it is difficult to ensure the security and reliability of a notary node in the related art.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a block chain cross-linking method, which comprises the following steps:
determining a first score for each first node in the blockchain system; the first score represents the trust level of the corresponding first node;
based on the determined first score of each first node, performing notary node recommendation in all the first nodes; wherein the content of the first and second substances,
in the determining the first score for each first node in the blockchain system, the method comprises:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determining a degree of trust T between a first node i and each second nodeij
According to the evaluation set AiConfidence T corresponding to each second nodeijA first score for the first node i is determined.
In the above scheme, the obtaining of the evaluation set a corresponding to the first node i is describediWhen, atThe method comprises the following steps:
broadcasting an evaluation signal with respect to the first node i; the evaluation signal carries a first public key;
receiving an evaluation response returned by each second node corresponding to the first node i; the evaluation response carries evaluation information encrypted based on the first public key;
and decrypting the received evaluation response based on the first private key corresponding to the first public key to obtain the evaluation information of each second node to the first node i.
In the above solution, the determining the trust level T between the first node i and each second nodeijThe method comprises the following steps:
determining the similarity of a first node i and a second node j; the similarity represents the similarity of the first node i and the second node j on the node attribute;
determining the adjacency degree of a first node i and a second node j; the adjacency degree represents the degree proportion of the first node i and the second node j in the network topology of the blockchain system;
and obtaining the trust degree between the first node i and the second node j based on the determined similarity and the determined adjacency.
In the foregoing solution, the recommending notary nodes in all the first nodes based on the determined first score of each first node includes:
and determining at least two first nodes as notary nodes in all the first nodes based on the determined first scores of each first node.
In the foregoing solution, after determining that at least two first nodes are notary nodes among all the first nodes, the method further includes:
splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; the first ciphertext represents a ciphertext obtained by encrypting the second private key;
under the condition of receiving a first request sent by at least one node, acquiring corresponding parts of the first ciphertext from the at least two notary nodes, and restoring the second private key; the first request characterizes a corresponding node request cross-chain.
In the above scheme, evaluation set AiCharacterizing at least one of the following evaluations of the first node i by the second node j:
processing efficiency evaluation, user feedback evaluation and negative information evaluation.
In the above scheme, the evaluation set a corresponding to the first node i is obtainediPreviously, the method further comprises:
receiving a second request sent by a first node i; the second request characterizes the first node i request to be confirmed as a notary node.
The embodiment of the present application further provides a block chain inter-chain device, including:
the scoring unit is used for determining a first score of each first node in the block chain system; the first score represents the trust level of the corresponding first node;
the recommending unit is used for recommending the notary nodes in all the first nodes based on the determined first scores of all the first nodes; wherein the content of the first and second substances,
in the determining the first score of each first node in the blockchain system, the scoring unit is configured to:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determining a degree of trust T between a first node i and each second nodeij
According to the evaluation set AiConfidence T corresponding to each second nodeijA first score for the first node i is determined.
An embodiment of the present application further provides an electronic device, including: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is configured to execute the steps of the block chain crossing method when running the computer program.
The embodiment of the present application further provides a storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above block chain cross-chain method.
In the embodiment of the application, an evaluation set representing evaluation information of all other nodes to a first node in a block chain system is obtained, the trust between the first node and each other node is determined, a first score of the first node is determined according to the evaluation set and the trust corresponding to each other node, and node recommendation is performed based on the determined first score of each first node. Therefore, each node is scored by using the evaluation set and the trust degree among different nodes, and the notary node recommendation is performed based on the scores, so that the safety and the reliability of the notary node recommendation are improved.
Drawings
Fig. 1 is a schematic flowchart of a block chain crossing method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a block chain crossing method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a blockchain inter-chain apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The cross-chain technology is a technology for performing value distribution across chains and barriers between chains. Due to the difference of the bottom-layer platforms of the block chain, cross-chain information interaction can be divided into bottom-layer isomorphism and bottom-layer isomorphism, the common recognition algorithm, the safety mechanism and the like of the bottom-layer isomorphism are different, information interaction cannot be directly carried out among heterogeneous chains, and technical challenges such as performance and safety are brought to a cross-chain technology.
In the related technology, information interaction between heterogeneous block chains is carried out through a notary mechanism, a third party serves as a notary, information interaction between various heterogeneous chains can be supported, and the safety and reliability of the notary are difficult to guarantee.
Based on this, in various embodiments of the application, an evaluation set characterizing evaluation information of the first node by all other nodes in the blockchain system is obtained, the trust level between the first node and each other node is determined, a first score of the first node is determined according to the evaluation set and the trust level corresponding to each other node, and node recommendation is performed based on the determined first score of each first node. Therefore, each node is scored by using the evaluation set and the trust degree among different nodes, and the notary node recommendation is performed based on the scores, so that the safety and the reliability of the notary node recommendation are improved.
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Fig. 1 is a schematic flow chart of an implementation process of a block chain crossing method provided in an embodiment of the present application, and as shown in fig. 1, the block chain crossing method includes:
step 101: determining a first score for each first node in the blockchain system; the first score characterizes a trust level of the corresponding first node.
Step 102: based on the determined first score of each first node, performing notary node recommendation in all the first nodes; wherein the content of the first and second substances,
in the determining the first score for each first node in the blockchain system, the method comprises:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determining a degree of trust T between a first node i and each second nodeij
According to the evaluation set AiCorresponding to each second nodeDegree of trust TijA first score for the first node i is determined.
In this embodiment, the evaluation information of all the second nodes except the first node i in the block chain system to the first node i is obtained, and the evaluation set a corresponding to the first node i is determinediAnd determining the trust level T between the first node i and each second nodeijAccording to the determined evaluation set A corresponding to the first node iiAnd a confidence level T corresponding to each second nodeijDetermining a first score of the first node i, and recommending at least one notary node in all the first nodes based on the determined first score of each first node. Here, the second node is any node other than the first node i in the blockchain system.
The safety of the notary node determination is ensured by constructing a dynamic notary node evaluation model. The method comprises the steps of providing a score ordering by collecting relevant information of various nodes, determining nodes in all first nodes for recommendation, scoring each node by utilizing an evaluation set and trust degrees among different nodes to obtain a first score corresponding to each node, recommending the nodes based on the first score ordering, recommending the nodes with high trust degrees to be notary nodes, improving safety and reliability of notary node recommendation, and further ensuring safety and stability of a block chain system.
In an embodiment, the obtaining of the evaluation set a corresponding to the first node i is describediThe method comprises the following steps:
broadcasting an evaluation signal with respect to the first node i; the evaluation signal carries a first public key;
receiving an evaluation response returned by each second node corresponding to the first node i; the evaluation response carries evaluation information encrypted based on the first public key;
and decrypting the received evaluation response based on the first private key corresponding to the first public key to obtain the evaluation information of each second node to the first node i.
When notary node recommendation is needed, the block chain system sends the block chain to all nodesThe evaluation signal of the first node i carries a first public key and an address of the first node to be evaluated, after all second nodes except the first node in the block chain system receive the evaluation signal, evaluation information encryption is carried out on the basis of the first public key carried in the evaluation signal, an evaluation response carrying the evaluation information encrypted on the basis of the first public key is returned, the block chain system decrypts the received evaluation response returned by each second node on the basis of the first private key corresponding to the first public key to obtain the evaluation information of each second node to the first node i, and an evaluation set A corresponding to the first node i is determined on the basis of the obtained evaluation information of all the second nodesi
Here, it may be because the nodes need notary node requirements generated across the chain; or when the node actively applies for becoming a notary node, whether the node can be used as the notary node is determined by grading.
Therefore, the evaluation information of each second node to the first node i in the block chain system is obtained by broadcasting the evaluation signal, the first score of each first node can be effectively determined, the notary node recommendation is carried out based on the scores, and the reliability of the notary node recommendation is improved.
The evaluation response returned by each second node may carry a digital signature of the second node, the digital signature is obtained by encrypting the hash value of the evaluation information by the corresponding private key of the second node, and the block chain system decrypts the digital signature by using the corresponding public key after receiving the digital signature, so that the identity of the second node returning the evaluation response can be determined.
In one embodiment, set A of evaluationsiCharacterizing at least one of the following evaluations of the first node i by the second node j:
processing efficiency evaluation, user feedback evaluation and negative information evaluation.
Here, the evaluation set a corresponding to the first node i is determined based on the acquired evaluation information of all the second nodesiAt least representing the processing efficiency evaluation P of the second node j to the first node i1User feedback evaluation P2And negative side effectsInformation evaluation P3
Representing the obtained processing efficiency evaluation P of the first node i by all the second nodes according to the following formula 11
Figure BDA0003034028750000071
Wherein p represents the processing efficiency evaluation weight of all the second nodes to the first node i; t isjIndicating transaction processing time for each second node.
Representing and acquiring user feedback evaluation P of all second nodes to the first node i through the following formula 22
Figure BDA0003034028750000072
Wherein q represents the user feedback evaluation weight of all the second nodes to the first node i; cjAnd representing the historical evaluation value of each second node user.
The negative information evaluation P of the first node i by all the second nodes is represented and obtained through the following formula 33
Figure BDA0003034028750000073
Wherein r represents the negative information evaluation weight of all the second nodes to the first node i; n is a radical ofjIndicating the number of negative message evaluations per second node.
Thus, the evaluation set a corresponding to the first node i can be characterized by the following formula 4iEvaluation set AiAt least representing the processing efficiency evaluation P of the second node j to the first node i1User feedback evaluation P2And negative information evaluation P3
Ai={P1,P2,P3} (4)
In one embodiment, the determining the first sectionConfidence T between point i and each second nodeijThe method comprises the following steps:
determining the similarity of a first node i and a second node j; the similarity represents the similarity of the first node i and the second node j on the node attribute;
determining the adjacency degree of a first node i and a second node j; the adjacency degree represents the degree proportion of the first node i and the second node j in the network topology of the blockchain system;
obtaining the trust degree between the first node i and the second node j based on the determined similarity and the determined adjacency
Determining a degree of trust T between a first node i and each second nodeijAnd then, for each second node, respectively determining the similarity of the first node i and the second node j and the adjacency of the first node i and the second node j, and obtaining the trust between the first node i and the second node j based on the determined similarity and the determined adjacency.
Here, the similarity represents the degree of similarity between the first node i and the second node j in the node attributes, and the similarity R between the first node i and the second node j is calculated by the following formula 5S(i,j):
Figure BDA0003034028750000081
Wherein S (i, j) represents the similarity between the first node i and the second node j,
Figure BDA0003034028750000082
representing the sum of the similarity of the second node j to all nodes.
In a blockchain system, a degree of a node characterizes the extent to which this node is in contact with surrounding nodes. If one node needs to carry out information propagation, the neighboring nodes with larger information propagation degree values are more beneficial to the diffusion of information flow in the network. Calculating the adjacency degree of the first node i and the second node j by the following formula 6 by determining the proportion of the degree of the adjacency degree characterizing the first node i to the sum of the degrees of all the adjacent nodes of the second node jRd(i,j):
Figure BDA0003034028750000083
Wherein d isiRepresents the degree, sigma of the first node ik∈N(j)dkThe sum of the degrees of the second node j and all neighboring nodes is characterized.
For example, if there are 5 nodes adjacent to the second node j in addition to the first node i, the degrees of the 5 nodes are 2, 3, 4, 3, and 3, respectively, and the degree of the first node i is 5, then the adjacency of the first node i and the second node j is determined
Figure BDA0003034028750000084
Based on the determined similarity RS(i, j) and adjacency Rd(i, j), the degree of trust T between the first node i and the second node j is calculated by the following equation 7ij
Tij=(1-α)*RS(i,j)+α*Rd(i,j) (7)
Wherein α represents the adjacency Rd(ii) a weight parameter of (i, j).
According to evaluation set AiConfidence T corresponding to each second nodeijThe first Score of the first node i is calculated by the following equation 8i
Figure BDA0003034028750000091
Where N denotes the total number of nodes in the blockchain system, α denotes the probability of hopping, N(j)Set of neighboring nodes representing node j, AiAn evaluation set, Score, representing evaluation information of all second nodes j to the first node ijRepresenting a first score for a second node j. Here, α is generally 0.85.
In an embodiment, the making of notary node recommendations among all first nodes based on the determined first score of each first node includes:
and determining at least two first nodes as notary nodes in all the first nodes based on the determined first scores of each first node.
Score based on the determined first Score of each first nodeiAnd sequencing, namely determining at least two first nodes as notary nodes from all the first nodes according to the sequencing of the first scores. Therefore, the notary node recommendation is performed by using the scores among different nodes, and the safety and reliability of the notary node recommendation are improved.
Here, the blockchain system broadcasts the ranking results and calculation process of the first score for each first node. If the objection information sent by the nodes is not received within the set time, determining a set number of first nodes with top ranking as notary nodes from all the first nodes; and if the objection information sent by any node is received within the set time, re-determining the first score of each first node in the block chain system.
In one embodiment, after said determining at least two first nodes among all first nodes to be notary nodes, the method further comprises:
splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; the first ciphertext represents a ciphertext obtained by encrypting the second private key;
under the condition of receiving a first request sent by at least one node, acquiring corresponding parts of the first ciphertext from the at least two notary nodes, and restoring the second private key; the first request characterizes a corresponding node request cross-chain.
Encrypting the second private key by using the key to obtain a first ciphertext corresponding to the second private key, splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; and under the condition of receiving a first request of requesting a cross-chain sent by at least one node, acquiring a corresponding part of the first ciphertext from the notary node, and restoring a second private key. Here, when the first ciphertext is split into multiple parts, the number of the split parts may be set according to the number of notary nodes, so that each notary node receives at least one part of the first ciphertext; each portion may be distributed to at least one notary node.
Therefore, the node performs cross-chain information interaction based on the acquired second private key, and a decentralized data verification process is achieved.
When the corresponding portion of the first ciphertext is obtained from the notary node, the identity of the node may be determined to be the notary node by verifying the digital signature of the node that sent the information in response to the first request, and the second private key is recovered based on the portion of the first ciphertext sent by the node determined to be the notary node.
In an embodiment, the evaluation set a corresponding to the first node i is obtainediPreviously, the method further comprises:
receiving a second request sent by a first node i; the second request characterizes the first node i request to be confirmed as a notary node.
And receiving a second request sent by the first node i, wherein the second request confirms that the first node i is a notary node, and acquiring evaluation information of all second nodes except the first node i in the block chain system to the first node i based on the second request. In this way, when the first node applies to become the notary node, the evaluation information of all the nodes in the block chain system to the first node is obtained, so as to determine whether to recommend the first node as the notary node.
In one embodiment, after obtaining the evaluation information of all the second nodes to each first node i, a trust relationship graph representing the trust relationships among all the nodes may be generated.
The present application will be described in further detail with reference to the following application examples.
With reference to fig. 2, the corresponding block chain inter-chain method includes the following steps:
step 201: when the first node applies to become a notary node, information such as processing efficiency evaluation, user feedback evaluation and negative information evaluation of the first node is collected, relevant information of the first node is evaluated, and whether the first node is the notary node or not is determined according to an evaluation result.
The blockchain system sends an evaluation signal related to the first node i to all nodes, and broadcasts a public key of the blockchain system and an address of the first node to be evaluated; after each node receives the signal, the received public key of the block chain system is used for encrypting information, and the private key of the node is used for encrypting a signature; the blockchain system collects the encrypted information of each node and uses a private key corresponding to the public key of the system to decrypt the encrypted information.
And the block chain system collects the information of the first nodes i, such as processing efficiency evaluation, user feedback evaluation, negative information evaluation and the like, carries out credit degree sorting, and broadcasts a sorting result and a calculation process of the first scores of each first node.
The first score is calculated as follows:
first, the weight W of each evaluation of the first node i by all the second nodes is determined by the following formula 91
Figure BDA0003034028750000111
Representing and obtaining the processing efficiency evaluation P of the first node i by all the second nodes according to formula 11
Representing and obtaining user feedback evaluation P of all second nodes to the first node i through formula 22
Negative information evaluation P of all second nodes to the first node i, which is obtained through representation of formula 33
Representing the evaluation set A corresponding to the first node i through formula 4iEvaluation set AiAt least representing the processing efficiency evaluation P of the second node j to the first node i1User feedback evaluation P2And negative information evaluation P3
Calculating the similarity R of the first node i and the second node j by formula 5S(i, j) characterizing how similar the first node i and the second node j are in the node attribute.
There will also be a higher frequency of interaction between two nodes with a certain similarity in node properties. The similarity S (i, j) of the first node i and the second node j is defined by the following equation 10:
S(i,j)=|H(i)∩H(j)| (10)
where H (i) represents the set of node attributes for the first node i, and H (j) represents the set of node attributes for the second node j.
In a blockchain system, a degree of a node characterizes the extent to which this node is in contact with surrounding nodes. If one node needs to carry out information propagation, the neighboring nodes with larger information propagation degree values are more beneficial to the diffusion of information flow in the network. Calculating the adjacency degree R of the first node i and the second node j by formula 6 by determining the proportion of the degree of the adjacency degree characterizing the first node i to the sum of the degrees of all the adjacent nodes of the second node jd(i,j)。
Based on the determined similarity RS(i, j) and adjacency Rd(i, j), calculating the trust level T between the first node i and the second node j by formula 7ij
According to evaluation set AiConfidence T corresponding to each second nodeijCalculating a first Score of the first node i by equation 8i
Score according to first ScoreiCarry out sequencing
The blockchain system broadcasts the ranking results and calculation process of the first scores of each first node. If the objection information sent by any node is not received within the set time, determining the first nodes with the set number and the top rank as notary nodes from all the first nodes, and removing the nodes with the top rank.
Step 202: splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; the first ciphertext represents a ciphertext obtained by encrypting the second private key.
Encrypting the second private key by using the key to obtain a first ciphertext corresponding to the second private key, splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; and under the condition of receiving a first request of requesting a cross-chain sent by at least one node, acquiring a corresponding part of the first ciphertext from the notary node, and restoring a second private key. Here, when the first ciphertext is split into multiple parts, the number of the split parts may be set according to the number of notary nodes, so that each notary node receives at least one part of the first ciphertext; each portion may be distributed to at least one notary node.
When the corresponding portion of the first ciphertext is obtained from the notary node, the identity of the node may be determined to be the notary node by verifying the digital signature of the node that sent the information in response to the first request, and the second private key is recovered based on the portion of the first ciphertext sent by the node determined to be the notary node. Therefore, each notary node cannot possess a complete key, and the obtained ciphertexts are combined together, so that the complete key cannot be deduced.
In order to implement the method according to the embodiment of the present application, an embodiment of the present application further provides a block chain inter-chain device, as shown in fig. 3, where the block chain inter-chain device includes:
a scoring unit 301, configured to determine a first score of each first node in the blockchain system; the first score represents the trust level of the corresponding first node;
a recommending unit 302, configured to perform notary node recommendation in all first nodes based on the determined first score of each first node; wherein the content of the first and second substances,
when determining the first score of each first node in the blockchain system, the scoring unit 301 is configured to:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determiningTrust T between first node i and each second nodeij
According to the evaluation set AiConfidence T corresponding to each second nodeijA first score for the first node i is determined.
Wherein, in one embodiment, the scoring unit 301 is configured to:
broadcasting an evaluation signal with respect to the first node i; the evaluation signal carries a first public key;
receiving an evaluation response returned by each second node corresponding to the first node i; the evaluation response carries evaluation information encrypted based on the first public key;
and decrypting the received evaluation response based on the first private key corresponding to the first public key to obtain the evaluation information of each second node to the first node i.
In one embodiment, the scoring unit 301 is configured to:
determining the similarity of a first node i and a second node j; the similarity represents the similarity of the first node i and the second node j on the node attribute;
determining the adjacency degree of a first node i and a second node j; the adjacency degree represents the degree proportion of the first node i and the second node j in the network topology of the blockchain system;
and obtaining the trust degree between the first node i and the second node j based on the determined similarity and the determined adjacency.
In an embodiment, the recommending unit 302 is configured to:
and determining at least two first nodes as notary nodes in all the first nodes based on the determined first scores of each first node.
In one embodiment, the apparatus further comprises:
the splitting unit is used for splitting the first ciphertext into at least two parts and sending the first ciphertext of each part to the determined notary node; the first ciphertext represents a ciphertext obtained by encrypting the second private key;
the restoring unit is used for acquiring corresponding parts of the first ciphertext from the at least two notary nodes and restoring the second private key under the condition of receiving a first request sent by at least one node; the first request characterizes a corresponding node request cross-chain.
In one embodiment, the evaluation set AiCharacterizing at least one of the following evaluations of the first node i by the second node j:
processing efficiency evaluation, user feedback evaluation and negative information evaluation.
In one embodiment, the apparatus further comprises:
a receiving unit, configured to receive a second request sent by a first node i; the second request characterizes the first node i request to be confirmed as a notary node.
In practical applications, the scoring Unit 301, the recommending Unit 302, the splitting Unit, the restoring Unit, and the receiving Unit may be implemented by processors in a block chain based cross-chain, such as a Central Processing Unit (CPU), a Digital Signal Processor (DSP), a Micro Control Unit (MCU), or a Programmable Gate Array (FPGA).
It should be noted that: in the block chain crossing device provided in the above embodiment, when the block chain crossing is performed, only the division of each program module is illustrated, and in practical applications, the processing distribution may be completed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules to complete all or part of the processing described above. In addition, the block chain crossing device provided in the above embodiments and the block chain crossing method embodiment belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
Based on the hardware implementation of the program module, and in order to implement the block chain cross-chain method in the embodiment of the present application, an embodiment of the present application further provides an electronic device, as shown in fig. 4, where the electronic device 400 includes:
a communication interface 410 capable of information interaction with other devices such as network devices and the like;
and the processor 420 is connected with the communication interface 410 to realize information interaction with other equipment, and is used for executing the method provided by one or more technical solutions when the computer program runs. And the computer program is stored on the memory 430.
Of course, in practice, the various components in the electronic device 400 are coupled together by a bus system 440. It is understood that the bus system 440 is used to enable communications among the components. The bus system 440 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 440 in fig. 4.
The memory 430 in the embodiments of the present application is used to store various types of data to support the operation of the electronic device 400. Examples of such data include: any computer program for operating on the electronic device 400.
It will be appreciated that the memory 430 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The memory 430 described in the embodiments herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The method disclosed in the embodiments of the present application may be applied to the processor 420, or implemented by the processor 420. Processor 420 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 420. The processor 420 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. Processor 420 may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the memory 430, and the processor 420 reads the program in the memory 430 and performs the steps of the aforementioned methods in conjunction with its hardware.
Optionally, when the processor 420 executes the program, the corresponding process implemented by the electronic device in each method of the embodiment of the present application is implemented, and for brevity, no further description is given here.
In an exemplary embodiment, the present application further provides a storage medium, specifically a computer-readable storage medium, for example, a memory 430 storing a computer program, which can be executed by a processor 420 of an electronic device to perform the steps of the foregoing method. The computer readable storage medium may be Memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, electronic device and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The technical means described in the embodiments of the present application may be arbitrarily combined without conflict. Unless otherwise specified and limited, the term "coupled" is to be construed broadly, e.g., as meaning electrical connections, or as meaning communications between two elements, either directly or indirectly through intervening media, as well as the specific meanings of such terms as understood by those skilled in the art.
In addition, in the examples of the present application, "first", "second", and the like are used for distinguishing similar objects, and are not necessarily used for describing a specific order or a sequential order. It should be understood that "first \ second \ third" distinct objects may be interchanged under appropriate circumstances such that the embodiments of the application described herein may be implemented in an order other than those illustrated or described herein.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Various combinations of the specific features in the embodiments described in the detailed description may be made without contradiction, for example, different embodiments may be formed by different combinations of the specific features, and in order to avoid unnecessary repetition, various possible combinations of the specific features in the present application will not be described separately.

Claims (10)

1. A method for block chain chaining, the method comprising:
determining a first score for each first node in the blockchain system; the first score represents the trust level of the corresponding first node;
based on the determined first score of each first node, performing notary node recommendation in all the first nodes; wherein the content of the first and second substances,
in the determining the first score for each first node in the blockchain system, the method comprises:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determining a degree of trust T between a first node i and each second nodeij
According to the evaluation set AiConfidence T corresponding to each second nodeijA first score for the first node i is determined.
2. The method according to claim 1, wherein the obtaining of the evaluation set a corresponding to the first node i is performediThe method comprises the following steps:
broadcasting an evaluation signal with respect to the first node i; the evaluation signal carries a first public key;
receiving an evaluation response returned by each second node corresponding to the first node i; the evaluation response carries evaluation information encrypted based on the first public key;
and decrypting the received evaluation response based on the first private key corresponding to the first public key to obtain the evaluation information of each second node to the first node i.
3. The method of claim 1, wherein determining a degree of trust T between the first node i and each second nodeijThe method comprises the following steps:
determining the similarity of a first node i and a second node j; the similarity represents the similarity of the first node i and the second node j on the node attribute;
determining the adjacency degree of a first node i and a second node j; the adjacency degree represents the degree proportion of the first node i and the second node j in the network topology of the blockchain system;
and obtaining the trust degree between the first node i and the second node j based on the determined similarity and the determined adjacency.
4. The method of claim 1, wherein performing notary node recommendations among all first nodes based on the determined first score for each first node comprises:
and determining at least two first nodes as notary nodes in all the first nodes based on the determined first scores of each first node.
5. The method of claim 4, wherein after the determining at least two first nodes among all first nodes are notary nodes, the method further comprises:
splitting the first ciphertext into at least two parts, and sending the first ciphertext of each part to the determined notary node; the first ciphertext represents a ciphertext obtained by encrypting the second private key;
under the condition of receiving a first request sent by at least one node, acquiring corresponding parts of the first ciphertext from the at least two notary nodes, and restoring the second private key; the first request characterizes a corresponding node request cross-chain.
6. The method according to any one of claims 1 to 5, wherein evaluation set AiCharacterizing at least one of the following evaluations of the first node i by the second node j:
processing efficiency evaluation, user feedback evaluation and negative information evaluation.
7. The method according to any one of claims 1 to 5, wherein the evaluation set A corresponding to the first node i is obtainediPreviously, the method further comprises:
receiving a second request sent by a first node i; the second request characterizes the first node i request to be confirmed as a notary node.
8. A blockchain inter-chain apparatus, comprising:
the scoring unit is used for determining a first score of each first node in the block chain system; the first score represents the trust level of the corresponding first node;
the recommending unit is used for recommending the notary nodes in all the first nodes based on the determined first scores of all the first nodes; wherein the content of the first and second substances,
in the determining the first score of each first node in the blockchain system, the scoring unit is configured to:
obtaining an evaluation set A corresponding to a first node ii(ii) a The evaluation set AiRepresenting the evaluation information of all second nodes corresponding to the first node i; the second node is any node except the first node i in the block chain system;
determining a degree of trust T between a first node i and each second nodeij
According to the evaluation set AiConfidence T corresponding to each second nodeijDetermining a first score for a first node i。
9. An electronic device, comprising: a processor and a memory for storing a computer program capable of running on the processor,
wherein the processor is configured to execute the steps of the blockchain cross-chain method of any one of claims 1 to 7 when running the computer program.
10. A storage medium having stored thereon a computer program for implementing the steps of the blockchain cross-chain method according to any one of claims 1 to 7 when executed by a processor.
CN202110438195.8A 2021-04-22 2021-04-22 Block chain crossing method and device, electronic equipment and storage medium Active CN113242131B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110438195.8A CN113242131B (en) 2021-04-22 2021-04-22 Block chain crossing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110438195.8A CN113242131B (en) 2021-04-22 2021-04-22 Block chain crossing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113242131A true CN113242131A (en) 2021-08-10
CN113242131B CN113242131B (en) 2023-10-24

Family

ID=77128926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110438195.8A Active CN113242131B (en) 2021-04-22 2021-04-22 Block chain crossing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113242131B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113688317A (en) * 2021-08-24 2021-11-23 江苏中润普达信息技术有限公司 Information recommendation method and system based on block chain
CN113890739A (en) * 2021-08-17 2022-01-04 北京邮电大学 Cross-block-chain authentication method and device, electronic equipment and medium
CN114363050A (en) * 2021-12-31 2022-04-15 北京交通大学 Decentralized cross-link protocol communication method based on notarization and Hash locking

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190066119A1 (en) * 2017-08-22 2019-02-28 Mastercard International Incorporated Method and system for review verification and trustworthiness scoring via blockchain
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
CN110249350A (en) * 2016-09-20 2019-09-17 河谷控股Ip有限责任公司 Sample tracking, system and method are carried out via sample tracking chain
US20190370813A1 (en) * 2018-06-04 2019-12-05 Coral Protocol Decentralized safeguard against fraud
CN110598010A (en) * 2018-07-24 2019-12-20 腾讯科技(深圳)有限公司 Grading processing method, system and storage medium of media content
US20200126116A1 (en) * 2018-10-18 2020-04-23 Adobe Inc. System for providing proof and attestation services for claim verification
CN111552853A (en) * 2020-04-20 2020-08-18 卓尔智联(武汉)研究院有限公司 Data capture method and device, electronic equipment and storage medium
CN111598681A (en) * 2020-04-30 2020-08-28 深圳前海星际同辉科技有限公司 Credit evaluation method, credit evaluation system and readable storage medium
CN112116473A (en) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 Cross-chain notary mechanism evaluation system and platform
CN112508704A (en) * 2020-12-17 2021-03-16 杭州趣链科技有限公司 Block chain cross-chain transaction method and device, computer equipment and storage medium
CN112637127A (en) * 2020-11-23 2021-04-09 北京邮电大学 Cross-block-chain communication method and device
CN112637189A (en) * 2020-12-18 2021-04-09 重庆大学 Multi-layer block chain cross-domain authentication method in application scene of Internet of things

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110249350A (en) * 2016-09-20 2019-09-17 河谷控股Ip有限责任公司 Sample tracking, system and method are carried out via sample tracking chain
US20190066119A1 (en) * 2017-08-22 2019-02-28 Mastercard International Incorporated Method and system for review verification and trustworthiness scoring via blockchain
US20190370813A1 (en) * 2018-06-04 2019-12-05 Coral Protocol Decentralized safeguard against fraud
CN110598010A (en) * 2018-07-24 2019-12-20 腾讯科技(深圳)有限公司 Grading processing method, system and storage medium of media content
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
US20200126116A1 (en) * 2018-10-18 2020-04-23 Adobe Inc. System for providing proof and attestation services for claim verification
CN111552853A (en) * 2020-04-20 2020-08-18 卓尔智联(武汉)研究院有限公司 Data capture method and device, electronic equipment and storage medium
CN111598681A (en) * 2020-04-30 2020-08-28 深圳前海星际同辉科技有限公司 Credit evaluation method, credit evaluation system and readable storage medium
CN112116473A (en) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 Cross-chain notary mechanism evaluation system and platform
CN112637127A (en) * 2020-11-23 2021-04-09 北京邮电大学 Cross-block-chain communication method and device
CN112508704A (en) * 2020-12-17 2021-03-16 杭州趣链科技有限公司 Block chain cross-chain transaction method and device, computer equipment and storage medium
CN112637189A (en) * 2020-12-18 2021-04-09 重庆大学 Multi-layer block chain cross-domain authentication method in application scene of Internet of things

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
MINGLI WU ECT.: "A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond", 《IEEE INTERNET OF THINGS JOURNAL》 *
YING LAN ECT.: "TrustCross: Enabling Confidential Interoperability across Blockchains Using Trusted Hardware", Retrieved from the Internet <URL:https://arxiv.org/pdf/2103.13809> *
张亮;刘百祥;张如意;江斌鑫;刘一江;: "区块链技术综述", 计算机工程, no. 05 *
戴炳荣,姜胜明,李顿伟,李超: "基于改进PageRank算法的跨链公证人机制评价模型", 《计算机工程》 *
朱志强;: "基于区块链的档案数据共享可信度机制构建", 黑龙江档案, no. 04 *
赵莉;任杰;: "基于多层次结构模型的云服务信任评估算法优化", 南京理工大学学报, no. 01 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113890739A (en) * 2021-08-17 2022-01-04 北京邮电大学 Cross-block-chain authentication method and device, electronic equipment and medium
CN113688317A (en) * 2021-08-24 2021-11-23 江苏中润普达信息技术有限公司 Information recommendation method and system based on block chain
CN114363050A (en) * 2021-12-31 2022-04-15 北京交通大学 Decentralized cross-link protocol communication method based on notarization and Hash locking

Also Published As

Publication number Publication date
CN113242131B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN113242131A (en) Block chain cross-chain method and device, electronic equipment and storage medium
US20220368545A1 (en) Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
WO2020134942A1 (en) Identity verification method and system therefor
WO2020061923A1 (en) Blockchain-based account management system and management method, and storage medium
CN111245597B (en) Key management method, system and equipment
CN113487042B (en) Federal learning method, device and federal learning system
JP6069852B2 (en) Information processing apparatus, information processing method, and program
Znaidi et al. Hierarchical node replication attacks detection in wireless sensor networks
CN113162768B (en) Intelligent Internet of things equipment authentication method and system based on block chain
Wang et al. Efficient public verification on the integrity of multi-owner data in the cloud
CN111428269B (en) Data access method, device and terminal equipment
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
US11394544B2 (en) Validation of blockchain activities based on proof of hardware
CN110177124A (en) Identity identifying method and relevant device based on block chain
US11477184B2 (en) Conducting secure interactions utilizing reliability information
Lu et al. Secure collaborative outsourced data mining with multi-owner in cloud computing
CN115499249B (en) File storage method and system based on block chain distributed encryption
Chen et al. Verifiable dynamic ranked search with forward privacy over encrypted cloud data
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN111080296B (en) Verification method and device based on blockchain system
Wu et al. Secure public data auditing scheme for cloud storage in smart city
CN113434906B (en) Data query method, device, computer equipment and storage medium
Duan et al. Design of anonymous authentication scheme for vehicle fog services using blockchain
Rani et al. Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant