CN111553795A - Multi-path scheduling method for system information of different block chains - Google Patents

Multi-path scheduling method for system information of different block chains Download PDF

Info

Publication number
CN111553795A
CN111553795A CN202010335185.7A CN202010335185A CN111553795A CN 111553795 A CN111553795 A CN 111553795A CN 202010335185 A CN202010335185 A CN 202010335185A CN 111553795 A CN111553795 A CN 111553795A
Authority
CN
China
Prior art keywords
chain
account
signature
cross
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010335185.7A
Other languages
Chinese (zh)
Inventor
潘小胜
单志平
徐晓峰
李志远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010335185.7A priority Critical patent/CN111553795A/en
Publication of CN111553795A publication Critical patent/CN111553795A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a multi-path scheduling method for system information of different block chains, which comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a multiple encryption signature module, an asset dynamic balance module and a user side. Through carrying out distributed management, carrying out intelligent prediction and cleaning to system resource to cross-chain transaction data, effectively improve data transmission efficiency, reliability and system resource's utilization ratio, through setting up multiple signature cold and hot account and carrying out dynamic asset balance adjustment, effectively promoted the security of transaction for value can freely, safely, efficient circulation in different block chain systems.

Description

Multi-path scheduling method for system information of different block chains
Technical Field
The invention relates to the technical field of block chains, in particular to a circulation technology among different block chain systems.
Background
With the continuous development of the block chain technology, more and more block chain systems coexist, and as each block chain can only transmit value in the system, the prospect of block chain application is limited to a certain extent, so that the method for value circulation in different block chain systems is important to research, the application scenes and the mining value of the block chains can be effectively expanded, and the problem of value isolated islands is solved.
Disclosure of Invention
The present invention provides a method for scheduling multiple channels of system information for different blockchains, which solves or partially solves the above-mentioned problems.
In order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a multi-path scheduling method for system information of different block chains comprises the following contents:
the blockchain system comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an Ether house; the block chain system further comprises a user node and a monitoring node, and is characterized by comprising: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, thereby reducing the communication burden of a network, ensuring the controllability of data transmission, and particularly keeping the reliable transmission of transaction data after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel distribution unit; the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, after the system is initialized, all link channels are opened, the total number of the link channels is defined, and the total number of the link channels is recorded as M*(ii) a With the increase of the cross-link transaction, the switch control subunit dynamically adjusts the opening and closing states of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of the cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows:
Figure BDA0002466309070000021
Figure BDA0002466309070000022
wherein j is a natural number ranging from 1 to M; m is the number of all users performing cross-chain transaction in the current network, and M is a natural number;
Figure BDA0002466309070000023
tunneling for jth user applying for cross-chain transactionsA real-time value of a lane account status parameter;
Figure BDA0002466309070000024
real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The initial value of the tunnel account state parameter is obtained; NS (server)0For initial values of network state parameters, i.e. AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)tw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator used for solving calculus; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online; the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean value of the link channel parameters:
Figure BDA0002466309070000025
wherein,
Figure BDA0002466309070000026
the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;
Figure BDA0002466309070000027
the average value of the network state parameters of all cross-link transaction users in the current network is obtained; the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:
Figure BDA0002466309070000028
wherein, Δ ASjFor the jth application for cross-chain transactionsA compensation value of a tunnel account state parameter of the user; delta NSjA compensation value of a network state parameter when a jth user applies for cross-chain transaction operation; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value; the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction:
Figure BDA0002466309070000029
wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction; the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel distribution unit;
the method comprises the following steps: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to a channel distribution unit; if NSjLess than NS0If yes, the switch control subunit closes the link channel where the jth user is located; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in the open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly-added cross-link transaction to the newly-opened linkIn the road channel; if NSjGreater than or equal to NS0And the channel distribution unit receives the link channel congestion information sent by the energy state perception module, and then the channel distribution unit carries out correction according to the corrected ASjReallocating link channels for cross-link transactions:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: setting channel distribution cyclic matrices of three types of transactions for a channel distribution unit as follows:
Figure BDA0002466309070000031
setting the channel allocation cyclic matrix is to maintain the input and output balance of data in all link channels in the congestion state, and defining the adjustment level of the link channels as q, q ∈ {1,2*Define the transfer parameter as q.2x -1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives the channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, and sends the information that the cross-link transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
step two, the user side is used as a user to provide registration for use, and account generation and operation on a providing chain are performed, wherein the operation comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the address of the tunnel account is bound with the address of the main chain account, and the binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account which are registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multiple signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode; the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents the nodes of all registered users in the blockchain system; the citizen node is a node for producing blocks and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become a citizen node after enough certification funds are paid, and the paid certification funds are frozen in the public account; the verification nodes are the nodes with the consensus verification qualification, after the citizen nodes pay responsibility guarantee funds of a certain amount, the verification nodes are generated after all the citizen nodes vote, and the paid responsibility guarantee funds are frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the constraint conditions of a resource demand prediction curve, transaction time constraint, system resource constraint and transaction success rate; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit transfers the assets from the main chain account to the asset chain account for the user;
the steps of cross-chain recharging are as follows:
the first step is as follows: the user logs in the main chain account, and after applying for the cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate multiple signature accounts, inputs the address of the asset chain account and the address of the main chain account in the multiple signature accounts, and transfers recharging data from the asset chain account to the multiple signature accounts;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, taking a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, wherein m is the minimum number of signature nodes to be met, and the signature nodes are verification nodes participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by a parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; signature private key VK is signed by multiple encryption signature modulegSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; multiple ofThe encryption signature module randomly sets a verification private key vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfFor a multiplicative group constructed from a system-specified large prime number f, where ← denotes taking a random number from the multiplicative group on the right, ah←Zf,bh←ZfRepresents from ZfTaking a random number to ah,bhPerforming the following steps;
generating a verification public key according to a hash function as
Figure BDA0002466309070000051
Wherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies the private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculating
Figure BDA0002466309070000052
Wherein R isgThe intermediate value of the g signature node, c is a random value and mod is a complementation function; the common value of all signature nodes is
Figure BDA0002466309070000061
Wherein R is a common value of all signature nodes, and pi is a multiplication operation; all the signature nodes carry out Hash operation on the transfer data and the public value to obtain a Hash value h of the signaturesigH (R, message), wherein HsigFor signed hash value, message is transfer data, H (,) is hash function, i.e. H (R, message) represents hashing public value R and message; can obtain a signature of
Figure BDA0002466309070000062
Therein, SiggThe signature of the g signature node; siggSending the encrypted signature to an encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of signatures using encryption functions, encryption function ENCgComprises the following steps:
Figure BDA0002466309070000063
the encryptor encrypts the multiple encrypted signatures ENCgSending the data to a citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:
Figure BDA0002466309070000064
wherein COMP denotes multiple signatures for multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:
Figure BDA0002466309070000065
wherein DEC is the decrypted multiple signature; the verification function is:
Figure BDA0002466309070000066
wherein R is*To verify the value, hgThe hash value of the g signature node is obtained; verifying R that a node will compute*Sending the data to a verifier;
the verifier judges the received verification value, if R is*If the verification is passed, the multiple encrypted multiple signatures are valid; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends an instruction for calling the transfer account to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of the transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of the transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and a link scheduling module is called to finish the transmission of the transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from the account of the asset chain;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the account to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to a cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into blocks, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to a main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the signature of the check node collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash-withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and transaction broadcasts together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, assets which are equal to the withdrawal amount are extracted from the multiple-signature cold account to the multiple-signature hot account, the second step is returned, and the citizen node packs the withdrawal application again;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls a link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:
Figure BDA0002466309070000081
the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,
Figure BDA0002466309070000082
the probability of a malicious node digging out a block in the asset chain can be expressed as
Figure BDA0002466309070000083
e is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
Figure BDA0002466309070000084
the seventh step: after the transfer is successful, the cross-chain cash withdrawal unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the account to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple-signature hot account and the multiple-signature cold account, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multi-signature thermal account of the user in a fixed period, and when the monitoring node monitors that the multi-signature thermal account asset of the user exceeds the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: the assets exceeding the limit are packaged by a verification node, and the packaged data are sent to a multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends the result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
Detailed description of the invention
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example (b): this embodiment specifically describes the contents of a method for multi-path scheduling of system information of different blockchains:
the blockchain system comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an Ether house; the block chain system also comprises a user node and a monitoring node; it is characterized in that the method comprises the following steps:
the method comprises the following steps: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, thereby reducing the communication burden of a network, ensuring the controllability of data transmission, and particularly keeping the reliable transmission of transaction data after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel distribution unit;
the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, and after the system is initialized, all the link channels are opened, and the total number of the link channels is defined as M; with the increase of the cross-link transaction, the switch control subunit dynamically adjusts the opening and closing state of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of the cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows:
Figure BDA0002466309070000091
wherein, M is the number of all users who carry out cross-chain transaction in the current network, and M is a natural number; the value range of j is a natural number from 1 to M;
Figure BDA0002466309070000092
real-time values of tunnel account status parameters for a jth user applying for cross-chain transactions;
Figure BDA0002466309070000093
real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The standard value of the tunnel account state parameter is obtained; NS (server)0The standard value of the network state parameter; AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)tw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online;
the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean of the link channel parameters:
Figure BDA0002466309070000101
wherein,
Figure BDA0002466309070000102
the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;
Figure BDA0002466309070000103
the average value of the network state parameters of all cross-link transaction users in the current network is obtained;
the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:
Figure BDA0002466309070000104
wherein, Δ ASjA compensation value of a tunnel account state parameter of a user applying for cross-chain transaction for the jth application; delta NSjIs the jth claimRequesting a compensation value of a network state parameter when a user of cross-chain transaction operates; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value;
the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction:
Figure BDA0002466309070000105
wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction;
the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel allocation unit;
step two: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to a channel distribution unit; if NSjLess than NS0If yes, the switch control subunit closes the link channel where the jth user is located; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in the open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly added cross-link transactionAllocating to the newly opened link channel; if NSjGreater than or equal to NS0And the channel distribution unit receives the link channel congestion information sent by the energy state perception module, and then the channel distribution unit carries out correction according to the corrected ASjReallocating link channels for cross-link transactions:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: in order to maintain the input and output balance of data in all link channels in a congestion state, a channel allocation unit sets channel allocation cyclic matrices of three types of transactions as follows:
Figure BDA0002466309070000111
the adjustment level of the link channel is defined as q, q ∈ {1,2*Define the transfer parameter as q.2x-1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives the channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, and sends the information that the cross-link transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
the user side provides registration for the user, generates an account and provides operation on a chain, and comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the address of the tunnel account is bound with the address of the main chain account, and the binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account which are registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multiple signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode;
the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents the nodes of all registered users in the blockchain system; the citizen node is a node for producing the block and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become a citizen node after enough certification funds are paid, and the paid certification funds are frozen in the public account; the verification nodes are nodes with consensus verification qualification, after the citizen nodes pay responsibility guarantee money with a certain amount, the verification nodes are generated after all the citizen nodes vote, and the paid responsibility guarantee money is frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the resource demand prediction curve, the trading time constraint, the system resource constraint and the trading success rate as constraint conditions; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit transfers the assets from the main chain account to the asset chain account for the user;
the step of cross-chain recharging is as follows:
the first step is as follows: the user logs in the main chain account, and after applying for the cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate multiple signature accounts, inputs the address of the asset chain account and the address of the main chain account in the multiple signature accounts, and transfers recharging data from the asset chain account to the multiple signature accounts;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, taking a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, wherein m is the minimum number of signature nodes to be met, and the signature nodes are verification nodes participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by a parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; signature private key VK is signed by multiple encryption signature modulegSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; random setting of multiple encryption signature moduleSetting verification private key as vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfA multiplication group constructed according to a large prime number f specified by a system; generating a verification public key according to a hash function as
Figure BDA0002466309070000131
Wherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies the private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculating
Figure BDA0002466309070000132
Wherein R isgThe intermediate value of the g signature node, c is a random value and mod is a complementation function; the common value of all signature nodes is
Figure BDA0002466309070000133
Wherein R is a common value of all signature nodes, and pi is a multiplication operation; all signature nodes carry out Hash operation on the transfer data and the public value to obtain a signed Hash value hsigH (R, message), wherein HsigH (-) is a hash value of the signature, H (-) is a hash function, and message is transfer data; can obtain a signature of
Figure BDA0002466309070000134
Therein, SiggThe signature of the g signature node; siggSending the encrypted signature to the encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of the signature using an encryption function ENCgComprises the following steps:
Figure BDA0002466309070000135
the encryptor encrypts the multiple encrypted signatures ENCgSending the data to a citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:
Figure BDA0002466309070000136
wherein COMP denotes multiple signatures for multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:
Figure BDA0002466309070000141
wherein DEC is the decrypted multiple signature; the verification function is:
Figure BDA0002466309070000142
wherein R is*To verify the value, hgThe hash value of the g signature node is obtained; verifying R that a node will compute*Sending the data to a verifier;
the verifier judges the received verification value, if R is*If the verification is passed, the multiple encrypted multiple signatures are valid; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends an instruction for calling the transfer account to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of the transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of the transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and the link scheduling module is called to finish the transmission of the transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from an asset chain account;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the account to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to a cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into blocks, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to a main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the signature of the check node collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash-withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and the transaction broadcast together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, extracting assets which are equal to the withdrawal amount from the multiple-signature cold account into the multiple-signature hot account, returning to the second step, and packing withdrawal applications again by the citizen node;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls a link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:
Figure BDA0002466309070000151
the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,
Figure BDA0002466309070000152
the probability of a malicious node digging out a block in the asset chain can be expressed as
Figure BDA0002466309070000153
e is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
Figure BDA0002466309070000154
the seventh step: after the transfer is successful, the cross-chain cash withdrawal unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the account to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple-signature hot account and the multiple-signature cold account, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multi-signature thermal account of the user in a fixed period, and when the monitoring node monitors that the multi-signature thermal account asset of the user exceeds the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: the assets exceeding the limit are packaged by a verification node, and the packaged data are sent to a multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends the result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
The above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.
The beneficial results are as follows: the invention provides a multi-path scheduling method for system information of different block chains, which effectively improves the data transmission efficiency, reliability and the utilization rate of system resources by carrying out distributed management on cross-chain transaction data and carrying out intelligent prediction and cleaning on system resources, effectively improves the security of transaction by setting multiple signature cold and hot accounts and carrying out dynamic asset balance adjustment, and enables the value to freely, safely and efficiently circulate in different block chain systems.

Claims (1)

1. AThe method for multi-path scheduling of different blockchain system information comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an ether house; the block chain system further comprises a user node and a monitoring node, and is characterized by comprising: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, so that the communication burden of a network is reduced, the controllability of data transmission is ensured, and particularly, the reliable transmission of transaction data can be still maintained after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel allocation unit; the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, after the system is initialized, all link channels are opened, the total number of the link channels is defined, and the total number of the link channels is recorded as M*(ii) a With the increase of cross-link transactions, the switch control subunit dynamically adjusts the opening and closing states of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows:
Figure FDA0002466309060000011
wherein j is a natural number ranging from 1 to M; m is the number of all users performing cross-chain transaction in the current network, and M is a natural number;
Figure FDA0002466309060000012
real-time values of tunnel account status parameters for jth user applying for cross-chain transactions;
Figure FDA0002466309060000013
Real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The initial value of the tunnel account state parameter is obtained; NS (server)0For initial values of network state parameters, i.e. AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)tw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator used for solving calculus; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online; the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean of the link channel parameters:
Figure FDA0002466309060000021
wherein,
Figure FDA0002466309060000022
the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;
Figure FDA0002466309060000023
the average value of the network state parameters of all cross-link transaction users in the current network is obtained; the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:
Figure FDA0002466309060000024
wherein, Δ ASjAs in the j applicationA compensation value for a tunnel account status parameter of a user for a cross-chain transaction; delta NSjA compensation value of a network state parameter when a jth user applies for cross-chain transaction operation; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value; the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction:
Figure FDA0002466309060000025
Figure FDA0002466309060000026
wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction; the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel allocation unit;
the method comprises the following steps: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to the channel distribution unit; if NSjLess than NS0If the user is a jth user, the switch control subunit switches on the link where the jth user is locatedClosing the channel; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in an open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly-added cross-link transaction to the newly-opened link channel; if NSjGreater than or equal to NS0And if the channel distribution unit receives the link channel congestion information sent by the energy state perception module, the channel distribution unit modifies the AS according to the modified ASjReallocating link channels for the cross-link transaction:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: setting channel distribution cyclic matrices of three types of transactions for the channel distribution unit as follows:
Figure FDA0002466309060000031
setting the channel allocation cyclic matrix is to maintain the input and output balance of data in all link channels in the congestion state, and defining the adjustment level of the link channels as q, q ∈ {1,2*Define the transfer parameter as q.2x-1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives a channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, sends the information that the cross-chain transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
step two, the user side is used as a user to provide registration for use, and account and providing chain operation is generated and comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the tunnel account is bound with the address of the main chain account, and binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multi-signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode; the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents nodes of all registered users in the blockchain system; the citizen node is a node for producing blocks and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become the citizen node after enough certification funds are paid by the tourist node, and the paid certification funds are frozen in the public account; the check node is a node with consensus verification qualification, the check node is generated after all the citizen nodes vote after the citizen nodes pay responsibility guarantee money with a certain amount, and the paid responsibility guarantee money is frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the resource demand prediction curve, the trading time constraint, the system resource constraint and the trading success rate as constraint conditions; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit is used for transferring the assets from the main chain account to the asset chain account for the user;
the step of cross-chain recharging is as follows:
the first step is as follows: a user logs in a main chain account, and after applying for cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate a multiple signature account, inputs the address of the asset chain account and the address of the main chain account in the multiple signature account, and transfers recharging data from the asset chain account to the multiple signature account;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, takes a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, m is the minimum number of signature nodes to be met, and signsThe name node is a verification node participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by the parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; the multiple encryption signature module is used for signing a private key VKgSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; the multiple encryption signature module randomly sets a verification private key vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfFor a multiplicative group constructed from a system-specified large prime number f, where ← denotes taking a random number from the multiplicative group on the right, ah←Zf,bh←ZfRepresents from ZfTaking a random number to ah,bhPerforming the following steps;
generating a verification public key according to a hash function as
Figure FDA0002466309060000051
Wherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies a private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculating
Figure FDA0002466309060000052
Wherein R isgIs the middle value of the g-th signature node, c is the followingMachine value, representing the pair rgMod is a remainder function; the common value of all signature nodes is
Figure FDA0002466309060000061
Wherein R is a common value of all signature nodes, and pi is a multiplication operation; all signature nodes carry out Hash operation on the transfer data and the public value to obtain a signed Hash value hsigH (R, message), wherein HsigFor signed hash value, message is the transfer data, H (,) is a hash function, i.e. H (R, message) represents hashing the public value R and message; can obtain a signature of
Figure FDA0002466309060000062
Therein, SiggThe signature of the g signature node; the SiggSending the encrypted signature to the encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of signatures using encryption functions, randg1←Zf、randg2←ZfRepresents from ZfTaking random numbers to randg1、randg2Performing the following steps; said encryption function ENCgComprises the following steps:
Figure FDA0002466309060000063
the encryptor encrypts the multiple encrypted signatures ENCgSending the data to the citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:
Figure FDA0002466309060000064
wherein COMP denotes multiple signatures of said multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:
Figure FDA0002466309060000065
wherein DEC is the decrypted multiple signature; the verification function is:
Figure FDA0002466309060000066
wherein R is*For verification values, c is a random value, DECcTo the power c, h of a decryption function DECgThe hash value of the g signature node is obtained; the verification node calculates R*Sending to the verifier;
the verifier judges the received verification value, if R is*If the signature is not valid, the multiple encrypted multiple signatures are verified; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends a transfer account calling instruction to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of a transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and the link scheduling module is called to finish the transmission of transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from an asset chain account;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the multiple signature accounts to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to the cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into a block, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to the main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the check node signature collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and the transaction broadcast together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, extracting assets which are equal to the withdrawal amount from the multiple-signature cold account into the multiple-signature hot account, returning to the second step, and packing withdrawal applications again by the citizen node;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls the link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:
Figure FDA0002466309060000081
the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,
Figure FDA0002466309060000082
the probability of a malicious node digging out a block in the asset chain can be expressed as
Figure FDA0002466309060000083
e is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
Figure FDA0002466309060000084
the seventh step: after the transfer is successful, the cross-chain cashing unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the multiple signature accounts to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple signature hot accounts and the multiple signature cold accounts, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multiple signature thermal accounts of the user in a fixed period, and when the monitoring node monitors that the multiple signature thermal account assets of the user exceed the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: packing the assets exceeding the limit by a verification node, and sending packed data to the multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends a result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
CN202010335185.7A 2020-04-24 2020-04-24 Multi-path scheduling method for system information of different block chains Withdrawn CN111553795A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010335185.7A CN111553795A (en) 2020-04-24 2020-04-24 Multi-path scheduling method for system information of different block chains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010335185.7A CN111553795A (en) 2020-04-24 2020-04-24 Multi-path scheduling method for system information of different block chains

Publications (1)

Publication Number Publication Date
CN111553795A true CN111553795A (en) 2020-08-18

Family

ID=72000143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010335185.7A Withdrawn CN111553795A (en) 2020-04-24 2020-04-24 Multi-path scheduling method for system information of different block chains

Country Status (1)

Country Link
CN (1) CN111553795A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330019A (en) * 2020-11-04 2021-02-05 安徽师范大学 Data transmission optimization method of block chain transaction channel
CN112541764A (en) * 2020-12-17 2021-03-23 成都知道创宇信息技术有限公司 Asset management method, device and system based on intelligent contract
CN112565104A (en) * 2020-12-01 2021-03-26 腾讯科技(深圳)有限公司 Flow control method, device, medium and electronic equipment of block chain system
CN112669159A (en) * 2021-01-11 2021-04-16 上海能链众合科技有限公司 Trust-based value circulation method in different block chain systems
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330019A (en) * 2020-11-04 2021-02-05 安徽师范大学 Data transmission optimization method of block chain transaction channel
CN112330019B (en) * 2020-11-04 2024-03-15 安徽师范大学 Data transmission optimization method for block chain transaction channel
CN112565104A (en) * 2020-12-01 2021-03-26 腾讯科技(深圳)有限公司 Flow control method, device, medium and electronic equipment of block chain system
CN112541764A (en) * 2020-12-17 2021-03-23 成都知道创宇信息技术有限公司 Asset management method, device and system based on intelligent contract
CN112541764B (en) * 2020-12-17 2023-11-28 成都知道创宇信息技术有限公司 Asset management method, device and system based on intelligent contract
CN112669159A (en) * 2021-01-11 2021-04-16 上海能链众合科技有限公司 Trust-based value circulation method in different block chain systems
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption
CN113570458B (en) * 2021-07-16 2023-09-26 东北大学秦皇岛分校 Blockchain payment channel supervision method based on proxy re-encryption

Similar Documents

Publication Publication Date Title
CN111553795A (en) Multi-path scheduling method for system information of different block chains
Ahn et al. Synchronized aggregate signatures: new definitions, constructions and applications
Li et al. Secure balance planning of off-blockchain payment channel networks
Camenisch et al. Simulatable adaptive oblivious transfer
Ruffing et al. Coinshuffle: Practical decentralized coin mixing for bitcoin
Vishnumurthy et al. Karma: A secure economic framework for peer-to-peer resource sharing
JP4790122B2 (en) Robust and efficient distributed RSA key generation
Cheon et al. Provably secure timed-release public key encryption
CN113407977B (en) Cross-chain extension method and system based on aggregated signature
CN113822672B (en) Block chain consensus method based on zero knowledge proof
US20120278609A1 (en) Joint encryption of data
CN112651830B (en) Block chain consensus method applied to power resource sharing network
Zhou et al. TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks
CN111147594A (en) Internet of things data transmission system, key generation method and data transmission method thereof
CN112669159A (en) Trust-based value circulation method in different block chain systems
CN113612604A (en) Asynchronous network-oriented safe distributed random number generation method and device
CN114491616A (en) Block chain and homomorphic encryption-based federated learning method and application
Zhang et al. A lightweight privacy preserving scheme of charging and discharging for electric vehicles based on consortium blockchain in charging service company
Yin et al. Sidechains with optimally succinct proof
Wang et al. Consensus algorithm based on verifiable randomness
CN113806764B (en) Distributed support vector machine based on blockchain and privacy protection and optimization method thereof
Wang et al. Enabling scalable and unlinkable payment channel hubs with oblivious puzzle transfer
CN118446762B (en) Fee calculation management method and system based on account management
Feng et al. Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
Mambo et al. How to utilize the transformability of digital signatures for solving the oracle problem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200818

WW01 Invention patent application withdrawn after publication