CN112581128A - Heterogeneous license chain value exchange method with presence certificate - Google Patents

Heterogeneous license chain value exchange method with presence certificate Download PDF

Info

Publication number
CN112581128A
CN112581128A CN202011458000.8A CN202011458000A CN112581128A CN 112581128 A CN112581128 A CN 112581128A CN 202011458000 A CN202011458000 A CN 202011458000A CN 112581128 A CN112581128 A CN 112581128A
Authority
CN
China
Prior art keywords
chain
transaction
cross
license
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011458000.8A
Other languages
Chinese (zh)
Other versions
CN112581128B (en
Inventor
臧铖
陈嘉俊
郭东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Zheshang Bank Co Ltd
Original Assignee
China Zheshang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Zheshang Bank Co Ltd filed Critical China Zheshang Bank Co Ltd
Priority to CN202011458000.8A priority Critical patent/CN112581128B/en
Publication of CN112581128A publication Critical patent/CN112581128A/en
Application granted granted Critical
Publication of CN112581128B publication Critical patent/CN112581128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a heterogeneous license chain value exchange method with existence certification, which can perform existence certification on inter-chain transactions, unify communication protocols between heterogeneous license chains and meet the requirements of reality, reliability, equal value, transaction consistency and the like of inter-chain information interaction. The method can be expanded in parallel among the license chains, has good expansibility, enables value exchange among heterogeneous license chains to be carried out, is expanded into a multi-service scene from a single scene or connection or expansion, is expanded by a single service main body or connected to the multi-service main body, and can greatly expand application scenes. The invention ensures the transaction consistency of value exchange between heterogeneous license chains through time lock, existence certification and a transaction rollback mechanism. The invention realizes the decentralized cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and better meets the demand of block chain decentralized management.

Description

Heterogeneous license chain value exchange method with presence certificate
Technical Field
The invention relates to the technical field of block chains, in particular to a heterogeneous license chain value exchange method with presence certification.
Background
The permission chain means that each node participating in the blockchain system is permitted, and an unlicensed node cannot access the system. The maximum value of the block chain is to realize the transfer of information value, as for a heterogeneous permission chain, participants are organizations authorized by permission, the communication between chains with different architectures has the problems of non-uniform interfaces, inconsistent consensus and the like, and the chains cannot be communicated with each other to realize the value exchange.
Especially heterogeneous license chains, have two major difficulties:
because of the heterogeneity, the adopted consensus mechanism, the storage mechanism and the block format are different, a uniform communication protocol needs to be defined in the information interaction process; when transaction information is verified, the existence of the message needs to be proved, that is, the a chain is communicated with the B chain, and the B chain can confirm that the content of the message sent by the a chain is really existed.
Because the method is a permission chain, the method has high requirements on node access and data authority, and the data isolation between chains cannot be damaged in the communication process.
Disclosure of Invention
Based on the technical problems, the invention designs and realizes a method for exchanging values between heterogeneous license chains with existence certification, the method can perform existence certification on transactions between chains, unify communication protocols between heterogeneous license chains, and realize the requirements of reality, reliability, equal value, transaction consistency and the like of information interaction between chains.
The purpose of the invention is realized by the following technical scheme: a has isomerism permit chain value exchange method that proves, both sides of the value exchange are isomerism permit chains, each permit chain has at least one cross-chain communication agent node, each agent node can connect with arbitrary node in the permit chain, the agent node is responsible for registration, message signature, trade route, verify the signature, verify the existence of trade, guarantee the transaction consistency among the permit chains, communicate and interact through the network communication module of cross-chain among each isomerism permit chain, design cross-chain standard interaction protocol CSCP and standard interface used for network communication among the block chain cross-chain in the network communication module of cross-chain;
the method realizes the transaction existence certification through the Mercker certification on the inter-chain transaction, and comprises the following steps:
step 1, obtaining a block hash's merkel tree: if the permission chain block is stored by adopting a Mercker tree structure, directly acquiring the Mercker tree of the current transaction as the existence certification of the transaction; if the allowed chain blocks are not stored in the merkel tree structure, the merkel tree proof of the block is generated, specifically: calculating the hash value of the block, taking the hash value as a leaf node of the binary tree, taking a father node of the leaf node as the hash value of the hash values of the two leaf nodes, and calculating the hash value of the root node by analogy;
step 2: the generated or obtained Mercker tree is used as a communication message to be encapsulated, so that the communication message conforms to CSCP;
and step 3: verifying the existence certification, and executing in the built-in intelligent contract, specifically: acquiring a hash value of the transaction; obtaining a verification path of the transaction in the Mercker tree, and calculating a root hash of the Mercker tree; the computed root hash is compared to the mercker tree root for presence verification in the CSCP message, and if the same, the transaction is verified as being truly present, otherwise it is not present.
Furthermore, the method adopts a decentralized management mechanism, which comprises certificate issuing authorization, registration management, a cross-chain standard interaction protocol and a standard interface, and is realized on a cross-chain communication agent node.
Furthermore, a certificate management module is arranged on the cross-chain communication agent node, the certificate management module generates a public and private key pair and a cross-chain root certificate of cross-chain communication, then a public key is sent to a target chain needing communication, and after the target chain is examined and authorized, the root certificate of the target chain is used as a source chain to sign and send a cross-chain certificate; after obtaining the authorization certificate of the destination chain, the source chain is registered, the registration content comprises identity information, authority information, a signature strategy and a verification rule, and cross-chain authority control, transaction routing and validity verification are realized through a registration management mechanism.
Further, a cross-chain standard interaction protocol CSCP converts blockchain messages of different architectures into cross-chain bus messages of a unified standard, which can meet the communication requirements between heterogeneous license chains, and the protocol main fields include: version, protocol version; sourcechaini id, source chain address; DestChainID, destination chain address; crosschiainppayload, cross-chain transaction content; timestamp, Timestamp; signature, proxy node signature; cert, cross-chain transaction node certificate; proof, presence verification information; OriginInfo, original transaction information for cross-chain transaction; extra, user extension field; wherein the Crossschainpayload is serialized into byte types through json, and the corresponding structure is analyzed through json when the byte types are transmitted to a destination chain according to a block chain architecture of cross-chain transaction; the standard interface is used for information interaction between license chains and comprises the following steps: the system comprises a transaction conversion interface, a transaction sending interface, a transaction receiving interface, a transaction verification interface, a registration chain interface, an update chain interface and an injection and sales chain interface, wherein the transaction conversion interface is used for adapting heterogeneous transaction messages to respective architectures through the CSCP aiming at heterogeneous license chains.
Furthermore, the method ensures the transaction consistency of value exchange among heterogeneous permission chains through a time lock, existence certification and a transaction rollback mechanism, unlocks the transaction if the existence certification is verified within a threshold time, and otherwise, the rollback is carried out, and the intelligent contract in the time lock is automatically executed without human intervention.
Further, in order to ensure transaction consistency of value exchange between heterogeneous license chains, the following operations are performed at the proxy node of the source chain license chain and the proxy node of the destination chain license chain:
the proxy node of the source chain generates a cross-chain transaction certificate and a cross-chain transaction abstract signature, locks a transaction alpha and initiates a cross-chain transaction request to the proxy node of the destination chain;
after receiving the cross-chain transaction request, the proxy node of the destination chain verifies the locked transaction alpha, locks the transaction beta if the verification is passed, generates a transaction beta locking certificate, and sends the transaction beta locking certificate to the proxy node of the source chain;
a proxy node of a source chain receives and verifies a transaction beta locking certificate, if the transaction beta locking certificate passes the verification, a cross-chain transaction request is initiated to a target chain, and the cross-chain transaction request comprises a cross-chain transaction certificate and a cross-chain transaction abstract signature;
the proxy node of the destination chain receives the cross-chain transaction request, verifies a cross-chain transaction certificate and a cross-chain transaction abstract signature, unlocks a transaction beta if the cross-chain transaction certificate and the cross-chain transaction abstract signature pass the verification, submits a cross-chain transaction, and returns a submitted cross-chain transaction certificate to the proxy node of the source chain;
the proxy node of the source chain receives and verifies the submitted cross-chain transaction certificate, and if the verification is passed, the transaction alpha is unlocked, so that the consistency operation of the transaction alpha and the transaction beta is realized;
in the verification process, the proxy node of the destination chain verifies whether the transaction beta is unlocked within the threshold time, and if the transaction beta is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction beta; the proxy node of the source chain verifies whether the transaction alpha is unlocked within a threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction alpha;
and through transaction locking and interaction, the transaction alpha and the transaction beta are ensured to be unlocked or not unlocked at the same time, and the necessary condition for unlocking the transaction locking is to verify the evidence of the end-chain transaction.
Furthermore, the information transmission is ensured not to be manually intervened through the built-in intelligent contract, the simultaneous success or simultaneous failure of the affairs locked by both communication parties is ensured, and the realization process of the affair consistency guarantee and the built-in intelligent contract is as follows:
a user initiates a value exchange request to a source license chain agent node; the source license chain agent node processes the cross-chain value exchange request; after receiving a cross-chain value exchange request, a source chain built-in intelligent contract generates a cross-chain transaction existence certificate and a signature; the source chain starts cross-chain transaction locking, and a transaction alpha is locked; the source chain sends the lock attestation to the destination chain;
the intelligent contract verification locking proof is arranged in the destination chain, and the transaction locking beta is started; the target chain sends a transaction beta locking certificate to the source chain;
a source chain verifies a transaction beta locking proof, and sends a cross-chain transaction existence proof and a signature to a target chain;
the target chain verifies that the source chain cross-chain transaction has the certification and the signature, and unlocks the transaction beta and submits the cross-chain transaction after the transaction beta passes; the target chain sends the cross-chain transaction existence certification and the signature to the source chain;
and the source chain verifies that the cross-chain transaction sent by the destination chain has the certificate and the signature, unlocks the transaction alpha after the verification is passed, and submits the cross-chain transaction.
Judging whether the transaction lock is unlocked or not in the threshold time by the source chain and the destination chain, if so, executing the transaction to exchange value, and otherwise, rolling back the transaction and unlocking the transaction lock;
further, the heterogeneous license chain value exchange includes the steps of:
(1) and (3) certificate issuance: the certificate management module issues a cross-chain root certificate and a public and private key pair to a private chain cross-chain proxy node according to requirements;
(2) chain registration: allowing a chain source chain to perform cross-chain registration to a destination chain, wherein the cross-chain registration mainly comprises identity information and a verification rule of the source chain, and after the registration is successful, a verification engine module of the destination chain can generate the verification rule of the chain, and store the identity information and the chain information of the source chain into a registry of the destination chain for persistent storage;
(3) and (3) identity and verification rule management: the verification rules are used for verifying the existence and the validity of the cross-chain transaction, the identity of the chain can be verified when the heterogeneous license chain is communicated, and the verification rules of the corresponding chain are matched to verify the existence and the validity of the transaction;
(4) and (3) an inspection stage: checking whether a source chain generating the cross-chain transaction is registered and has relevant access rights;
(5) a verification stage: matching an authentication rule in a registry of a destination chain through source chain identity information of the transaction, and then inputting authentication information, the authentication rule and the cross-chain transaction of the transaction into an authentication engine for authentication;
(6) an execution stage: entering an execution stage after the cross-chain transaction passes verification, wherein the execution stage mainly comprises transaction existence certification and transaction consistency guarantee, and if the transaction lock is unlocked within a threshold time, executing the cross-chain transaction to realize the transmission between heterogeneous permission chains;
(7) and returning a result: and finally, the destination chain constructs the result into return information and sends the return information to the source chain.
Furthermore, the authority control of data access between the permission chains is mainly realized by the authority control management through registration information, relevant authorities including read-write authority, information acquisition range and contract method calling authority are appointed during registration, and the control management of the data access authority of the permission chains can be realized in a checking stage.
Further, the message passing process between heterogeneous license chains is as follows:
the permission chain source chain sends a cross-chain message to the agent node;
the proxy node of the source chain of the permit chain converts the type of the source chain message into a CSCP message, signs the CSCP message, and sends the CSCP message to the proxy node of the destination chain of the permit chain;
the agent node of the permission chain destination chain receives the CSCP message, carries out signature verification, identity verification, authority verification and existence verification on the CSCP message, converts the CSCP message into a transaction message in a destination chain format, and sends the cross-chain transaction to the permission chain destination chain;
and the destination chain of the license chain processes the cross-chain message and returns a processing result.
The invention has the beneficial effects that: the method can be used for proving the existence of the inter-chain transaction, unifying the communication protocol between heterogeneous license chains and meeting the requirements of reality, reliability, equal value, transaction consistency and the like of inter-chain information interaction. The method can be expanded in parallel among the license chains, has good expansibility, enables value exchange among heterogeneous license chains to be carried out, is expanded into a multi-service scene from a single scene or connection or expansion, is expanded by a single service main body or connected to the multi-service main body, and can greatly expand application scenes. The invention ensures the transaction consistency of value exchange between heterogeneous license chains through time lock, existence certification and a transaction rollback mechanism. The invention realizes the decentralized cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and better meets the demand of block chain decentralized management.
Drawings
FIG. 1 is a diagram of the overall architecture of a heterogeneous license chain value exchange provided by an embodiment of the present invention;
FIG. 2 is a block diagram of a Mercker tree according to an embodiment of the present invention;
FIG. 3 is a flow diagram of an implementation of a transaction consistency guarantee and built-in intelligent contracts provided by an embodiment of the present invention;
FIG. 4 is a block diagram of the overall process of value exchange for a heterogeneous license chain provided by an embodiment of the present invention;
fig. 5 is a heterogeneous license chain messaging flow diagram provided by an embodiment of the present invention.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The invention designs and realizes a method for exchanging values between heterogeneous license chains with existence certification, which can perform existence certification on transactions between chains, unify communication protocols between heterogeneous license chains and realize the requirements of reality, reliability, equal value, transaction consistency and the like of information interaction between chains.
The invention provides a method for exchanging values between heterogeneous license chains with existence certification, which can be expanded in parallel between the license chains and has good expansibility, so that the value exchange between the heterogeneous license chains can be carried out, a single scene or a connection or expansion mode is a multi-service scene, a single service main body is expanded or connected to the multi-service main body, and an application scene can be greatly expanded.
The invention realizes the information transmission of the heterogeneous chain by a decentralized management mode, wherein the decentralized management mainly comprises certificate issuing authorization, registration management, a standard cross-chain communication protocol and a standard communication interface method.
The invention carries out the existence certification through a cross-chain existence verification method, and the cross-chain existence verification method mainly comprises the steps of constructing a Mercker tree certification, packaging communication messages and verifying the existence.
The invention ensures the transaction consistency of value exchange among the heterogeneous permission chains through a time lock, existence certification and a transaction rollback mechanism, unlocks the transaction if the existence certification is verified within the threshold time, and otherwise, rolls back to ensure the transaction consistency of the heterogeneous permission chain communication.
The general architecture of the present invention is shown in fig. 1. The two communication parties are heterogeneous license chains, each license chain is provided with at least one cross-chain communication agent node crossbar, each crossbar can be connected with any node in the license chain, and the heterogeneous license chains are communicated and interacted through a cross-chain network communication module crossbar;
one, cross-chain communication agent node cross
The cross-chain message is transmitted to the cross-chain node of the destination chain by the cross-chain sending interface and then transmitted to the destination chain for relevant operation. TLS encryption is adopted in the communication process, so that the information transmission safety can be ensured. crossgene is primarily responsible for registration between license chains, message signing, transaction routing, signature verification, transaction presence verification, transaction consistency assurance, and the like.
Cross-chain network communication module crossbar
A cross-chain standard interaction protocol cscp (cross standard communication protocol) designed in crosspub is mainly used for inter-chain network communication of a block chain.
Heterogeneous license chain communication can meet cross-chain calling among heterogeneous chains through a CSCP bus protocol, block chain messages of different architectures are converted into cross-chain bus messages of a uniform standard through the CSCP bus protocol, and communication requirements among the heterogeneous license chains can be met. The protocol main fields are as follows:
Figure BDA0002829979910000071
Figure BDA0002829979910000081
the cross-chain transaction content CrossconfornPayload is serialized into byte types through json, the byte types can be determined according to the block chain architecture of the cross-chain transaction, and the corresponding structure is analyzed through json when the byte types are transmitted to a destination chain.
Standard interfaces are defined on the CSCP protocol for information interaction between the license chains. Mainly comprises the following steps:
the transaction conversion interface TxToCSCP \ CSCPToTx can adapt the heterogeneous transaction message to respective architecture through a bus standard protocol CSCP aiming at the heterogeneous license chain;
the transaction sending interface SendTx is used for sending information to a destination chain by a source chain;
a transaction receiving interface ReceivTX for receiving cross-chain transaction by a destination chain;
the transaction verification interface VerifyCSCP is used for verifying transaction information;
the registration link port RegistChain is used for identity registration;
updating a link interface UpdateChain, which is used for updating the link identity information;
and the logout link interface DeleteChain is used for logout of the link identity information.
Three, decentralized management mechanism
The decentralized management mainly comprises certificate issuing authorization, registration management, a standard cross-chain communication protocol and a standard communication interface method, and the mechanisms are realized on cross-chain agent node cross.
A certificate management module is arranged on a cross-chain proxy node crossbar, the certificate management module can generate a public and private key pair of cross-chain communication and a cross-chain root certificate, then a public key is sent to a target chain needing communication, and after the target chain is examined and authorized, the root certificate of the target chain is used as a source chain to sign a cross-chain certificate. Thus, the identity authentication in the process of cross-link communication is ensured by adopting a cryptology mode, and the safety is ensured.
After obtaining the authorization certificate of the destination chain, registering, wherein the registered content mainly comprises identity information, authority information, a signature strategy and a verification rule, and cross-chain authority control, transaction routing, validity verification and the like are realized through a registration management mechanism.
The cross-chain standard communication protocol CSCP (cross chain standard communication protocol) and the standard communication interface method realize information communication between heterogeneous license chains.
The invention realizes the decentralized cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and better meets the demand of block chain decentralized management.
Method for verifying existence of cross-chain transaction
1. Acquiring the Merck tree of the block hash, and constructing and generating the Merck tree by itself if the Merck tree is not acquired
If the permission chain block adopts the memory of the Mercker tree structure, the Mercker of the current transaction is directly obtained
A tree as proof of presence for the transaction;
secondly, because of the heterogeneity of the permission chains, some block chain platform block storages do not adopt the Merckel tree structure,
at this time, the block needs to be traversed, and the mercker tree proof of the block is generated by itself, and the specific generation method is as follows:
a) calculating a hash value of the block, and using the hash value as a leaf node of a binary tree;
b) the father node of the leaf node is the hash value of the hash values of the two leaf nodes;
c) and the hash value of the root node is calculated by analogy.
2. Encapsulated into standard cross-chain transaction message, conforming to CSCP
The generated or obtained Merck tree is used as a communication message to be encapsulated, so that the communication message conforms to the CSCP protocol standard;
3. verifying presence attestation, built-in intelligent contract execution
The invention designs a built-in intelligent contract which is used for verifying existence certification and unlocking locking affairs. The specific verification process is as follows:
A. acquiring a hash value of the transaction;
B. obtaining a verification path of the transaction in the Mercker tree, and calculating a root hash of the Mercker tree;
C. the computed root hash is compared to the mercker tree root for presence attestation in the CSCP message,
if they are the same, the transaction is proved to be truly present, otherwise it is not present.
In the present invention, the proof of existence of cross-chain transactions is achieved by mercker's proof. The structure of the merkel tree is shown in fig. 2, where each non-leaf node is labeled by the hash value of its child node, and the root node of the tree is called the merkel root (merkle root). FIG. 2 shows the Mercker tree structure of a block X, and if it is verified whether the transaction Tx _ D is in the block, it is not necessary to obtain the whole block, but only the transactions Tx _ D, H _ AB, H _ C and merkle root need to be provided. The specific process is as follows:
a. calculating hash according to the transaction D to obtain H _ D;
b. calculating Hash according to H _ C and H _ D to obtain H _ CD;
c. calculating hash according to the H _ AB and the H _ CD to obtain H _ ABCD;
d. comparing H _ ABCD with merkle root, if the same, it is proved that transaction Tx _ D exists in the block, otherwise it is said that it does not exist.
The communication between the license chains needs existence certification, and the transaction information needs to be provided with verification information, wherein the certification information refers to initial hash values used in the verification process, namely H _ AB, H _ C, merkle root and transaction information Tx _ D.
Fifth, transaction consistency assurance
And the transaction locking is unlocked according to the existence certification, and the intelligent contract in the time lock is automatically executed without human intervention, so that the transaction consistency is ensured.
Performing the following operations at the proxy node of the license chain A and the proxy node of the license chain B:
1. the agent node of the permission chain A generates a cross-chain transaction certificate and a cross-chain transaction abstract signature, locks a transaction alpha and sends a cross-chain transaction request to the agent node of the permission chain B;
2. after receiving the cross-chain transaction request, the proxy node of the permission chain B verifies the locked transaction alpha, locks the transaction beta if the verification is passed, generates a transaction beta locking certificate, and sends the transaction beta locking certificate to the proxy node of the permission chain A;
3. the proxy node of the permission chain A receives and verifies the transaction beta locking certificate, and if the transaction beta locking certificate passes the verification, a cross-chain transaction request is sent to the permission chain B, wherein the cross-chain transaction request comprises a cross-chain transaction certificate and a cross-chain transaction digest signature;
4. the agent node of the permission chain B receives the cross-chain transaction request, verifies the cross-chain transaction certificate and the cross-chain transaction abstract signature, unlocks the transaction beta if the verification is passed, submits the cross-chain transaction, and returns a submission cross-chain transaction certificate to the agent node of the permission chain A;
5. and the proxy node of the permission chain A receives and verifies the submitted cross-chain transaction certificate, and unlocks the transaction alpha if the verification is passed, so that the consistency operation of the transaction alpha and the transaction beta is realized.
In the verification process:
the agent node of the permission chain B verifies whether the transaction beta is unlocked within the threshold time, and if the transaction beta is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction beta;
the agent node of the permission chain A verifies whether the transaction alpha is unlocked within the threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction alpha;
and through transaction locking and interaction, the transaction alpha and the transaction beta are ensured to be unlocked or not unlocked at the same time, and the necessary condition for unlocking the transaction locking is to verify the evidence of the end-chain transaction. And a time lock mechanism is added, so that the transaction consistency of value exchange between heterogeneous license chains is ensured. This information transfer can be a value asset on the chain while meeting read-write consistency requirements. Compared with a hash lock, the invention realizes the unlocking of the transaction through the transaction existence proof of the chain, improves the efficiency and simultaneously ensures the true existence of the transaction.
Through the built-in intelligent contract, the information transmission is guaranteed not to be manually intervened, the affairs locked by both communication parties are guaranteed to be either successful or failed at the same time, and the affair consistency is guaranteed.
The main functions and processes of the transaction consistency assurance and built-in intelligent contract are shown in fig. 3, and include:
1. a user initiates a value exchange request to a source chain agent node;
2. the source license chain agent node processes the cross-chain value exchange request;
3. after receiving a cross-chain value exchange request, a source chain built-in intelligent contract generates a cross-chain transaction existence certificate and a signature;
4. the source chain begins a cross-chain transaction lock, locking transaction a (which may be a value asset);
5. the source chain sends the lock attestation to the destination chain;
6. the intelligent contract verification locking proof is arranged in the destination chain, and the transaction locking beta is started;
7. the target chain sends a transaction beta locking certificate to the source chain;
8. a source chain verifies a transaction beta locking proof, and sends a cross-chain transaction existence proof and a signature to a target chain;
9. the target chain verifies that the source chain cross-chain transaction has the certification and the signature, and unlocks the transaction beta and submits the cross-chain transaction after the transaction beta passes;
10. the target chain sends the cross-chain transaction existence certification and the signature to the source chain;
11. the source chain verifies that the cross-chain transaction sent by the destination chain has the certification and the signature, unlocks the transaction alpha after the verification is passed and submits the cross-chain transaction;
12. judging whether the transaction lock is unlocked or not in the threshold time by the source chain and the destination chain, if so, executing the transaction to exchange value, and otherwise, rolling back the transaction and unlocking the transaction lock;
based on the above five designs, the key flow of the value exchange of the heterogeneous license chain is shown in fig. 4, and includes the following steps:
(1) certificate issuance
And the certificate management module issues a cross-chain root certificate and a public and private key pair to the private chain cross-chain proxy node according to requirements. The specific issuing rule is as follows: assuming that the chain A and the chain B are communicated with each other, the chain root certificate of the chain A issues a cross-chain certificate to the chain B by adopting a chain public key of the chain B; the B chain root certificate issues a cross-chain certificate to the A chain by adopting an A chain public key, and deploys the certificate and a public and private key pair on the cross-chain communication agent node cross. Then the B chain can use the root certificate to verify the cross-chain certificate of the message sent by the a chain, and similarly, the a chain can use the root certificate to verify the cross-chain certificate of the message sent by the B chain; meanwhile, the message digest signature is verified, so that cross-chain authority management is achieved and communication safety is guaranteed.
The invention designs and realizes a certificate management module certManage which is mainly used for generating and managing related CA certificates and digital certificates and has the functions of certificate issuing, public and private key generation, certificate checking, certificate revocation and the like.
(2) Chain registration
And after the registration is successful, the verification engine module of the destination chain generates a verification rule for the chain, and then the legitimacy of the cross-chain transaction is verified according to the verification rule. Different validation rules are generated for different architected license chains. And storing the identity information and the chain information of the source chain into a registry of the destination chain for persistent storage. The verification engine of the destination chain cross checks the information registered by the source chain.
The chain of permissions requires the permission to be granted, so data right control on the chain is important. The invention controls the authority of data access between permission chains, mainly carries out authority control management through registration information, and appoints related authorities such as read-write authority, information acquisition range, contract method calling authority and the like during registration. The control management of the permission chain data access rights can be implemented during the checking phase.
cross supports chain update and logout operations, the overall process is similar to the registration process, and the content of the registry is updated after the update and logout information is checked and verified.
(3) Identity and authentication rule management
Validation rules are used by a validation engine to validate presence and validity for cross-chain transactions. Because the verification rules of each chain are different due to the heterogeneity of each chain, the verification engine of the cross cannot provide a uniform verification rule for each chain, and therefore when the source chain is required to be registered with the destination chain, the cross of the destination chain deploys and registers the corresponding verification rules, and records the identity information of the registered chain into the registry. The identity of the chain can be verified when the chain is allowed to communicate, the verification rule of the corresponding chain is matched to verify the existence and the validity of the transaction, and the related transaction is executed after the verification is passed.
(4) Inspection phase
The checking work of the cross-chain transaction comprises the following steps: whether the source chain generating the cross-chain transaction is registered or not, including source chain identity information, verification rules, whether relevant access rights exist or not, and the like.
(5) Verification phase
And the cross-chain transaction passing the check enters a verification stage, the verification stage is executed by a verification engine, a verification rule is matched in a registry of a destination chain through the source chain identity information of the transaction, and then the verification information, the verification rule and the cross-chain transaction of the transaction are input into the verification engine and then verified. After the verification is passed, the transaction will enter the execution phase.
(6) Execution phase
And entering an execution phase after the cross-chain transaction passes the verification, wherein the execution phase mainly comprises the transaction existence certification and transaction consistency guarantee method and the interaction process. If the transaction lock is unlocked within the threshold time, a cross-chain transaction is executed, and the transmission between heterogeneous permission chains is realized.
(7) Result return
And finally, the destination chain constructs the result into return information and sends the return information to the source chain.
In one embodiment, the message passing flow is shown in fig. 5, and includes the following steps:
1. the permission chain A sends a cross-chain message to the proxy node crossgene;
2. the crossgene of the permit chain A converts the type of the A chain message into a bus standard communication message CSCP;
3. the cross of license chain A signs the CSCP message;
4. the crosssangent of permit chain A sends CSCP messages to the crosssangent of chain B;
5. the cross of the license chain B receives the CSCP message;
6. cross of the license chain B performs signature verification on the CSCP message;
7. the cross of the license chain B carries out identity verification on the CSCP message;
8. the cross of the license chain B carries out authority verification on the CSCP message;
9. the cross of the license chain B verifies the existence of the CSCP message;
10. the cross of the license chain B converts the CSCP message into a transaction message in a B chain format;
11. the cross gene of the permit chain B sends the cross chain transaction to the chain B;
12. the permit chain B processes the cross-chain message;
13. the permit chain B returns the processing result.
In one embodiment, a computer device is provided, which includes a memory and a processor, wherein the memory stores computer readable instructions, and the computer readable instructions, when executed by the processor, cause the processor to execute the steps in the method for exchanging value of heterogeneous license chain with presence certificate in the embodiments.
In one embodiment, a storage medium storing computer-readable instructions is provided, which when executed by one or more processors, cause the one or more processors to perform the steps in the heterogeneous license chain value exchange method with presence attestation of the embodiments described above. The storage medium may be a nonvolatile storage medium.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.

Claims (10)

1. A method for exchanging the value of a heterogeneous license chain with a presence certificate is characterized in that two sides of the value exchange are heterogeneous license chains, each license chain is provided with at least one cross-chain communication agent node, each agent node can be connected with any node in the license chain, the agent nodes are responsible for registration between the license chains, message signature, transaction routing, signature verification, transaction existence verification and transaction consistency guarantee, the heterogeneous license chains are communicated and interacted with each other through a cross-chain network communication module, and a cross-chain standard interaction protocol CSCP and a standard interface for network communication between block chains and cross chains are designed in the cross-chain network communication module;
the method realizes the transaction existence certification through the Mercker certification on the inter-chain transaction, and comprises the following steps:
step 1, obtaining a block hash's merkel tree: if the permission chain block is stored by adopting a Mercker tree structure, directly acquiring the Mercker tree of the current transaction as the existence certification of the transaction; if the allowed chain blocks are not stored in the merkel tree structure, the merkel tree proof of the block is generated, specifically: calculating the hash value of the block, taking the hash value as a leaf node of the binary tree, taking a father node of the leaf node as the hash value of the hash values of the two leaf nodes, and calculating the hash value of the root node by analogy;
step 2: the generated or obtained Mercker tree is used as a communication message to be encapsulated, so that the communication message conforms to CSCP;
and step 3: verifying the existence certification, and executing in the built-in intelligent contract, specifically: acquiring a hash value of the transaction; obtaining a verification path of the transaction in the Mercker tree, and calculating a root hash of the Mercker tree; the computed root hash is compared to the mercker tree root for presence verification in the CSCP message, and if the same, the transaction is verified as being truly present, otherwise it is not present.
2. The method of claim 1, wherein the method is implemented on a cross-chain communication agent node using decentralized management mechanisms including certificate authority, registration management, cross-chain standard interaction protocol, and standard interface.
3. The method for exchanging the value of the heterogeneous license chain with the existence certification according to claim 1, characterized in that a certificate management module is arranged on the cross-chain communication agent node, the certificate management module generates a public and private key pair and a cross-chain root certificate of cross-chain communication, then sends a public key to a destination chain needing communication, and after the destination chain is audited and authorized, issues a cross-chain certificate for a source chain by using the root certificate of the self; after obtaining the authorization certificate of the destination chain, the source chain is registered, the registration content comprises identity information, authority information, a signature strategy and a verification rule, and cross-chain authority control, transaction routing and validity verification are realized through a registration management mechanism.
4. The method of claim 1, wherein a cross-chain standard interaction protocol (CSCP) converts blockchain messages of different architectures into cross-chain bus messages of a uniform standard, and can satisfy communication requirements between heterogeneous license chains, and the protocol main field includes: version, protocol version; sourcechaini id, source chain address; DestChainID, destination chain address; crosschiainppayload, cross-chain transaction content; timestamp, Timestamp; signature, proxy node signature; cert, cross-chain transaction node certificate; proof, presence verification information; OriginInfo, original transaction information for cross-chain transaction; extra, user extension field; wherein the Crossschainpayload is serialized into byte types through json, and the corresponding structure is analyzed through json when the byte types are transmitted to a destination chain according to a block chain architecture of cross-chain transaction; the standard interface is used for information interaction between license chains and comprises the following steps: the system comprises a transaction conversion interface, a transaction sending interface, a transaction receiving interface, a transaction verification interface, a registration chain interface, an update chain interface and an injection and sales chain interface, wherein the transaction conversion interface is used for adapting heterogeneous transaction messages to respective architectures through the CSCP aiming at heterogeneous license chains.
5. The method for exchanging the value of the heterogeneous license chain with the existence certification is characterized in that the method ensures the transaction consistency of the value exchange between the heterogeneous license chains through a time lock, the existence certification and a transaction rollback mechanism, the transaction is unlocked if the existence certification is verified within a threshold time, and otherwise, the transaction is rolled back, and the intelligent contract in the time lock is automatically executed without human intervention.
6. The method for exchanging the value of the heterogeneous license chain with the existence certification according to the claim 5, characterized in that, in order to ensure the transaction consistency of the value exchange between the heterogeneous license chains, the following operations are executed at the proxy node of the source chain license chain and the proxy node of the destination chain license chain:
the proxy node of the source chain generates a cross-chain transaction certificate and a cross-chain transaction abstract signature, locks a transaction alpha and initiates a cross-chain transaction request to the proxy node of the destination chain;
after receiving the cross-chain transaction request, the proxy node of the destination chain verifies the locked transaction alpha, locks the transaction beta if the verification is passed, generates a transaction beta locking certificate, and sends the transaction beta locking certificate to the proxy node of the source chain;
a proxy node of a source chain receives and verifies a transaction beta locking certificate, if the transaction beta locking certificate passes the verification, a cross-chain transaction request is initiated to a target chain, and the cross-chain transaction request comprises a cross-chain transaction certificate and a cross-chain transaction abstract signature;
the proxy node of the destination chain receives the cross-chain transaction request, verifies a cross-chain transaction certificate and a cross-chain transaction abstract signature, unlocks a transaction beta if the cross-chain transaction certificate and the cross-chain transaction abstract signature pass the verification, submits a cross-chain transaction, and returns a submitted cross-chain transaction certificate to the proxy node of the source chain;
the proxy node of the source chain receives and verifies the submitted cross-chain transaction certificate, and if the verification is passed, the transaction alpha is unlocked, so that the consistency operation of the transaction alpha and the transaction beta is realized;
in the verification process, the proxy node of the destination chain verifies whether the transaction beta is unlocked within the threshold time, and if the transaction beta is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction beta; the proxy node of the source chain verifies whether the transaction alpha is unlocked within a threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction and releasing the transaction alpha;
and through transaction locking and interaction, the transaction alpha and the transaction beta are ensured to be unlocked or not unlocked at the same time, and the necessary condition for unlocking the transaction locking is to verify the evidence of the end-chain transaction.
7. The method for exchanging the value of the heterogeneous license chain with the existence certification according to claim 5, characterized in that the built-in intelligent contract ensures that the information transmission is not interfered by human, and ensures that the transactions locked by the two communication parties succeed or fail at the same time, and the transaction consistency guarantee and the built-in intelligent contract are implemented as follows:
a user initiates a value exchange request to a source license chain agent node; the source license chain agent node processes the cross-chain value exchange request; after receiving a cross-chain value exchange request, a source chain built-in intelligent contract generates a cross-chain transaction existence certificate and a signature; the source chain starts cross-chain transaction locking, and a transaction alpha is locked; the source chain sends the lock attestation to the destination chain;
the intelligent contract verification locking proof is arranged in the destination chain, and the transaction locking beta is started; the target chain sends a transaction beta locking certificate to the source chain;
a source chain verifies a transaction beta locking proof, and sends a cross-chain transaction existence proof and a signature to a target chain;
the target chain verifies that the source chain cross-chain transaction has the certification and the signature, and unlocks the transaction beta and submits the cross-chain transaction after the transaction beta passes; the target chain sends the cross-chain transaction existence certification and the signature to the source chain;
and the source chain verifies that the cross-chain transaction sent by the destination chain has the certificate and the signature, unlocks the transaction alpha after the verification is passed, and submits the cross-chain transaction.
Judging whether the transaction lock is unlocked or not in the threshold time by the source chain and the destination chain, if so, executing the transaction to exchange value, and otherwise, rolling back the transaction and unlocking the transaction lock;
8. the method of claim 1, wherein the heterogeneous license chain value exchange comprises the steps of:
(1) and (3) certificate issuance: the certificate management module issues a cross-chain root certificate and a public and private key pair to a private chain cross-chain proxy node according to requirements;
(2) chain registration: allowing a chain source chain to perform cross-chain registration to a destination chain, wherein the cross-chain registration mainly comprises identity information and a verification rule of the source chain, and after the registration is successful, a verification engine module of the destination chain can generate the verification rule of the chain, and store the identity information and the chain information of the source chain into a registry of the destination chain for persistent storage;
(3) and (3) identity and verification rule management: the verification rules are used for verifying the existence and the validity of the cross-chain transaction, the identity of the chain can be verified when the heterogeneous license chain is communicated, and the verification rules of the corresponding chain are matched to verify the existence and the validity of the transaction;
(4) and (3) an inspection stage: checking whether a source chain generating the cross-chain transaction is registered and has relevant access rights;
(5) a verification stage: matching an authentication rule in a registry of a destination chain through source chain identity information of the transaction, and then inputting authentication information, the authentication rule and the cross-chain transaction of the transaction into an authentication engine for authentication;
(6) an execution stage: entering an execution stage after the cross-chain transaction passes verification, wherein the execution stage mainly comprises transaction existence certification and transaction consistency guarantee, and if the transaction lock is unlocked within a threshold time, executing the cross-chain transaction to realize the transmission between heterogeneous permission chains;
(7) and returning a result: and finally, the destination chain constructs the result into return information and sends the return information to the source chain.
9. The method for exchanging the value of the heterogeneous license chain with the existence certification according to claim 1, characterized in that the authority control of the data access between the license chains is mainly managed by the authority control through registration information, and the related authorities including read-write authority, information acquisition range and contract method calling authority are designated during the registration, and the control management of the data access authority of the license chain can be realized in the checking stage.
10. The method for exchanging value of heterogeneous license chains with presence attestation according to claim 1, wherein the message passing process between heterogeneous license chains is as follows:
the permission chain source chain sends a cross-chain message to the agent node;
the proxy node of the source chain of the permit chain converts the type of the source chain message into a CSCP message, signs the CSCP message, and sends the CSCP message to the proxy node of the destination chain of the permit chain;
the agent node of the permission chain destination chain receives the CSCP message, carries out signature verification, identity verification, authority verification and existence verification on the CSCP message, converts the CSCP message into a transaction message in a destination chain format, and sends the cross-chain transaction to the permission chain destination chain;
and the destination chain of the license chain processes the cross-chain message and returns a processing result.
CN202011458000.8A 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence Active CN112581128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011458000.8A CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011458000.8A CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Publications (2)

Publication Number Publication Date
CN112581128A true CN112581128A (en) 2021-03-30
CN112581128B CN112581128B (en) 2024-04-05

Family

ID=75132143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011458000.8A Active CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Country Status (1)

Country Link
CN (1) CN112581128B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114240439A (en) * 2022-02-28 2022-03-25 北京邮电大学 Cross-chain transaction rollback method and device based on threshold signature and double-hash chain mode
CN114331447A (en) * 2022-03-15 2022-04-12 北京溪塔科技有限公司 Cross-link message submitting method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN111416808A (en) * 2020-03-13 2020-07-14 财付通支付科技有限公司 Cross-block-chain data mutual storage method, device, equipment and storage medium
CN111598566A (en) * 2020-04-30 2020-08-28 厦门潭宏信息科技有限公司 Network payment system based on mixed cross-chain
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN111769957A (en) * 2020-09-02 2020-10-13 百度在线网络技术(北京)有限公司 Block chain cross-chain query method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN111416808A (en) * 2020-03-13 2020-07-14 财付通支付科技有限公司 Cross-block-chain data mutual storage method, device, equipment and storage medium
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN111598566A (en) * 2020-04-30 2020-08-28 厦门潭宏信息科技有限公司 Network payment system based on mixed cross-chain
CN111769957A (en) * 2020-09-02 2020-10-13 百度在线网络技术(北京)有限公司 Block chain cross-chain query method, device, equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114240439A (en) * 2022-02-28 2022-03-25 北京邮电大学 Cross-chain transaction rollback method and device based on threshold signature and double-hash chain mode
CN114240439B (en) * 2022-02-28 2022-05-13 北京邮电大学 Cross-chain transaction rollback method and device based on threshold signature and double-hash chain mode
CN114331447A (en) * 2022-03-15 2022-04-12 北京溪塔科技有限公司 Cross-link message submitting method and device

Also Published As

Publication number Publication date
CN112581128B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
CN112615915B (en) Method for constructing alliance chain between private chains
CN112529706B (en) Decentralizing heterogeneous public chain asset exchange method
CN110875821B (en) Cryptography blockchain interoperation
CN112583917B (en) CSCP-based hybrid chain construction method
EP3616105B1 (en) Confidentiality in a consortium blockchain network
US10250394B1 (en) Cryptologic self-executing blockchain export commitment
CN110288480B (en) Private transaction method and device for blockchain
CN112507393B (en) Method for guaranteeing consistency of block chain cross-chain transaction
US20190287105A1 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN114499898B (en) Block chain cross-chain secure access method and device
CN112581128B (en) Heterogeneous license chain value exchange method with presence evidence
US11196570B2 (en) Cryptologic blockchain interoperability membership system
CN113328997A (en) Alliance chain cross-chain system and method
CN113360861B (en) Mortgage loan oriented decentralized identity method based on repeater cross-chain
CN113850599B (en) Cross-link transaction method and system applied to alliance link
Abraham et al. Qualified eID derivation into a distributed ledger based IdM system
CN113689216A (en) Cross-chain transaction processing method and device, equipment, storage medium and program product
CN112508703B (en) Isomorphic public-private chain value exchange method
CN112615838A (en) Extensible block chain cross-chain communication method
KR20180041050A (en) Method for providing certificate service based on m of n multiple signatures in use of merkle tree structure and server using the same
CN112636920A (en) Isomorphic permission chain interconnection method based on authority control
KR101890587B1 (en) Method for providing certificate service based on m of n multiple signatures in use of merkle tree structure and server using the same
CN115708119A (en) Cross-chain transaction system, method, device and storage medium
KR102462998B1 (en) Apparatus and method for cross authentication between multi-chain based on bft consensus algorithm
CN117440032A (en) Cross-chain system based on relay chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant