CN111553795A - Multi-path scheduling method for system information of different block chains - Google Patents
Multi-path scheduling method for system information of different block chains Download PDFInfo
- Publication number
- CN111553795A CN111553795A CN202010335185.7A CN202010335185A CN111553795A CN 111553795 A CN111553795 A CN 111553795A CN 202010335185 A CN202010335185 A CN 202010335185A CN 111553795 A CN111553795 A CN 111553795A
- Authority
- CN
- China
- Prior art keywords
- chain
- account
- signature
- cross
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000005540 biological transmission Effects 0.000 claims abstract description 23
- 238000004140 cleaning Methods 0.000 claims abstract description 18
- 238000012795 verification Methods 0.000 claims description 134
- 238000012546 transfer Methods 0.000 claims description 71
- 230000006870 function Effects 0.000 claims description 28
- 238000012544 monitoring process Methods 0.000 claims description 21
- 230000008447 perception Effects 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 15
- 238000007726 management method Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 9
- 238000004088 simulation Methods 0.000 claims description 9
- 125000004122 cyclic group Chemical group 0.000 claims description 8
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000003908 quality control method Methods 0.000 claims description 6
- 238000012549 training Methods 0.000 claims description 6
- 238000012937 correction Methods 0.000 claims description 5
- 239000011159 matrix material Substances 0.000 claims description 5
- 238000005065 mining Methods 0.000 claims description 4
- 238000013528 artificial neural network Methods 0.000 claims description 3
- 238000004422 calculation algorithm Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 claims description 3
- 238000012986 modification Methods 0.000 claims description 3
- 230000004048 modification Effects 0.000 claims description 3
- 238000012856 packing Methods 0.000 claims description 3
- 238000012797 qualification Methods 0.000 claims description 3
- 238000013468 resource allocation Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 102100036378 T-cell immunomodulatory protein Human genes 0.000 description 1
- 101710194900 T-cell immunomodulatory protein Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a multi-path scheduling method for system information of different block chains, which comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a multiple encryption signature module, an asset dynamic balance module and a user side. Through carrying out distributed management, carrying out intelligent prediction and cleaning to system resource to cross-chain transaction data, effectively improve data transmission efficiency, reliability and system resource's utilization ratio, through setting up multiple signature cold and hot account and carrying out dynamic asset balance adjustment, effectively promoted the security of transaction for value can freely, safely, efficient circulation in different block chain systems.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a circulation technology among different block chain systems.
Background
With the continuous development of the block chain technology, more and more block chain systems coexist, and as each block chain can only transmit value in the system, the prospect of block chain application is limited to a certain extent, so that the method for value circulation in different block chain systems is important to research, the application scenes and the mining value of the block chains can be effectively expanded, and the problem of value isolated islands is solved.
Disclosure of Invention
The present invention provides a method for scheduling multiple channels of system information for different blockchains, which solves or partially solves the above-mentioned problems.
In order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a multi-path scheduling method for system information of different block chains comprises the following contents:
the blockchain system comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an Ether house; the block chain system further comprises a user node and a monitoring node, and is characterized by comprising: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, thereby reducing the communication burden of a network, ensuring the controllability of data transmission, and particularly keeping the reliable transmission of transaction data after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel distribution unit; the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, after the system is initialized, all link channels are opened, the total number of the link channels is defined, and the total number of the link channels is recorded as M*(ii) a With the increase of the cross-link transaction, the switch control subunit dynamically adjusts the opening and closing states of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of the cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows: wherein j is a natural number ranging from 1 to M; m is the number of all users performing cross-chain transaction in the current network, and M is a natural number;tunneling for jth user applying for cross-chain transactionsA real-time value of a lane account status parameter;real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The initial value of the tunnel account state parameter is obtained; NS (server)0For initial values of network state parameters, i.e. AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)t+αw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator used for solving calculus; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online; the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean value of the link channel parameters:wherein,the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;the average value of the network state parameters of all cross-link transaction users in the current network is obtained; the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:
wherein, Δ ASjFor the jth application for cross-chain transactionsA compensation value of a tunnel account state parameter of the user; delta NSjA compensation value of a network state parameter when a jth user applies for cross-chain transaction operation; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value; the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction:wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction; the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel distribution unit;
the method comprises the following steps: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to a channel distribution unit; if NSjLess than NS0If yes, the switch control subunit closes the link channel where the jth user is located; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in the open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly-added cross-link transaction to the newly-opened linkIn the road channel; if NSjGreater than or equal to NS0And the channel distribution unit receives the link channel congestion information sent by the energy state perception module, and then the channel distribution unit carries out correction according to the corrected ASjReallocating link channels for cross-link transactions:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: setting channel distribution cyclic matrices of three types of transactions for a channel distribution unit as follows:
setting the channel allocation cyclic matrix is to maintain the input and output balance of data in all link channels in the congestion state, and defining the adjustment level of the link channels as q, q ∈ {1,2*Define the transfer parameter as q.2x -1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives the channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, and sends the information that the cross-link transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
step two, the user side is used as a user to provide registration for use, and account generation and operation on a providing chain are performed, wherein the operation comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the address of the tunnel account is bound with the address of the main chain account, and the binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account which are registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multiple signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode; the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents the nodes of all registered users in the blockchain system; the citizen node is a node for producing blocks and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become a citizen node after enough certification funds are paid, and the paid certification funds are frozen in the public account; the verification nodes are the nodes with the consensus verification qualification, after the citizen nodes pay responsibility guarantee funds of a certain amount, the verification nodes are generated after all the citizen nodes vote, and the paid responsibility guarantee funds are frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the constraint conditions of a resource demand prediction curve, transaction time constraint, system resource constraint and transaction success rate; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit transfers the assets from the main chain account to the asset chain account for the user;
the steps of cross-chain recharging are as follows:
the first step is as follows: the user logs in the main chain account, and after applying for the cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate multiple signature accounts, inputs the address of the asset chain account and the address of the main chain account in the multiple signature accounts, and transfers recharging data from the asset chain account to the multiple signature accounts;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, taking a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, wherein m is the minimum number of signature nodes to be met, and the signature nodes are verification nodes participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by a parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; signature private key VK is signed by multiple encryption signature modulegSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; multiple ofThe encryption signature module randomly sets a verification private key vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfFor a multiplicative group constructed from a system-specified large prime number f, where ← denotes taking a random number from the multiplicative group on the right, ah←Zf,bh←ZfRepresents from ZfTaking a random number to ah,bhPerforming the following steps;
generating a verification public key according to a hash function asWherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies the private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculatingWherein R isgThe intermediate value of the g signature node, c is a random value and mod is a complementation function; the common value of all signature nodes isWherein R is a common value of all signature nodes, and pi is a multiplication operation; all the signature nodes carry out Hash operation on the transfer data and the public value to obtain a Hash value h of the signaturesigH (R, message), wherein HsigFor signed hash value, message is transfer data, H (,) is hash function, i.e. H (R, message) represents hashing public value R and message; can obtain a signature ofTherein, SiggThe signature of the g signature node; siggSending the encrypted signature to an encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of signatures using encryption functions, encryption function ENCgComprises the following steps:the encryptor encrypts the multiple encrypted signatures ENCgSending the data to a citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:wherein COMP denotes multiple signatures for multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:wherein DEC is the decrypted multiple signature; the verification function is:wherein R is*To verify the value, hgThe hash value of the g signature node is obtained; verifying R that a node will compute*Sending the data to a verifier;
the verifier judges the received verification value, if R is*If the verification is passed, the multiple encrypted multiple signatures are valid; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends an instruction for calling the transfer account to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of the transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of the transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and a link scheduling module is called to finish the transmission of the transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from the account of the asset chain;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the account to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to a cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into blocks, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to a main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the signature of the check node collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash-withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and transaction broadcasts together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, assets which are equal to the withdrawal amount are extracted from the multiple-signature cold account to the multiple-signature hot account, the second step is returned, and the citizen node packs the withdrawal application again;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls a link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:
the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,the probability of a malicious node digging out a block in the asset chain can be expressed ase is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
the seventh step: after the transfer is successful, the cross-chain cash withdrawal unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the account to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple-signature hot account and the multiple-signature cold account, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multi-signature thermal account of the user in a fixed period, and when the monitoring node monitors that the multi-signature thermal account asset of the user exceeds the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: the assets exceeding the limit are packaged by a verification node, and the packaged data are sent to a multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends the result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
Detailed description of the invention
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example (b): this embodiment specifically describes the contents of a method for multi-path scheduling of system information of different blockchains:
the blockchain system comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an Ether house; the block chain system also comprises a user node and a monitoring node; it is characterized in that the method comprises the following steps:
the method comprises the following steps: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, thereby reducing the communication burden of a network, ensuring the controllability of data transmission, and particularly keeping the reliable transmission of transaction data after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel distribution unit;
the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, and after the system is initialized, all the link channels are opened, and the total number of the link channels is defined as M; with the increase of the cross-link transaction, the switch control subunit dynamically adjusts the opening and closing state of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of the cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows:wherein, M is the number of all users who carry out cross-chain transaction in the current network, and M is a natural number; the value range of j is a natural number from 1 to M;real-time values of tunnel account status parameters for a jth user applying for cross-chain transactions;real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The standard value of the tunnel account state parameter is obtained; NS (server)0The standard value of the network state parameter; AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)t+αw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online;
the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean of the link channel parameters:wherein,the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;the average value of the network state parameters of all cross-link transaction users in the current network is obtained;
the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:wherein, Δ ASjA compensation value of a tunnel account state parameter of a user applying for cross-chain transaction for the jth application; delta NSjIs the jth claimRequesting a compensation value of a network state parameter when a user of cross-chain transaction operates; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value;
the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction:wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction;
the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel allocation unit;
step two: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to a channel distribution unit; if NSjLess than NS0If yes, the switch control subunit closes the link channel where the jth user is located; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in the open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly added cross-link transactionAllocating to the newly opened link channel; if NSjGreater than or equal to NS0And the channel distribution unit receives the link channel congestion information sent by the energy state perception module, and then the channel distribution unit carries out correction according to the corrected ASjReallocating link channels for cross-link transactions:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: in order to maintain the input and output balance of data in all link channels in a congestion state, a channel allocation unit sets channel allocation cyclic matrices of three types of transactions as follows:the adjustment level of the link channel is defined as q, q ∈ {1,2*Define the transfer parameter as q.2x-1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives the channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, and sends the information that the cross-link transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
the user side provides registration for the user, generates an account and provides operation on a chain, and comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the address of the tunnel account is bound with the address of the main chain account, and the binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account which are registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multiple signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode;
the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents the nodes of all registered users in the blockchain system; the citizen node is a node for producing the block and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become a citizen node after enough certification funds are paid, and the paid certification funds are frozen in the public account; the verification nodes are nodes with consensus verification qualification, after the citizen nodes pay responsibility guarantee money with a certain amount, the verification nodes are generated after all the citizen nodes vote, and the paid responsibility guarantee money is frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the resource demand prediction curve, the trading time constraint, the system resource constraint and the trading success rate as constraint conditions; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit transfers the assets from the main chain account to the asset chain account for the user;
the step of cross-chain recharging is as follows:
the first step is as follows: the user logs in the main chain account, and after applying for the cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate multiple signature accounts, inputs the address of the asset chain account and the address of the main chain account in the multiple signature accounts, and transfers recharging data from the asset chain account to the multiple signature accounts;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, taking a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, wherein m is the minimum number of signature nodes to be met, and the signature nodes are verification nodes participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by a parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; signature private key VK is signed by multiple encryption signature modulegSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; random setting of multiple encryption signature moduleSetting verification private key as vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfA multiplication group constructed according to a large prime number f specified by a system; generating a verification public key according to a hash function asWherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies the private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculatingWherein R isgThe intermediate value of the g signature node, c is a random value and mod is a complementation function; the common value of all signature nodes isWherein R is a common value of all signature nodes, and pi is a multiplication operation; all signature nodes carry out Hash operation on the transfer data and the public value to obtain a signed Hash value hsigH (R, message), wherein HsigH (-) is a hash value of the signature, H (-) is a hash function, and message is transfer data; can obtain a signature ofTherein, SiggThe signature of the g signature node; siggSending the encrypted signature to the encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of the signature using an encryption function ENCgComprises the following steps:the encryptor encrypts the multiple encrypted signatures ENCgSending the data to a citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:wherein COMP denotes multiple signatures for multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:wherein DEC is the decrypted multiple signature; the verification function is:wherein R is*To verify the value, hgThe hash value of the g signature node is obtained; verifying R that a node will compute*Sending the data to a verifier;
the verifier judges the received verification value, if R is*If the verification is passed, the multiple encrypted multiple signatures are valid; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends an instruction for calling the transfer account to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of the transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of the transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and the link scheduling module is called to finish the transmission of the transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from an asset chain account;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the account to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to a cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into blocks, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to a main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the signature of the check node collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash-withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and the transaction broadcast together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, extracting assets which are equal to the withdrawal amount from the multiple-signature cold account into the multiple-signature hot account, returning to the second step, and packing withdrawal applications again by the citizen node;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls a link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,the probability of a malicious node digging out a block in the asset chain can be expressed ase is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
the seventh step: after the transfer is successful, the cross-chain cash withdrawal unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the account to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple-signature hot account and the multiple-signature cold account, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multi-signature thermal account of the user in a fixed period, and when the monitoring node monitors that the multi-signature thermal account asset of the user exceeds the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: the assets exceeding the limit are packaged by a verification node, and the packaged data are sent to a multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends the result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
The above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.
The beneficial results are as follows: the invention provides a multi-path scheduling method for system information of different block chains, which effectively improves the data transmission efficiency, reliability and the utilization rate of system resources by carrying out distributed management on cross-chain transaction data and carrying out intelligent prediction and cleaning on system resources, effectively improves the security of transaction by setting multiple signature cold and hot accounts and carrying out dynamic asset balance adjustment, and enables the value to freely, safely and efficiently circulate in different block chain systems.
Claims (1)
1. AThe method for multi-path scheduling of different blockchain system information comprises a main chain and an asset chain; the main chain comprises a link scheduling module, an energy state sensing module, an intelligent cleaning module, a conversion module, a multiple encryption signature module, an asset dynamic balance module and a user side; the asset chain is other block chains communicated with the main chain and comprises a bitcoin and an ether house; the block chain system further comprises a user node and a monitoring node, and is characterized by comprising: the link scheduling module is responsible for carrying out distributed management on data transmission of cross-link transaction, so that the communication burden of a network is reduced, the controllability of data transmission is ensured, and particularly, the reliable transmission of transaction data can be still maintained after a main node in a block chain is attacked; the link scheduling module comprises a link control unit and a channel allocation unit; the link control unit comprises a switch control subunit, a first control subunit and a second control subunit; the switch control subunit is responsible for opening and closing all link channels, after the system is initialized, all link channels are opened, the total number of the link channels is defined, and the total number of the link channels is recorded as M*(ii) a With the increase of cross-link transactions, the switch control subunit dynamically adjusts the opening and closing states of the link channel according to the monitoring data of the second control subunit on the network state; the first control subunit calculates a real-time value of a link channel parameter of cross-link transaction, wherein the link channel parameter comprises a tunnel account state parameter and a network state parameter; the first control subunit calculates a real-time value of the link channel parameter based on the tunnel account state parameter of the jth user applying for the cross-link transaction and the current network state parameter, and the calculation formula is as follows:wherein j is a natural number ranging from 1 to M; m is the number of all users performing cross-chain transaction in the current network, and M is a natural number;real-time values of tunnel account status parameters for jth user applying for cross-chain transactions;Real-time values of network state parameters for the jth user operating for applying for cross-chain transactions; AS0The initial value of the tunnel account state parameter is obtained; NS (server)0For initial values of network state parameters, i.e. AS0And NS0Are all system preset values αtCoefficient for transfer across chains, αwCoefficient for cross-chain cash, αtAnd αwTaking the value of 0 or 1 according to the type of the cross-link transaction, (α)t+αw)jCoefficient corresponding to the type of the cross-chain transaction of the jth user applying the cross-chain transaction βjA differential coefficient for an account response of a user applying for a cross-chain transaction for jth; s is a differential operator used for solving calculus; pjNetwork delay for the operation of the jth user applying for the cross-chain transaction; qjThe instantaneous online state of the jth user applying for the cross-chain transaction is 0 if not online and 1 if online; the second control subunit adopts a discrete convergence algorithm to construct a state calibration unit and an integral compensation unit; the state calibration unit calculates a global mean of the link channel parameters:wherein,the average value of the tunnel account state parameters of all cross-link transaction users in the current network is obtained;the average value of the network state parameters of all cross-link transaction users in the current network is obtained; the integral compensation unit calculates a difference value of the real-time value and the average value of the link channel parameter of each cross-link transaction user:wherein, Δ ASjAs in the j applicationA compensation value for a tunnel account status parameter of a user for a cross-chain transaction; delta NSjA compensation value of a network state parameter when a jth user applies for cross-chain transaction operation; lambda [ alpha ]1、γ1Respectively a first proportional parameter and a first integral parameter; lambda [ alpha ]2And gamma2Respectively a second proportional parameter and a second integral parameter; t is t+The time from starting the first control subunit to finishing calculating the global mean value; the second control subunit calculates the modification value of the link channel parameter of the jth user applying the cross-link transaction: wherein, ASjThe correction value of the tunnel account state parameter of the user applying the cross-chain transaction for the jth application; NS (server)jModifying a network state parameter for a jth user applying for a cross-chain transaction; the second control subunit switches the NSjFeeding back to the switch control subunit; the second control subunit connects ASjFeeding back to the channel allocation unit;
the method comprises the following steps: the energy state perception module monitors the starting time, the network response time and the queuing time of each cross-link transaction in real time, and when the network response time or the queuing time exceeds an early warning value set by a system, the network is considered to be in a network interruption state; when the network response time does not exceed the early warning value set by the system, but the queuing time exceeds the early warning value set by the system, the network is considered to be in a network congestion state; when the response time and the queuing time of the network do not exceed the early warning value set by the system, the network is considered to be in a normal state; if the energy state perception module monitors that the network is interrupted, the energy state perception module sends a channel closing signal to the switch control subunit; if the energy state perception module monitors network congestion, the energy state perception module sends link channel congestion information to the channel distribution unit; if NSjLess than NS0If the user is a jth user, the switch control subunit switches on the link where the jth user is locatedClosing the channel; after the preset time delta T of the system, the switch control subunit adjusts the closed link channel to be in an open state, and sends the updated link channel state information to the channel distribution unit, and the channel distribution unit randomly distributes the newly-added cross-link transaction to the newly-opened link channel; if NSjGreater than or equal to NS0And if the channel distribution unit receives the link channel congestion information sent by the energy state perception module, the channel distribution unit modifies the AS according to the modified ASjReallocating link channels for the cross-link transaction:
the first step is as follows: the channel allocation unit establishes priority classes for the cross-chain transactions, sequences the cross-chain transactions from high to low according to starting time, defines the cross-chain transactions with the ranking of the top 20% as emergency transactions, the cross-chain transactions with the ranking of the top 30% as important transactions and the cross-chain transactions with the ranking of the back 50% as common transactions;
the second step is that: setting channel distribution cyclic matrices of three types of transactions for the channel distribution unit as follows:setting the channel allocation cyclic matrix is to maintain the input and output balance of data in all link channels in the congestion state, and defining the adjustment level of the link channels as q, q ∈ {1,2*Define the transfer parameter as q.2x-1Where x is an integer, according to ASjEstablishing a link channel distribution strategy by the channel distribution cyclic matrix and the transmission parameters, and replanning the link channel of the cross-link transaction in the queue; the cross-link transaction data of the jth user is transmitted according to the redistributed link channels;
if the switch control subunit receives a channel closing signal, the switch control subunit immediately terminates the transaction operation in the corresponding channel, sends the information that the cross-chain transaction is unsuccessful to the exchange module, and the exchange module switches the transaction mode from the online mode to the offline mode;
step two, the user side is used as a user to provide registration for use, and account and providing chain operation is generated and comprises a registration module, a transit account module and an account management module; the registration module provides services for registering a main chain account and a tunnel account in a main chain for a user; the tunnel account is bound with the address of the main chain account, and binding information is sent to the account management module for storage; the transit account module provides transit account setting for the user, and if the user selects a tunnel account, the tunnel account is a default transit account; if the user does not select the tunnel account, the default transit account is empty and needs to be set in the cross-chain transaction process; the account management module manages a public account, a main chain account, a tunnel account and a multiple signature account registered by a user; the public account is a public account in the blockchain system and is used for temporarily storing the deposit and the transaction commission fees for the election of each user node; the multi-signature account is an account which is created by the verification node through a consensus mechanism and is used for storing transfer assets of cross-chain transaction; the multiple signature accounts comprise multiple signature hot accounts and multiple signature cold accounts, wherein the multiple signature hot accounts are transit accounts of cross-chain transactions in an online mode, and the multiple signature cold accounts are transit accounts of cross-chain transactions in an offline mode; the user nodes comprise tourist nodes, citizen nodes and verification nodes; the guest node represents nodes of all registered users in the blockchain system; the citizen node is a node for producing blocks and collecting multiple signatures on the main chain and is responsible for accounting the cross-chain transaction; the tourist node can become the citizen node after enough certification funds are paid by the tourist node, and the paid certification funds are frozen in the public account; the check node is a node with consensus verification qualification, the check node is generated after all the citizen nodes vote after the citizen nodes pay responsibility guarantee money with a certain amount, and the paid responsibility guarantee money is frozen in the public account;
step three: the intelligent cleaning module comprises a simulation unit, a prediction unit and a resource cleaning unit; the simulation unit establishes a learning set for historical data of total number of active accounts, time interval distribution of cross-link transaction amount and link channel time utilization rate in the system, and establishes a resource demand prediction curve through a training neural network; the simulation unit establishes a quality control curve for the resource demand prediction curve, the trading time constraint, the system resource constraint and the trading success rate as constraint conditions; the prediction unit predicts the time-sharing demand of the short-term system resources according to the resource demand prediction curve, calculates the prediction error of the last time period, and feeds the prediction error back to the training unit to continuously improve the resource demand prediction curve; the prediction unit calculates the distributed resource allocation of the account according to the measured data of the quality control curve, the transaction time, the transaction success rate and the system resource utilization rate, and the allocation result is sent to the resource cleaning unit; the resource cleaning unit cleans accounts lower than a preset value and releases system resources;
step four: the exchange module provides a chain-crossing transaction operation of a main chain and an asset chain for a user, and comprises a chain-crossing recharging unit and a chain-crossing cash-up unit, wherein the chain-crossing recharging unit transfers assets from an asset chain account to the main chain account for the user; the cross-chain cash withdrawal unit is used for transferring the assets from the main chain account to the asset chain account for the user;
the step of cross-chain recharging is as follows:
the first step is as follows: a user logs in a main chain account, and after applying for cross-chain recharging, the user side sends an application instruction to the cross-chain recharging unit;
the second step is that: the cross-chain recharging unit calls the multiple encryption signature module to generate a multiple signature account, inputs the address of the asset chain account and the address of the main chain account in the multiple signature account, and transfers recharging data from the asset chain account to the multiple signature account;
the multiple encryption signature module comprises a parameter generator, an encryptor and a verifier; the parameter generator is used for generating input and output parameters of the multiple signatures; the encryptor encrypts the multiple signatures; the verifier is used for verifying the validity of the multiple signatures;
the multiple encryption signature module initializes parameter setting, takes a security parameter χ, a first threshold parameter m and a second threshold parameter h as input parameters, m is the minimum number of signature nodes to be met, and signsThe name node is a verification node participating in multiple signatures; h is the minimum number of verification nodes to be met, and the verification nodes are verification nodes participating in consensus verification; generating output parameters by the parameter generator, and generating m public and private key Pairs (PK) by adopting a hash functiong,VKg) Wherein, g is 1,2gIs the public signature key, VK, of the g-th signature nodegA signature private key of the g signature node; the multiple encryption signature module is used for signing a private key VKgSending the signature to the corresponding signature node through an encryption channel, and sending all signature public keys { PK1,PK2,...,PKmDisclosure into a system; the multiple encryption signature module randomly sets a verification private key vkh=(ah,bh) Wherein vk ishA verification private key received for the h-th verification node; a ish、bhIs the h-th randomly generated natural number and satisfies ah←Zf,bh←Zf,ZfFor a multiplicative group constructed from a system-specified large prime number f, where ← denotes taking a random number from the multiplicative group on the right, ah←Zf,bh←ZfRepresents from ZfTaking a random number to ah,bhPerforming the following steps;
generating a verification public key according to a hash function asWherein, pkhG is a given generator for a verification public key corresponding to the h signature; the multiple encryption signature module verifies a private key vkhSending the verification public key (pk) to the corresponding verification node1,pk2,...,pkhDisclosure into a system; verifying after the signed verification nodes receive the signature private key, and signing by each verification node after verification of all the signed verification nodes is passed; each signature node selects a random number rgCalculatingWherein R isgIs the middle value of the g-th signature node, c is the followingMachine value, representing the pair rgMod is a remainder function; the common value of all signature nodes isWherein R is a common value of all signature nodes, and pi is a multiplication operation; all signature nodes carry out Hash operation on the transfer data and the public value to obtain a signed Hash value hsigH (R, message), wherein HsigFor signed hash value, message is the transfer data, H (,) is a hash function, i.e. H (R, message) represents hashing the public value R and message; can obtain a signature ofTherein, SiggThe signature of the g signature node; the SiggSending the encrypted signature to the encryptor to generate an encrypted signature;
the encryptor selects two random numbers randg1、randg2Satisfy randg1←Zf、randg2←ZfMultiple encryption of signatures using encryption functions, randg1←Zf、randg2←ZfRepresents from ZfTaking random numbers to randg1、randg2Performing the following steps; said encryption function ENCgComprises the following steps:the encryptor encrypts the multiple encrypted signatures ENCgSending the data to the citizen node; the citizen node calculates multiple encrypted multiple signatures according to multiple signature functions, wherein the multiple signature functions are as follows:wherein COMP denotes multiple signatures of said multiple encryptions; the citizen node sends the multiple encrypted multiple signatures to the verification node; the verification node decrypts and verifies the received multiple encrypted multiple signatures, and the decryption function is as follows:wherein DEC is the decrypted multiple signature; the verification function is:wherein R is*For verification values, c is a random value, DECcTo the power c, h of a decryption function DECgThe hash value of the g signature node is obtained; the verification node calculates R*Sending to the verifier;
the verifier judges the received verification value, if R is*If the signature is not valid, the multiple encrypted multiple signatures are verified; if R is*If not, the verification is not passed, and the consensus verification is finished;
the third step: after the consensus verification is completed, the cross-chain recharging unit sends a transfer account calling instruction to the transfer account module;
the fourth step: the cross-chain recharging unit judges the condition of a transfer account, if the tunnel account is a default transfer account, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the tunnel account according to the exchange proportion of the intelligent contract, and calls the link scheduling module to finish the transmission of transfer data;
the fifth step: if the default transfer account is empty, the cross-chain recharging unit exchanges the transfer assets of the multiple signature accounts into corresponding main chain assets to be transferred to the main chain account according to the exchange proportion of the intelligent contract, and the link scheduling module is called to finish the transmission of transfer data;
and a sixth step: after the transfer is successful, the cross-chain recharging unit sends an instruction to the asset chain, and corresponding assets are deducted from an asset chain account;
the seventh step: if the multiple signature accounts do not find the associated main chain account address, the cross-chain recharging unit backs back to transfer the multiple signature accounts to the asset chain account;
the cross-chain cash withdrawal steps are as follows:
the first step is as follows: after a user applies for cross-link cash withdrawal at a user side, the user side sends an application instruction to the cross-link cash withdrawal unit; the cash withdrawal request comprises a cash withdrawal amount and a cash withdrawal account address in the asset chain;
the second step is that: after receiving a user cash withdrawal application, a citizen node packs a user request into a block, initiates a transaction broadcast transferring from a multi-signature account address to a cash withdrawal account address, and issues the transaction broadcast to the main chain;
the third step: when the verification node receives the broadcasted transaction information, signing and broadcasting in the main chain; if the citizen node collects verification node signatures which are not less than two thirds of the total number of all verification nodes, the transaction verification is passed; if the check node signature collected by the citizen node is less than one third of the total number of all check nodes, the transaction verification fails, and the cash withdrawal operation request is rejected;
the fourth step: the citizen node packages all collected verification node signatures and the transaction broadcast together to generate a new block, and broadcasts the new block to an asset chain;
the fifth step: after receiving the broadcast passing the verification, the verification node judges whether the balance of the multi-signature thermal account is more than or equal to the cash withdrawal amount, and if the balance is more than or equal to the cash withdrawal amount, the verification node sends out a signature for transferring accounts from the multi-signature thermal account address to the cash withdrawal account address on the asset chain; if the balance of the multiple-signature hot account is less than the withdrawal amount, extracting assets which are equal to the withdrawal amount from the multiple-signature cold account into the multiple-signature hot account, returning to the second step, and packing withdrawal applications again by the citizen node;
and a sixth step: after N new blocks are generated, the verification node calls the multiple encryption signature module to carry out consensus verification, and after the verification is passed, the cross-link cash withdrawal unit transfers the cash withdrawal amount from the multiple signature hot account address to the asset link account address; the cross-link cash withdrawal unit calls the link scheduling module to complete transmission of transfer data;
n is the number of blocks needing to wait for determining assets in the asset chain; the number of blocks to be confirmed of different asset chains can be calculated according to the propagation rule of the block chains, and the calculation formula of N is as follows:
the formula shows that the block number to be waited for confirming the asset in the asset chain is the minimum block number to be confirmed for ensuring the block to be reliable under the influence of the mining speed, the block attack probability and the probability of generating an invalid block, wherein theta represents the probability that the block is an available block, i is the number of blocks dug by a malicious node in time t, k represents the ratio of the malicious node to the reliable node in the asset chain, v represents the average speed of the reliable node in the asset chain digging the block, and n represents the number of peer nodes of the nodes in the asset chain,the probability of a malicious node digging out a block in the asset chain can be expressed ase is a natural constant; defining the tolerance of unavailable blocks in the asset chain as psi and the tolerance of waiting time as T, and then satisfying the following conditions: t is less than or equal to T,
the seventh step: after the transfer is successful, the cross-chain cashing unit sends an instruction to the main chain, and corresponding assets are deducted from the main chain account;
eighth step: if the multiple signature accounts do not find the associated asset chain account address, the cross-chain recharging unit backs back to transfer the multiple signature accounts to the main chain account;
step five: the asset dynamic balance module monitors asset distribution of the multiple signature hot accounts and the multiple signature cold accounts, and performs dynamic balance adjustment according to the monitoring result of the monitoring node, wherein the monitoring and adjusting process comprises the following steps:
the first step is as follows: the asset dynamic balance module updates the asset state of the multiple signature thermal accounts of the user in a fixed period, and when the monitoring node monitors that the multiple signature thermal account assets of the user exceed the limit set by the system, the monitoring node sends a broadcast for dynamic balance adjustment to the whole network;
the second step is that: packing the assets exceeding the limit by a verification node, and sending packed data to the multiple encryption signature module for signature and verification; after the verification is passed, the multiple encryption signature module sends a result to the asset dynamic balance module; if the verification fails, ending the asset dynamic balance adjustment process;
the third step: and after receiving the multiple encrypted multiple signatures, the asset dynamic balance module transfers the packaged asset to a multiple signature cold account address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010335185.7A CN111553795A (en) | 2020-04-24 | 2020-04-24 | Multi-path scheduling method for system information of different block chains |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010335185.7A CN111553795A (en) | 2020-04-24 | 2020-04-24 | Multi-path scheduling method for system information of different block chains |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111553795A true CN111553795A (en) | 2020-08-18 |
Family
ID=72000143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010335185.7A Withdrawn CN111553795A (en) | 2020-04-24 | 2020-04-24 | Multi-path scheduling method for system information of different block chains |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111553795A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112330019A (en) * | 2020-11-04 | 2021-02-05 | 安徽师范大学 | Data transmission optimization method of block chain transaction channel |
CN112541764A (en) * | 2020-12-17 | 2021-03-23 | 成都知道创宇信息技术有限公司 | Asset management method, device and system based on intelligent contract |
CN112565104A (en) * | 2020-12-01 | 2021-03-26 | 腾讯科技(深圳)有限公司 | Flow control method, device, medium and electronic equipment of block chain system |
CN112669159A (en) * | 2021-01-11 | 2021-04-16 | 上海能链众合科技有限公司 | Trust-based value circulation method in different block chain systems |
CN113570458A (en) * | 2021-07-16 | 2021-10-29 | 东北大学秦皇岛分校 | Block chain payment channel supervision method based on proxy re-encryption |
-
2020
- 2020-04-24 CN CN202010335185.7A patent/CN111553795A/en not_active Withdrawn
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112330019A (en) * | 2020-11-04 | 2021-02-05 | 安徽师范大学 | Data transmission optimization method of block chain transaction channel |
CN112330019B (en) * | 2020-11-04 | 2024-03-15 | 安徽师范大学 | Data transmission optimization method for block chain transaction channel |
CN112565104A (en) * | 2020-12-01 | 2021-03-26 | 腾讯科技(深圳)有限公司 | Flow control method, device, medium and electronic equipment of block chain system |
CN112541764A (en) * | 2020-12-17 | 2021-03-23 | 成都知道创宇信息技术有限公司 | Asset management method, device and system based on intelligent contract |
CN112541764B (en) * | 2020-12-17 | 2023-11-28 | 成都知道创宇信息技术有限公司 | Asset management method, device and system based on intelligent contract |
CN112669159A (en) * | 2021-01-11 | 2021-04-16 | 上海能链众合科技有限公司 | Trust-based value circulation method in different block chain systems |
CN113570458A (en) * | 2021-07-16 | 2021-10-29 | 东北大学秦皇岛分校 | Block chain payment channel supervision method based on proxy re-encryption |
CN113570458B (en) * | 2021-07-16 | 2023-09-26 | 东北大学秦皇岛分校 | Blockchain payment channel supervision method based on proxy re-encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111553795A (en) | Multi-path scheduling method for system information of different block chains | |
Ahn et al. | Synchronized aggregate signatures: new definitions, constructions and applications | |
Li et al. | Secure balance planning of off-blockchain payment channel networks | |
Camenisch et al. | Simulatable adaptive oblivious transfer | |
Ruffing et al. | Coinshuffle: Practical decentralized coin mixing for bitcoin | |
Vishnumurthy et al. | Karma: A secure economic framework for peer-to-peer resource sharing | |
JP4790122B2 (en) | Robust and efficient distributed RSA key generation | |
Cheon et al. | Provably secure timed-release public key encryption | |
CN113407977B (en) | Cross-chain extension method and system based on aggregated signature | |
CN113822672B (en) | Block chain consensus method based on zero knowledge proof | |
US20120278609A1 (en) | Joint encryption of data | |
CN112651830B (en) | Block chain consensus method applied to power resource sharing network | |
Zhou et al. | TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks | |
CN111147594A (en) | Internet of things data transmission system, key generation method and data transmission method thereof | |
CN112669159A (en) | Trust-based value circulation method in different block chain systems | |
CN113612604A (en) | Asynchronous network-oriented safe distributed random number generation method and device | |
CN114491616A (en) | Block chain and homomorphic encryption-based federated learning method and application | |
Zhang et al. | A lightweight privacy preserving scheme of charging and discharging for electric vehicles based on consortium blockchain in charging service company | |
Yin et al. | Sidechains with optimally succinct proof | |
Wang et al. | Consensus algorithm based on verifiable randomness | |
CN113806764B (en) | Distributed support vector machine based on blockchain and privacy protection and optimization method thereof | |
Wang et al. | Enabling scalable and unlinkable payment channel hubs with oblivious puzzle transfer | |
CN118446762B (en) | Fee calculation management method and system based on account management | |
Feng et al. | Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing | |
Mambo et al. | How to utilize the transformability of digital signatures for solving the oracle problem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200818 |
|
WW01 | Invention patent application withdrawn after publication |