CN109379343A - A kind of the isomery common recognition method and terminal of block chain - Google Patents
A kind of the isomery common recognition method and terminal of block chain Download PDFInfo
- Publication number
- CN109379343A CN109379343A CN201811128351.5A CN201811128351A CN109379343A CN 109379343 A CN109379343 A CN 109379343A CN 201811128351 A CN201811128351 A CN 201811128351A CN 109379343 A CN109379343 A CN 109379343A
- Authority
- CN
- China
- Prior art keywords
- node
- fragment
- decision node
- common recognition
- message blocks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides the isomery common recognition method and terminal of a kind of block chain, and method includes: to filter out decision node of the exclusive node as block during each round common recognition;The sub- message blocks that each fragment is sent are received by the decision node, and the sub- message blocks sent respectively to each fragment are verified;The sub- message blocks being verified are merged, the message blocks after being merged;The message blocks are respectively sent to the decision node of each fragment by the decision node of the block;If receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge that the message blocks are verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified corresponding signing messages.The present invention can prevent block chain safety issue caused by hacker attack to a certain extent, improve the safety of block chain.
Description
Technical field
The present invention relates to a kind of isomery of block chain technical field more particularly to block chain common recognition method and terminals.
Background technique
Common recognition mechanism is one of the core technology of block chain.Common recognition mechanism is that the user of mutual mistrust in block chain reaches letter
The mechanism appointed is the basis of record transmitting, verifying, duplication in block chain.Current common recognition mechanism mainly includes proof of work
(Proof of Work, PoW), equity prove (Proof of Stake, PoS), and equity is appointed to prove (Delegated Proof
Of Stake, DPoS) and practical Byzantine failure tolerance algorithm (Practical Byzantine Fault Tolerance, PBFT)
And the deformation of this 4 kinds common recognition mechanism.Certainly, now novel distributed account book technology, such as with directed acyclic graph
(Directed Acyclic Graph, DAG) is that the new distribution type account book technology of representative carries common recognition mechanism.Existing common recognition
Mechanism is more or less problematic in that.Such as PoW common recognition mechanism is there are the wasting of resources, the common recognition time is long and common recognition monopolization and
The defect of 51% natural attack;PoS common recognition mechanism haves the defects that long-chain attack, common recognition monopolization and knows together difficult of proof;
DPoS common recognition mechanism haves the defects that centralization, long-chain attack and knows together difficult of proof;When PBFT knows together mechanism in the presence of common recognition
Between with common recognition number of nodes exponential increase defect;And the new distribution type account book technology of the included common recognition based on DAG is deposited
Safety it is weak and common recognition centralization the problem of.
Safety is the most important attribute of common recognition mechanism.Common recognition mechanism is the core of block chain, the safety for mechanism of knowing together
Directly determine the safety of entire block catenary system.Therefore the safety for reinforcing common recognition mechanism is to promote entire block catenary system
The key for being safely.Current common recognition mechanism has ignored the safety of a part mostly for availability, or only considers
A part of safety, it may also be said to which common recognition mechanism only considers the safety that anti-internal system people makes sad work of it at present, and seldom examine
Consider the safety of anti-hacking.
Current block chain mostly uses greatly the common recognition mechanism of single common recognition or a variety of common recognition laminated structures, such as has block
Catenary system uses the common recognition mechanism of PoW+PBFT, and the common recognition mechanism of this superposition is to do preliminary common recognition with PoW mostly, then again
Using other common recognition mechanism.The common recognition mechanism of this mode can not fundamentally solve common recognition mechanism above-mentioned and be faced
Defect.
Summary of the invention
The technical problems to be solved by the present invention are: the present invention provides a kind of isomery of block chain common recognition method and ends
End, can prevent block chain safety issue caused by hacker attack to a certain extent, improve the safety of block chain.
In order to solve the above-mentioned technical problems, the present invention provides a kind of isomery of block chain common recognition methods, including following step
It is rapid:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively
Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement
Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks
Pass through corresponding signing messages.
It knows together terminal the present invention also provides a kind of isomery of block chain, including memory, processor and is stored in storage
On device and the computer program that can run on a processor, the processor realize following step when executing the computer program
It is rapid:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively
Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement
Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks
Pass through corresponding signing messages.
The invention has the benefit that
The present invention provides a kind of isomery of block chain common recognition method and terminals to select during each round common recognition
Decision node of the exclusive node as block is carried out by the sub- message blocks that decision node of the decision node to each fragment is sent
Verifying, and the sub- message blocks being verified are merged, the message blocks after being merged, and message blocks are respectively sent to often
The corresponding decision node of one fragment is verified, and when the number being verified is greater than preset number threshold value, indicates the message blocks
It is verified, the message blocks can be broadcasted;The present invention by the above method, selected during each round common recognition block it is new certainly
Plan node is also just unable to control entire common recognition so that attacker can not judge " leader " (decision node of fragment) of decision
Process, while common recognition algorithm used by each fragment is different, attacker can not control all points by a kind of attack strategies
Piece is also just unable to control entire common recognition process, and attacker wants most nodes of the necessary control system of control common recognition process,
This undoubtedly increases the difficulty of attack, to solve the node of a certain fragment in hacker attack block chain, and block is caused to be determined
The problem of significant error, occurs for plan, improves the safety of block chain.
Detailed description of the invention
Fig. 1 is the step schematic diagram according to the isomery of one of embodiment of the present invention one block chain common recognition method;
Fig. 2 is the structural schematic diagram according to a kind of isomery common recognition terminal of block chain of the embodiment of the present invention;
Label declaration:
1, memory;2, processor.
Specific embodiment
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and cooperate attached
Figure is explained in detail.
Fig. 1 is please referred to, the present invention provides a kind of isomery of block chain common recognition methods, comprising the following steps:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively
Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement
Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks
Pass through corresponding signing messages.
As can be seen from the above description, the present invention provides a kind of isomery of block chain common recognition method, in each round common recognition process
In, decision node of the exclusive node as block is selected, the son sent by decision node of the decision node to each fragment
Message blocks are verified, and are merged to the sub- message blocks being verified, the message blocks after being merged, and message blocks are divided
The corresponding decision node of each fragment is not sent to be verified, when the number being verified is greater than preset number threshold value, table
Show that the message blocks are verified, the message blocks can be broadcasted;The present invention is selected during each round common recognition by the above method
The new decision node of block is also just unable to control entire common recognition process, together so that attacker can not judge " leader " of decision
When each fragment used by common recognition algorithm it is different, attacker can not control all fragments by a kind of attack strategies, also
It is unable to control entire common recognition process, attacker wants most nodes of the necessary control system of control common recognition process, this is undoubtedly
The difficulty of attack is increased, to solve the node of a certain fragment in hacker attack block chain, and block decision is caused to occur
The problem of significant error, improves the safety of block chain.
Further, the S1 specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula,
Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
As can be seen from the above description, during each round common recognition, it is corresponding to filter out minimum competition value by the above method
Decision node of the node as the block mentioned so that the decision node during wheel common recognition can not be determined in advance in attacker
Safety during high block chain common recognition;Each competition of above-mentioned announcement is worth corresponding node and the node is used for data solution
Close public key is verified convenient for the decision node of fragment by signing messages of the public key to sub- message blocks.
Further, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data
Private key, r indicates the wheel number of current common recognition process, QrIndicate that the corresponding random number of r wheel common recognition process (is known together in each round
A random number is generated in the process),It indicates to utilize private key skiTo r and QrCarry out data signature, H1For Hash letter
Number.
As can be seen from the above description, being directed to each node to be selected by the above method during each round common recognition, calculating
It obtains corresponding competition value to be all different, guarantees that the decision node of fragment obtained in each round common recognition process generates at random,
The probability that the decision node of fragment is attacked can be greatly reduced.
Further, the S2 specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;
The block is made of the sub- message blocks of multiple fragments.
By the public key of the decision node of each fragment, the sub- message blocks A.L.S. that corresponding fragment decision node is sent is verified
The correctness of breath;The signing messages carries out signature institute by the private key stored on the decision node for the decision node of the fragment
Obtained information.
It, can the sub- message blocks that send of the decision node effectively to each fragment as can be seen from the above description, by the above method
It is verified, improves the safety of common recognition process;Meanwhile the public key of the decision node of each fragment, above-mentioned announcement can be passed through
Node and the node on obtained for the public key acquisition of data deciphering;
Further, the S4 specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm
The decision node of one fragment.
As can be seen from the above description, can guarantee message blocks to be sent on the decision node of the first fragment, improve system
Fault-tolerance.
Further, the isomery common recognition method of a kind of block chain, further includes:
By preset second formula, newly-increased node is distributed into corresponding fragment;
Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is that node i is to be allocated
The serial number of fragment, addi indicate the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address
Sequence transitions utilize the strtol function in C java standard library at the function of integer.
Further, the isomery common recognition method of a kind of block chain, further includes:
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1,
2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node
Uncommon value, cryptographic Hash are calculated by the first formula, and % indicates complementation operation.
Referring to figure 2., a kind of block chain provided by the invention isomery know together terminal, including memory 1, processor 2 and
It is stored in the computer program that can be run on memory 1 and on processor 2, the processor 2 is realized when executing described program
Following steps:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively
Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement
Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks
Pass through corresponding signing messages.
Further, the isomery common recognition terminal of a kind of block chain, the S1 specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula,
Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
Further, the isomery common recognition terminal of a kind of block chain, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data
Private key, r indicates the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates
Utilize private key skiTo r and QrCarry out data signature, H1For hash function.
Further, the isomery common recognition terminal of a kind of block chain, the S2 specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;
By the public key of the decision node of each fragment, the sub- message blocks A.L.S. that corresponding fragment decision node is sent is verified
The correctness of breath;The signing messages carries out signature institute by the private key stored on the decision node for the decision node of the fragment
Obtained information.
Further, the isomery common recognition terminal of a kind of block chain, the S4 specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm
The decision node of one fragment.
Further, the isomery common recognition method of a kind of block chain, further includes:
By preset second formula, newly-increased node is distributed into corresponding fragment;
Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is that node i is to be allocated
The serial number of fragment, addi indicate the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address
Sequence transitions utilize the strtol function in C java standard library at the function of integer.
Further, the isomery common recognition method of a kind of block chain, further includes:
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1,
2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node
Uncommon value, % indicate complementation operation.
Please refer to Fig. 1, the embodiment of the present invention one are as follows:
The present invention provides a kind of isomery of block chain common recognition methods, comprising the following steps:
By preset formula, newly-increased node is distributed into corresponding fragment;
The formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is node i fragment to be allocated
Serial number, addi indicates the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address sequence
The function for being transformed into integer utilizes the strtol function in C java standard library.
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1,
2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node
Uncommon value, % indicate complementation operation.
During each round common recognition, decision node of the exclusive node as block is filtered out;
Wherein, during each round is known together, decision node of the exclusive node as block is filtered out, specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula,
Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;From the multiple competition value
In filter out and meet the competition value of preset condition and (filter out the competition value for being less than default competition value threshold value, the choosing of this threshold value
Take the quantity of node to be selected for selecting to come with needs with the number of nodes to be selected for participating in competition related, it can be according to actual needs
Oneself setting), obtain multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
Wherein, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data
Private key, r indicates the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates
Utilize private key skiTo r and QrCarry out data signature, H1For hash function, i.e., Hash operation is carried out to the data after signature;
The corresponding competition value of each node to be selected is calculated by preset first formula, obtains multiple competition values, specifically
Are as follows:
The corresponding cryptographic Hash of each node to be selected is calculated by the first formula, cryptographic Hash is converted into two numbers processed,
Multiple binary numbers are obtained, the multiple binary number is the multiple competition value, each competition value and a node to be selected
It is corresponding.
The sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears
Breath block is verified;
Wherein, the sub- message blocks that each fragment is sent are received by the decision node, and each fragment is sent respectively
Sub- message blocks verified, specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;Sub- message blocks are in each point
The block generated in piece includes multiple message in block as the concept of the block on normal block chain;
The decision node of control block verifies corresponding fragment decision node hair by the public key of the decision node of each fragment
The correctness of the sub- message blocks signing messages sent;The signing messages is the decision node of the fragment by depositing on the decision node
The private key of storage carries out obtained information of signing.
The sub- message blocks being verified are merged, the message blocks after being merged;
The message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
Wherein, the message blocks are respectively sent to the decision node of each fragment by the decision node of the block,
Specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm
The decision node of one fragment.
If the decision node of fragment receives the first signing messages postbacked more than the fragment decision node of preset number threshold value,
Then judge that the message blocks are verified;After being verified, then the message blocks are broadcasted to network;First signing messages is
The decision node of fragment to message blocks be verified after (verifying be exactly the signed data for including in message blocks is verified, with
And message format in message blocks is verified), what is postbacked is verified corresponding signing messages;Wherein the quantity threshold is
The number of all fragment decision nodes with 2/3 product.
Referring to figure 2., the embodiment of the present invention two are as follows:
It knows together terminal the present invention provides a kind of isomery of block chain, including memory 1, processor 2 and is stored in storage
On device 1 and the computer program that can run on processor 2, the processor 2 realize embodiment one when executing described program
All steps.
In conclusion the present invention provides a kind of isomery of block chain common recognition method and terminal, in each round common recognition process
In, decision node of the exclusive node as block is selected, the son sent by decision node of the decision node to each fragment
Message blocks are verified, and are merged to the sub- message blocks being verified, the message blocks after being merged, and message blocks are divided
The corresponding decision node of each fragment is not sent to be verified, when the number being verified is greater than preset number threshold value, table
Show that the message blocks are verified, the message blocks can be broadcasted;The present invention is selected during each round common recognition by the above method
The new decision node of block is also just unable to control entire common recognition process, together so that attacker can not judge " leader " of decision
When each fragment used by common recognition algorithm it is different, attacker can not control all fragments by a kind of attack strategies, also
It is unable to control entire common recognition process, attacker wants most nodes of the necessary control system of control common recognition process, this is undoubtedly
The difficulty of attack is increased, to solve the node of a certain fragment in hacker attack block chain, and block decision is caused to occur
The problem of significant error, improves the safety of block chain.
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in other relevant technical fields, similarly
It is included within the scope of the present invention.
Claims (10)
- The method 1. a kind of isomery of block chain is known together, which comprises the following steps:S1: during each round common recognition, decision node of the exclusive node as block is filtered out;S2: the sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears Breath block is verified;S3: the sub- message blocks being verified are merged, the message blocks after being merged;S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge the message Block is verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified Corresponding signing messages.
- The method 2. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that the S1 specifically:During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, is obtained Multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;Screen decision node of the corresponding node of the first minimum competition value as block.
- The method 3. a kind of isomery of block chain according to claim 2 is known together, which is characterized in that first formula is specific Are as follows:Wherein, the CiFor the competition value of i-th of node to be selected, the skiIndicate the private that encryption data is used on the node to be selected Key, r indicate the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates to utilize Private key skiTo r and QrCarry out data signature, H1For hash function.
- The method 4. a kind of isomery of block chain according to claim 2 is known together, which is characterized in that the S2 specifically:The sub- message blocks that each fragment is sent are received by the decision node of the block;By the public key of the decision node of each fragment, the sub- message blocks signing messages that corresponding fragment decision node is sent is verified Correctness;The signing messages is obtained by the decision node of the fragment is signed by the private key stored on the decision node Information.
- The method 5. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that the S4 specifically:The message blocks are respectively sent to each point by practical Byzantine failure tolerance algorithm by the decision node for controlling the block The decision node of piece.
- The method 6. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that further include:By preset second formula, newly-increased node is distributed into corresponding fragment;Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is node i fragment to be allocated Serial number, addi indicates the address of node i, and sToi indicates that address sequence is transformed into the function of integer.
- The method 7. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that further include:Default common recognition algorithm set Co={ Co1,Co2,…,Com, wherein Cok, k=1,2 ..., m, the row of expression serial number k's is total to Know algorithm;If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesIts In, the g indicates the serial number of new fragment, describedIndicate the new corresponding cryptographic Hash of fragment decision node, % indicates complementation Operation.
- The terminal 8. isomery of block chain a kind of is known together, including memory, processor and storage are on a memory and can be in processor The computer program of upper operation, which is characterized in that the processor performs the steps of when executing the computer programS1: during each round common recognition, decision node of the exclusive node as block is filtered out;S2: the sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears Breath block is verified;S3: the sub- message blocks being verified are merged, the message blocks after being merged;S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge the message Block is verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified Corresponding signing messages.
- The terminal 9. a kind of isomery of block chain according to claim 8 is known together, which is characterized in that the S1 specifically:During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, is obtained Multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;Screen decision node of the corresponding node of the first minimum competition value as block.
- The terminal 10. a kind of isomery of block chain according to claim 9 is known together, which is characterized in that the first formula tool Body are as follows:Wherein, the CiFor the competition value of i-th of node to be selected, the skiIndicate the private that encryption data is used on the node to be selected Key, r indicate the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates to utilize Private key skiTo r and QrCarry out data signature, H1For hash function.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128351.5A CN109379343B (en) | 2018-09-27 | 2018-09-27 | Heterogeneous consensus method of block chains and terminal |
CN202110141138.3A CN112968884B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method and terminal for preventing hacker attack |
CN202110141137.9A CN112968883B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method with high safety and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128351.5A CN109379343B (en) | 2018-09-27 | 2018-09-27 | Heterogeneous consensus method of block chains and terminal |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110141138.3A Division CN112968884B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method and terminal for preventing hacker attack |
CN202110141137.9A Division CN112968883B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method with high safety and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109379343A true CN109379343A (en) | 2019-02-22 |
CN109379343B CN109379343B (en) | 2020-12-18 |
Family
ID=65402778
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110141137.9A Active CN112968883B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method with high safety and terminal |
CN201811128351.5A Active CN109379343B (en) | 2018-09-27 | 2018-09-27 | Heterogeneous consensus method of block chains and terminal |
CN202110141138.3A Active CN112968884B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method and terminal for preventing hacker attack |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110141137.9A Active CN112968883B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method with high safety and terminal |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110141138.3A Active CN112968884B (en) | 2018-09-27 | 2018-09-27 | Block chain heterogeneous consensus method and terminal for preventing hacker attack |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN112968883B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110619020A (en) * | 2019-09-02 | 2019-12-27 | 杭州趣链科技有限公司 | Block chain fragmentation method based on machine learning |
CN111478878A (en) * | 2020-02-28 | 2020-07-31 | 新华三技术有限公司 | Anti-attack method and device |
CN112202775A (en) * | 2020-09-29 | 2021-01-08 | 北京理工大学 | Consensus mechanism architecture and method for block chain of directed acyclic graph structure |
CN112990568A (en) * | 2021-03-11 | 2021-06-18 | 华北电力大学 | Block chain consensus mechanism construction method under comprehensive energy intelligent transaction scene |
CN113297310A (en) * | 2021-06-15 | 2021-08-24 | 广东工业大学 | Method for selecting block chain fragmentation verifier in Internet of things |
CN113779642A (en) * | 2021-09-02 | 2021-12-10 | 国网北京市电力公司 | Data processing method and device, system and electronic equipment thereof |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113411407B (en) * | 2021-06-25 | 2022-03-18 | 北京邮电大学 | Piece-separating type car networking system based on block chain technology |
CN115426125A (en) * | 2022-01-28 | 2022-12-02 | 中国科学院计算技术研究所 | Block validity verification method for block chain fragmentation system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106656974A (en) * | 2016-10-17 | 2017-05-10 | 江苏通付盾科技有限公司 | Block chain grouping consensus method and system |
CN106780032A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of block chain interchain assets transfer method under multichain scene |
WO2017148527A1 (en) * | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
US20170346637A1 (en) * | 2016-05-27 | 2017-11-30 | Sony Corporation | Electronic apparatus, method for electronic apparatus and information processing system |
CN107678865A (en) * | 2017-09-20 | 2018-02-09 | 中国银行股份有限公司 | The verification method and system of block chain based on transaction packet |
CN108241968A (en) * | 2017-03-26 | 2018-07-03 | 杭州复杂美科技有限公司 | The method that front end processor participates in block chain common recognition |
US20180220278A1 (en) * | 2017-02-01 | 2018-08-02 | BriefTrace Ltd. | System and method for securing and verifying information from transportation monitors |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789908B (en) * | 2016-11-23 | 2019-09-06 | 江苏通付盾科技有限公司 | Block common recognition method for building up and system in block chain |
CN111917864B (en) * | 2017-02-22 | 2023-08-22 | 创新先进技术有限公司 | Service verification method and device |
CN107341702B (en) * | 2017-03-08 | 2020-06-23 | 创新先进技术有限公司 | Service processing method and device |
CN107276765B (en) * | 2017-07-04 | 2020-05-05 | 中国联合网络通信集团有限公司 | Processing method and device for consensus in block chain |
CN107909369A (en) * | 2017-10-13 | 2018-04-13 | 布比(北京)网络技术有限公司 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
CN107968708B (en) * | 2017-11-10 | 2020-01-17 | 财付通支付科技有限公司 | Method, device, terminal and server for generating signature |
CN108182635A (en) * | 2017-12-18 | 2018-06-19 | 深圳前海微众银行股份有限公司 | Block chain common recognition method, system and computer readable storage medium |
CN108320155B (en) * | 2017-12-21 | 2020-09-11 | 中国科学院信息工程研究所 | Method for realizing block chain consensus mechanism |
CN108521328B (en) * | 2018-03-26 | 2020-08-28 | 杭州秘猿科技有限公司 | Block chain consensus method and device and electronic equipment |
-
2018
- 2018-09-27 CN CN202110141137.9A patent/CN112968883B/en active Active
- 2018-09-27 CN CN201811128351.5A patent/CN109379343B/en active Active
- 2018-09-27 CN CN202110141138.3A patent/CN112968884B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017148527A1 (en) * | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
US20170346637A1 (en) * | 2016-05-27 | 2017-11-30 | Sony Corporation | Electronic apparatus, method for electronic apparatus and information processing system |
CN106656974A (en) * | 2016-10-17 | 2017-05-10 | 江苏通付盾科技有限公司 | Block chain grouping consensus method and system |
CN106780032A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of block chain interchain assets transfer method under multichain scene |
US20180220278A1 (en) * | 2017-02-01 | 2018-08-02 | BriefTrace Ltd. | System and method for securing and verifying information from transportation monitors |
CN108241968A (en) * | 2017-03-26 | 2018-07-03 | 杭州复杂美科技有限公司 | The method that front end processor participates in block chain common recognition |
CN107678865A (en) * | 2017-09-20 | 2018-02-09 | 中国银行股份有限公司 | The verification method and system of block chain based on transaction packet |
Non-Patent Citations (3)
Title |
---|
DU MINGXIAO: "《A review on consensus algorithm of blockchain》", 《2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC)》 * |
XUE MING SI: "《research on a new signature scheme on blockchain》", 《HINDAWI SECURITY AND COMMUNICATION NETWORKS》 * |
苑超等: "《基于聚合签名的共识算法优化方案》", 《计算机科学》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110619020A (en) * | 2019-09-02 | 2019-12-27 | 杭州趣链科技有限公司 | Block chain fragmentation method based on machine learning |
CN110619020B (en) * | 2019-09-02 | 2022-04-01 | 杭州趣链科技有限公司 | Block chain fragmentation method based on machine learning |
CN111478878A (en) * | 2020-02-28 | 2020-07-31 | 新华三技术有限公司 | Anti-attack method and device |
CN111478878B (en) * | 2020-02-28 | 2022-10-21 | 新华三技术有限公司 | Anti-attack method and device |
CN112202775A (en) * | 2020-09-29 | 2021-01-08 | 北京理工大学 | Consensus mechanism architecture and method for block chain of directed acyclic graph structure |
CN112202775B (en) * | 2020-09-29 | 2021-06-22 | 北京理工大学 | Consensus mechanism architecture and method for block chain of directed acyclic graph structure |
CN112990568A (en) * | 2021-03-11 | 2021-06-18 | 华北电力大学 | Block chain consensus mechanism construction method under comprehensive energy intelligent transaction scene |
CN113297310A (en) * | 2021-06-15 | 2021-08-24 | 广东工业大学 | Method for selecting block chain fragmentation verifier in Internet of things |
CN113297310B (en) * | 2021-06-15 | 2023-03-21 | 广东工业大学 | Method for selecting block chain fragmentation verifier in Internet of things |
CN113779642A (en) * | 2021-09-02 | 2021-12-10 | 国网北京市电力公司 | Data processing method and device, system and electronic equipment thereof |
CN113779642B (en) * | 2021-09-02 | 2024-05-28 | 国网北京市电力公司 | Data processing method, device and system thereof, and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112968883B (en) | 2023-04-07 |
CN112968883A (en) | 2021-06-15 |
CN112968884B (en) | 2023-03-24 |
CN109379343B (en) | 2020-12-18 |
CN112968884A (en) | 2021-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109379343A (en) | A kind of the isomery common recognition method and terminal of block chain | |
KR101795695B1 (en) | Method for providing archiving service and verification service of data transceived via messenger service and server using the same | |
CN111343142B (en) | Data processing method and device based on block chain network and storage medium | |
CN109067543A (en) | Digital certificate management method, device, computer equipment and storage medium | |
CN108985772A (en) | A kind of verification method, device, equipment and the storage medium of block chain | |
CN108282334B (en) | Multi-party key negotiation device, method and system based on block chain | |
CN108604335A (en) | The method and server of file are serviced and recorded by notarization service verification for providing the notarization to file | |
CN111445247B (en) | Method and apparatus for preventing block chain forking | |
CN111291060A (en) | Method, device and computer readable medium for managing block chain nodes | |
CN110868286B (en) | Method for generating random number based on blockchain intelligent contract | |
CN112000744A (en) | Signature method and related equipment | |
CN112184229A (en) | Block chain-based sub-account transaction processing method, system and equipment | |
CN112862607A (en) | Method, device, equipment and storage medium for realizing block chain consensus mechanism | |
GB2593109A (en) | Reliability verification system for digital-asset data packet | |
WO2023273059A1 (en) | Device monitoring method, system and apparatus, and computer device and storage medium | |
CN110585727B (en) | Resource acquisition method and device | |
CN109274674A (en) | A kind of block chain isomerism common recognition method and terminal with high security | |
CN115964755B (en) | Data authorization and verification method, device, equipment and storage medium | |
CN110618989B (en) | Information processing method, information processing device and related products | |
KR101829731B1 (en) | Method and server for registering stockholder's list and recording transfer of stock ownership | |
CN113300837B (en) | Cross-chain verification method and device based on block certification and electronic equipment | |
CN110661789B (en) | Address resetting method, device, equipment and computer readable storage medium | |
WO2021120227A1 (en) | Method for information recommendation and device | |
CN111291336A (en) | Game registration method and device in game platform | |
CN111932326A (en) | Data processing method based on block chain network and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |