CN110766410B - Trusted cross-chain event construction and verification method and device based on Merker tree - Google Patents
Trusted cross-chain event construction and verification method and device based on Merker tree Download PDFInfo
- Publication number
- CN110766410B CN110766410B CN201911021463.5A CN201911021463A CN110766410B CN 110766410 B CN110766410 B CN 110766410B CN 201911021463 A CN201911021463 A CN 201911021463A CN 110766410 B CN110766410 B CN 110766410B
- Authority
- CN
- China
- Prior art keywords
- cross
- chain
- merck
- tree
- chain event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application provides a trusted cross-chain event construction and verification method and device based on a merck tree, wherein the method comprises the following steps that (1) a system builds a cross-chain event tree of the merck structure for a blockchain platform needing cross-chain transaction; (2) The cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract; (3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted; (4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree; (5) The target blockchain platform verifies the trustworthiness of the cross-chain event based on the cross-chain event tree of the merck structure on the source blockchain and the associated proof of availability. The method starts from the serious difficulty of the cross-chain verification, captures the cross-chain event by means of an intelligent contract event, and realizes the credibility and the quick verification of the cross-chain event by means of constructing a merck tree and a merck path of the cross-chain event.
Description
Technical Field
The application relates to the technical field of blockchain communication, in particular to a method and equipment for constructing and verifying a trusted cross-chain event based on a merck tree.
Background
With the rapid development of blockchain application, the business requirements of various application scenes are increasingly complex, so that various blockchain platforms are promoted, and the popularization and ecological development of the blockchains are limited to a great extent due to the lack of interconnection mechanisms between the chains. For this, the cross-link technology has been developed, and the cross-link technology can be mainly divided into asset exchange and information exchange according to the difference of interactive contents. In terms of asset exchange, some blockchains (DLT, distributed Ledger Technology) employing the decentralized ledger technique are in fact still isolated from each other, and the value exchange between them is mainly done by means of centralized exchanges, and the asset value on the chain cannot be reasonably assessed. The information exchange is very complex due to the data synchronization and corresponding cross-link call between chains, so that the alliance between the industries can not share information at present, and the business intercommunication barrier is very high.
An important problem to be solved in cross-chain interaction is how to make the target blockchain verify the trust of the cross-chain transaction, and in the traditional cross-chain technology, a hash locking mode, an e-form relay mode and the like are adopted. However, the precondition of these cross-chain interactive verifications is the consistency of the cross-chain transactions and the isomorphism of the corresponding platforms, and how to construct a trusted proving mechanism supporting the rapid verification of heterogeneous blockchains is of great importance.
Disclosure of Invention
In view of the foregoing deficiencies or inadequacies of the prior art, it would be desirable to provide a fast verification method and apparatus for merck tree-based trusted cross-chain event construction and verification.
In a first aspect, the present application provides a method for constructing and verifying a trusted cross-chain event based on a merck tree, including: the method comprises the following steps of constructing a merck tree structure of a cross-chain event similar to an account book state tree, and constructing a trusted proof of the cross-chain event based on merck loop strength:
(1) For a blockchain platform needing to carry out cross-chain transaction, the system builds a cross-chain event tree of a merck structure;
(2) The cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract;
(3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted;
(4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and related credibility certification, if the verification is not passed, an illegal event rollback flow is executed, and if the verification is passed, a subsequent cross-link routing flow is executed.
Further, a cross-chain event tree of the merck structure constructed by the system is parallel to the account state merck tree, wherein the cross-chain event tree can be externally accessed in a public way, and the merck root of the cross-chain event tree and the merck root of the account state tree jointly form the merck root of the whole blockchain.
Further, the throwing or generating of the cross-chain event is necessarily realized through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through the whole network consensus of a consensus algorithm like a common blockchain transaction.
Further, the trusted verification of the cross-chain event is based on the merck path of the cross-chain event merck tree of the original blockchain in which the cross-chain event is located
In a second aspect, the present application also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a fast authenticated merck tree-based trusted cross-chain event structuring and authentication method provided in accordance with embodiments of the present application.
Advantageous effects of the application
The method starts from the serious difficulty of the cross-chain verification, captures the cross-chain event by means of an intelligent contract event, and realizes the credibility and the quick verification of the cross-chain event by means of constructing a merck tree and a merck path of the cross-chain event.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a method for quickly verifying a trusted cross-chain event structure and verification based on a merck tree according to an embodiment of the present application.
Fig. 2 is a cross-chain event tree based on the merck tree.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the application are shown in the drawings.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
Fig. 1 is a flowchart of a trusted across-chain event constructing and verifying method based on a merck tree according to an embodiment of the present application.
As shown in fig. 1, in this embodiment, a method for constructing and verifying a trusted across-chain event based on a merck tree is characterized in that a merck tree structure of the across-chain event similar to an account state tree is constructed, and a trusted proof of the across-chain event is constructed based on merck loop strength, and the method specifically includes the following steps:
(1) For a blockchain platform needing to perform cross-chain transactions, as shown in fig. 1, the system builds a cross-chain event tree of a merck structure by collecting related cross-chain transactions in the block generation stage;
(2) Under the call of the application service platform, the cross-chain blockchain platform throws out the cross-chain event by triggering the cross-chain intelligent contract;
(3) After the cross-chain event is packaged and arranged in the platform, a cross-chain event tree of the merck structure is inserted, and the blockchain platform signs the root of the whole cross-chain event tree after cross-chain consensus of each round;
(4) The block chain platform builds a credibility merck proof of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and related credibility certification, if the verification is not passed, an illegal event rollback flow is executed, and if the verification is passed, a subsequent cross-link routing flow is executed.
Preferably, as shown in fig. 2, the inter-chain event tree of the merck structure constructed by the system is parallel to the ledger tree of the ledger state, wherein the inter-chain event tree can be accessed externally and publicly, and the merck root of the inter-chain event tree and the merck root of the ledger tree together form the merck root of the whole blockchain.
Preferably, the throwing or generating of the cross-chain event is necessarily achieved through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through the whole network consensus of a consensus algorithm like a common blockchain transaction.
Preferably, the trusted verification of the cross-chain event is based on the merck path of the cross-chain event merck tree of the original blockchain in which the cross-chain event resides.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
As shown in fig. 3, as another aspect, the present application also provides an apparatus 700 including one or more Central Processing Units (CPUs) 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data required for the operation of the device 700 are also stored. The CPU701, ROM702, and RAM703 are connected to each other through a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments of the present disclosure, the merck tree-based trusted cross-chain event structuring and verifying method described in any of the embodiments above may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a merck tree-based trusted cross-chain event structuring and validation method. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711.
As still another aspect, the present application also provides a computer-readable storage medium, which may be a computer-readable storage medium contained in the apparatus of the above-described embodiment; or may be a computer-readable storage medium, alone, that is not assembled into a device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the merck tree based trusted cross-chain event structuring and validation method described in the present application.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present application may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, each of the units may be a software program provided in a computer or a mobile smart device, or may be separately configured hardware devices. Wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application referred to in the present application is not limited to the specific combinations of the technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the application. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.
Claims (3)
1. The method for constructing and verifying the trusted cross-chain event based on the merck tree is characterized by constructing a cross-chain event merck tree structure and constructing a cross-chain event trusted proof based on a merck path, and specifically comprises the following steps of:
(1) For a blockchain platform needing to carry out cross-chain transaction, a system needs to construct a cross-chain event tree of a merck structure, wherein the cross-chain event tree of the merck structure constructed by the system is parallel to an account state merck tree, the cross-chain event tree is accessed in a public way, and the merck root of the cross-chain event tree and the merck root of the account state tree form the merck root of the whole blockchain together;
(2) The block chain platform throws out a cross-chain event by triggering a cross-chain intelligent contract;
(3) The cross-chain event is processed through the inside of the block chain platform, and a cross-chain event tree of the merck structure is inserted;
(4) The blockchain platform builds a trust evidence of the cross-chain event based on the merck cross-chain event tree;
(5) The target blockchain platform verifies the credibility of the cross-chain event according to the cross-chain event tree of the merck structure on the source blockchain and the related credibility proof, if the verification is not passed, an illegal event rollback flow is executed, if the verification is passed, a subsequent cross-link routing flow is executed, and the verification of the credibility of the cross-chain event is realized based on the merck path of the cross-chain event merck tree of the original blockchain where the cross-chain event is located.
2. The merck tree based trusted cross-chain event constructing and verifying method of claim 1, wherein the throwing or generating of the cross-chain event is achieved through a built-in cross-chain intelligent contract, and the cross-chain event is confirmed through a common network consensus of a consensus algorithm as in a common blockchain transaction.
3. An apparatus, the apparatus comprising: one or more processors; a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911021463.5A CN110766410B (en) | 2019-10-24 | 2019-10-24 | Trusted cross-chain event construction and verification method and device based on Merker tree |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911021463.5A CN110766410B (en) | 2019-10-24 | 2019-10-24 | Trusted cross-chain event construction and verification method and device based on Merker tree |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110766410A CN110766410A (en) | 2020-02-07 |
CN110766410B true CN110766410B (en) | 2023-09-22 |
Family
ID=69333890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911021463.5A Active CN110766410B (en) | 2019-10-24 | 2019-10-24 | Trusted cross-chain event construction and verification method and device based on Merker tree |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110766410B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339114B (en) * | 2020-02-28 | 2023-05-09 | 百度在线网络技术(北京)有限公司 | Data access method, device, equipment and storage medium |
CN111488615A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | Cross-link realization method and device for service data block chain |
CN111553735A (en) * | 2020-04-29 | 2020-08-18 | 陈议尊 | Point transaction method and system using public link |
CN111415162A (en) * | 2020-04-29 | 2020-07-14 | 陈议尊 | Transaction method and system based on block chain public chain |
CN111914021B (en) * | 2020-07-02 | 2022-12-02 | 众连智能科技有限公司 | Cross-block-chain interaction method, system, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909369A (en) * | 2017-10-13 | 2018-04-13 | 布比(北京)网络技术有限公司 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
CN108269190A (en) * | 2018-01-17 | 2018-07-10 | 深圳四方精创资讯股份有限公司 | Across chain method and its system based on across chain relaying platform |
CN108876370A (en) * | 2018-06-12 | 2018-11-23 | 北京航空航天大学 | The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework |
CN108881187A (en) * | 2018-05-31 | 2018-11-23 | 杭州秘猿科技有限公司 | A kind of across chain data transferring method and equipment suitable for permitting chain scene |
CN109471744A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The more subchain system architectures of main chain adduction row based on block chain |
CN110288345A (en) * | 2019-06-26 | 2019-09-27 | 深圳市网心科技有限公司 | Across chain communication means, device, main chain node and storage medium |
-
2019
- 2019-10-24 CN CN201911021463.5A patent/CN110766410B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909369A (en) * | 2017-10-13 | 2018-04-13 | 布比(北京)网络技术有限公司 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
CN108269190A (en) * | 2018-01-17 | 2018-07-10 | 深圳四方精创资讯股份有限公司 | Across chain method and its system based on across chain relaying platform |
CN108881187A (en) * | 2018-05-31 | 2018-11-23 | 杭州秘猿科技有限公司 | A kind of across chain data transferring method and equipment suitable for permitting chain scene |
CN108876370A (en) * | 2018-06-12 | 2018-11-23 | 北京航空航天大学 | The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework |
CN109471744A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The more subchain system architectures of main chain adduction row based on block chain |
CN110288345A (en) * | 2019-06-26 | 2019-09-27 | 深圳市网心科技有限公司 | Across chain communication means, device, main chain node and storage medium |
Non-Patent Citations (2)
Title |
---|
Joseph Poon等.Plasma: Scalable Autonomous Smart Contracts.《White Paper》.2017,第1-47页. * |
李芳 等.区块链跨链技术进展研究.《软件学报》.2019,第30卷(第6期),第1649-1660页. * |
Also Published As
Publication number | Publication date |
---|---|
CN110766410A (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110766410B (en) | Trusted cross-chain event construction and verification method and device based on Merker tree | |
US12028459B2 (en) | Multi-access edge computing node with distributed ledger | |
CN111295660B (en) | Computer-implemented system and method for connecting blockchain to digital twinning | |
CN110751475A (en) | Cross-chain method, system, equipment and storage medium for blockchain transaction | |
CN109146490B (en) | Block generation method, device and system | |
CN112508566A (en) | Alliance chain-based cross-chain private transaction method and equipment | |
CN113792347B (en) | Federal learning method, device, equipment and storage medium based on block chain | |
CN114567643B (en) | Cross-blockchain data transfer method, device and related equipment | |
CN112287033B (en) | Data synchronization method, equipment and computer readable storage medium | |
CN115701078B (en) | Cross-chain transaction processing method, device, electronic equipment and storage medium | |
CN113570479B (en) | Block chain transmission method, system and storage medium for real estate transaction data | |
CN112311779B (en) | Data access control method and device applied to block chain system | |
CN110400217A (en) | The regular changing process method and device of intelligent contract | |
CN110187831A (en) | The block data storage system and method for block chain alliance chain | |
CN111640018A (en) | Block chain transaction existence verification method and device | |
JP2022539283A (en) | A method and system for validating blockchain data stored in a storage format different from the blockchain | |
CN113689216A (en) | Cross-chain transaction processing method and device, equipment, storage medium and program product | |
CN111597269A (en) | Block chain-based contract implementation method, device and equipment | |
CN107277108B (en) | Method, device and system for processing messages at nodes of block chain | |
CN116777631B (en) | Transaction uplink method and device based on blockchain, equipment and medium | |
CN110033188A (en) | Business scheduling method, device, calculating equipment and medium based on block chain | |
US12131320B2 (en) | Methods and systems for implementing an omni-chain interoperability protocol in an omni-chain network | |
CN111311179A (en) | Object processing method and device, electronic equipment and computer readable storage medium | |
CN115439240A (en) | Transaction group execution method, computer device and storage medium | |
CN116186786A (en) | Block chain-based service processing method and device, electronic equipment and readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |