CN114172661A - Bidirectional chain-crossing method, system and device for digital assets - Google Patents

Bidirectional chain-crossing method, system and device for digital assets Download PDF

Info

Publication number
CN114172661A
CN114172661A CN202111467461.6A CN202111467461A CN114172661A CN 114172661 A CN114172661 A CN 114172661A CN 202111467461 A CN202111467461 A CN 202111467461A CN 114172661 A CN114172661 A CN 114172661A
Authority
CN
China
Prior art keywords
chain
node
hosting
verification
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111467461.6A
Other languages
Chinese (zh)
Other versions
CN114172661B (en
Inventor
郭光华
戴伟
刘斌啸
罗建满
卢瑞瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Lianwang Technology Co ltd
Original Assignee
Hangzhou Lianwang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Lianwang Technology Co ltd filed Critical Hangzhou Lianwang Technology Co ltd
Priority to CN202111467461.6A priority Critical patent/CN114172661B/en
Publication of CN114172661A publication Critical patent/CN114172661A/en
Application granted granted Critical
Publication of CN114172661B publication Critical patent/CN114172661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a bidirectional chain-crossing method of a digital asset, which comprises the steps of chain-crossing circulation of a first blockchain digital asset to a second blockchain and reverse redemption of the digital asset, and specifically comprises the following steps: verifying the chain crossing information of the first blockchain through a light node in the second blockchain, locking the first blockchain digital asset serving as a chain crossing asset in a hosting address by a hosting node after the verification is passed, and generating a mapping asset corresponding to the chain crossing asset in the second blockchain for circulation; responding to the redemption request of the digital asset, the escrow node carries out threshold signature based on aggregation multi-signature on the redemption transaction, and the verification node further verifies the threshold signature; and after the verification is successful, the escrow node is permitted to release the digital assets to the original account address of the first block chain. Based on the invention, the small amount mortgage game theory is combined with verification node consensus layer hosting fusion and a novel aggregation multi-pick threshold algorithm bidirectional decentralized cross-chain is adopted.

Description

Bidirectional chain-crossing method, system and device for digital assets
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a bidirectional chain crossing method, system and device for digital assets.
Background
Since the next half year 2015, block chain technology has developed explosively.
Due to the independence of the parallel block chains, the problems of the block chains in the aspects of information intercommunication, value transfer and the like need to be solved. Cross-chain, as the name implies, is a technique that allows value to flow directly across the barriers between chains. The cross-chain technology is a new research hotspot in the field of block chains, and establishes a uniform communication channel suitable for a plurality of different systems through a certain consensus scheme and a connection mechanism so as to realize interoperation between different parallel chains. The chain-crossing technology is at the emerging stage at present, and has attracted the extensive attention of government departments and research institutions.
Such as: (1) the digital asset cross-chain of ChainX adopts multiple signature escrow combined with light nodes to verify the cross-chain; the method has the defects that the multi-signature hosting of the digital assets has limitations (such as 15 signatures at most, large exchange commission, and only reputation burden on a host and no economic burden), and in addition, because the light nodes are single-direction verification, the two-way cross-linking cannot be realized in the main block chain cross-linking.
(2) The interclay digital asset cross-chain realizes cross-chain by adopting a game asset excess mortgage mode; the disadvantages are the same as other defi logics, risk clearing caused by circulation fluctuation of the digital assets, and limited cross-link resources of the digital assets caused by excessive mortgage.
(3) The digital asset cross-chaining of etherhouse Wbtc employs several federation agencies as warranty similar federal cross-chaining. The drawback is that it is too centralised and there is a risk of centralisation.
(4) The RenBTC digital asset cross-chaining employs a distributed key in conjunction with all verification nodes of the network to jointly guarantee cross-chaining hosting of the digital asset; the method has the defects that the distributed key calculation of the single private key needs to find a trusted execution environment for recovering the security of the key, and the private key is easy to leak in a responsible communication implementation environment.
In this ten thousand chain interconnected era in the future, cross-chain interoperability is an important ring. Each currency has its own unique value and definition, such as CBDC for digital legal, Diem for dollar-like, BTC for value storage, ETH for e-fuel-like, etc., and the ecological value of the entire blockchain is actually realized only when inter-chain islanding is broken and blockchain networks are formed. Therefore, a need for a secure, versatile and bi-directional chain-crossing method is urgently needed.
Disclosure of Invention
In view of the above, the invention provides a bidirectional chain-crossing method for digital assets, which is used for circulation and redemption of the digital assets on different chains, the light node chain-crossing is adopted to ensure the safety and decentralization of the unidirectional chain-crossing, and the decentralization chain-crossing which is the same as a POS network is made by adopting the small amount mortgage game science, the verification node consensus layer hosting fusion and the novel aggregation multi-sign threshold algorithm fusion, so as to further realize the bidirectional chain-crossing of the digital assets.
A bi-directional cross-chaining method of a digital asset, comprising cross-chaining circulation of a first blockchain digital asset to a second blockchain and reverse redemption of the digital asset as follows:
verifying the chain crossing information of the first blockchain through a light node in the second blockchain, locking the first blockchain digital asset serving as a chain crossing asset in a hosting address by a hosting node after the verification is passed, and generating a mapping asset corresponding to the chain crossing asset in the second blockchain for circulation;
responding to the redemption request of the digital asset, the escrow node carries out threshold signature based on aggregation multi-signature on the redemption transaction, and the verification node further verifies the threshold signature;
and after the verification is successful, the escrow node is permitted to release the digital assets to the original account address of the first block chain.
The first blockchain and the second blockchain are two different networks of architecturally and logically blockchains that differ in the digital assets that are identified for circulation across the chains.
The bidirectional cross-chain comprises two processes:
(1) the first blockchain digital asset is circulated across the chain to the second blockchain:
the process is to validate, by a first blockchain light node on a second blockchain, cross-chain information from the first blockchain and lock a cross-chain asset in a fixed escrow address, which is a separate on-chain address associated with the first blockchain, while generating on the second blockchain a mapped asset corresponding to the cross-chain asset, which belongs to a negotiable digital asset of the second blockchain, equivalent to cross-linking the digital asset of the first blockchain into the second blockchain.
(2) Reverse redemption of the second blockchain locked digital asset:
because the light node cross-link belongs to the single cross-link process, the reverse redemption cannot be realized, here, a verification node and a hosting node are combined, the centralization of hosting caused by selecting a plurality of hosting nodes from trusts is improved, and through small amount mortgage, excessive mortgage like Interlay is not needed, only one point mortgage far smaller than the hosting limit is needed to punish laziness or collusion of some nodes, so that efficient hosting is realized, and through improving the traditional multiple signatures, threshold signature logic is implemented by aggregating multiple signatures, the multiple signature flow is reduced, the signature path is expanded, and finally, the reverse redemption of the digital asset with the novel POS consensus characteristic is realized.
The traditional POS consensus mechanism is internally provided with uniform digital assets, one-third node errors are tolerated by a Byzantine fault-tolerant algorithm, the node acquires the permission of voting consensus by paying a certain amount of digital assets as a guarantee fund, and in order to prevent malicious nodes, the node is generally required to perform excess mortgage to acquire the permission of participating in consensus. The mechanism is a mode with much labor and much time, and has the advantages of simple algorithm, easy realization, huge cost investment if a system is damaged, and certain safety guarantee.
Further, the validation node is deployed in a second blockchain for performing consensus validation of cross-chain transactions;
the hosting node is used for managing locking and releasing of cross-chain assets and is selected and obtained from the verification nodes through a small amount mortgage game mechanism.
The common identification layer of the verification nodes is fused with the escrow nodes, and the escrow nodes are obtained from the verification nodes through small amount mortgage game selection, namely the escrow nodes are the verification nodes, so that the safety of the escrow nodes is improved, the on-chain independent signature is realized, and the off-chain multi-signature verification is changed. Under this mental logic, the more proximate a managed node is to infinity, the more decentralized.
In particular, the small amount mortgage gaming mechanism is implemented as follows:
setting a shared resource pool in a second block chain, and transferring the small share mapping assets held by the verification nodes into the shared resource pool as the mortgage of the election hosting nodes by the verification nodes;
the verification node endows a reputation value to the verification node during initial registration, and the reputation value is accumulated according to the times of successful participation of the verification node in cross-chain consensus verification and successful hosting of cross-chain assets;
and determining whether the verification node becomes a managed node or not according to the mortgage and the reputation value and a fixed share proportion.
The shared resource pool is used as an execution tool, can be a storage node or an intelligent contract or an associated server, is deployed in the second block chain, is used for storing the mortgage of the verification node, and can execute excitation or punishment aiming at the verification node, including release and locking of the mortgage.
The small amount mortgage game mechanism increases the accumulation of reputation values of the verification nodes, the mortgages of the verification nodes are less, the single mortgage of the verification nodes does not affect the overall result according to POS consensus logic, the verification nodes need to serially execute the mortgage, the result of the multi-signature aggregation signature can be changed, each verification node is endowed with the reputation value as verification or trusteeship guarantee, once a certain node executes the mortgage, the future income, the accumulated reputation value and the mortgage are lost, and the reputation value is used as a reference for next election of the trusteeship node, so that the safe verification and trusteeship of the verification nodes and the trusteeship node are guaranteed.
Further, the first blockchain interlinkage information is verified through the light node in the second blockchain, the first blockchain digital asset is locked in the hosting address as an interlinkage asset by the hosting node after the verification is passed, and a mapping asset corresponding to the interlinkage asset is generated in the second blockchain for circulation, and the specific flow is as follows:
deploying a first blockchain light node on a second blockchain, setting a relay program, verifying the cross-chain information of the digital assets from the first blockchain to the second blockchain by recording block head information in real time through the light node, and synchronizing corresponding cross-chain transactions from the first blockchain to the second blockchain through the relay program;
in the process, the light node verifies the cross-chain information to ensure the authenticity of the cross-chain information of the first block chain, a Sync synchronization tool can be designed in a relay program to synchronize the cross-chain transaction related to the verified cross-chain information in the first block chain, and the cross-chain transaction comprises a Mercker certification, a timestamp and the output amount and attribute of the cross-chain asset, and the like of the asset cross-chain. And releasing corresponding cross-chain assets according to the cross-chain transaction after the subsequent hosting node acquires the authority.
Deploying a hosting node in a relay program, wherein the hosting node generates a hosting address by adopting public key aggregation and combining with a MAST tree structure;
based on the MAST structure, Merkle branches are utilized to enable each hosting node to only record and display the actual execution part of the script, the script paths of all nodes do not need to be recorded, and the space is saved to the maximum extent.
Secondly, the signature process that all managed nodes participate in the aggregation signature process is solved, managed addresses are constructed by combining MAST structures, and the aggregation signature is verified and the process of cross-chain assets is locked in the addresses.
After verification and confirmation of the cross-chain information, the verification node verifies the hosting address, and after verification is passed, the hosting node is informed to lock the cross-chain assets in the hosting address according to the obtained cross-chain affairs.
While generating mapping assets corresponding to the cross-chain assets in the second blockchain using the mirroring ratio for transformation circulation in the second blockchain.
The mirror image ratio is obtained by counting the preplan machine according to a fixed conversion ratio, and the original digital assets and the mapping assets can be converted with each other according to a mirror image cross-chain principle, and the fixed ratio can be set in an initial deployment contract in which the first block chain and the second block chain are associated with each other.
Specifically, the hosting node generates a hosting address by combining public key aggregation and a mask tree structure, which is as follows:
transmitting respective public keys to other managed nodes in the managed nodes, and aggregating all the public keys to generate a first aggregated public key;
randomly selecting n hosting nodes from the hosting nodes, and aggregating public keys of the n hosting nodes to generate an aggregated public key combination as a second aggregated public key;
and constructing an MAST tree structure by taking each second aggregation public key as a public key script, acquiring a Merkle Root of the MAST tree structure, performing combined hashing by using the Merkle Root and the first aggregation public key to acquire a third aggregation public key, and deriving a managed address by using the third aggregation public key.
The hosting address is generated by combining aggregated signatures of n hosting nodes with a MAST tree, and is a hosting address with threshold signatures, so that centralized multi-signature addresses are avoided.
Specifically, the verification node verifies the escrow address as follows:
and acquiring a public key script corresponding to any one of the partial hosting nodes from the MAST tree structure and hash values corresponding to other public key scripts, calculating a merkle root, performing combined hash on the merkle root and the second aggregated public key and calculating a derived address, comparing whether the derived address is consistent with the hosting address or not, and if so, indicating that the hosting address is correct.
Firstly, confirming an execution hosting address conforming to each public key script, acquiring script branches and associated hash values in a MAST tree structure, acquiring a merkle root, then further combining a second aggregation public key to calculate an aggregation public key, and further utilizing random number hash to generate a derived address by the aggregation public key, wherein whether the derived address is consistent with the provided hosting address or not is judged. The process enables autonomous verification of the managed address on the chain, which may be accomplished by deploying a verification contract.
Further, in response to the redemption request of the digital asset, the escrow node performs threshold signature based on aggregation multi-signature on the redemption transaction, and the verification node further verifies the threshold signature as follows:
in response to a redemption request for the digital asset, each of the n hosting nodes generating a plurality of temporary public-private key pairs using an elliptic curve algorithm and passing its public and temporary public keys to other of the n hosting nodes;
aggregating all public keys held by each of the n escrow nodes to generate an aggregated public key, linearly combining and summing all temporary public keys to generate an aggregated temporary public key, broadcasting the aggregated public key and the aggregated temporary public key on a second block chain, signing the redeemed transaction by using a private key and the temporary private key of the aggregated public key, and summing all signatures to generate a threshold signature;
and the verifying node verifies the threshold signature by using the aggregation public key pair and the aggregation temporary public key, and if the threshold signature is consistent with the threshold signature, the threshold signature is correct. The process is to utilize an aggregation public key pair and an aggregation temporary public key pair to sign the redeemed transaction and compare the signature with the calculation result of the line elliptic curve of the aggregation signature, and if the signature is consistent, the aggregation signature is correct.
The escrow node generates an aggregation threshold signature, signs the redeemed transaction, replaces the complicated process of signing the redeemed transaction by all escrow nodes, and only generates one aggregation threshold signature by aggregation, thereby avoiding that the verification nodes verify multiple signatures one by one, shortening the verification process, further reducing the byte space and increasing the operation performance of reverse cross-linking.
Further, the verifying is successful and then the escrow node is permitted to release the digital asset to the first blockchain primary account address, as follows:
and the verifying node verifies the threshold signature, sends out consensus voting of the cross-chain asset redemption transaction after the verification is passed, and starts a permitting mechanism to permit the hosting node to release the cross-chain asset in the hosting address and return the cross-chain asset to the account address of the first block chain client when more than two thirds of the verifying nodes pass the voting.
And after the verification node successfully checks the signature, performing POS cross-chain consensus, and by using a Byzantine fault-tolerant algorithm, if the verification node exceeding 2/3 votes, considering that the redemption transaction is executable, wherein the permission mechanism is to send a release permission instruction to the hosting node after receiving the voting result of the verification node.
The invention designs a bidirectional chain-crossing method and a system for digital assets, which have the following advantages:
(1) realizing decentralized one-way cross-chaining by combining the light nodes and the relay program;
(2) in the reverse redemption process, a small amount mortgage game mechanism is adopted to select hosting nodes from the verification nodes, the participation of the verification nodes in cross-chain hosting is promoted, cross-chain asset hosting is fused in a consensus layer, and the decentralization of hosting is further realized;
(3) the aggregation threshold signature is used for replacing multiple signatures, so that the efficiency and the safety of the signature are improved, the signature threshold is increased, and the cross-chain based on the POS consensus mechanism is expanded.
Drawings
FIG. 1 is a diagram of a digital asset bi-directional cross-link architecture of the present invention;
FIG. 2 is a flow diagram illustrating the cross-chain circulation of a first blockchain digital asset to a second blockchain;
fig. 3 is a first blockchain digital asset reverse redemption flow diagram.
Detailed Description
In order to more specifically describe the present invention, the following detailed description is provided for the technical solution of the present invention with reference to the accompanying drawings and the specific embodiments.
Example 1:
the invention provides a bidirectional chain crossing method for digital assets, which is an architecture diagram of the bidirectional chain crossing of the digital assets as shown in fig. 1, wherein a plurality of verification nodes are deployed in a second blockchain for participating in the chain crossing consensus verification, and the verification nodes acquire the authority of the verification nodes by mortgage on the digital assets of the second blockchain held by the verification nodes;
in order to realize the safe chain crossing and the reverse chain crossing of the first blockchain digital asset to the second blockchain, a plurality of hosting nodes are selected from the verification nodes through a small amount mortgage game mechanism for hosting the chain crossing assets.
In addition, a shared resource pool (storage contract or storage node or server) is provided in the second blockchain for storing mortgage assets, including mortgage funds for contesting the verification node and the escrow node.
The small amount mortgage game mechanism is as follows:
setting a shared resource pool in the second block chain, and transferring the small share mapping assets held by the verification nodes into the shared resource pool by the verification nodes to be used as mortgages of the election hosting nodes;
the method comprises the steps that a verification node endows a reputation value to the verification node during initial registration, and the reputation value is accumulated according to the times that the verification node successfully participates in cross-chain consensus verification and successfully hosts cross-chain assets;
and determining whether the verification node becomes a managed node according to the mortgage and the reputation value according to a fixed share proportion.
If 50 verification nodes participate in the election hosting node, each verification node mortgage is marked as Si(i ═ 1, 2.. times, 50), because the multiple trustees participated in by the trustee nodes are subjected to aggregated signature, so as to form a uniform signature and signature verification, a single trustee node cannot do malignancy, collusion is necessary to do malignancy, the collusion cost is large enough, node mortgage is guarantee of future income and reputation value, and once the malignancy is done, the future income and the node accumulated reputation value and the mortgage are lost.
The bidirectional chain crossing of the digital assets in the invention specifically comprises two processes:
(1) the first blockchain digital asset is circulated across chains to the second blockchain;
verifying the chain crossing information of the first blockchain through a light node in the second blockchain, locking the first blockchain digital asset serving as a chain crossing asset in a hosting address by a hosting node after the verification is passed, and generating a mapping asset corresponding to the chain crossing asset in the second blockchain for circulation;
(2) reverse redemption of the first blockchain digital asset.
Responding to the redemption request of the digital asset, the escrow node carries out threshold signature based on aggregation multi-signature on the redemption transaction, and the verification node further verifies the threshold signature;
and after the verification is successful, the escrow node is permitted to release the digital assets to the original account address of the first block chain.
Wherein, the generation and verification of the managed address are as follows:
the method comprises the following steps that a hosting node generates a hosting address by combining public key aggregation with a MAST tree structure, and the hosting address supports cross-chain transaction of threshold signatures, and specifically comprises the following steps:
1)1) transmitting respective signature public keys to other signature nodes by using an encryption communication protocol in the N signature nodes, and aggregating all signature public keys to generate a first aggregation public key C;
C=hash(L,PK1)·PK1+hash(L,PKi)·PKi+…+hash(L,PKN)·PKN);
where L is the public key list: l ═ PK1,...PKi,…PKNRepresents an ordered set of all public keys involved in the signing process;
signature public key PKi=skiG (G is a uniform elliptic curve base point); skiA random private key that is a signature node; i is any one of the N signature nodes.
2) Selecting N signature nodes from the N signature nodes to generate
Figure BDA0003392148190000071
Combining n signature nodes, carrying out public key aggregation on the signature public keys of the n signature nodes to generate
Figure BDA0003392148190000072
A kind of aggregate public key combination;
3) based on
Figure BDA0003392148190000073
Each aggregation public key script in the seed aggregation public key combination creates a Merkle tree structure of an MAST structure and acquires a Merkle Root of the MAST structure;
4) and (3) the first aggregation public keys of the N signature nodes and Merkle Root derivation threshold signature addresses:
adding Merkle Root, and calculating the final second public key aggregation P as:
p ═ C + H (C | | Merkle Root) G, where H (C | | | Merkle Root) represents the polymerization hash of C and Merkle Root;
deriving a managed address from the aggregated public key: d: hash (P, s), s is a random number.
The verification node verifies the managed address specifically as follows:
obtaining Script branch Script corresponding to any hosting node i in n hosting nodes from the created Merkel tree structure of MAST structureiAnd the Hash values of other script branches are calculated to obtain a verifiable merkle root, and a second aggregation public key P ═ C + H (C | | | merkle root) G is used for verifying the managed address by the aggregation public key: d: hash (P, s), s being a random number; and comparing whether D is consistent with D, if so, indicating that the managed address is correct, and if not, indicating that the provided threshold signature address is incorrect, and refusing to execute the cross-chain transaction.
Example 2:
the specific flow of cross-chain circulation and reverse redemption of a first blockchain digital asset to a second blockchain is described in this embodiment.
(1) As shown in fig. 2, the process of cross-chain circulation of a first blockchain digital asset to a second blockchain is as follows:
1) deploying a light node of the first block chain on the basis of the second block chain, and recording asset cross-chain information sent by the first block chain in real time through the light node;
2) a relay program (which can be a distributed server) is arranged between the first block chain and the second block chain, a Sync synchronization tool is loaded into the relay program, verification of the light node aiming at the cross-chain information is responded, and cross-chain transaction transactions corresponding to the cross-chain information are synchronized through the Sync synchronization tool;
3) the verification node acquires a cross-chain transaction, performs consensus voting on the executed cross-chain transaction by combining with the verification result of the light node, and allows the execution of the cross-chain transaction when the verification node exceeds 2/3 and participates in the consensus voting executed by the cross-chain transaction;
4) and the verifying node verifies the hosting address according to the MAST structure, and after the verification is passed, a permission mechanism is started to inform the hosting node to lock the corresponding first blockchain digital asset in the hosting address, and meanwhile, an equivalent mapping asset is generated in the second blockchain for cross-chain circulation of the second blockchain.
Wherein the grant mechanism is an execution instruction deployed in the second blockchain, a call by the subject authentication node, and in response to sending the instruction to the managed node, causes the managed node to perform the associated operation.
The equivalent mapping assets are generated by mapping the first blockchain digital assets and the second blockchain mapping assets according to a fixed conversion rate in a mode of mirroring across chains, wherein the conversion rate is written into an intelligent contract at the initial time of creating the blockchain, and the conversion rate can be permanently fixed according to the actual situation or dynamically adjusted according to the total amount and distribution situation of the digital assets on the chains.
(2) As shown in fig. 3, reverse redemption of a first blockchain digital asset:
1) generating an aggregated multi-signature threshold signature based on the n managed nodes:
in response to a redemption request for the digital asset, each escrow node i of the n escrow nodes is based on the held private key skiCalculating the corresponding public key PKi=skiG (G is a uniform elliptic curve base point);
v random private keys are generated based on a random function, corresponding random public keys are generated by sequentially utilizing an elliptic curve algorithm, and a random public and private key pair (r) is generatedi,1,,Ri,1)…(ri,j,,Ri,j)(1=<j<=v);
Mixing PKi,(Ri,1…Ri,j) Passing to other ones of the n hosting nodes;
Computing a public key list L-hash (PK) after all public keys are collected1…PKn);
Further carrying out Hash operation on the public key list and the signature public key to obtain an aggregation public key:
Pn=hash(L,PK1)·PK1+…+hash(L,PKn)·PKn);
and linearly combining and summing the temporary public keys to generate an aggregate temporary public key:
Rj=b1Ri,1+b2*Ri,2+…bj Ri,j;(j∈[1,…,v])
(b1,b2,...bj)=(1,H(2,Pn,((R1,R2,...Rv)))
polymeric random public key R ═ (R)1+…+Rj);
Escrow node utilizes private key skiRandom private key ri,j,For redemption transaction TXSigning, summing all the signatures to generate n escrow nodes, collecting all the random public keys, and utilizing a fixed linear coefficient set (b)1,b2,...bj) Calculating to obtain the aggregation signature of point participation:
Si=ri+hash(Pn,R,TX)·ski
summing all signatures S ═ S (S)1+…+Si);
An aggregation threshold signature (R, S) is generated with the aggregation random number.
2) The verification node verifies the aggregation threshold signature:
the hosting node aggregates the public key P it generatesnAnd aggregating the random public key R to broadcast on the second block chain;
verification node utilizes aggregated public key pair PnAnd aggregating the random public key R to sign the redemption transaction: r + hash (P)n,R,TX)·Pn
And comparing the result with the line elliptic curve calculation result S.G of the aggregation threshold signature, and checkingEvidence for the presence of S.G ═ R + hash (P)n,R,TX)·PnAnd if the signatures are consistent, the signature of the aggregation threshold is correct.
If not, the verification fails.
3) Performing a cross-chaining asset redemption transaction:
after the validation passes, the validation node issues a consensus vote for the redemption of the cross-chain asset for the transaction, and when the validation node passes the vote exceeding 2/3, a permit mechanism is initiated that permits the escrow node to release the cross-chain asset in the escrow address and return to the first blockchain client account address.
The embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It will be readily apparent to those skilled in the art that various modifications to the above-described embodiments may be made, and the generic principles defined herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above embodiments, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (10)

1. A bi-directional chain crossing method for digital assets, comprising the steps of:
the second blockchain acquires cross-chain information sent by the first blockchain and verifies the cross-chain information through a light node, wherein the cross-chain information comprises digital assets, and the light node is a node in the second blockchain;
after the verification is passed, the first blockchain digital asset is taken as a cross-chain asset and is locked in a hosting address by a hosting node, mapping assets corresponding to the cross-chain asset are generated and circulated, wherein the hosting node generates the hosting address by adopting public key aggregation and combining with a MAST tree structure;
in response to the first blockchain transmitting a redemption request for the digital asset, the escrow node threshold-signing information related to the redemption request;
and verifying the threshold signature based on a verification node, and releasing the digital assets to the original account address in the first block chain after the verification is passed.
2. The bi-directional chain-crossing method of a digital asset as claimed in claim 1, wherein said validation node is disposed in said second blockchain;
the verification node is used for executing consensus verification of cross-chain transactions;
the trusteeship nodes are screened out by the verification nodes through a small amount mortgage game mechanism and used for locking and releasing cross-chain assets.
3. The bi-directional chain crossing method of digital assets according to claim 2, wherein the small mortgage gaming mechanism is embodied as follows:
the verification node transfers the small share mapping assets held by the verification node into a shared resource pool as a mortgage of the election hosting node, wherein the shared resource pool is arranged in a second block chain;
and determining whether the verification node becomes a hosting node or not according to the mortgage and the reputation value according to a fixed share proportion, wherein the reputation value is a value formed by accumulating according to the times of successful participation of the verification node in cross-chain consensus verification and successful hosting of cross-chain assets.
4. The bi-directional chain crossing method for digital assets according to claim 1, wherein the hosting node generates a hosting address by adopting public key aggregation in combination with a MAST tree structure, comprising the following steps:
based on the managed nodes transmitting respective public keys to other managed nodes, aggregating all public keys to generate a first aggregated public key;
randomly selecting n hosting nodes, and aggregating public keys of the n hosting nodes to generate an aggregated public key combination as a second aggregated public key;
and constructing an MAST tree structure by taking each second aggregation public key as a public key script, acquiring a Merkle Root of the MAST tree structure, performing combined hashing by using the Merkle Root and the first aggregation public key to acquire a third aggregation public key, and deriving a managed address by using the third aggregation public key.
5. The bi-directional chain crossing method of digital assets according to claim 1 or 4, wherein the step of locking a first blockchain digital asset as a chain crossing asset in a hosting address by a hosting node and generating a mapped asset corresponding to the chain crossing asset comprises the steps of:
verifying the managed address, wherein the verification process comprises the following steps: acquiring a public key script corresponding to any one of partial hosting nodes from an MAST tree structure and hash values corresponding to other public key scripts, calculating a merkle root, performing combined hash on the merkle root and a second aggregated public key and calculating a derived address, and comparing whether the derived address is consistent with the hosting address or not;
if the cross-chain assets are consistent with the cross-chain assets, the verification is passed, and according to the cross-chain transaction, a hosting node is informed to lock the cross-chain assets in a hosting address;
mapping assets corresponding to the cross-chain assets are generated in the second blockchain based on the mirroring ratio for transformation circulation in the second blockchain.
6. The bi-directional chain-crossing method of a digital asset as claimed in claim 1, wherein said verifying said threshold signature based on a verification node comprises the steps of:
each hosting node of the n hosting nodes generates a plurality of temporary public and private key pairs by utilizing an elliptic curve algorithm, and transmits a public key and a temporary public key thereof to other hosting nodes of the n hosting nodes;
aggregating all public keys held by each of the n escrow nodes to generate an aggregated public key, linearly combining and summing all temporary public keys to generate an aggregated temporary public key, broadcasting the aggregated public key and the aggregated temporary public key on a second block chain, signing the redeemed transaction by using a private key and the temporary private key of the aggregated public key, and summing all signatures to generate a threshold signature;
and the verifying node verifies the threshold signature by using the aggregation public key pair and the aggregation temporary public key, and if the threshold signature is consistent with the threshold signature, the threshold signature is correct.
7. The bi-directional chain crossing method for digital assets according to claim 1, wherein the step of releasing the digital assets into the original account address in the first blockchain after the verification is passed comprises the steps of:
issuing a consensus vote for the redemption of the transaction across the linked assets;
when more than two-thirds of the verification nodes pass the voting, starting a permission mechanism;
the hosting node is permitted to release the cross-chain assets in the hosting address and return the first blockchain client account address.
8. A bidirectional chain-crossing system of digital assets is characterized by comprising an acquisition verification module, a locking circulation module, a response signature module and a verification release module;
the acquisition verification module is configured to: the second blockchain acquires cross-chain information sent by the first blockchain and verifies the cross-chain information through a light node, wherein the cross-chain information comprises digital assets, and the light node is a node in the second blockchain;
a lockout flow module configured to: after the verification is passed, the first blockchain digital asset is taken as a cross-chain asset and is locked in a hosting address by a hosting node, mapping assets corresponding to the cross-chain asset are generated and circulated, wherein the hosting node generates the hosting address by adopting public key aggregation and combining with a MAST tree structure;
the response signing module configured to: in response to the first blockchain transmitting a redemption request for the digital asset, the escrow node threshold-signing information related to the redemption request;
the verification release module is configured to: and verifying the threshold signature based on a verification node, and releasing the digital assets to the original account address in the first block chain after the verification is passed.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of claims 1 to 7.
10. A bi-directional chain crossing apparatus for a digital asset, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the method steps of any of claims 1 to 7.
CN202111467461.6A 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset Active CN114172661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111467461.6A CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111467461.6A CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Publications (2)

Publication Number Publication Date
CN114172661A true CN114172661A (en) 2022-03-11
CN114172661B CN114172661B (en) 2023-12-08

Family

ID=80482780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111467461.6A Active CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Country Status (1)

Country Link
CN (1) CN114172661B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117592991A (en) * 2024-01-18 2024-02-23 暨南大学 Efficient blockchain cross-chain data exchange method based on threshold signature

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112784306A (en) * 2021-02-01 2021-05-11 杭州链网科技有限公司 Cross-chain escrow method and system based on key fragmentation and multi-signature
CN112887380A (en) * 2021-01-15 2021-06-01 杭州链网科技有限公司 Cross-chain intercommunication method and system
CN113032482A (en) * 2021-03-10 2021-06-25 杭州链网科技有限公司 Construction method and system of cross-chain transfer bridge
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112887380A (en) * 2021-01-15 2021-06-01 杭州链网科技有限公司 Cross-chain intercommunication method and system
CN112784306A (en) * 2021-02-01 2021-05-11 杭州链网科技有限公司 Cross-chain escrow method and system based on key fragmentation and multi-signature
CN113032482A (en) * 2021-03-10 2021-06-25 杭州链网科技有限公司 Construction method and system of cross-chain transfer bridge
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭朝;郭帅印;张胜利;宋令阳;王晖;: "区块链跨链技术分析", 物联网学报, no. 02 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117592991A (en) * 2024-01-18 2024-02-23 暨南大学 Efficient blockchain cross-chain data exchange method based on threshold signature
CN117592991B (en) * 2024-01-18 2024-04-26 暨南大学 Efficient blockchain cross-chain data exchange method based on threshold signature

Also Published As

Publication number Publication date
CN114172661B (en) 2023-12-08

Similar Documents

Publication Publication Date Title
CN109685489B (en) Cross-chain transaction method for assets between block chains
US11128522B2 (en) Changing a master node in a blockchain system
US20220231869A1 (en) Cross-blockchain mutual data storage
US11669811B2 (en) Blockchain-based digital token utilization
CN109189962B (en) License service implementation system based on block chain
CN110990408B (en) Business information collaboration method based on block chain, business system and alliance chain
US11153069B2 (en) Data authentication using a blockchain approach
WO2020258831A1 (en) Method and device for master node handover processing in blockchain system
EP3540628B1 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN109508982A (en) REPB common recognition based on the more subchains of block chain main chain adduction row
JP2021512569A (en) Blockchain data processing method, management side, client side, converter and medium
CN110741373A (en) Computer-implemented system and method for managing large blocks on a blockchain network
CN107231299A (en) A kind of chain route and realized the system that block chain communicates across chain
CN101193103B (en) A method and system for allocating and validating identity identifier
WO2019141984A1 (en) Interaction between blockchains
CN114172661A (en) Bidirectional chain-crossing method, system and device for digital assets
CN116827957B (en) Information processing method, device, equipment and medium based on multi-block chain
CN116527684B (en) Multi-chain information interaction method based on 1+1+N relay consensus committee
US20220278854A1 (en) Unity Protocol Consensus
CN113627906A (en) Cross-chain transaction method, system and storage medium of Hash locking and side chain technology
CN115828328A (en) Method, device, processor and storage medium for managing full life cycle of confidential unstructured data based on block chain in trusted environment
CN113839768A (en) Cross-link communication method based on satellite link relay
CN113158224A (en) Business data sharing model system based on block chain
CN116708463B (en) Information processing method, device, equipment and medium based on multi-block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant