CN107862216A - Method for secret protection, device and the storage medium merchandised for anonymity across chain - Google Patents

Method for secret protection, device and the storage medium merchandised for anonymity across chain Download PDF

Info

Publication number
CN107862216A
CN107862216A CN201710953056.2A CN201710953056A CN107862216A CN 107862216 A CN107862216 A CN 107862216A CN 201710953056 A CN201710953056 A CN 201710953056A CN 107862216 A CN107862216 A CN 107862216A
Authority
CN
China
Prior art keywords
chain
transaction
parallel
interconnection
information
Prior art date
Application number
CN201710953056.2A
Other languages
Chinese (zh)
Inventor
孙毅
张珺
李忠诚
李军
蒋海
Original Assignee
布比(北京)网络技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 布比(北京)网络技术有限公司 filed Critical 布比(北京)网络技术有限公司
Priority to CN201710953056.2A priority Critical patent/CN107862216A/en
Publication of CN107862216A publication Critical patent/CN107862216A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

It is used for anonymous method for secret protection, device and storage medium across chain transaction the invention discloses a kind of.Wherein, across chain transaction is the transaction between source parallel chain and purpose parallel chain, and source parallel chain and purpose parallel chain are respectively with interconnecting chain link.This method comprises the following steps:Structure source parallel chain is used for the anonymous common parameter across chain transaction;By on common parameter static registration or dynamic registration to interconnection chain;According to common parameter, parallel chain network common recognition checking is carried out to across the chain transaction of anonymity broadcasted in the parallel chain of source;After parallel chain network common recognition is verified, by across the chain transaction broadcast of anonymity in chain is interconnected.The embodiment of the present invention can be realized and quickly the privacy merchandised across chain is protected; it can be verified in the case where not revealing across chain transaction privacy information and complete across chain transaction; the privacy across chain transaction is ensure that, ensure that the security across the privacy information of the participant of chain transaction.

Description

Method for secret protection, device and the storage medium merchandised for anonymity across chain

Technical field

The present invention relates to block chain technical field, more particularly to it is a kind of be used for anonymous method for secret protection across chain transaction, Device and storage medium.

Background technology

Since bit coin proposes, block chain technology is developed rapidly.Currently occur a variety of separate Block chain.The demand of the processing data of across different blocks chains (referred to as across chain) has become in current block chain application more Urgent demand.

Applicant it has been investigated that:In block chain network, although station address does not have with the true identity in real world There is any association, but due to Transaction Information and all participation users to share, so passing through dealing money size, exchange hour, friendship The public informations such as easy frequency, may be by the true body in transaction and real world using statistical methods such as data minings Part connects, so as to occur revealing the risk of privacy of user.Because across chain transaction is related to different block chains, it is necessary to longer Proving time, and the proof time of anonymous deal is shorter, so the time conflict between foring checking and proving.Due to this Time conflict influences, otherwise only the privacy of user of (single-stranded) transaction in chain is studied at present, otherwise do not consider anonymous deal.

How transaction across chain to anonymity carries out secret protection, turns into technical problem urgently to be resolved hurrily.

The content of the invention

In order to solve the problems, such as that transaction across chain to anonymity carries out secret protection, it is used to hide the embodiments of the invention provide one kind Method for secret protection, device and storage medium of the name across chain transaction.

First aspect, there is provided a kind of to be used for the anonymous method for secret protection across chain transaction.Wherein, across chain transaction is that source is put down Transaction between row chain and purpose parallel chain, source parallel chain and purpose parallel chain are respectively with interconnecting chain link.This method include with Lower step:

Structure source parallel chain is used for the anonymous common parameter across chain transaction;

By on common parameter static registration or dynamic registration to interconnection chain;

According to common parameter, parallel chain network common recognition checking is carried out to across the chain transaction of anonymity broadcasted in the parallel chain of source;

After parallel chain network common recognition is verified, by across the chain transaction broadcast of anonymity in chain is interconnected.

Second aspect, there is provided a kind of to be used for the anonymous method for secret protection across chain transaction.Wherein, across chain transaction is that source is put down Transaction between row chain and purpose parallel chain, source parallel chain and purpose parallel chain are respectively with interconnecting chain link.This method include with Lower step:

Obtain anonymity across chain transaction of the broadcast in chain is interconnected;

According to the common parameter in static registration or dynamic registration to interconnection chain, transaction across chain to anonymity carries out interconnection chain Network common recognition checking;

After interconnection chain network common recognition is verified, by across the chain transaction broadcast of anonymity into purpose parallel chain.

The third aspect, there is provided a kind of to be used for the anonymous privacy protection device across chain transaction.Wherein, across chain transaction is that source is put down Transaction between row chain and purpose parallel chain, source parallel chain and purpose parallel chain are respectively with interconnecting chain link.The device includes:

Parameter builds module, is used for the anonymous common parameter merchandised across chain for building source parallel chain;

Parameter Registering modules, for by common parameter static registration or dynamic registration to interconnection chain;

Interconnection common recognition module, for according to common parameter, being put down to across the chain transaction of anonymity broadcasted in the parallel chain of source The common recognition checking of row chain network;

Across chain transaction modules, for after parallel chain network common recognition is verified, across the chain transaction broadcast of anonymity to be interconnected In chain.

Fourth aspect, there is provided a kind of to be used for the anonymous privacy protection device across chain transaction.Wherein, across chain transaction is that source is put down Transaction between row chain and purpose parallel chain, source parallel chain and purpose parallel chain are respectively with interconnecting chain link.The device includes:

Transaction acquisition module, for obtaining anonymity across chain transaction of the broadcast in chain is interconnected;

Know together authentication module, for according to the common parameter on static registration or dynamic registration to interconnection chain, to anonymity Across chain transaction carries out interconnecting chain network common recognition checking;

Transaction broadcast module, for after interconnection chain network common recognition is verified, across the chain transaction of anonymity to be broadcasted to purpose In parallel chain.

5th aspect, there is provided a kind of to be used for the anonymous privacy protection device across chain transaction.The device includes:

Memory, for depositing program;

Processor, for performing the program of the memory storage, described program make it that the computing device is above-mentioned each Method described in aspect.

A kind of 6th aspect, there is provided computer-readable recording medium.Finger is stored with the computer-readable recording medium Order, when run on a computer so that computer performs the method described in above-mentioned each side.

A kind of 7th aspect, there is provided computer program product for including instruction.When the product is run on computers, So that computer performs the method described in above-mentioned each side.

A kind of eighth aspect, there is provided computer program.When the computer program is run on computers so that calculate Machine performs the method described in above-mentioned each side.

On the one hand, the embodiment of the present invention can be used for the anonymous common parameter merchandised across chain, general by building source parallel chain Common parameter static registration or dynamic registration are on interconnection chain, it is possible to achieve once register, the effect repeatedly called, can solve Certainly the common parameter generation time is longer and cause the proving time long, shorter with generating the time of zero-knowledge proof of anonymous deal Conflict, improve across chain transaction interactive performance.

On the other hand, the common parameter of different parallel chains can be added to interconnection in a registered manner by the embodiment of the present invention In chain, it can ensure that safety verification is with performing while across the chain anonymous deal of different parallel chains in the case where interconnecting chain environment.

Another aspect, the embodiment of the present invention can be according to common parameters, to broadcasting across the chain friendship of anonymity in the parallel chain of source Easily carry out parallel chain network common recognition checking;After parallel chain network common recognition is verified, across the chain transaction broadcast of anonymity is being interconnected In chain, it is possible to achieve verified in the case where not revealing across chain transaction privacy information and complete across chain transaction, not only ensure that across The privacy of chain transaction, and ensure that the security across the privacy information of the participant of chain transaction.

Brief description of the drawings

In order to illustrate the technical solution of the embodiments of the present invention more clearly, it will make below to required in the embodiment of the present invention Accompanying drawing is briefly described, it should be apparent that, drawings described below is only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.

Fig. 1 is across the catenary system configuration diagram of block chain of one embodiment of the invention;

Fig. 2 (a) is the parallel data verification method schematic flow sheet for being linked into interconnection chain of one embodiment of the invention;

Fig. 2 (b) is the parallel data verification method flow signal for being linked into interconnection chain of another embodiment of the present invention;

Fig. 3 (a) is the parallel data receiving-transmitting method schematic flow sheet for being linked into interconnection chain of one embodiment of the invention;

Fig. 3 (b) is the parallel data receiving-transmitting method schematic flow sheet for being linked into interconnection chain of another embodiment of the present invention;

Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention;

Fig. 5 is a Fig. 4 schematic flow sheet;

Fig. 6 is Fig. 4 another sub-process schematic diagram;

Fig. 7 is Fig. 4 another sub-process schematic diagram;

Fig. 8 is the structural representation of the block of the interconnection chain of one embodiment of the invention;

Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain;

Figure 10 is the schematic flow sheet for being used for the anonymous method for secret protection across chain transaction of one embodiment of the invention;

Figure 11 is the schematic flow sheet for being used for the anonymous method for secret protection across chain transaction of another embodiment of the present invention;

Figure 12 is the structural representation for being used for the anonymous privacy protection device across chain transaction of one embodiment of the invention;

Figure 13 is the structural representation for being used for the anonymous privacy protection device across chain transaction of another embodiment of the present invention;

Figure 14 is the circuit theory schematic diagram for being used for the anonymous privacy protection device across chain transaction of one embodiment of the invention.

Embodiment

To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.

It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.

Fig. 1 is the schematic diagram of the block chain interacted system of one embodiment of the invention.

As shown in figure 1, the system can include:Interconnect chain 101, parallel chain 102, parallel chain 103, parallel chain 104, parallel Chain 105 and parallel chain 106.It can be disposed in interconnection chain 101:Data transmit-receive node (being represented with regular pentagon), data supervision section Point (being represented with ellipse) and data verification node (using triangular representation).It is parallel chain 102, parallel chain 103, parallel chain 104, flat Row chain 105 and parallel chain 106 can dispose one or more:Data transmit-receive node (being represented with regular pentagon) and parallel chain Network node (is represented) with circle.Wherein, data transmit-receive node is shared by parallel chain and interconnection chain 101.

Wherein, it is a kind of block chain to interconnect chain 101, can be used for establishing contact in various independent block interchains.It is any Block chain has access to interconnection chain, and exchanges information by interconnecting chain, and then can complete to transfer accounts across chain, and a block Chain operates to the data access of another block chain, storage, modification etc..For example, interconnection chain 101 can be used for it is existing each other Between independent block chain (such as:Ether mill block chain Ripple block chains etc.) establish contact so that and data interaction is no longer limited to In a single block chain so that the flow range of value is no longer limited to a single block chain.By the system, appoint What block chain can access interconnection chain 101, and be carried out by interconnecting chain 101 with other block chains at the data such as across chain transaction Reason.For example, a block chain carries out the data processings such as data access, storage, modification to another block chain.It is in another example different Across chain transfer data processing is carried out between block chain.Specifically, for example, the bit coin user in Ripple block chains need to When ether mill user too in mill block chain transfers accounts, directly it can be traded using the bit coin in oneself account, without Ripple coin is converted into ether coin by third party.In addition, the embodiment of the present invention can pass through same main body management service Two block chains (for example, a block chain is responsible for finance activities, another block chain is responsible for ideal money assets) so that it is empty The availability for intending currency depends on finance activities.When occurring situations such as freezing of assets, assets can influence finance activities, so as to real Existing assets hinder function, carry out effective restraint and limitation to assets, and ensure assets security.

Parallel chain is properly termed as panel data block chain, or referred to as parallel block chain.When certain block chain (such as bit Coin block chain or ether mill block chain) access interconnection chain after just become parallel chain.It is parallel chain 102, parallel chain 103, parallel Chain 104, parallel chain 105 and parallel chain 106 can access interconnection chain 101.The data transmit-receive node that parallel chain and interconnection chain share Across chain transaction can be forwarded in interconnection chain network.

On the one hand data verification node can be used for receiving the information such as the transaction from data transmit-receive person, and verify transaction Validity;On the other hand, data verification node can be used for the complete copy for safeguarding interconnection chain, participate in the common recognition of interconnection chain 101 Process.Data verification node is only deployed at the inside of interconnection chain 101, and it is not belonging to a part for parallel chain.Data verification node Checking transaction validity while transaction data can be obtained from parallel chain, and synchronous, the common recognition transaction in interconnection chain network. Data verification node is connected with the data transmit-receive node in parallel chain, it can receive data transmit-receive node transmission on parallel The Transaction Information of chain, it can also send the transaction data from other parallel chains and give corresponding data transmitting-receiving node.

For data verification node by being interacted with data transmit-receive node, the place that can obtain the collection of data transmit-receive node is parallel Transaction data on chain.Data verification node can verify the transaction data on its parallel chain obtained.Data verification node it Between known together and (reached in agreement) and generate interconnection chain block.After knowing together successfully, data verification node can will be across chain Transaction data is sent to the data transmit-receive node of corresponding purpose chain (such as some parallel chain).Data verification node is at one Carve and be only connected with a parallel chain, be only responsible for the checking work that a parallel chain is merchandised across chain.But it can be born in different time The checking work that multiple parallel chains are merchandised across chain is blamed, that is, verifies that node has rotation mechanism.

Data transmit-receive node both belongs to parallel chain, belongs to interconnection chain again, i.e., data transmit-receive node is by parallel chain and interconnection chain Share.The program of two kinds of block chains (such as parallel chain and interconnection chain) can be run on data transmit-receive node.It is with interconnecting chain In data verification node be connected, the Transaction Information that can send parallel chain gives data verification node, can also receive data verification The transaction data from other parallel chains that node is sent.

One plain block chain can have multiple data transmit-receive nodes.When on the plain block chain where data transmit-receive node be not present across When chain is merchandised, data transmit-receive node gives the block hair of plain block chain to checking node;Plain block where data transmit-receive node When across chain transaction on chain be present, data transmit-receive node is by the block head of plain block chain, across chain Transaction Information and verifies across chain transaction The checking information of validity is sent to checking node.

Data supervisory node is only deployed at the inside of interconnection chain 101, is connected with data verification node.It is not belonging to parallel chain A part.Data supervisory node monitoring data verifies the transaction verification behavior of node, is finding to have data verification node not just Data verification node is punished during true behavior.One supervisory node can supervise a set, and (number is more than or waited In checking node 1).

Above-mentioned each node can be various electronic equipments or functional unit in various electronic equipments, function Module even one section of program.These electronic equipments include but is not limited to PC, server, ore deposit machine etc..

It should be understood that the number of the block chain and node in Fig. 1 is only schematical.According to needs are realized, spirit is carried out Configuration living.

Embodiments below can apply the system architecture of the embodiment of the present invention to carry out data interaction or processing.In order to Description is succinct, and the content of each embodiment can mutual reference.

Fig. 2 (a) is the parallel data verification method schematic flow sheet for being linked into interconnection chain of one embodiment of the invention.

The present embodiment can apply to interconnect the data verification node side of chain.

As shown in Fig. 2 (a), this method may comprise steps of:S210, the data verification node reception for interconnecting chain are parallel The data transmit-receive node of chain send by it is parallel be linked into interconnection chain access request;S220, in response to access request, data are tested Node generation identification information is demonstrate,proved, identification information is stored in the storage for managing parallel chain, and by identification information broadcast mutual Join in chain;S230, after at least one other checking node in interconnecting chain is stored identification information, data verification section Point is successfully accessed information to data transmit-receive node feeding back, and at least part information in storage is sent into data transmit-receive node, So that data transmit-receive node carries out synchronizing information.

In S210, data transmit-receive node is a kind of special parallel chain network node, and it can be by parallel chain network section Point change.Parallel chain network node freely can be dynamically joined to and exit interconnection path so that interconnection chain framework can be with Flexibly expand.Most start, interconnection chain can be added by the application of parallel chain network node, by interconnecting the data verification section in chain After point checking, parallel chain network node just becomes data transmit-receive node.

In certain embodiments, parallel chain can include:Source parallel chain and purpose parallel chain.

In S220, identification information can include the one or more in following information:Parallel chain title, parallel chain are compiled Number, parallel chain common recognition algorithm, parallel chain data transmit-receive nodal information (such as address, numbering).Identification information can also be included only Information of one one parallel chain of mark etc..

In this step, the data verification node can be used for individually carrying out initial authentication to access request.For managing The storage of parallel chain can be stored with the management informations such as parallel chain management table, parallel chain management figure.

Wherein, it is the most key be exactly it is parallel be linked into interconnection chain when, it can be included in its access request initiated The common recognition algorithm used, it is main to include the effective field of checking block and the checking effective algorithm of block.Once the parallel link Enter and interconnect chain, then all checking nodes interconnected in chain update its parallel chain management table, and new parallel chain is added in its table Relevant information, the relevant information includes the common recognition algorithm that uses of the parallel chain.

In S230, at least one other checking node in chain is interconnected, it is preferred that all other checking node, docking Enter request and carry out common recognition checking.After common recognition is verified, identification information is stored in respective storage parallel chain management table or flat In the storage of row chain management figure.

The storage such as table is managed corresponding to the parallel chain of each data verification node, data transmit-receive node is also stored with parallel Chain table of comparisons etc. stores.The information that data transmit-receive node can be sent according to data verification node, can be by parallel chain and interconnection Chain carries out synchronizing information.For example, the parallel chain table of comparisons and parallel chain management table are synchronized.

In this step, other checking nodes can be used for collective to access request progress network common recognition, i.e. review checking.

On the one hand, foregoing invention embodiment, sent by the data transmit-receive node of data verification node reception parallel chain By the parallel access request for being linked into interconnection chain, in response to access request, data verification node generation identification information, mark is believed In storage of the breath deposit for managing parallel chain, the information for being used to manage parallel chain in checking node can be updated the data, for example, Parallel chain management table is updated.

On the other hand, by data verification node by identification information broadcast in chain is interconnected so that other tested in interconnection chain Card node can be stored identification information, and update the respective information for being used to manage parallel chain.

Another aspect, data verification node are successfully accessed information to data transmit-receive node feeding back, and by storage at least Partial information is sent to data transmit-receive node, can cause data transmit-receive node updates parallel chain corresponding with parallel chain management table The table of comparisons.

The node in parallel chain and each node in interconnection chain are entered it follows that foregoing invention embodiment can be realized Row information is synchronous.By interconnecting the synchronizing information (for example, parallel chain manages table synchronizing information) in chain between data verification node When can realize that parallel chain initiates access request next time, the arbitrary data checking node in interconnection chain has unified, newest Parallel chain management table, so as to ensure that interconnection chain in each data verification node can correctly handle connecing for parallel chain Enter request, solve the problems, such as that the security caused by existing information centralized management is low, improve the safety of access interconnection chain Property.In addition, foregoing invention embodiment safely can be linked into interconnection chain by parallel so that the node on different block chains can With freedom, it is dynamically joined to and exits interconnect chain networking so that interconnection chain framework can be expanded flexibly.

In certain embodiments, the above method can also comprise the following steps:

S240, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across The source parallel chain block head of chain transaction;

S250, data verification node obtain the first common recognition that source parallel chain is known together to across chain transaction from storage and calculated Method;

S260, data verification node carry out the first checking to source parallel chain block head using the first common recognition algorithm;

S270, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other checking node interconnected in chain carries out the second checking to across chain transaction using the second common recognition algorithm of interconnection chain.

Thus, the embodiment of the present invention carries out the first checking and the second checking by using different common recognition algorithms, relatively In use identical common recognition algorithm come carry out second verification major advantage can be with as follows:

1st, algorithm (such as existing Cosmos methods and other similar across chain methods) is known together using existing identical to limit Parallel chain (zones) processed, although can simplify logical transaction, existing common recognition method might not be with real trade situation Matching, so network common recognition is ineffective.And although logical transaction of the embodiment of the present invention is slightly more complex, across chain transaction is being carried out When, interconnection chain (hub) need verify parallel chain send across chain transaction validity, i.e., by the parallel chain block head of preservation come Whether the transaction of parallel chain is effective corresponding to across the chain transaction of checking, meanwhile, interconnection chain is in synchronous parallel sequence build, it is also desirable to Verify the validity of the block head, it can be ensured that the common recognition method of use matches with real trade situation, can lift network and be total to Know effect.

2nd, using existing same common recognition algorithm, although can ensure to verify the one of the mode of block to a certain extent Cause property, so as to avoid the inconvenience that the method for testing a variety of checking block finiteness is brought, while across chain trading processing speed is improved, Namely there is simpler processing logic, more efficient treatability performance using the network of the block chain of unified algorithm of knowing together, But unified common recognition algorithm limits the species of the block chain of access so that the expansibility of block chain reduces.It is in addition, existing Same common recognition method because not requiring common recognition algorithm, in order to ensure the safety of each parallel chain transaction, it is necessary to Incidentally specific checking information, help interconnect the transaction on chain confirmation parallel chain when carrying out across chain transaction.Comparatively speaking, this hair Bright embodiment is because without subsidiary specific checking information, it is possible to is simplified this part operation logic, not only saves The time that later stage merchandises across chain, the efficiency across chain transaction can be improved, and make it that the expansibility of interconnection chain is stronger, development Prospect is bigger.

Fig. 2 (b) is the parallel data verification method schematic flow sheet for being linked into interconnection chain of another embodiment of the present invention.

The present embodiment can apply to interconnect the data verification node side of chain.

As shown in Fig. 2 (b), this method may comprise steps of:

S201, interconnect chain data verification node receive parallel chain data transmit-receive node send by it is parallel be linked into mutually Join the access request of chain.

S202, in response to access request, the generation of data verification node comprises at least the identification information of the first common recognition algorithm, deposits Identification information is stored up, and by identification information broadcast in chain is interconnected.

S203, after data verification node confirms that at least one other checking node in interconnection chain receives identification information, To data transmit-receive node feeding back information is successfully accessed including identification information.

In certain embodiments, this method can also comprise the following steps:

S204, data verification node will be successfully accessed information and be sent to data transmit-receive node, for data transmit-receive node profit Synchronizing information is carried out with the identification information being successfully accessed in information.

Wherein, parallel chain can include:Source parallel chain and/or purpose parallel chain.Source parallel chain can by interconnect chain with Across the chain transaction of purpose parallel chain.

In certain embodiments, this method can also comprise the following steps:

S205, data verification node carry out sequence parallel across the source that chain is merchandised according to for source parallel chain with purpose parallel chain Build, the first checking is carried out to source parallel chain block head using the first common recognition algorithm.

Wherein, the first common recognition algorithm can be the algorithm that source parallel chain is known together to across chain transaction.

S206, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other checking node interconnected in chain carries out the second checking to across chain transaction using the second common recognition algorithm.

Wherein, the second common recognition algorithm is to interconnect the algorithm that chain is known together to across chain transaction.

In certain embodiments, identification information also includes:Solicited message.

In certain embodiments, solicited message includes the one or more in following information:Parallel chain title, parallel chain Numbering, parallel chain data transmit-receive nodal information.

Fig. 3 (a) is the parallel data receiving-transmitting method schematic flow sheet for being linked into interconnection chain of one embodiment of the invention.

The present embodiment can apply to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2 Distinguish and be to write by different angles, the two implementation mutually can be referred to and quoted.

As shown in Fig. 3 (a), this method may comprise steps of:S310, the data transmit-receive node of parallel chain is to interconnection chain Data verification node send by it is parallel be linked into interconnection chain access request;S320, please according to access in data verification node Identification information is sought survival into, identification information is stored in the storage for managing parallel chain, and by identification information broadcast in interconnection chain In, after at least one other checking node in interconnection chain is stored identification information, data transmit-receive node receives data and tested Card node feeding back is successfully accessed information;S330, data transmit-receive node are received in the storage that data verification node is sent at least Partial information, row information of going forward side by side are synchronous.

On the one hand, the embodiment of the present invention utilizes the cut-in method, can solve the problems, such as existing malleability difficulty so that any Parallel chain can be stablized, advantageously access is interconnected in chain network.

On the other hand, the embodiment of the present invention causes access and the validity of the transaction in later stage to obtain maximum guarantor Card, user need not trust interconnection chain, it is only necessary to the parallel operation for being linked into interconnection chain be verified using checking information and across chain The validity of transaction.

Another aspect, the embodiment of the present invention can get up existing block chain link independent of each other, expand value Sphere of circulation.

Fig. 3 (b) is the parallel data receiving-transmitting method schematic flow sheet for being linked into interconnection chain of another embodiment of the present invention.

The present embodiment can apply to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2 Distinguish and be to write by different angles, the two implementation mutually can be referred to and quoted.

As shown in Fig. 3 (b), this method may comprise steps of:

S301, the data verification node of data transmit-receive node to the interconnection chain of parallel chain is sent is linked into interconnection chain by parallel Access request.

S302, include the identification information of the first common recognition algorithm, storage mark according to access request generation in data verification node Know information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other checking node receive mark After information, data transmit-receive node reception data verification node feeding back is successfully accessed information including identification information.

In certain embodiments, the parallel method for being linked into interconnection chain can also comprise the following steps:

S303, data transmit-receive node carry out synchronizing information using the identification information being successfully accessed in information.

Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention.

The present embodiment can apply to the data transmit-receive node of parallel chain and this both sides of data verification node of interconnection chain.Such as Shown in Fig. 4, this method may comprise steps of:

S410, parallel chain initiate the access request of access interconnection chain.

One or more node operation interconnection chain program on plain block chain, obtains default interconnection chain nodal information, hair Play access request.

S420, interconnect the data verification node verification access request of chain.

Checking node judges whether to receive access request.

S430, parallel chain processing feedback information, carries out synchronizing information.

The contents of the section will be described in greater detail below.

In certain embodiments, this method can also include:

S440, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across The source parallel chain block head of chain transaction.

S450, data verification node obtain the first common recognition that source parallel chain is known together to across chain transaction from storage and calculated Method.

S460, data verification node carry out the first checking to source parallel chain block head using the first common recognition algorithm.

S470, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other checking node interconnected in chain carries out the second checking to across chain transaction using the second common recognition algorithm of interconnection chain.

In certain embodiments, can utilize interconnect chain block head record in following information it is one or two kinds of with On:The cryptographic Hash of a upper block head, the sequence number of this block, transaction Merkle tree root cryptographic Hash, timestamp, verify node Signature.The block body for interconnecting chain can be utilized to record more than one or two kinds of in following information:Across chain data processing of information (such as across chain Transaction Information), parallel chain block head, validity evidence.It is so designed that, can be by current block and previous block phase Connection, a block chain that can verify that is formed, the difficulty that block is tampered can be increased.

Fig. 5 is a Fig. 4 schematic flow sheet.

With reference to figure 4 and Fig. 5, parallel chain initiates that shown in the access request of access interconnection chain (i.e. S410) following step can be included Suddenly:

S411, parallel chain network node operation interconnection chain program, obtains and nodal information is preset in program.

Parallel chain network node can be one or more nodes on plain block chain.

S412, parallel chain network node ask data verification nodal information active in interconnection chain network to default node;

S413, default node are sent to parallel chain network section by data verification nodal information active in chain network is interconnected Point;

S414, parallel chain network node initiate access interconnection chain request to the active data verification node obtained.

Fig. 6 is Fig. 4 another sub-process schematic diagram.

With reference to figure 4 and Fig. 6, following step can be included by interconnecting the data verification node verification access request (i.e. S420) of chain Suddenly:

S421, its parallel chain network management table for being safeguarded of data verification querying node.

S422, data verification node judge whether the parallel chain has accessed interconnection chain network.

When it is to have accessed interconnection chain network to be judged as the parallel chain, turn S423.

When being judged as that the parallel chain does not access interconnection chain network, turn S428.

S423, when it is to have accessed interconnection chain network to be judged as the parallel chain, data verification node is parallel chain network section Point generation identification information is simultaneously broadcasted, and then the identification information is stored in plain block chain network management table.

That is, the data verification node for receiving access request is believed to initiate the generation identification of the parallel chain network node of access request Cease and be broadcasted.

The identification information is also stored in plain block chain network management table by S424, other checking nodes for receiving the identification information In.

This indicates that the one or more nodes for initiating request become the data transmit-receive node of the plain block chain.

S425, data verification node send to the data transmit-receive node for initiating request and are successfully accessed information.

S426, the checking node for receiving access request send the plain block link network of renewal to the data transmit-receive node for initiating request Network manages table information.

S427, the complete plain block chain network management table of all data transmit-receive node updates, now completes whole interconnection link network The synchronization of plain block chain network management table information in network, data verification node feeding back plain block chain network management table responsible backward more Fresh information.

The synchronizing information (for example, parallel chain management table synchronizing information) interconnected in chain between data verification node is in order under During parallel chain access request, interconnecting the checking node of the arbitrary data in chain has unified, newest parallel chain management table. So as to ensure that the data verification node in interconnection chain can correctly handle the access request of parallel chain.

S428, S422 is above met, when being judged as that the parallel chain does not access interconnection chain network, receive the data of access request Checking node initiates the ballot that a whole network participates in interconnection chain network and handles the access request.

S429, judges whether ballot passes through.

If voted through, into step S4210.If ballot is not by into step S4211.

S4210, if voted through, the data verification node for receiving access request is the parallel chain and hair of request access Play the parallel chain network node generation identification information of request and be broadcasted, the identification information is then stored in plain block chain network pipe Manage in table, then turn S424.

S4211, if ballot is not by receiving the checking node of access request to the parallel chain network node of initiation request Send the plain block chain network management table information of renewal;

Fig. 7 is Fig. 4 another sub-process schematic diagram.

With reference to figure 4 and Fig. 7, parallel chain processing feedback information, carry out synchronizing information (i.e. S430) and may comprise steps of:

S431, the parallel chain for initiating access request receive feedback of the interconnection chain to its access request.

S432, judge whether to access according to feedback.

S433, if being fed back to access failure, the parallel chain for initiating access request puts down the access failure information received at this Broadcasted in row chain.

S434, if being fed back to be successfully accessed, the plain block chain for initiating access request receives the plain block chain network that interconnection chain is sent Table information is managed, and the information received is broadcasted in the parallel chain.

S435, other plain block chains receive the plain block chain network management table fresh information that interconnection chain is sent, improve the flat of oneself The block chain table of comparisons.

It should be noted that in the case where not conflicting, those skilled in the art can according to actual needs will be above-mentioned The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out into the operation such as flexible combination.For simplicity, repeat no more Various implementations.

Fig. 8 is the structural representation of the block of the interconnection chain of one embodiment of the invention.

As shown in figure 8, the structure of the block of interconnection chain can include block first 1 and block body 2.Wherein, block first 1 can be with Including:The cryptographic Hash 3 of a upper block head, block sequence number 4, to effective summary 5 of Transaction Information in block, timestamp 6 and Verify node signature 7.Block body 2 can include:Specific Transaction Information 8 and the checking information 9 across chain transaction.

Wherein, the cryptographic Hash 3 of a upper block head can be determined what is obtained after upper block progress Hash operation Long character string.Being so designed that can make the block be connected with previous block, form a block chain that can verify that, Ke Yizeng The difficulty that big block is tampered.

The sequence number 4 of block can refer to the symbol for identifying block present position.Other functions can be facilitated by being so designed that Point to the block.

Effective summary 5 of Transaction Information can be Merkle tree root Hash in block.Merkle tree roots Hash can include Interconnect cryptographic Hash and the cryptographic Hash of across the chain transaction of plain block chain and the calculating generation of validity evidence that chain transaction calculates generation.

Timestamp 6 can be the character string at unique mark a certain moment, for identifying the time caused by the block.

Checking node signature 7 can be the digital signature for the checking node private key generation for generating the block, to identify The generator of block.

Specific Transaction Information 8 can include specifically across chain Transaction Information and specific interconnection chain insider transaction letter Breath.

It can include across the checking information 9 of chain transaction:Using Merkle trees verify across chain transaction validity when need its The block head of his cryptographic Hash (i.e. across chain transaction validity evidence) and plain block chain.Utilize these cryptographic Hash and the area of plain block chain Build, it is able to verify that the validity across chain transaction.

In certain embodiments, interconnection chain can include:Data verification node.

In certain embodiments, data verification node can be used for receiving that the data transmit-receive node of parallel chain sends by institute State the parallel access request for being linked into interconnection chain;In response to access request, the generation of data verification node includes the first common recognition algorithm Identification information, identification information is stored, and by identification information broadcast in chain is interconnected;Confirm at least one other in interconnection chain After checking node receives identification information, information is successfully accessed including the identification information to data transmit-receive node feeding back.

In certain embodiments, data verification node is additionally operable to:Information will be successfully accessed and be sent to data transmit-receive node, with The identification information being successfully accessed for data transmit-receive node described in information carries out synchronizing information.

In certain embodiments, parallel chain can include:Source parallel chain and/or purpose parallel chain.

In certain embodiments, data verification node can be also used for:Enter according to for source parallel chain and purpose parallel chain Row carries out the first checking to source parallel chain block head across the source parallel chain block head of chain transaction using the first common recognition algorithm;Treat After one is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, at least one in interconnection chain Individual other checking nodes carry out the second checking to across chain transaction using the second common recognition algorithm.

In certain embodiments, the first common recognition algorithm is the algorithm that source parallel chain is known together to across chain transaction.

In certain embodiments, the second common recognition algorithm is to interconnect the algorithm that chain is known together to across chain transaction.

In certain embodiments, chain is interconnected, it is characterised in that also include:Block head and block body.Wherein, block head can For recording the one or more in following information:The cryptographic Hash of a upper block head, the sequence number of this block, transaction Merkle tree root cryptographic Hash, timestamp, the signature for verifying node;One kind that block body can be used for recording in following information or It is a variety of:Across chain Transaction Information, parallel chain block head, validity evidence.

In certain embodiments, parallel chain can include:Data transmit-receive node.

In certain embodiments, data transmit-receive node can be used for sending parallel chain to the data verification node of interconnection chain Access the access request of the interconnection chain;Include the mark of the first common recognition algorithm according to access request generation in data verification node Information, store identification information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other checking section After point receives identification information, receive data verification node feeding back is successfully accessed information including identification information.

In certain embodiments, data transmit-receive node can be also used for carrying out using the identification information being successfully accessed in information Synchronizing information.

Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain.

As shown in figure 9, this method may comprise steps of:

S910, the parallel chain block head that parallel chain data transmit-receive node corresponding to interconnection chain checking node reception is sent.

S920, checking node are inquired about the common recognition algorithm of the parallel chain according to its all parallel chain network management table, found The method for verifying block head validity.

S930, checking node verify the validity of block head according to the verification mode, are preserved if effectively, and will The effective district build is broadcasted to whole interconnection chain network.

In certain embodiments, interconnection chain can include:Data verification node in above-mentioned each embodiment, and it is above-mentioned each Other checking nodes in individual embodiment.

In certain embodiments, can also include:Data supervisory node.Data supervisory node can be used for Monitoring Data and test Demonstrate,prove the verification operation of node and/or other checking nodes, when verification operation occur it is abnormal, manage data verification node and/or its It verifies node.Thus, data supervisory node may insure checking and network common recognition it is fair, efficient, improve the later stage access With the security of transaction.

In certain embodiments, interconnection chain can include:Block head and block body.Wherein,

Block head can be used for recording the one or more in following information:The cryptographic Hash of a upper block head, local area The sequence number of block, transaction Merkle tree root cryptographic Hash, timestamp, the signature for verifying node.It is following that block body can be used for record One or more in information:Across chain data processing of information (such as across chain Transaction Information), parallel chain block head, validity card According to.

In certain embodiments, parallel chain can include:The data transmit-receive node of above-mentioned each embodiment.

In certain embodiments, parallel chain can include:Parallel chain network node.Parallel chain network node can be used for transporting Row interconnection chain program, obtains and nodal information is preset in program, active data verification nodal information is asked to default node, to work The data verification node request access interconnection chain of jump.

In certain embodiments, block chain interacted system can include:The parallel chain of above-mentioned each embodiment, and it is above-mentioned each The interconnection chain of individual embodiment.

Figure 10 is the schematic flow sheet for being used for the anonymous method for secret protection across chain transaction of one embodiment of the invention.

In the present embodiment, across chain transaction is the transaction between source parallel chain and purpose parallel chain, source parallel chain and purpose Parallel chain is respectively with interconnecting chain link.This method can apply to the source data checking node side of source parallel chain.

As shown in Figure 10, this method may comprise steps of:

S101, structure source parallel chain are used for the anonymous common parameter across chain transaction;S102, by common parameter static registration or Person's dynamic registration to interconnection chain on;S103, according to common parameter, across the chain transaction of anonymity broadcasted in the parallel chain of source is put down The common recognition checking of row chain network;S104, after parallel chain network common recognition is verified, by across the chain transaction broadcast of anonymity in interconnection chain In.

In step S101, parallel chain zero-knowledge proof method can be based on and carry out common parameter structure.For example, use ZkSNARK zero-knowledge proof method.ZkSNARK is the encryption method of a proof/checking calculation of integrity.

In certain embodiments, common parameter structure can be realized with the module of write-in program, such as parallel chain is across chain Transaction verification rule module, trading rules modular converter, common parameter generation module, binding and Registering modules etc..

In certain embodiments, across the chain transaction verification rule module of parallel chain is determined for across the chain friendship of a certain parallel chain Easy proof rule function, the validity merchandised across chain can be verified by the function.For example, (it can be used for based on UTXO models The model of bit coin block chain) proof rule, the proof rule of public key signature of user balance are carried out, but it is not limited to both Rule.

In certain embodiments, the conversion for the transaction verification rule that trading rules modular converter can be used in block chain. The module will solve the problems, such as to belong to np problem.Np problem refers to the indecisive problem that multinomial algorithm can solve the problem that be present, And wherein np complete problem is most possible the problem of not being P problems type.The module can be demonstrate,proved using zkSNARK Zero Knowledges Bright algorithm solves the problems, such as validation verification of merchandising.But zkSNARK zero-knowledge proofs algorithm can only operate secondary arithmetic routine (QAP).Across the chain transaction verification rule function of a certain parallel chain can be converted into zkSNARK Zero Knowledges by trading rules modular converter The manageable form of algorithm is proved, such as QAP forms.

In certain embodiments, QAP forms can be as follows:

In above-mentioned formula (1), Ai(x)、Bi(x)、Ci(x), H (x), Z (x) are that across chain transaction verification rule is converted to QAP After form, obtained multinomial.Except in QAP equatioies polynomial coefficient with the sender of transaction, recipient, transfer amount of money etc. Outside information is different, the QAP equatioies based on parallel chain transaction verification rule construct are fixed.

In certain embodiments, common parameter generation module can based on a certain parallel chain across chain trading rules QAP shapes Formula generates the common parameter of zero-knowledge proof algorithm, including:Generator's key (PK) and verifier's key (VK).Wherein:For Generator's key (PK), the transaction initiator of a certain parallel chain use generator's key (PK) generation transaction associated privacy information Zero-knowledge proof.For verifier's key (VK), verifier can use the checking transaction of a certain parallel chain verifier key (VK) In by corresponding generator's key (PK) generation zero-knowledge proof.

In certain embodiments, because the calculating time of parallel chain common parameter is longer, therefore binding and Registering modules are designed, After the ID of a certain parallel chain and its generator's key (PK), verifier's key (VK) binding, it is registered in interconnection chain, is easy to anti- It is multiple to use.

In certain embodiments, across chain anonymous deal checking can be used for realizing across chain anonymous deal by initiating with realization The overall process finally confirmed.

In step S101, structure source parallel chain, which is used for the anonymous common parameter across chain transaction, can include following sub-step Suddenly:S1011, determine that source parallel chain is used for the anonymous proof rule function merchandised across chain;S1012, proof rule function is changed Into ternary vector R1CS forms;S1013, R1CS forms are converted into the secondary program QAP forms that count;S1014, according to QAP shapes Formula, generate the common parameter based on zero-knowledge proof algorithm.Wherein, common parameter can include:Generator's key PK and checking Person's key VK.

In S1012, in order to which transaction verification rule is converted into QAP forms, it is necessary to which transaction verification rule function is changed Into NP full-language R1CS forms.In this step, it is possible, firstly, to by across the chain transaction verification rules abstraction of a certain parallel chain into again Miscellaneous multinomial.Then, by complicated Factoring Polynomials into two kinds of forms:A=b and a=b (op) c, op can be the behaviour such as addition subtraction multiplication and division Accord with, a and b can be variable, numeral or subexpression.Finally, according to the expression formula decomposed be converted into a series of ternarys to Measure the form of (a, b, c), i.e. R1CS forms.

In S1013, the transaction verification rule for the R1CS forms that the parallel chain is merchandised across chain is converted into QAP (secondary calculations Art program) form, Fast Fourier Transform (FFT) or Lagrange's interpolation can be used, but be not limited to both approaches.

In S1014, based on QAP (the secondary program that counts) Form generation parallel chains across chain anonymous deal zkSNARK Zero-knowledge proof algorithm common parameter, i.e. generator's key (PK) and verifier's key (VK).Due to the transaction verification of parallel chain Rule includes checking signature, calculates the complicated multinomial operation such as Merkel tree (Merkle trees) root cryptographic Hash, so by its structure QAP forms include a large amount of Hash operation functions, directly calculate QAP forms in linear combination can consume a large amount of computing resources with And the time.In order to avoid the above situation, it is necessary to which the multinomial included in QAP forms is converted into a certain safe stochastic variable rn The value at place, now QAP equatioies still set up.

In order to avoid directly by multinomial Ai(x)、Bi(x)、Ci(x) value at safe stochastic variable is published in public In parameter, point G can be generated based on elliptic curve numerical value is converted to point on elliptic curve:

P=G*n (formula 2)

In above-mentioned formula (2), P is the point on elliptic curve.It is discrete right based on elliptic curve under existing research system Number problem is very scabrous, i.e., obtaining n by P and G, (n is limited domain variable, and it n) is extremely tired that rn, which belongs to, in the present embodiment Difficult.Therefore, point of the numerical value after converted is published in common parameter.

In order that the checking node in interconnection chain network is being unaware of merchandise associated privacy information such as both parties, trade gold The validity of transaction is able to verify that in the case of volume, it is necessary to using the peering function e of elliptic curve, the function needs the condition met It is as follows:

E (P, Q+R)=e (P, Q) * e (P, R) (formula 3)

E (P+Q, R)=e (P, R) * e (Q, R) (formula 4)

In above-mentioned formula 3 and formula 4, P, Q, R are the point on elliptic curve respectively, in order to verify that interconnection chain trading rules turn The QAP equatioies changed, only need to verify:

E (δ _ a, δ _ b)=e (δ _ c, G) * e (δ _ h, δ _ z) (formula 5)

Wherein:

δ _ a=G*A (rn)

δ _ b=G*B (rn)

δ _ c=G*C (rn)

δ _ h=G*H (rn)

δ _ z=G*Z (rn)

By generator's key (PK), node (such as checking node) can be demonstrate,proved in the case where non-disclosre merchandises privacy information Open-birth conclusion of the business easily effective evidence;Correspondingly, transaction circumstantial evidence can be verified by verifier's key (VK), checking node Validity, so as to make the operation for receiving or refusing the transaction.

In step s 102,2 realizations can will be included on common parameter static registration or dynamic registration to interconnection chain Mode.

First implementation, ID, PK and VK of source parallel chain are bound, and the information of binding is passed through into predetermined application Program Interfaces API registration is to interconnecting on chain, so that source code of the interconnection chain based on interconnection chain is hidden source parallel chain initiation Across the chain transaction of name carries out interconnecting chain common recognition checking;

Second implementation, ID, PK and VK of source parallel chain are bound, the information change interconnection chain based on binding Source code known together so that interconnection chain carries out interconnection chain based on across the chain transaction of anonymity that the code after change is initiated source parallel chain Checking.

By parallel chain ID and generator's key (PK) and verifier's key (VK) binding registration to interconnecting on chain, and only Have through interconnecting after most of verifier votes through in chain, just can finally come into force, parallel chain zero-knowledge proof algorithm common parameter Building process terminates.Embodiment has dynamic registration and static registration etc..

In certain embodiments, dynamic registration can be:By parallel chain ID and generator's key (PK) and verifier's key (VK) after binding, a kind of the servicing of interconnection chain common recognition checking is turned into by specific API registration, not changing interconnection chain, specifically common recognition is tested Card mode, also do not update interconnection chain code.Static registration can be:Parallel chain ID and generator's key (PK) and verifier is close After key (VK) binding, renewal interconnection chain block chain code so that interconnection chain node can verify that what the parallel chain sent hides across chain Name transaction, completes the common recognition to the transaction and forwarding.But specific logon mode is not limited to both the above.

In step s 103, the anonymous implementation across chain transaction broadcasted in the parallel chain of source can include:Based on PK, The anonymous zero-knowledge proof information across chain transaction of generation;According to zero-knowledge proof information, across chain Transaction Information, source parallel chain ID With the ID of purpose parallel chain, anonymous deal information is generated, and by the broadcast of anonymous deal information in the parallel chain of source.According to public ginseng Number, the implementation that transaction across chain to anonymity carries out parallel chain network common recognition checking can include:Obtain in anonymous deal information Zero-knowledge proof information;Zero-knowledge proof information is verified according to VK.

Step S103 can include following sub-step:

S1031, in parallel chain transaction initiator using generator's key (PK) generation transaction zero-knowledge proof.Generator The main input of key (PK) be across chain anonymous deal Merkle tree roots cryptographic Hash, sequence number (by using promoter's private key with Random number is generated by pseudo-random function) and other information, auxiliary input is Transaction Information, Merkle branches, merchandise initiator Public and private key privacy information, recipient's public key information, correlation random number (random number used during formation sequence).

S1032, the main zero-knowledge proof for inputting, generating that will merchandise, this parallel chain block chain mark, the parallel sequence of purpose The information combinations such as block chain mark form across chain anonymous deal.

S1033, across the chain anonymous deal formed in step S1032 is broadcast to parallel chain by transaction initiator in parallel chain In.

Across the chain anonymous deal generated in S1034, parallel chain interior joint receiving step S1032, and use verifier's key (VK) across the chain anonymous deal generated in verification step S1032.If all node verifications of parallel chain are by into step S1035, if checking is not by into step S1036.

Across the chain anonymous deal generated in S1035, step S1032 is bundled to block by the checking of parallel chain interior joint In, after the block is known together in parallel chain, the block head of the block and across chain anonymous deal are forwarded in interconnection chain, entered Enter step S1037.

Across the chain anonymous deal generated in S1036, step S1032 is invalid, abandons the transaction, across chain anonymous deal checking with Implementation process terminates.

Across the chain anonymous deal sent in S1037, interconnection chain interior joint receiving step S1035, sends out according in step S1035 The block head sent, the SPV for obtaining this across chain anonymous deal prove information, verify that the transaction is known together by parallel chain, afterwards Should across chain anonymous deal using verifier's key (VK) checking.If all checking nodes are verified in interconnection chain, will Across chain anonymous deal recorded in interconnection chain block, into step S104, if checking is not by into step S1036.

In step S104, after parallel chain network common recognition is verified, by across the chain transaction broadcast of anonymity in chain is interconnected, It is to be verified by rear so that the checking node transaction across chain to anonymity in interconnection chain is verified, purpose is given in across chain transaction Parallel chain.Across the chain anonymous deal generated in above-mentioned steps S1032 is forwarded to purpose parallel chain block chain and come into force, across chain anonymity Transaction verification terminates with implementation process.

Thus, the above-mentioned transaction method for secret protection based on across chain, across chain transaction privacy information can not only not revealed In the case of verify and complete across chain transaction, ensure the privacy across chain transaction, and can ensure that across chain transaction participant is believed The privacy and security of breath.

Figure 11 is the schematic flow sheet for being used for the anonymous method for secret protection across chain transaction of another embodiment of the present invention.

In the present embodiment, across chain transaction is the transaction between source parallel chain and purpose parallel chain, source parallel chain and purpose Parallel chain is respectively with interconnecting chain link.This method can apply to interconnect the data verification node side of chain.

As shown in figure 11, this method may comprise steps of:S111, structure source parallel chain are used for anonymity across chain transaction Common parameter;S112, by common parameter static registration or dynamic registration to interconnection chain;S113, according to common parameter, to wide Broadcast across the chain transaction of anonymity in the parallel chain of source and carry out parallel chain network common recognition checking;S114, treat parallel chain network common recognition checking By rear, by across the chain transaction broadcast of anonymity in chain is interconnected.

In step S111, structure source parallel chain, which is used for the anonymous common parameter across chain transaction, can include following sub-step Suddenly:S1111, determine that source parallel chain is used for the anonymous proof rule function merchandised across chain.S1112, proof rule function is changed Into ternary vector R1CS forms.S1113, R1CS forms are converted into the secondary program QAP forms that count.S1114, according to QAP shapes Formula, generate the common parameter based on zero-knowledge proof algorithm.Common parameter can include:Generator's key PK and verifier's key VK。

In step S112, it will can include following 2 kinds on common parameter static registration or dynamic registration to interconnection chain Implementation:

The first implementation, ID, PK and VK of source parallel chain are bound, the information of binding is passed through into predetermined application Program Interfaces API registration is to interconnecting on chain, so that source code of the interconnection chain based on interconnection chain is hidden source parallel chain initiation Across the chain transaction of name carries out interconnecting chain common recognition checking.

Second of implementation, ID, PK and VK of source parallel chain are bound, the information change interconnection chain based on binding Source code known together so that interconnection chain carries out interconnection chain based on across the chain transaction of anonymity that the code after change is initiated source parallel chain Checking.

In step S113, across the chain transaction of anonymity broadcasted in the parallel chain of source can be included:It is anonymous based on PK, generation Across the zero-knowledge proof information of chain transaction;Put down according to zero-knowledge proof information, across chain Transaction Information, the ID of source parallel chain and purpose The ID of row chain, anonymous deal information is generated, and by the broadcast of anonymous deal information in the parallel chain of source.

According to common parameter, transaction across chain to anonymity, which carries out parallel chain network common recognition checking, to be included:Obtain anonymous hand over Zero-knowledge proof information in easy information;Zero-knowledge proof information is verified according to VK.

It should be noted that in the case where not conflicting, those skilled in the art can according to actual needs will be above-mentioned The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out into the operation such as flexible combination.For simplicity, repeat no more Various implementations.In addition, the content of each embodiment can mutual reference.

Figure 12 is the structural representation for being used for the anonymous privacy protection device across chain transaction of one embodiment of the invention.

In the present embodiment, across chain transaction is the transaction between source parallel chain and purpose parallel chain, source parallel chain and purpose Parallel chain is respectively with interconnecting chain link.

As shown in figure 12, can include across the privacy protection device that chain is merchandised for anonymity:Parameter structure module 121, ginseng Number Registering modules 122, interconnection common recognition module 123 and across chain transaction modules 124.Wherein, parameter structure module 121 can be used for structure Build source parallel chain and be used for the anonymous common parameter merchandised across chain;Parameter Registering modules 122 can be used for the static note of common parameter Volume or dynamic registration to interconnection chain on;Interconnection common recognition module 123 can be used for according to common parameter, to broadcasting in source parallel chain In across the chain transaction of anonymity carry out parallel chain network common recognition and verify;Across chain transaction modules 124 can be used for treating that parallel chain network is total to After knowledge is verified, by across the chain transaction broadcast of anonymity in chain is interconnected.

In certain embodiments, parameter structure module 121 can include:Function determining unit, the first converting unit, second Converting unit and parameter generating unit.Wherein:Function determining unit is determined for source parallel chain and is used for anonymous across chain transaction Proof rule function;First converting unit can be used for proof rule function being converted into ternary vector R1CS forms;Second Converting unit can be used for R1CS forms being converted into the secondary program QAP forms that count;Parameter generating unit can be used for basis QAP forms, generate the common parameter based on zero-knowledge proof algorithm.

In certain embodiments, common parameter is the parameter based on zero-knowledge proof algorithm, and common parameter includes:Generator Key PK and verifier's key VK.

In certain embodiments, parameter Registering modules 122 can include:Interface registering unit or code changing unit.

Interface registering unit can be used for being bound ID, PK and VK of source parallel chain, the information of binding be passed through pre- Application programming interface API registration is determined to interconnection chain, so that source code of the interconnection chain based on interconnection chain is sent out source parallel chain Across the chain transaction of anonymity risen carries out interconnecting chain common recognition checking;Or code changing unit can be used for ID, PK of source parallel chain Bound with VK, the source code of the information change interconnection chain based on binding, so as to interconnect chain based on the code after change to source Across the chain transaction of anonymity that parallel chain is initiated carries out interconnecting chain common recognition checking.

Figure 13 is the structural representation for being used for the anonymous privacy protection device across chain transaction of another embodiment of the present invention.

In the present embodiment, across chain transaction is the transaction between source parallel chain and purpose parallel chain, source parallel chain and purpose Parallel chain is respectively with interconnecting chain link.

It can include across the privacy protection device that chain is merchandised for anonymity:Transaction acquisition module 131, common recognition authentication module 132 and transaction broadcast module 133.Wherein, transaction acquisition module 131 can be used for obtaining anonymity of the broadcast in chain is interconnected across chain Transaction;Common recognition authentication module 132 can be used for according to the common parameter in static registration or dynamic registration to interconnection chain, to hideing Across the chain transaction of name carries out interconnecting chain network common recognition checking;Transaction broadcast module 133 can be used for chain network common recognition checking to be interconnected By rear, by across the chain transaction broadcast of anonymity into purpose parallel chain.

In certain embodiments, common parameter includes:Generator's key PK and verifier's key VK.

In certain embodiments, common recognition authentication module 132 can include:Information acquisition unit and Information Authentication unit.

Information acquisition unit can be used for obtaining the zero-knowledge proof information in anonymous deal information;

Information Authentication unit can be used for verifying zero-knowledge proof information according to VK.

In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.When implemented in software, can realize in the form of a computer program product whole or in part.The computer program Product includes one or more computer instructions, when run on a computer so that computer performs above-mentioned each implementation Method described in example.When loading on computers and performing the computer program instructions, produce whole or in part according to Flow or function described in the embodiment of the present invention.Computer can be all-purpose computer, special-purpose computer, computer network or Other programmable devices of person.Computer instruction can store in a computer-readable storage medium, or can from a computer Read storage medium to transmit to another computer-readable recording medium, for example, the computer instruction can be from website station Point, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode is transmitted to another web-site, computer, server or data center.Meter Calculation machine readable storage medium storing program for executing can be any usable medium that computer can access or can use Jie comprising one or more The data storage devices such as the integrated server of matter, data center.Usable medium can be magnetic medium, (for example, floppy disk, hard disk, Tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disc Solid State Disk (SSD)) etc..

It should be noted that the device of the various embodiments described above can be as the method for each embodiment of the various embodiments described above In executive agent, it is possible to achieve the corresponding flow in each method, identical technique effect is realized, for sake of simplicity, in this respect Content repeats no more.

Figure 14 is the circuit theory schematic diagram for being used for the anonymous privacy protection device across chain transaction of one embodiment of the invention.

As shown in figure 14, the framework can include CPU (CPU) 141, and it can be according to being stored in read-only deposit Program in reservoir (ROM) 142 is held from the program that storage part 148 is loaded into random access storage device (RAM) 143 The various operations that the above-mentioned each embodiment of row is done.In RAM143, the various programs needed for system architecture operation are also stored with And data.CPU141, ROM 142 and RAM 143 are connected with each other by bus 144.Input/output (I/O) interface 145 also connects It is connected to bus 144.

I/O interfaces 145 are connected to lower component:Importation 146 including keyboard, mouse etc.;Penetrated including such as negative electrode The output par, c 147 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 148 including hard disk etc.; And the communications portion 149 of the NIC including LAN card, modem etc..Communications portion 149 via such as because The network of spy's net performs communication process.Driver 1410 is also according to needing to be connected to I/O interfaces 145.Detachable media 1411, it is all Such as disk, CD, magneto-optic disk, semiconductor memory, it is arranged on as needed on driver 1410, in order to read from it The computer program gone out is mounted into storage part 148 as needed.

Especially, according to an embodiment of the invention, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiments of the invention include a kind of computer program product, it includes being tangibly embodied in machine readable Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this In the embodiment of sample, the computer program can be downloaded and installed by communications portion 149 from network, and/or from removable Medium 1411 is unloaded to be mounted.

Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, it can be as the part that unit is shown or may not be physics list Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.

Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.

Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (18)

1. a kind of be used for the anonymous method for secret protection across chain transaction, it is characterised in that across the chain transaction be source parallel chain and Transaction between purpose parallel chain, the source parallel chain and the purpose parallel chain are respectively with interconnecting chain link, methods described bag Include following steps:
Build the source parallel chain and be used for the anonymous common parameter merchandised across chain;
The common parameter static registration or dynamic registration are interconnected on chain to described;
According to the common parameter, parallel chain network common recognition is carried out to across the chain transaction of anonymity broadcasted in the source parallel chain and tested Card;
After the parallel chain network common recognition is verified, by across the chain transaction broadcast of the anonymity in the interconnection chain.
2. according to the method for claim 1, it is characterised in that the structure source parallel chain is used for anonymous across chain transaction Common parameter, including:
Determine that the source parallel chain is used for the anonymous proof rule function merchandised across chain;
The proof rule function is converted into ternary vector R1CS forms;
The R1CS forms are converted into the secondary program QAP forms that count;
According to the QAP forms, the common parameter based on zero-knowledge proof algorithm is generated.
3. method according to claim 1 or 2, it is characterised in that the common parameter includes:Generator's key PK and test Card person's key VK.
4. according to the method for claim 3, it is characterised in that arrive the common parameter static registration or dynamic registration On the interconnection chain, including:
The ID, the PK and the VK of the source parallel chain are bound, the information of binding is compiled by predetermined application Journey interface API registration is interconnected on chain to described, so that source code of the interconnection chain based on the interconnection chain is parallel to the source Across the chain transaction of anonymity that chain is initiated carries out interconnecting chain common recognition checking;
Or
The ID, the PK and the VK of the source parallel chain are bound, the information change interconnection chain based on binding Source code, so that the interconnection chain is interconnected based on across the chain transaction of anonymity that the code after change is initiated the source parallel chain Chain common recognition checking.
5. according to the method for claim 3, it is characterised in that anonymity across chain friendship of the broadcast in the source parallel chain Easily, including:
Based on the PK, the anonymous zero-knowledge proof information across chain transaction is generated;
According to the ID of the zero-knowledge proof information, across chain Transaction Information, the ID of the source parallel chain and the purpose parallel chain, The anonymous deal information is generated, and by anonymous deal information broadcast in the source parallel chain.
6. according to the method for claim 5, it is characterised in that it is described according to the common parameter, to the anonymity across chain Transaction carries out parallel chain network common recognition checking, including:
Obtain the zero-knowledge proof information in the anonymous deal information;
The zero-knowledge proof information is verified according to the VK.
7. a kind of be used for the anonymous method for secret protection across chain transaction, it is characterised in that across the chain transaction be source parallel chain and Transaction between purpose parallel chain, the source parallel chain and the purpose parallel chain are respectively with interconnecting chain link, methods described bag Include following steps:
Obtain anonymity across chain transaction of the broadcast in the interconnection chain;
According to the common parameter in static registration or dynamic registration to the interconnection chain, across the chain transaction of the anonymity is carried out mutual Join chain network common recognition checking;
After the interconnection chain network common recognition is verified, by across the chain transaction broadcast of the anonymity into the purpose parallel chain.
8. according to the method for claim 7, it is characterised in that the common parameter includes:Generator's key PK and checking Person's key VK.
9. according to the method for claim 8, it is characterised in that across the chain transaction of the anonymity is carried out to interconnect chain network common recognition Checking, including:
Obtain the zero-knowledge proof information in the anonymous deal information;
The zero-knowledge proof information is verified according to the VK.
10. a kind of be used for the anonymous privacy protection device across chain transaction, it is characterised in that across the chain transaction be source parallel chain and Transaction between purpose parallel chain, the source parallel chain and the purpose parallel chain are respectively with interconnecting chain link, described device bag Include:
Parameter builds module, is used for the anonymous common parameter merchandised across chain for building the source parallel chain;
Parameter Registering modules, for the common parameter static registration or dynamic registration to be interconnected into chain to described;
Interconnection common recognition module, for according to the common parameter, to broadcast in the source parallel chain it is anonymous across chain merchandise into The parallel chain network common recognition checking of row;
Across chain transaction modules, for after the parallel chain network common recognition is verified, across the chain transaction broadcast of the anonymity to be existed In the interconnection chain.
11. device according to claim 10, it is characterised in that the parameter structure module includes:
Function determining unit, for determining that the source parallel chain is used for the anonymous proof rule function merchandised across chain;
First converting unit, for the proof rule function to be converted into R1CS forms;
Second converting unit, for the R1CS forms to be converted into QAP forms;
Parameter generating unit, for according to the QAP forms, generating the common parameter based on zero-knowledge proof algorithm.
12. the device according to claim 10 or 11, it is characterised in that the common parameter is calculated based on zero-knowledge proof The parameter of method, the common parameter include:Generator's key PK and verifier's key VK.
13. device according to claim 12, it is characterised in that the parameter Registering modules include:
Interface registering unit, for the ID, the PK and the VK of the source parallel chain to be bound, the information of binding is led to Predetermined application DLL API registration is crossed to the interconnection chain, so that source of the interconnection chain based on the interconnection chain Across the chain transaction of anonymity that code is initiated the source parallel chain carries out interconnecting chain common recognition checking;
Or
Code changing unit, for the ID, the PK and the VK of the source parallel chain to be bound, the information based on binding The source code of the interconnection chain is changed, so that the anonymity that the interconnection chain is initiated the source parallel chain based on the code after change Across chain transaction carries out interconnecting chain common recognition checking.
14. a kind of be used for the anonymous privacy protection device across chain transaction, it is characterised in that across the chain transaction be source parallel chain and Transaction between purpose parallel chain, the source parallel chain and the purpose parallel chain are respectively with interconnecting chain link, described device bag Include:
Transaction acquisition module, for obtaining anonymity across chain transaction of the broadcast in the interconnection chain;
Know together authentication module, for according to the common parameter on static registration or dynamic registration to the interconnection chain, to described Anonymous across chain transaction carries out interconnecting chain network common recognition checking;
Transaction broadcast module, for after the interconnection chain network common recognition is verified, across the chain transaction of the anonymity to be broadcasted extremely In the purpose parallel chain.
15. device according to claim 14, it is characterised in that the common parameter includes:Generator's key PK and test Card person's key VK.
16. device according to claim 15, it is characterised in that the common recognition authentication module includes:
Information acquisition unit, for obtaining the zero-knowledge proof information in the anonymous deal information;
Information Authentication unit, for verifying the zero-knowledge proof information according to the VK.
17. a kind of be used for the anonymous privacy protection device across chain transaction, it is characterised in that including:
Memory, for depositing program;
Processor, for performing the program of the memory storage, described program causes the computing device such as claim Method in 1-9 described in any one.
A kind of 18. computer-readable recording medium, it is characterised in that including:Instruction,
When the instruction is run on computers so that computer performs the side as described in any one in claim 1-9 Method.
CN201710953056.2A 2017-10-13 2017-10-13 Method for secret protection, device and the storage medium merchandised for anonymity across chain CN107862216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710953056.2A CN107862216A (en) 2017-10-13 2017-10-13 Method for secret protection, device and the storage medium merchandised for anonymity across chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710953056.2A CN107862216A (en) 2017-10-13 2017-10-13 Method for secret protection, device and the storage medium merchandised for anonymity across chain

Publications (1)

Publication Number Publication Date
CN107862216A true CN107862216A (en) 2018-03-30

Family

ID=61699789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710953056.2A CN107862216A (en) 2017-10-13 2017-10-13 Method for secret protection, device and the storage medium merchandised for anonymity across chain

Country Status (1)

Country Link
CN (1) CN107862216A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108492093A (en) * 2018-04-09 2018-09-04 李俊山 A kind of application model of block chain technology in efficiency of government promotion
CN108683630A (en) * 2018-04-03 2018-10-19 阿里巴巴集团控股有限公司 The authentication method and device, electronic equipment of transregional piece of chain
CN108847943A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Processing method, device, electronic equipment and the storage medium of np problem
CN108984784A (en) * 2018-07-26 2018-12-11 百度在线网络技术(北京)有限公司 Application implementation method, device, equipment and storage medium based on block chain network
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109242675A (en) * 2018-07-27 2019-01-18 阿里巴巴集团控股有限公司 Assets dissemination method and device, electronic equipment based on block chain
CN109286685A (en) * 2018-11-21 2019-01-29 北京蓝石环球区块链科技有限公司 The system architecture of the more subchains of main chain adduction row of subchain can be expanded
CN109286678A (en) * 2018-10-30 2019-01-29 刘国勋 The block chain group ecosystem and readable storage medium storing program for executing of complete decentralization and closed loop
CN109377365A (en) * 2018-10-18 2019-02-22 杭州复杂美科技有限公司 A kind of assets transfer method, equipment and storage medium
CN109617929A (en) * 2019-02-12 2019-04-12 浪潮通用软件有限公司 Node and user's interactive authentication method and system under block chain network mode
CN109711844A (en) * 2018-12-31 2019-05-03 莆田市烛火信息技术有限公司 A kind of parallel chain management method of block chain network
CN109767216A (en) * 2018-12-29 2019-05-17 莆田市烛火信息技术有限公司 A kind of account book accounting system for the block chain network that parallel chain periodically converges
CN110008686A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 The data processing method of transregional piece of chain, device, client, block catenary system
CN110276693A (en) * 2018-06-07 2019-09-24 腾讯科技(深圳)有限公司 Settlement of insurance claim method and system
WO2020001105A1 (en) * 2018-06-29 2020-01-02 阿里巴巴集团控股有限公司 Blockchain-based data verification method and apparatus, and electronic device
WO2020043046A1 (en) * 2018-08-30 2020-03-05 杭州复杂美科技有限公司 Parallel chain cross-chain transaction method, device and storage medium
CN111080447A (en) * 2019-12-02 2020-04-28 裴保林 Rotation method and system for neutral node in block chain system
CN111079198A (en) * 2020-03-10 2020-04-28 广州电力交易中心有限责任公司 Data publishing method and system based on electric power transaction
CN111192146A (en) * 2020-04-10 2020-05-22 支付宝(杭州)信息技术有限公司 Correction method and device for block chain data
WO2020177537A1 (en) * 2019-03-02 2020-09-10 杭州复杂美科技有限公司 Parallel chain consensus method, data exception processing method, device and storage medium
WO2020098835A3 (en) * 2020-02-03 2020-12-10 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based trustable guarantees

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102315A1 (en) * 2010-10-25 2012-04-26 Nokia Corporation Verification of peer-to-peer multimedia content
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107220130A (en) * 2017-05-12 2017-09-29 北京众享比特科技有限公司 A kind of information common recognition method realized at the node of block chain, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102315A1 (en) * 2010-10-25 2012-04-26 Nokia Corporation Verification of peer-to-peer multimedia content
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107220130A (en) * 2017-05-12 2017-09-29 北京众享比特科技有限公司 A kind of information common recognition method realized at the node of block chain, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DR. GAVIN WOOD, ET.AL,: "《Polkadot白皮书》", 10 November 2016 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683630A (en) * 2018-04-03 2018-10-19 阿里巴巴集团控股有限公司 The authentication method and device, electronic equipment of transregional piece of chain
CN108683630B (en) * 2018-04-03 2020-05-29 阿里巴巴集团控股有限公司 Cross-block-chain authentication method and device and electronic equipment
CN108492093A (en) * 2018-04-09 2018-09-04 李俊山 A kind of application model of block chain technology in efficiency of government promotion
CN110276693A (en) * 2018-06-07 2019-09-24 腾讯科技(深圳)有限公司 Settlement of insurance claim method and system
CN108847943A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Processing method, device, electronic equipment and the storage medium of np problem
CN109067832A (en) * 2018-06-27 2018-12-21 南京百市通数字科技有限公司 A kind of block chain transmission of transaction data method
WO2020001105A1 (en) * 2018-06-29 2020-01-02 阿里巴巴集团控股有限公司 Blockchain-based data verification method and apparatus, and electronic device
CN108984784A (en) * 2018-07-26 2018-12-11 百度在线网络技术(北京)有限公司 Application implementation method, device, equipment and storage medium based on block chain network
CN109242675A (en) * 2018-07-27 2019-01-18 阿里巴巴集团控股有限公司 Assets dissemination method and device, electronic equipment based on block chain
WO2020043046A1 (en) * 2018-08-30 2020-03-05 杭州复杂美科技有限公司 Parallel chain cross-chain transaction method, device and storage medium
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109377365A (en) * 2018-10-18 2019-02-22 杭州复杂美科技有限公司 A kind of assets transfer method, equipment and storage medium
CN109286678A (en) * 2018-10-30 2019-01-29 刘国勋 The block chain group ecosystem and readable storage medium storing program for executing of complete decentralization and closed loop
CN110008686A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 The data processing method of transregional piece of chain, device, client, block catenary system
CN109286685A (en) * 2018-11-21 2019-01-29 北京蓝石环球区块链科技有限公司 The system architecture of the more subchains of main chain adduction row of subchain can be expanded
CN109767216B (en) * 2018-12-29 2020-10-02 莆田市烛火信息技术有限公司 Account book accounting system of block chain network with regularly converged parallel chains
CN109767216A (en) * 2018-12-29 2019-05-17 莆田市烛火信息技术有限公司 A kind of account book accounting system for the block chain network that parallel chain periodically converges
CN109711844A (en) * 2018-12-31 2019-05-03 莆田市烛火信息技术有限公司 A kind of parallel chain management method of block chain network
CN109617929A (en) * 2019-02-12 2019-04-12 浪潮通用软件有限公司 Node and user's interactive authentication method and system under block chain network mode
WO2020177537A1 (en) * 2019-03-02 2020-09-10 杭州复杂美科技有限公司 Parallel chain consensus method, data exception processing method, device and storage medium
CN111080447B (en) * 2019-12-02 2020-10-30 百望股份有限公司 Rotation method and system for neutral node in block chain system
CN111080447A (en) * 2019-12-02 2020-04-28 裴保林 Rotation method and system for neutral node in block chain system
WO2020098835A3 (en) * 2020-02-03 2020-12-10 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based trustable guarantees
CN111079198A (en) * 2020-03-10 2020-04-28 广州电力交易中心有限责任公司 Data publishing method and system based on electric power transaction
CN111192146B (en) * 2020-04-10 2020-07-17 支付宝(杭州)信息技术有限公司 Correction method and device for block chain data
CN111192146A (en) * 2020-04-10 2020-05-22 支付宝(杭州)信息技术有限公司 Correction method and device for block chain data

Similar Documents

Publication Publication Date Title
Bonawitz et al. Practical secure aggregation for privacy-preserving machine learning
Ben-Or et al. Multi-prover interactive proofs: How to remove intractability assumptions
Hazay et al. Efficient RSA key generation and threshold paillier in the two-party setting
WO2017192007A2 (en) Block chain for supporting plurality of one-way functions for verification of blocks
CN107294727B (en) Electronic voting method, terminal equipment and block chain network
Kiayias et al. Fair and robust multi-party computation using a global transaction ledger
Yli-Huumo et al. Where is current research on blockchain technology?—a systematic review
Wei et al. Security and privacy for storage and computation in cloud computing
Setty et al. Taking proof-based verified computation a few steps closer to practicality
Bentov et al. How to use bitcoin to design fair protocols
US20200259804A1 (en) Manicoding for communication verification
Chung et al. Memory delegation
Hazay et al. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
Lincoln et al. A probabilistic poly-time framework for protocol analysis
Malavolta et al. Anonymous multi-hop locks for blockchain scalability and interoperability
Mao Modern cryptography: theory and practice
Chen et al. Concurrent signatures
Androulaki et al. Reputation systems for anonymous networks
CN107231351A (en) The management method and relevant device of electronic certificate
Sompolinsky et al. SPECTRE: A Fast and Scalable Cryptocurrency Protocol.
Kumaresan et al. Improvements to secure computation with penalties
Gennaro et al. Secure distributed key generation for discrete-log based cryptosystems
Eyal et al. Majority is not enough: Bitcoin mining is vulnerable
Abadi et al. Models and proofs of protocol security: A progress report
Hoens et al. Reliable medical recommendation systems with patient privacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination