CN109379343A - A kind of the isomery common recognition method and terminal of block chain - Google Patents

A kind of the isomery common recognition method and terminal of block chain Download PDF

Info

Publication number
CN109379343A
CN109379343A CN201811128351.5A CN201811128351A CN109379343A CN 109379343 A CN109379343 A CN 109379343A CN 201811128351 A CN201811128351 A CN 201811128351A CN 109379343 A CN109379343 A CN 109379343A
Authority
CN
China
Prior art keywords
node
fragment
decision node
common recognition
message blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811128351.5A
Other languages
Chinese (zh)
Other versions
CN109379343B (en
Inventor
斯雪明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Fuchain Technology Co Ltd
Original Assignee
Fujian Fuchain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Fuchain Technology Co Ltd filed Critical Fujian Fuchain Technology Co Ltd
Priority to CN201811128351.5A priority Critical patent/CN109379343B/en
Priority to CN202110141138.3A priority patent/CN112968884B/en
Priority to CN202110141137.9A priority patent/CN112968883B/en
Publication of CN109379343A publication Critical patent/CN109379343A/en
Application granted granted Critical
Publication of CN109379343B publication Critical patent/CN109379343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides the isomery common recognition method and terminal of a kind of block chain, and method includes: to filter out decision node of the exclusive node as block during each round common recognition;The sub- message blocks that each fragment is sent are received by the decision node, and the sub- message blocks sent respectively to each fragment are verified;The sub- message blocks being verified are merged, the message blocks after being merged;The message blocks are respectively sent to the decision node of each fragment by the decision node of the block;If receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge that the message blocks are verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified corresponding signing messages.The present invention can prevent block chain safety issue caused by hacker attack to a certain extent, improve the safety of block chain.

Description

A kind of the isomery common recognition method and terminal of block chain
Technical field
The present invention relates to a kind of isomery of block chain technical field more particularly to block chain common recognition method and terminals.
Background technique
Common recognition mechanism is one of the core technology of block chain.Common recognition mechanism is that the user of mutual mistrust in block chain reaches letter The mechanism appointed is the basis of record transmitting, verifying, duplication in block chain.Current common recognition mechanism mainly includes proof of work (Proof of Work, PoW), equity prove (Proof of Stake, PoS), and equity is appointed to prove (Delegated Proof Of Stake, DPoS) and practical Byzantine failure tolerance algorithm (Practical Byzantine Fault Tolerance, PBFT) And the deformation of this 4 kinds common recognition mechanism.Certainly, now novel distributed account book technology, such as with directed acyclic graph (Directed Acyclic Graph, DAG) is that the new distribution type account book technology of representative carries common recognition mechanism.Existing common recognition Mechanism is more or less problematic in that.Such as PoW common recognition mechanism is there are the wasting of resources, the common recognition time is long and common recognition monopolization and The defect of 51% natural attack;PoS common recognition mechanism haves the defects that long-chain attack, common recognition monopolization and knows together difficult of proof; DPoS common recognition mechanism haves the defects that centralization, long-chain attack and knows together difficult of proof;When PBFT knows together mechanism in the presence of common recognition Between with common recognition number of nodes exponential increase defect;And the new distribution type account book technology of the included common recognition based on DAG is deposited Safety it is weak and common recognition centralization the problem of.
Safety is the most important attribute of common recognition mechanism.Common recognition mechanism is the core of block chain, the safety for mechanism of knowing together Directly determine the safety of entire block catenary system.Therefore the safety for reinforcing common recognition mechanism is to promote entire block catenary system The key for being safely.Current common recognition mechanism has ignored the safety of a part mostly for availability, or only considers A part of safety, it may also be said to which common recognition mechanism only considers the safety that anti-internal system people makes sad work of it at present, and seldom examine Consider the safety of anti-hacking.
Current block chain mostly uses greatly the common recognition mechanism of single common recognition or a variety of common recognition laminated structures, such as has block Catenary system uses the common recognition mechanism of PoW+PBFT, and the common recognition mechanism of this superposition is to do preliminary common recognition with PoW mostly, then again Using other common recognition mechanism.The common recognition mechanism of this mode can not fundamentally solve common recognition mechanism above-mentioned and be faced Defect.
Summary of the invention
The technical problems to be solved by the present invention are: the present invention provides a kind of isomery of block chain common recognition method and ends End, can prevent block chain safety issue caused by hacker attack to a certain extent, improve the safety of block chain.
In order to solve the above-mentioned technical problems, the present invention provides a kind of isomery of block chain common recognition methods, including following step It is rapid:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks Pass through corresponding signing messages.
It knows together terminal the present invention also provides a kind of isomery of block chain, including memory, processor and is stored in storage On device and the computer program that can run on a processor, the processor realize following step when executing the computer program It is rapid:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks Pass through corresponding signing messages.
The invention has the benefit that
The present invention provides a kind of isomery of block chain common recognition method and terminals to select during each round common recognition Decision node of the exclusive node as block is carried out by the sub- message blocks that decision node of the decision node to each fragment is sent Verifying, and the sub- message blocks being verified are merged, the message blocks after being merged, and message blocks are respectively sent to often The corresponding decision node of one fragment is verified, and when the number being verified is greater than preset number threshold value, indicates the message blocks It is verified, the message blocks can be broadcasted;The present invention by the above method, selected during each round common recognition block it is new certainly Plan node is also just unable to control entire common recognition so that attacker can not judge " leader " (decision node of fragment) of decision Process, while common recognition algorithm used by each fragment is different, attacker can not control all points by a kind of attack strategies Piece is also just unable to control entire common recognition process, and attacker wants most nodes of the necessary control system of control common recognition process, This undoubtedly increases the difficulty of attack, to solve the node of a certain fragment in hacker attack block chain, and block is caused to be determined The problem of significant error, occurs for plan, improves the safety of block chain.
Detailed description of the invention
Fig. 1 is the step schematic diagram according to the isomery of one of embodiment of the present invention one block chain common recognition method;
Fig. 2 is the structural schematic diagram according to a kind of isomery common recognition terminal of block chain of the embodiment of the present invention;
Label declaration:
1, memory;2, processor.
Specific embodiment
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and cooperate attached Figure is explained in detail.
Fig. 1 is please referred to, the present invention provides a kind of isomery of block chain common recognition methods, comprising the following steps:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks Pass through corresponding signing messages.
As can be seen from the above description, the present invention provides a kind of isomery of block chain common recognition method, in each round common recognition process In, decision node of the exclusive node as block is selected, the son sent by decision node of the decision node to each fragment Message blocks are verified, and are merged to the sub- message blocks being verified, the message blocks after being merged, and message blocks are divided The corresponding decision node of each fragment is not sent to be verified, when the number being verified is greater than preset number threshold value, table Show that the message blocks are verified, the message blocks can be broadcasted;The present invention is selected during each round common recognition by the above method The new decision node of block is also just unable to control entire common recognition process, together so that attacker can not judge " leader " of decision When each fragment used by common recognition algorithm it is different, attacker can not control all fragments by a kind of attack strategies, also It is unable to control entire common recognition process, attacker wants most nodes of the necessary control system of control common recognition process, this is undoubtedly The difficulty of attack is increased, to solve the node of a certain fragment in hacker attack block chain, and block decision is caused to occur The problem of significant error, improves the safety of block chain.
Further, the S1 specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
As can be seen from the above description, during each round common recognition, it is corresponding to filter out minimum competition value by the above method Decision node of the node as the block mentioned so that the decision node during wheel common recognition can not be determined in advance in attacker Safety during high block chain common recognition;Each competition of above-mentioned announcement is worth corresponding node and the node is used for data solution Close public key is verified convenient for the decision node of fragment by signing messages of the public key to sub- message blocks.
Further, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data Private key, r indicates the wheel number of current common recognition process, QrIndicate that the corresponding random number of r wheel common recognition process (is known together in each round A random number is generated in the process),It indicates to utilize private key skiTo r and QrCarry out data signature, H1For Hash letter Number.
As can be seen from the above description, being directed to each node to be selected by the above method during each round common recognition, calculating It obtains corresponding competition value to be all different, guarantees that the decision node of fragment obtained in each round common recognition process generates at random, The probability that the decision node of fragment is attacked can be greatly reduced.
Further, the S2 specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;
The block is made of the sub- message blocks of multiple fragments.
By the public key of the decision node of each fragment, the sub- message blocks A.L.S. that corresponding fragment decision node is sent is verified The correctness of breath;The signing messages carries out signature institute by the private key stored on the decision node for the decision node of the fragment Obtained information.
It, can the sub- message blocks that send of the decision node effectively to each fragment as can be seen from the above description, by the above method It is verified, improves the safety of common recognition process;Meanwhile the public key of the decision node of each fragment, above-mentioned announcement can be passed through Node and the node on obtained for the public key acquisition of data deciphering;
Further, the S4 specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm The decision node of one fragment.
As can be seen from the above description, can guarantee message blocks to be sent on the decision node of the first fragment, improve system Fault-tolerance.
Further, the isomery common recognition method of a kind of block chain, further includes:
By preset second formula, newly-increased node is distributed into corresponding fragment;
Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is that node i is to be allocated The serial number of fragment, addi indicate the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address Sequence transitions utilize the strtol function in C java standard library at the function of integer.
Further, the isomery common recognition method of a kind of block chain, further includes:
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1, 2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node Uncommon value, cryptographic Hash are calculated by the first formula, and % indicates complementation operation.
Referring to figure 2., a kind of block chain provided by the invention isomery know together terminal, including memory 1, processor 2 and It is stored in the computer program that can be run on memory 1 and on processor 2, the processor 2 is realized when executing described program Following steps:
S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
S2: receiving the sub- message blocks that each fragment is sent by the decision node, and each fragment is sent respectively Sub- message blocks are verified;
S3: the sub- message blocks being verified are merged, the message blocks after being merged;
S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, described in judgement Message blocks are verified;First signing messages is the verifying that postbacks after the decision node of fragment is verified message blocks Pass through corresponding signing messages.
Further, the isomery common recognition terminal of a kind of block chain, the S1 specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
Further, the isomery common recognition terminal of a kind of block chain, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data Private key, r indicates the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates Utilize private key skiTo r and QrCarry out data signature, H1For hash function.
Further, the isomery common recognition terminal of a kind of block chain, the S2 specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;
By the public key of the decision node of each fragment, the sub- message blocks A.L.S. that corresponding fragment decision node is sent is verified The correctness of breath;The signing messages carries out signature institute by the private key stored on the decision node for the decision node of the fragment Obtained information.
Further, the isomery common recognition terminal of a kind of block chain, the S4 specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm The decision node of one fragment.
Further, the isomery common recognition method of a kind of block chain, further includes:
By preset second formula, newly-increased node is distributed into corresponding fragment;
Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is that node i is to be allocated The serial number of fragment, addi indicate the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address Sequence transitions utilize the strtol function in C java standard library at the function of integer.
Further, the isomery common recognition method of a kind of block chain, further includes:
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1, 2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node Uncommon value, % indicate complementation operation.
Please refer to Fig. 1, the embodiment of the present invention one are as follows:
The present invention provides a kind of isomery of block chain common recognition methods, comprising the following steps:
By preset formula, newly-increased node is distributed into corresponding fragment;
The formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is node i fragment to be allocated Serial number, addi indicates the address of node i, and sToi indicates that address sequence is transformed into the function of integer;Specifically, by address sequence The function for being transformed into integer utilizes the strtol function in C java standard library.
Default common recognition algorithm set Co={ Co1,Co2,…,Com(preset m common recognition algorithm), wherein Cok, k=1, 2 ..., m, the common recognition algorithm of the row of expression serial number k;
If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesWherein, the g indicates the serial number of new fragment, describedIndicate the new corresponding Kazakhstan of fragment decision node Uncommon value, % indicate complementation operation.
During each round common recognition, decision node of the exclusive node as block is filtered out;
Wherein, during each round is known together, decision node of the exclusive node as block is filtered out, specifically:
During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, Obtain multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;From the multiple competition value In filter out and meet the competition value of preset condition and (filter out the competition value for being less than default competition value threshold value, the choosing of this threshold value Take the quantity of node to be selected for selecting to come with needs with the number of nodes to be selected for participating in competition related, it can be according to actual needs Oneself setting), obtain multiple first competition values;
Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
Screen decision node of the corresponding node of the first minimum competition value as block.
Wherein, first formula specifically:
Wherein, the CiFor the competition value of i-th of node to be selected, the skiIt indicates on the node to be selected for encryption data Private key, r indicates the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates Utilize private key skiTo r and QrCarry out data signature, H1For hash function, i.e., Hash operation is carried out to the data after signature;
The corresponding competition value of each node to be selected is calculated by preset first formula, obtains multiple competition values, specifically Are as follows:
The corresponding cryptographic Hash of each node to be selected is calculated by the first formula, cryptographic Hash is converted into two numbers processed, Multiple binary numbers are obtained, the multiple binary number is the multiple competition value, each competition value and a node to be selected It is corresponding.
The sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears Breath block is verified;
Wherein, the sub- message blocks that each fragment is sent are received by the decision node, and each fragment is sent respectively Sub- message blocks verified, specifically:
The sub- message blocks that each fragment is sent are received by the decision node of the block;Sub- message blocks are in each point The block generated in piece includes multiple message in block as the concept of the block on normal block chain;
The decision node of control block verifies corresponding fragment decision node hair by the public key of the decision node of each fragment The correctness of the sub- message blocks signing messages sent;The signing messages is the decision node of the fragment by depositing on the decision node The private key of storage carries out obtained information of signing.
The sub- message blocks being verified are merged, the message blocks after being merged;
The message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
Wherein, the message blocks are respectively sent to the decision node of each fragment by the decision node of the block, Specifically:
The message blocks are respectively sent to often by the decision node for controlling the block by practical Byzantine failure tolerance algorithm The decision node of one fragment.
If the decision node of fragment receives the first signing messages postbacked more than the fragment decision node of preset number threshold value, Then judge that the message blocks are verified;After being verified, then the message blocks are broadcasted to network;First signing messages is The decision node of fragment to message blocks be verified after (verifying be exactly the signed data for including in message blocks is verified, with And message format in message blocks is verified), what is postbacked is verified corresponding signing messages;Wherein the quantity threshold is The number of all fragment decision nodes with 2/3 product.
Referring to figure 2., the embodiment of the present invention two are as follows:
It knows together terminal the present invention provides a kind of isomery of block chain, including memory 1, processor 2 and is stored in storage On device 1 and the computer program that can run on processor 2, the processor 2 realize embodiment one when executing described program All steps.
In conclusion the present invention provides a kind of isomery of block chain common recognition method and terminal, in each round common recognition process In, decision node of the exclusive node as block is selected, the son sent by decision node of the decision node to each fragment Message blocks are verified, and are merged to the sub- message blocks being verified, the message blocks after being merged, and message blocks are divided The corresponding decision node of each fragment is not sent to be verified, when the number being verified is greater than preset number threshold value, table Show that the message blocks are verified, the message blocks can be broadcasted;The present invention is selected during each round common recognition by the above method The new decision node of block is also just unable to control entire common recognition process, together so that attacker can not judge " leader " of decision When each fragment used by common recognition algorithm it is different, attacker can not control all fragments by a kind of attack strategies, also It is unable to control entire common recognition process, attacker wants most nodes of the necessary control system of control common recognition process, this is undoubtedly The difficulty of attack is increased, to solve the node of a certain fragment in hacker attack block chain, and block decision is caused to occur The problem of significant error, improves the safety of block chain.
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in other relevant technical fields, similarly It is included within the scope of the present invention.

Claims (10)

  1. The method 1. a kind of isomery of block chain is known together, which comprises the following steps:
    S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
    S2: the sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears Breath block is verified;
    S3: the sub- message blocks being verified are merged, the message blocks after being merged;
    S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
    S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge the message Block is verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified Corresponding signing messages.
  2. The method 2. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that the S1 specifically:
    During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, is obtained Multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
    The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
    Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
    Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
    Screen decision node of the corresponding node of the first minimum competition value as block.
  3. The method 3. a kind of isomery of block chain according to claim 2 is known together, which is characterized in that first formula is specific Are as follows:
    Wherein, the CiFor the competition value of i-th of node to be selected, the skiIndicate the private that encryption data is used on the node to be selected Key, r indicate the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates to utilize Private key skiTo r and QrCarry out data signature, H1For hash function.
  4. The method 4. a kind of isomery of block chain according to claim 2 is known together, which is characterized in that the S2 specifically:
    The sub- message blocks that each fragment is sent are received by the decision node of the block;
    By the public key of the decision node of each fragment, the sub- message blocks signing messages that corresponding fragment decision node is sent is verified Correctness;The signing messages is obtained by the decision node of the fragment is signed by the private key stored on the decision node Information.
  5. The method 5. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that the S4 specifically:
    The message blocks are respectively sent to each point by practical Byzantine failure tolerance algorithm by the decision node for controlling the block The decision node of piece.
  6. The method 6. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that further include:
    By preset second formula, newly-increased node is distributed into corresponding fragment;
    Second formula is x=sToi (addi) %n, wherein the i is the serial number of node, x is node i fragment to be allocated Serial number, addi indicates the address of node i, and sToi indicates that address sequence is transformed into the function of integer.
  7. The method 7. a kind of isomery of block chain according to claim 1 is known together, which is characterized in that further include:
    Default common recognition algorithm set Co={ Co1,Co2,…,Com, wherein Cok, k=1,2 ..., m, the row of expression serial number k's is total to Know algorithm;
    If generating new fragment in block chain, the row's serial number for the common recognition algorithm that new fragment usesIts In, the g indicates the serial number of new fragment, describedIndicate the new corresponding cryptographic Hash of fragment decision node, % indicates complementation Operation.
  8. The terminal 8. isomery of block chain a kind of is known together, including memory, processor and storage are on a memory and can be in processor The computer program of upper operation, which is characterized in that the processor performs the steps of when executing the computer program
    S1: during each round common recognition, decision node of the exclusive node as block is filtered out;
    S2: the sub- message blocks that each fragment is sent are received by the decision node, and the son sent respectively to each fragment disappears Breath block is verified;
    S3: the sub- message blocks being verified are merged, the message blocks after being merged;
    S4: the message blocks are respectively sent to the decision node of each fragment by the decision node of the block;
    S5: if receiving the first signing messages postbacked more than the fragment decision node of preset number threshold value, judge the message Block is verified;First signing messages is after the decision node of fragment is verified message blocks, and what is postbacked is verified Corresponding signing messages.
  9. The terminal 9. a kind of isomery of block chain according to claim 8 is known together, which is characterized in that the S1 specifically:
    During each round common recognition, the corresponding competition value of each node to be selected is calculated by preset first formula, is obtained Multiple competition values;Each described node to be selected is the corresponding decision node of each fragment;
    The competition value for meeting preset condition is filtered out from the multiple competition value, obtains multiple first competition values;
    Announce the public key that each first competition is worth corresponding node and the node is used for data deciphering;
    Within a preset time, the minimum value in the first competition value of all announcements is obtained, the first minimum competition value is obtained;
    Screen decision node of the corresponding node of the first minimum competition value as block.
  10. The terminal 10. a kind of isomery of block chain according to claim 9 is known together, which is characterized in that the first formula tool Body are as follows:
    Wherein, the CiFor the competition value of i-th of node to be selected, the skiIndicate the private that encryption data is used on the node to be selected Key, r indicate the wheel number of current common recognition process, QrIndicate the corresponding random number of r wheel common recognition process,It indicates to utilize Private key skiTo r and QrCarry out data signature, H1For hash function.
CN201811128351.5A 2018-09-27 2018-09-27 Heterogeneous consensus method of block chains and terminal Active CN109379343B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811128351.5A CN109379343B (en) 2018-09-27 2018-09-27 Heterogeneous consensus method of block chains and terminal
CN202110141138.3A CN112968884B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method and terminal for preventing hacker attack
CN202110141137.9A CN112968883B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method with high safety and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811128351.5A CN109379343B (en) 2018-09-27 2018-09-27 Heterogeneous consensus method of block chains and terminal

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202110141138.3A Division CN112968884B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method and terminal for preventing hacker attack
CN202110141137.9A Division CN112968883B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method with high safety and terminal

Publications (2)

Publication Number Publication Date
CN109379343A true CN109379343A (en) 2019-02-22
CN109379343B CN109379343B (en) 2020-12-18

Family

ID=65402778

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110141137.9A Active CN112968883B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method with high safety and terminal
CN201811128351.5A Active CN109379343B (en) 2018-09-27 2018-09-27 Heterogeneous consensus method of block chains and terminal
CN202110141138.3A Active CN112968884B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method and terminal for preventing hacker attack

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110141137.9A Active CN112968883B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method with high safety and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110141138.3A Active CN112968884B (en) 2018-09-27 2018-09-27 Block chain heterogeneous consensus method and terminal for preventing hacker attack

Country Status (1)

Country Link
CN (3) CN112968883B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619020A (en) * 2019-09-02 2019-12-27 杭州趣链科技有限公司 Block chain fragmentation method based on machine learning
CN111478878A (en) * 2020-02-28 2020-07-31 新华三技术有限公司 Anti-attack method and device
CN112202775A (en) * 2020-09-29 2021-01-08 北京理工大学 Consensus mechanism architecture and method for block chain of directed acyclic graph structure
CN112990568A (en) * 2021-03-11 2021-06-18 华北电力大学 Block chain consensus mechanism construction method under comprehensive energy intelligent transaction scene
CN113297310A (en) * 2021-06-15 2021-08-24 广东工业大学 Method for selecting block chain fragmentation verifier in Internet of things
CN113779642A (en) * 2021-09-02 2021-12-10 国网北京市电力公司 Data processing method and device, system and electronic equipment thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411407B (en) * 2021-06-25 2022-03-18 北京邮电大学 Piece-separating type car networking system based on block chain technology
CN115426125A (en) * 2022-01-28 2022-12-02 中国科学院计算技术研究所 Block validity verification method for block chain fragmentation system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
CN106780032A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of block chain interchain assets transfer method under multichain scene
WO2017148527A1 (en) * 2016-03-03 2017-09-08 Nec Europe Ltd. Method for managing data in a network of nodes
US20170346637A1 (en) * 2016-05-27 2017-11-30 Sony Corporation Electronic apparatus, method for electronic apparatus and information processing system
CN107678865A (en) * 2017-09-20 2018-02-09 中国银行股份有限公司 The verification method and system of block chain based on transaction packet
CN108241968A (en) * 2017-03-26 2018-07-03 杭州复杂美科技有限公司 The method that front end processor participates in block chain common recognition
US20180220278A1 (en) * 2017-02-01 2018-08-02 BriefTrace Ltd. System and method for securing and verifying information from transportation monitors

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789908B (en) * 2016-11-23 2019-09-06 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain
CN111917864B (en) * 2017-02-22 2023-08-22 创新先进技术有限公司 Service verification method and device
CN107341702B (en) * 2017-03-08 2020-06-23 创新先进技术有限公司 Service processing method and device
CN107276765B (en) * 2017-07-04 2020-05-05 中国联合网络通信集团有限公司 Processing method and device for consensus in block chain
CN107909369A (en) * 2017-10-13 2018-04-13 布比(北京)网络技术有限公司 Based on the common recognition method, apparatus merchandised across chain and storage medium
CN107968708B (en) * 2017-11-10 2020-01-17 财付通支付科技有限公司 Method, device, terminal and server for generating signature
CN108182635A (en) * 2017-12-18 2018-06-19 深圳前海微众银行股份有限公司 Block chain common recognition method, system and computer readable storage medium
CN108320155B (en) * 2017-12-21 2020-09-11 中国科学院信息工程研究所 Method for realizing block chain consensus mechanism
CN108521328B (en) * 2018-03-26 2020-08-28 杭州秘猿科技有限公司 Block chain consensus method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017148527A1 (en) * 2016-03-03 2017-09-08 Nec Europe Ltd. Method for managing data in a network of nodes
US20170346637A1 (en) * 2016-05-27 2017-11-30 Sony Corporation Electronic apparatus, method for electronic apparatus and information processing system
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
CN106780032A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of block chain interchain assets transfer method under multichain scene
US20180220278A1 (en) * 2017-02-01 2018-08-02 BriefTrace Ltd. System and method for securing and verifying information from transportation monitors
CN108241968A (en) * 2017-03-26 2018-07-03 杭州复杂美科技有限公司 The method that front end processor participates in block chain common recognition
CN107678865A (en) * 2017-09-20 2018-02-09 中国银行股份有限公司 The verification method and system of block chain based on transaction packet

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DU MINGXIAO: "《A review on consensus algorithm of blockchain》", 《2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC)》 *
XUE MING SI: "《research on a new signature scheme on blockchain》", 《HINDAWI SECURITY AND COMMUNICATION NETWORKS》 *
苑超等: "《基于聚合签名的共识算法优化方案》", 《计算机科学》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619020A (en) * 2019-09-02 2019-12-27 杭州趣链科技有限公司 Block chain fragmentation method based on machine learning
CN110619020B (en) * 2019-09-02 2022-04-01 杭州趣链科技有限公司 Block chain fragmentation method based on machine learning
CN111478878A (en) * 2020-02-28 2020-07-31 新华三技术有限公司 Anti-attack method and device
CN111478878B (en) * 2020-02-28 2022-10-21 新华三技术有限公司 Anti-attack method and device
CN112202775A (en) * 2020-09-29 2021-01-08 北京理工大学 Consensus mechanism architecture and method for block chain of directed acyclic graph structure
CN112202775B (en) * 2020-09-29 2021-06-22 北京理工大学 Consensus mechanism architecture and method for block chain of directed acyclic graph structure
CN112990568A (en) * 2021-03-11 2021-06-18 华北电力大学 Block chain consensus mechanism construction method under comprehensive energy intelligent transaction scene
CN113297310A (en) * 2021-06-15 2021-08-24 广东工业大学 Method for selecting block chain fragmentation verifier in Internet of things
CN113297310B (en) * 2021-06-15 2023-03-21 广东工业大学 Method for selecting block chain fragmentation verifier in Internet of things
CN113779642A (en) * 2021-09-02 2021-12-10 国网北京市电力公司 Data processing method and device, system and electronic equipment thereof
CN113779642B (en) * 2021-09-02 2024-05-28 国网北京市电力公司 Data processing method, device and system thereof, and electronic equipment

Also Published As

Publication number Publication date
CN112968883B (en) 2023-04-07
CN112968883A (en) 2021-06-15
CN112968884B (en) 2023-03-24
CN109379343B (en) 2020-12-18
CN112968884A (en) 2021-06-15

Similar Documents

Publication Publication Date Title
CN109379343A (en) A kind of the isomery common recognition method and terminal of block chain
KR101795695B1 (en) Method for providing archiving service and verification service of data transceived via messenger service and server using the same
CN111343142B (en) Data processing method and device based on block chain network and storage medium
CN109067543A (en) Digital certificate management method, device, computer equipment and storage medium
CN108985772A (en) A kind of verification method, device, equipment and the storage medium of block chain
CN108282334B (en) Multi-party key negotiation device, method and system based on block chain
CN108604335A (en) The method and server of file are serviced and recorded by notarization service verification for providing the notarization to file
CN111445247B (en) Method and apparatus for preventing block chain forking
CN111291060A (en) Method, device and computer readable medium for managing block chain nodes
CN110868286B (en) Method for generating random number based on blockchain intelligent contract
CN112000744A (en) Signature method and related equipment
CN112184229A (en) Block chain-based sub-account transaction processing method, system and equipment
CN112862607A (en) Method, device, equipment and storage medium for realizing block chain consensus mechanism
GB2593109A (en) Reliability verification system for digital-asset data packet
WO2023273059A1 (en) Device monitoring method, system and apparatus, and computer device and storage medium
CN110585727B (en) Resource acquisition method and device
CN109274674A (en) A kind of block chain isomerism common recognition method and terminal with high security
CN115964755B (en) Data authorization and verification method, device, equipment and storage medium
CN110618989B (en) Information processing method, information processing device and related products
KR101829731B1 (en) Method and server for registering stockholder's list and recording transfer of stock ownership
CN113300837B (en) Cross-chain verification method and device based on block certification and electronic equipment
CN110661789B (en) Address resetting method, device, equipment and computer readable storage medium
WO2021120227A1 (en) Method for information recommendation and device
CN111291336A (en) Game registration method and device in game platform
CN111932326A (en) Data processing method based on block chain network and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant