CN113783854B - Credit data cross-chain sharing method and device based on block chain - Google Patents

Credit data cross-chain sharing method and device based on block chain Download PDF

Info

Publication number
CN113783854B
CN113783854B CN202111004426.0A CN202111004426A CN113783854B CN 113783854 B CN113783854 B CN 113783854B CN 202111004426 A CN202111004426 A CN 202111004426A CN 113783854 B CN113783854 B CN 113783854B
Authority
CN
China
Prior art keywords
chain
block chain
coordination
blockchain
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111004426.0A
Other languages
Chinese (zh)
Other versions
CN113783854A (en
Inventor
谭林
钟思琪
王云丽
尹海波
杨征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Tianhe Guoyun Technology Co Ltd
Original Assignee
Hunan Tianhe Guoyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Tianhe Guoyun Technology Co Ltd filed Critical Hunan Tianhe Guoyun Technology Co Ltd
Priority to CN202111004426.0A priority Critical patent/CN113783854B/en
Publication of CN113783854A publication Critical patent/CN113783854A/en
Application granted granted Critical
Publication of CN113783854B publication Critical patent/CN113783854B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a credit data cross-chain sharing method and device based on block chains, wherein the method comprises the steps of establishing a multi-chain coordination network among a plurality of heterogeneous block chain networks, so that data access connection can be established among different block chain systems; and combining a Diffie-Hellman key exchange algorithm to realize identity authentication by utilizing a multi-chain coordination network so as to finish credit data transmission. Compared with the related art, the credit data cross-chain sharing method and device based on the blockchain, provided by the application, ensure the safety of cross-chain interaction and global consistency in a multi-chain scene, and enhance the safety of data cross-chain sharing.

Description

Credit data cross-chain sharing method and device based on block chain
Technical Field
The application relates to the technical field of blockchains, in particular to a method and a device for sharing credit data across chains based on blockchains.
Background
The architecture of the block chain decentralization brings various advantages of data non-falsification, safety, reliability, traceability and the like, and solves the thought for the supply chain to carry out the credit management of suppliers, but the isolated characteristic of the block chain network can not realize information sharing, so that the credit data interaction of the suppliers between the supply chain systems running in different block chain networks is influenced. Different supply chain systems rely on a variety of heterogeneous blockchain platforms, in communication with heterogeneous alliance blockchain platforms, to exploit the value of blockchain and supply chain combinations. Most of the current cross-link schemes are aimed at asset transfer among payment systems or cross-link sharing of data of the Internet of things, cannot be completely suitable for credit data sharing of suppliers, are less in schemes for solving the problem of cross-link sharing of the credit data of the suppliers, and are not safe enough in identity verification among cross-link points and safety protection means in the process of cross-link data transmission.
Credit information sharing is a precondition for realizing credit sharing. The block chain enabled supply chain provider information management can convert the uncontrollable risk of a single enterprise into the overall controllable risk of a supply chain enterprise, and the risk is controlled to be the lowest by acquiring various credit information in a three-dimensional way. Currently, supply chain enterprises start to build a blockchain platform, so that after a future blockchain becomes an infrastructure of each enterprise, each company stores data by using the blockchain, and meanwhile, business characteristics and self requirements of different institutions determine that blockchains of each industry and each institution exist in a heterogeneous manner. This creates challenges for vendor credit management and credit information sharing in the supply chain domain, mainly in:
(1) The standards of the data of each chain are inconsistent, and unified data access and management are difficult to realize
Vendor credit data may reside in different supply chain systems, which typically create personalized data standards and consensus mechanisms based on their own needs. Heterogeneous blockchains result in the need for the supplier management to query for sufficient credit information about the suppliers, requiring knowledge of the technical architecture and protocol specifications of each supply chain platform blockchain, making data access and query management more difficult.
(2) The chains are mutually isolated, and information islands still exist
Each blockchain of different supply chains independently runs in a closed loop, no information is interacted between the different chains, credit data which is comprehensively and completely specific to a specific supplier is difficult to form, repeated entry cost is required for a supplier management department to enter the different chains, and particularly all chains are traversed, so that the integrity of the credit data is easily lacked.
(3) Each chain is self-organizing, lacking interoperability
Each chain is an independent and vertical closed system, the common recognition mechanism and the verification method of the generated block adopted by each chain are different, and when data credit and data sharing are carried out across the chains, the interoperability between the chains is lacking.
Therefore, there is a need to provide a new method and apparatus for cross-chain sharing of credit data based on blockchain to overcome the above-mentioned drawbacks.
Disclosure of Invention
The application aims to provide a novel credit data cross-chain sharing method and device based on block chains, which ensure the safety of cross-chain interaction and global consistency in a multi-chain scene and enhance the safety of data cross-chain sharing.
The application provides a credit data cross-chain sharing method based on a block chain, which comprises the following steps:
establishing a multi-chain coordination network among a plurality of heterogeneous blockchain networks to enable data access connection among different blockchain systems to be established;
and combining a Diffie-Hellman key exchange algorithm to realize identity authentication by utilizing a multi-chain coordination network so as to finish credit data transmission.
The application also provides a credit data cross-chain sharing device based on the block chain, which comprises a network communication module, a protocol management module and a cryptographic algorithm module;
the network communication module is used for carrying out communication connection with other different blockchain networks, dividing nodes of the blockchain networks and selecting coordination nodes to construct a coordination network;
the protocol management module is used for initializing protocol nodes in the coordination network and synchronizing necessary information of the block chain network;
and the cipher algorithm module is used for carrying out key calculation according to the requirements of the protocol nodes, and transmitting the key safely between the two data exchange parties so as to realize the safe sharing of the cross-chain data.
The application also provides a computer readable storage medium storing a computer program which when executed by a processor implements the steps of the block chain-based credit data cross-chain sharing method.
The application also provides a computer terminal, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps of the block chain-based credit data cross-chain sharing method when executing the computer program.
Compared with the related art, the application provides a cross-chain identity authentication method on the basis of a multi-chain architecture, can enhance the safety of data in a cross-chain transmission process, improves a cross-chain communication protocol on the basis of realizing interconnection and intercommunication among multi-heterogeneous blockchains on the basis of a coordination network, designs an intermediate person distributed by taking a coordination node as a key related parameter, provides identity authentication credentials for both cross-chain interaction sides, realizes trusted identity authentication among alliance chains, and ensures the safety of cross-chain interaction and global consistency in a multi-chain scene; the key exchange algorithm based on Diffie-Hellman is combined, so that the two parties of the cross-link interaction can generate the same key locally, the privacy of the key is protected, the symmetric key is used for realizing the encrypted transmission of the cross-link data, and the security of the data cross-link sharing is enhanced.
Drawings
For a clearer description of the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments are briefly introduced below, and the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art, where:
FIG. 1 is a network architecture diagram of a blockchain-based credit data cross-chain sharing method of the present application;
FIG. 2 is a timing diagram of a blockchain-based credit data cross-chain sharing method of the present application;
FIG. 3 is a cross-chain flow chart of a blockchain-based credit data cross-chain sharing method of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be clear and complete, and it is obvious that the described embodiments are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the present application provides a method for sharing credit data across chains based on blockchains, comprising:
s1, a multi-chain coordination network is established among a plurality of heterogeneous blockchain networks, so that data access connection can be established among different blockchain systems. Dividing nodes in the block chain network, wherein the nodes are minimum operation units forming the whole multi-chain architecture, and dividing the nodes in the block chain network into common nodes, interactive nodes, relay nodes and coordination nodes according to functions required by multi-chain operation; selecting coordination nodes of each block chain network, and forming a coordination network together with other selected coordination nodes; the coordination network initializes necessary information in the synchronous blockchain network, maintains a routing list of all blockchain networks, and realizes a path of credit data query.
Specifically, as shown in fig. 2, in order to clear the obstacle that obstructs the sharing of credit data of suppliers among different blockchains, the multi-link coordination network is established among a plurality of heterogeneous blockchain networks, so that different blockchain systems can establish data access connection with other blockchain systems, and after the two systems are connected, the credit data of the suppliers can be shared. The coordination network comprises a group of coordination nodes which are trusted by all independent blockchain subsystems and are composed of nodes operated by the blockchain subsystems. The coordination nodes are mutually connected to form a P2P network, and the routing information and the identity authentication information of a plurality of block chain subsystems in the multi-chain system are maintained. Whenever a new blockchain joins the multi-chain network, the blockchain needs to select a coordinator node, connect to the coordinator network, and through a series of initializations, the blockchain can communicate with other blockchains in the blockchain network.
In a multi-chain architecture built based on a coordinated network, each logically independently running unit can be regarded as a node, which is the smallest running unit that makes up the entire multi-chain architecture. According to the scheme, the nodes are divided into 4 different types according to functions required by multi-chain operation, and the different types are a common node, an interactive node, a relay node and a coordination node respectively.
The common nodes are mainly lightweight nodes, full nodes and miner nodes inside each blockchain. The lightweight node only stores partial block information or partial information (such as block header information, block hash and the like) of the block, and is mainly used for connecting to a block chain network, submitting or inquiring information, and the node generally deployed on the hardware resource limited equipment adopts a lightweight node form; the full node stores all blocks and transaction lists, all data of the block chain need to be synchronized, and the node with stronger storage capacity is generally used as the full node; the miner nodes are generally responsible for more calculation tasks, have stronger calculation capability, acquire answers through violent calculation of the cryptology difficult problem, thereby generating new blocks and transmitting the new blocks out, and are synchronous and consensus with other nodes in the block chain. The number of common nodes should be the highest number of nodes in the multi-link architecture. All the common nodes can form a complete independent block chain network. The nodes connected by the common nodes are other common nodes and interaction nodes in the blockchain.
The blockchain network which is composed of common nodes does not have the capability of interacting with other blockchains, and the blockchains without the capability of interacting form an 'information island' isolated from the outside. The scheme introduces the interaction node to provide the inter-and-intra interaction capability of the blockchain. Currently, most blockchains can achieve the purpose of communication through various IPC (inter-process communication) modes. The interactive node is a special common node, and is different from the common node in that the interactive node provides the capability of interacting with the outside of the blockchain, and the interactive node is connected with the common node and the relay node in the blockchain.
The relay node is a core part in the whole multi-chain architecture, is responsible for sub-block chain information adaptation in the block chain network, maintains an interaction node list of the sub-block chain, ensures high availability of the sub-block chain through quick switching after the interaction node crashes, and plays a role in load balancing. Because the common protocols, service interfaces and transaction types in the heterogeneous blockchains are different, the relay node is required to convert a specific interaction format into a universal cross-chain service interaction format so as to perform cross-chain interaction with other heterogeneous blockchains. The relay node is connected with the interactive node, the coordination node and the relay nodes of other block chain subsystems in the block chain subsystem. The relay node needs to have a strong data processing capability, and thus needs to be acted as a node with a strong computing resource capability in the common node.
The coordination node is an authoritative node selected by each sub-blockchain system based on credibility and computing power, and is operated by the sub-blockchain system and trusted by the current sub-blockchain. And forming a coordination network together with other coordination points, synchronizing some necessary information including sub-block chain state, relay node state and routing information, and simultaneously maintaining a routing list together by all nodes in the coordination network, wherein the coordination node needs to carry out identity authentication on the relay node when initializing or adding a new relay node.
S2, combining a Diffie-Hellman key exchange algorithm, and utilizing a multi-chain coordination network to realize identity verification, so that credit data transmission is completed. Sending a data exchange request to a coordination node, and inquiring routing information by the coordination node; after the route information is acquired, the coordination node generates key parameters, and signs a digital signature of the coordination node as an authentication credential; carrying out identity verification through the key parameter and the authentication credentials; after verification is passed, calculating a public parameter by using a Diffie-Hellman key exchange algorithm, and locally generating a symmetric key by using the public parameter; and encrypting and decrypting the request result data by using the symmetric key to finish data transmission of the request response.
Specifically, as shown in fig. 3, the present application takes the cross-chain exchange sharing of provider credit data between the blockchain system of the supply chain a and the blockchain system of the supply chain B as an example, and describes the process of performing one-time cross-chain data exchange sharing as follows:
step one: the block chain A subsystem inquires a target block chain relay route containing a supplier C from a coordination network through a relay node of the A, the coordination node firstly carries out identity authentication on the relay node A, namely inquires whether the relay node A exists in a relay route list of the coordination network, if so, the identity authentication passes, and the coordination node inquires relay route information of a alliance chain where the supplier exists according to an access request; if the access request information does not exist, the identity authentication is carried out on the A, the relay node A is added into a relay route list after the identity authentication is passed, the relay list of the coordination network is updated, and then the provider route information is queried according to the access request information.
Step two: and inquiring the routing information after the identity authentication is passed. If the first inquiry returns the complete destination block chain relay route information, if the first inquiry is carried out and the route information is not modified, the unmodified identification is returned, otherwise, the modified route information is returned.
Step three: after the relay node routing information of the target block chain subsystem B is obtained by the block chain subsystem A, a key parameter is requested to be generated from the coordination node, after the coordination node receives the request, a large prime number p and a primitive element g of the prime number required for generating the key are provided for the cross-chain data access session process, a digital signature of the coordination node is signed as a certificate passing through the authentication of the coordination network, the p and the g are sent to the relay node A, and the data are stored locally.
Step four: after obtaining the relay node routing information of the target blockchain subsystem B, the blockchain subsystem A receives the key parameter, and then the relay node A sends a format-converted cross-chain query request to the relay node B, and simultaneously sends the key related parameter and the authentication credential returned by the coordination node to the relay node B, wherein the two blockchain subsystems are directly connected through the relay node.
Step five: the block chain subsystem B performs cross-chain identity authentication on the relay node A at the relay node B, namely the relay node B forwards a cross-chain access request sent by the relay node A to a coordination network for verification, after the coordination network passes the verification, key related data p and g sent to the A are sent to the B again, the relay node B compares whether two key related data of the relay node A and the coordination node are consistent or not, if so, the access is controlled according to a data access strategy through the identity authentication of the A.
Step six: if the access is valid, format conversion is performed on the query message, the query intelligent contract is called after the format conversion is performed on the query message into the specific format of the blockchain B, and the target data is queried in the blockchain B. While the relay node B will utilize the Diffie-Hellman key exchange algorithm x=g a mod p computes a public parameter X. And finally, sending the destination data and the public parameters to the relay node A.
Step seven: after receiving the parameter X, the relay node a will also use the Diffie-Hellman key exchange algorithm y=g b The mod p calculates a public parameter Y and sends the public parameter Y to the relay node B, a symmetric key k only visible by A, B is locally generated by A, B through exchanging the public parameters, and the key is used for encryption and decryption in the following cross-chain data interaction process to protect the safe transmission and privacy of the provider data.
Step eight: and the blockchain B packages the polling result, performs format conversion and digital signature addition through the relay node B, encrypts data by using the key k, and responds to the request of the blockchain subsystem A.
Step nine: the block chain subsystem A decrypts and verifies the response result by using the key k through the relay node A, then carries out format conversion on the response, and then returns a final query result of the block chain A.
The credit data of the same provider can be shared in alliance chains of different supply chain systems through the steps, and meanwhile, the security privacy in the data cross-chain transmission process is protected through generating a symmetric key through a Diffie-Hellman key exchange algorithm.
The Diffie-Hellman key exchange algorithm comprises:
negotiating two globally disclosed parameters, a prime number p and an integer g, g being a primitive root of p;
the requesting party takes a private integer a and sends the private integer a to the target party to calculate the result: a=g a The value of mod p, A can be seen by other nodes;
the target party takes a private integer b and sends the private integer b to the requesting party to calculate the result: b=g b The value of mod p, B can be seen by other nodes;
the requestor calculates a symmetric encryption key k=b a mod p=(g b ) a mod p= g ab mod p; the target party can also calculate a symmetric encryption key k=a b mod p= (g a ) b mod p=g ab mod p;
Through the above procedure, the requesting party and the target party have a common key k, and p, g, a, B are public parameters, and the specific values of a and B are not disclosed in view of the difficulty in calculating discrete logarithms, so that the key k is private.
The application also provides a credit data cross-chain sharing device based on the block chain, which comprises a network communication module, a protocol management module and a cryptographic algorithm module;
the network communication module is used for carrying out communication connection with other different blockchain networks, dividing nodes of the blockchain networks and selecting coordination nodes to construct a coordination network;
the protocol management module is used for initializing protocol nodes in the coordination network and synchronizing necessary information of the block chain network;
and the cipher algorithm module is used for carrying out key calculation according to the requirements of the protocol nodes, and transmitting the key safely between the two data exchange parties so as to realize the safe sharing of the cross-chain data.
The scheme utilizes a multi-chain coordination network architecture to carry out interconnection and interworking between supply chain systems based on block chains, and maintains a list of all suppliers through a coordination node so as to provide relay route information of a supply alliance chain where a target supplier is located, thereby being more suitable for scene characteristics and credit data access requirements of carrying out credit data sharing of the suppliers among multiple supply chains.
The scheme combines the characteristics of a Diffie-Hellman key exchange algorithm, and transmits the key safely between two data exchange parties, so as to realize the secure sharing of the cross-chain data; meanwhile, the identity verification of the data provider to the data demander is realized by utilizing the characteristic that the intermediate parameters of the algorithm are publicly visible and the secret key cannot be revealed and utilizing the coordination node to distribute the public parameters.
The application also provides a computer readable storage medium storing a computer program which when executed by a processor implements the steps of the block chain-based credit data cross-chain sharing method.
The application also provides a computer terminal, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps of the block chain-based credit data cross-chain sharing method when executing the computer program.
The processor, when executing the computer program, performs the functions of the modules/units in the above-described device embodiments. The computer program may be divided into one or more modules/units, which are stored in the memory and executed by the processor to accomplish the present application, for example. The one or more modules/units may be a series of computer program instruction segments capable of performing the specified functions, which instruction segments are used for describing the execution of the computer program in the terminal device.
The computer terminal can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing devices. May include, but is not limited to, a processor, memory. More or fewer components may be included or certain components may be combined, or different components may be included, for example, in input and output devices, network access devices, buses, etc.
The processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a micro processor or the processor may be any conventional processor or the like.
The memory may be an internal storage unit, such as a hard disk or a memory. The memory may also be an external storage device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card, etc. Further, the memory may also include both internal storage units and external storage devices. The memory is used for storing the computer program and other programs and data. The memory may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that the above-described functional units and modules are merely illustrated for convenience and brevity of description, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e., the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, and will not be described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technology. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be realized in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium may include content that is subject to appropriate increases and decreases as required by jurisdictions and by patent practice, such as in certain jurisdictions, where electrical carrier signals and telecommunications signals are not included in the computer readable medium.
The foregoing description is only illustrative of the present application and is not to be construed as limiting the scope of the application, and all equivalent structures or equivalent processes utilizing the teachings of the present application and the appended drawings, or direct or indirect application in other related arts, are included in the scope of the present application.

Claims (7)

1. A blockchain-based credit data cross-chain sharing method, comprising:
establishing a multi-chain coordination network among a plurality of heterogeneous blockchain networks to enable data access connection among different blockchain systems to be established;
the identity verification is realized by combining a Diffie-Hellman key exchange algorithm and utilizing a multi-chain coordination network, so that credit data transmission is completed; comprising the following steps:
sending a data exchange request to a coordination node, and inquiring route information by the coordination node;
after the route information is acquired, the coordination node generates key parameters, and signs a digital signature of the coordination node as an authentication credential;
carrying out identity verification through the key parameter and the authentication credentials;
after verification is passed, calculating a public parameter by using a Diffie-Hellman key exchange algorithm, and locally generating a symmetric key by using the public parameter;
encrypting and decrypting the request result data by using the symmetric key to finish data transmission of the request response;
the method comprises the following steps: after obtaining the relay node route information of the target block chain subsystem B, the block chain subsystem A requests the coordination node to generate key parameters, after receiving the request, the coordination node provides a large prime number p and a primitive element g of the prime number required by key generation for the current cross-chain data access session process, signs a digital signature of the coordination node as a certificate passing through the authentication of the coordination network, and sends the p and g to the relay node of the block chain subsystem A and stores the p and g to the local;
after obtaining the relay node routing information of the target block chain subsystem B, after the block chain subsystem A receives the key parameter, the relay node of the block chain subsystem A sends a format-converted cross-chain query request to the relay node of the block chain subsystem B, and simultaneously sends the key related parameter and the authentication evidence returned by the coordination node to the relay node of the block chain subsystem B, and at the moment, the two block chain subsystems are directly connected through the relay node;
the relay node of the block chain subsystem B carries out cross-chain identity authentication on the relay node of the block chain subsystem A, namely the relay node of the block chain subsystem B forwards a cross-chain access request sent by the relay node of the block chain subsystem A to a coordination network for verification, after the coordination network passes the verification, key related data p and g sent to A are sent to B again, the relay node of the block chain subsystem B compares whether two key related data of the relay node of the block chain subsystem A and the two key related data of the coordination node are consistent or not, if so, the access is controlled according to a data access strategy through the identity authentication of the relay node of the block chain subsystem A;
if the access is effective, converting the format of the query message into a specific format of the block chain subsystem B, and then calling a query intelligent contract to query target data in the block chain subsystem B; while block chain subsystem BThe relay node will utilize Diffie-Hellman key exchange algorithm x=g a The modp calculates a public parameter X; finally, the destination data and the public parameters are sent to a relay node of the block chain subsystem A;
after receiving the parameter X, the relay node of the blockchain subsystem a will also utilize the Diffie-Hellman key exchange algorithm y=g b The mod p calculates a public parameter Y and sends the public parameter Y to the relay node of the blockchain subsystem B, and a symmetric key k only A, B visible is locally generated by exchanging the public parameters of each other and A, B respectively;
the relay node of the block chain subsystem B encapsulates the polling result, performs format conversion and digital signature addition through the relay node of the block chain subsystem B, encrypts data by using a key k, and responds to the request of the block chain subsystem A;
the block chain subsystem A decrypts and verifies the response result by using the key k through the relay node of the block chain subsystem A, then carries out format conversion on the response, and returns the final query result of the block chain subsystem A to complete data transmission of the request response.
2. The blockchain-based credit data cross-chain sharing method of claim 1, wherein establishing a multi-chain coordination network between a plurality of heterogeneous blockchain networks to enable data access connections between different blockchain systems to be established with each other comprises:
dividing nodes in the block chain network, wherein the nodes are minimum operation units forming the whole multi-chain architecture, and dividing the nodes in the block chain network into common nodes, interaction nodes, relay nodes and coordination nodes according to functions required by multi-chain operation;
selecting coordination nodes of each block chain network, and forming a coordination network together with other selected coordination nodes;
the coordination network initializes necessary information in the synchronous blockchain network, maintains a routing list of all blockchain networks, and realizes a path of credit data query.
3. The blockchain-based credit data cross-chain sharing method of claim 1, wherein the Diffie-Hellman key exchange algorithm comprises:
negotiating two globally disclosed parameters, a prime number p and an integer g, g being a primitive root of p;
the requesting party takes a private integer a and sends the private integer a to the target party to calculate the result: a=g a The value of modp, a can be seen by other nodes;
the target party takes a private integer b and sends the private integer b to the requesting party to calculate the result: b=g b The value of modp, B can be seen by other nodes;
the requestor calculates a symmetric encryption key k=b a modp=(g b ) a modp=g ab modp; the target party can also calculate a symmetric encryption key k=a b modp=(g a ) b modp=g ab modp;
Through the above procedure, the requesting party and the target party have a common key k, and p, g, a, B are public parameters, and the specific values of a and B are not disclosed in view of the difficulty in calculating discrete logarithms, so that the key k is private.
4. An apparatus for applying the blockchain-based credit data cross-chain sharing method of any of claims 1-3, wherein the apparatus comprises a network communication module, a protocol management module, and a cryptographic algorithm module;
the network communication module is used for carrying out communication connection with other different blockchain networks, dividing nodes of the blockchain networks and selecting coordination nodes to construct a coordination network;
the protocol management module is used for initializing protocol nodes in the coordination network and synchronizing necessary information of the blockchain network;
and the cipher algorithm module is used for carrying out key calculation according to the requirements of the protocol nodes, and transmitting the key safely between the two data exchange parties so as to realize the safe sharing of the cross-chain data.
5. The blockchain-based credit data cross-chain sharing device of claim 4, wherein the necessary information of the blockchain network includes sub-blockchain state, relay node state, and routing information.
6. A computer readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the steps of the blockchain-based credit data cross-chain sharing method of any of the preceding claims 1-3.
7. A computer terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the blockchain-based credit data cross-chain sharing method of any of claims 1-3 when the computer program is executed.
CN202111004426.0A 2021-08-30 2021-08-30 Credit data cross-chain sharing method and device based on block chain Active CN113783854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111004426.0A CN113783854B (en) 2021-08-30 2021-08-30 Credit data cross-chain sharing method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111004426.0A CN113783854B (en) 2021-08-30 2021-08-30 Credit data cross-chain sharing method and device based on block chain

Publications (2)

Publication Number Publication Date
CN113783854A CN113783854A (en) 2021-12-10
CN113783854B true CN113783854B (en) 2023-10-17

Family

ID=78839962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111004426.0A Active CN113783854B (en) 2021-08-30 2021-08-30 Credit data cross-chain sharing method and device based on block chain

Country Status (1)

Country Link
CN (1) CN113783854B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065679B (en) * 2022-06-02 2024-06-07 湖南天河国云科技有限公司 Electronic health record sharing model, method, system and medium based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650189A (en) * 2019-09-20 2020-01-03 深圳供电局有限公司 Relay-based block chain interaction system and method
CN111447187A (en) * 2020-03-19 2020-07-24 重庆邮电大学 Cross-domain authentication method for heterogeneous Internet of things
CN112003889A (en) * 2020-07-10 2020-11-27 南京邮电大学 Distributed cross-chain system and cross-chain information interaction and system access control mechanism
CN112906056A (en) * 2021-03-17 2021-06-04 广东工业大学 Cloud storage key security management method based on block chain
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650189A (en) * 2019-09-20 2020-01-03 深圳供电局有限公司 Relay-based block chain interaction system and method
CN111447187A (en) * 2020-03-19 2020-07-24 重庆邮电大学 Cross-domain authentication method for heterogeneous Internet of things
CN112003889A (en) * 2020-07-10 2020-11-27 南京邮电大学 Distributed cross-chain system and cross-chain information interaction and system access control mechanism
CN112906056A (en) * 2021-03-17 2021-06-04 广东工业大学 Cloud storage key security management method based on block chain
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract

Also Published As

Publication number Publication date
CN113783854A (en) 2021-12-10

Similar Documents

Publication Publication Date Title
CN110266655B (en) Cross-chain interconnection method, device and system based on block chain
CN114615095B (en) Block chain cross-chain data processing method, relay chain, application chain and cross-chain network
EP3859647B1 (en) Blockchain transaction generation method and device
CN112491846A (en) Cross-chain block chain communication method and device
CN114499898B (en) Block chain cross-chain secure access method and device
JP2000066588A (en) Cipher method
CN112116472B (en) Blockchain cross-chain transaction model and method
CN114051031B (en) Encryption communication method, system, equipment and storage medium based on distributed identity
Shao et al. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT
CN114547583A (en) Identity authentication system, method, device, equipment and computer readable storage medium
CN112508576A (en) Key management method, system and storage medium based on block chain
CN114710275A (en) Block chain-based cross-domain authentication and key agreement method in Internet of things environment
CN110716724B (en) Method and device for realizing privacy block chain based on FPGA
CN115174061A (en) Message transmission method and device based on block chain relay communication network system
CN113783854B (en) Credit data cross-chain sharing method and device based on block chain
CN114301677B (en) Key negotiation method, device, electronic equipment and storage medium
CN114142995B (en) Key security distribution method and device for block chain relay communication network
Zhang et al. Privacy-preserving cross-chain payment scheme for blockchain-enabled energy trading
CN111914272A (en) Encryption retrieval method and system for origin data in mobile edge computing environment
CN112187451A (en) Quantum computation resistant communication method, device, equipment and storage medium
CN116112185A (en) Private data sharing method based on blockchain and zero knowledge proof
CN112468983B (en) Low-power-consumption access authentication method for intelligent equipment of power internet of things and auxiliary device thereof
JP6635315B2 (en) ID-based authentication key exchange system, terminal, ID-based authentication key exchange method, program
CN112787819B (en) Industrial control safety communication system and communication method
Luo et al. Split-Chain based Efficient Blockchain-Assisted Cross-Domain Authentication for IoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant