CN114172661B - Bidirectional cross-link method, system and device for digital asset - Google Patents

Bidirectional cross-link method, system and device for digital asset Download PDF

Info

Publication number
CN114172661B
CN114172661B CN202111467461.6A CN202111467461A CN114172661B CN 114172661 B CN114172661 B CN 114172661B CN 202111467461 A CN202111467461 A CN 202111467461A CN 114172661 B CN114172661 B CN 114172661B
Authority
CN
China
Prior art keywords
node
cross
chain
verification
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111467461.6A
Other languages
Chinese (zh)
Other versions
CN114172661A (en
Inventor
郭光华
戴伟
刘斌啸
罗建满
卢瑞瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Lianwang Technology Co ltd
Original Assignee
Hangzhou Lianwang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Lianwang Technology Co ltd filed Critical Hangzhou Lianwang Technology Co ltd
Priority to CN202111467461.6A priority Critical patent/CN114172661B/en
Publication of CN114172661A publication Critical patent/CN114172661A/en
Application granted granted Critical
Publication of CN114172661B publication Critical patent/CN114172661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a bidirectional cross-chain method of digital assets, which comprises the steps of enabling a first blockchain digital asset to circulate to a second blockchain cross-chain and enabling the digital asset to be redeemed reversely, and specifically comprises the following steps: verifying the first blockchain cross-chain information in the second blockchain through the light node, locking the first blockchain digital asset as a cross-chain asset in the managed address by the managed node after the verification is passed, and generating a mapping asset corresponding to the cross-chain asset in the second blockchain for circulation; responding to the redemption request of the digital asset, the hosting node performs threshold signature based on the aggregate multi-signature on the redemption transaction, and the verification node further verifies the threshold signature; after verification is successful, the hosting node is permitted to release the digital asset to the first blockchain original account address. Based on the invention, the small mortgage gambling is combined with verification node consensus layer hosting fusion and novel aggregate multi-signature threshold algorithm bidirectional decentralization cross-chain.

Description

Bidirectional cross-link method, system and device for digital asset
Technical Field
The invention belongs to the technical field of blockchain, and particularly relates to a bidirectional cross-chain method, a bidirectional cross-chain system and a bidirectional cross-chain device for digital assets.
Background
The blockchain technology has evolved in bursts since the next half of 2015.
Because of the independence of parallel blockchains, the problems of blockchains in the aspects of information intercommunication, value transfer and the like are to be solved. The cross-chain, as the name implies, is a technology that allows the value to directly circulate across the obstacles between chains. The cross-chain technology is a new research hotspot in the field of blockchain, and establishes a unified communication channel applicable to a plurality of different systems through a certain consensus scheme and a connecting mechanism so as to realize the interoperation between different parallel chains. The cross-chain technology is now in an emerging stage and has attracted widespread attention from government and research institutions.
Such as: (1) The digital asset cross-chain of ChainX adopts multiple signature hosting to combine with light node verification cross-chain; the defects are that the multi-signature hosting of the digital asset has limitation (such as 15 re-signatures at most, huge transaction fee, only reputation burden of a host person and no economic burden), and the light node is one-way verification, so that two-way cross-chain cannot be realized in the main stream block chain cross-chain.
(2) The inter digital asset cross-link is realized in the form of overage mortgage of game assets; the drawbacks are the same drawbacks as other defi logic, risk clearing due to digital asset circulation fluctuations, and limited digital asset cross-chain resources due to excess mortgages.
(3) The digital asset cross-chain of ethernet Wbtc employs several federation authorities as vouching federation-like cross-chains. The disadvantage is that too much over-centering is a risk of centering.
(4) The digital asset cross-chain of the RenBTC adopts a distributed key to combine with all verification nodes of a network to jointly guarantee cross-chain hosting of the digital asset; the method has the defects that a trusted execution environment for recovering the key security is needed to be found in the distributed key calculation of the single private key, and the private key is easy to leak in a responsible communication implementation environment.
In the future age of ten-thousand-link interconnection, cross-link interoperability is an important ring. Each currency has its unique value and definition, such as CBDC for digital currency, diem for dollar-like, BTC for value storage, ETH for electronic fuel-like, etc., and the value of the entire blockchain ecology is truly represented only when inter-chain islanding is broken, the blockchain net is formed. There is a need for a safe, versatile and bi-directionally implementable cross-chain approach.
Disclosure of Invention
In view of the above, the invention provides a bidirectional straddling method of digital assets, which is used for circulating and redeeming the digital assets on different chains, adopts a light node straddling to ensure the safety and decentralization of unidirectional straddling, adopts a small mortgage gambling and verification node consensus layer hosting fusion and novel aggregation multi-signature threshold algorithm fusion to perform decentralization straddling as the POS network, and further realizes bidirectional straddling of the digital assets.
A bi-directional cross-chain method of digital assets, comprising a first blockchain digital asset flowing across a chain to a second blockchain and reverse redemption of the digital asset, comprising:
verifying the first blockchain cross-chain information in the second blockchain through the light node, locking the first blockchain digital asset as a cross-chain asset in the managed address by the managed node after the verification is passed, and generating a mapping asset corresponding to the cross-chain asset in the second blockchain for circulation;
responding to the redemption request of the digital asset, the hosting node performs threshold signature based on the aggregate multi-signature on the redemption transaction, and the verification node further verifies the threshold signature;
after verification is successful, the hosting node is permitted to release the digital asset to the first blockchain original account address.
The first blockchain and the second blockchain are blockchain networks of two different architectures and business logic that have different digital assets identified by the on-chain circulation.
The bi-directional cross-chain includes two processes:
(1) The first blockchain digital asset is circulated across the chain to the second blockchain:
the process validates the cross-chain information from the first blockchain by a first blockchain light node on the second blockchain and locks the cross-chain asset in a fixed hosted address that is a separate on-chain address associated with the first blockchain while generating a mapped asset on the second blockchain corresponding to the cross-chain asset that belongs to the negotiable digital asset of the second blockchain equivalent to equivalently cross-linking the digital asset of the first blockchain into the second blockchain.
(2) Reverse redemption of the second blockchain locked digital asset:
because the light node cross-chain belongs to a single cross-chain process and cannot be reversely redeemed, the verification node and the managed nodes are combined, the centralization of the managed is caused by selecting a plurality of managed nodes from the trusted is improved, the excessive mortgage like an internet is not needed, the punishment generated by lazy or collusion of some nodes is only needed by one-point mortgage far smaller than the managed amount, the efficient managed is realized, the threshold signature logic is implemented by adopting the aggregation of multiple signatures through improving the traditional multiple signatures, the multiple signature flow is reduced, the signature path is expanded, and finally the digital asset reverse redemption with novel POS consensus characteristics is realized.
The conventional POS consensus mechanism is internally provided with unified digital assets, one third of nodes tolerant to faults by using a Bayesian fault tolerance algorithm, and the nodes acquire the authority of voting consensus by paying a certain amount of digital assets as a guarantee, so that in order to prevent malicious nodes, the nodes are usually required to perform excessive mortgages to acquire the authority of participating in consensus. The mechanism is a labor-intensive mode, and has the advantages of simple algorithm, easy realization, huge cost input when a system is destroyed, and certain safety guarantee.
Further, the validation node is disposed in a second blockchain for performing consensus validation of cross-chain transactions;
the hosting node is used for managing locking and releasing of the cross-chain asset, and is obtained through picking of a small mortgage game mechanism from the verification node.
The authentication node consensus layer is fused with the hosting node, the hosting node is obtained from the authentication node through small mortgage game selection, namely the hosting node is the authentication node, the security of the hosting node is improved, the autonomous signature on the chain is realized, and the multi-signature authentication outside the chain is changed. Under such thinking logic, the closer the managed node is to infinity, the more decentralised.
In particular, the micro-mortgage gaming mechanism is embodied as follows:
setting a shared resource pool in a second blockchain, and transferring the small share mapping assets held by the verification node into the shared resource pool as collateral deposit of an competitive escrow node by the verification node;
the verification node gives a reputation value to the verification node during initial registration, and the reputation value is accumulated according to the times that the verification node successfully participates in cross-chain consensus verification and successfully hosts the cross-chain asset;
and determining whether the verification node becomes a hosting node according to the collateral deposit and the reputation value according to a fixed share proportion.
The shared resource pool, which may be a storage node or smart contract or associatable server, is deployed in the second blockchain for storage of the collateral deposit by the validation node and may perform incentives or penalties for the validation node, including release and locking of the collateral deposit.
The small mortgage game mechanism increases the accumulation of the reputation values of the verification nodes, and because the collateral deposit of the verification nodes is relatively less, the independent disfigurement of the verification nodes does not affect the whole result according to POS consensus logic, the verification nodes are required to be disfigured in series, so that the result of multi-signature aggregate signatures can be changed, each verification node is endowed with the reputation value as verification or hosting guarantee, once one node is disfigured, the future benefits, the accumulated reputation value and the collateral deposit of the verification node are lost, and the reputation value is taken as a reference of the hosting node of the next competitive choice, so that the safety verification and hosting of the verification node and the hosting node are ensured.
Further, the first blockchain cross-chain information is verified through the light node in the second blockchain, and after the verification is passed, the first blockchain digital asset is locked in the hosting address as a cross-chain asset by the hosting node, and meanwhile, a mapping asset corresponding to the cross-chain asset is generated in the second blockchain for circulation, and the specific flow is as follows:
disposing a first block chain light node on a second block chain, setting a relay program, verifying the cross-chain information of the first block chain to the second block chain digital asset through the light node real-time recording of block head information, and synchronizing corresponding cross-chain transactions of the first block chain to the second block chain through the relay program;
the process verifies the cross-chain information through the light node, the authenticity of the cross-chain information of the first blockchain is guaranteed, a Sync synchronization tool can be designed in a relay program, and the cross-chain transaction related to the verified cross-chain information in the first blockchain is synchronized, wherein the cross-chain transaction comprises Merker proof, time stamp, output amount and attribute of the cross-chain asset and the like of initiating the cross-chain of the asset. So that the corresponding cross-chain asset is released according to the cross-chain transaction after the subsequent hosting node acquires the authority.
Deploying the managed node in a relay program, wherein the managed node generates a managed address by adopting public key aggregation and combining with a MAST tree structure;
based on the MAST structure, the Merkle branch is utilized to enable each managed node to record and display only the actual execution part of the script of the managed node, so that script paths of all nodes are not required to be recorded, and the space is saved to the greatest extent.
Secondly, the signing process of all the managed nodes in the aggregate signing process is solved, a managed address is constructed by combining with a MAST structure, and the process of verifying the aggregate signature and locking the cross-chain asset is carried out in the address.
After the verification and confirmation of the cross-chain information, the verification node verifies the managed address, and after the verification is passed, the management node is notified according to the acquired cross-chain transaction to lock the cross-chain asset in the managed address.
While mapping assets corresponding to the cross-chain assets are generated in the second blockchain using the mirror ratio for conversion circulation in the second blockchain.
The mirror ratio is obtained by mutually converting the original digital asset and the mapped asset according to a mirror cross-chain principle through a fixed conversion ratio, wherein the fixed ratio is obtained through prophetic statistics and can be set in initial deployment contracts of the mutual association of the first blockchain and the second blockchain.
Specifically, the hosting node generates a hosting address by combining public key aggregation with a MAST tree structure, and the method specifically comprises the following steps:
transmitting the public keys to other managed nodes in the managed nodes, and aggregating all public keys to generate a first aggregate public key;
randomly selecting n hosting nodes from the hosting nodes, and aggregating public keys of the n hosting nodes to generate an aggregate public key combination serving as a second aggregate public key;
and constructing a MAST tree structure by taking each second aggregation public key as a public key script, obtaining a Merkle Root of the MAST tree structure, carrying out combined hash on the Merkle Root and the first aggregation public key to obtain a third aggregation public key, and deriving the managed address from the third aggregation public key.
The managed addresses are generated by n managed nodes through combining aggregate signatures with MAST trees, and the managed addresses with threshold signatures are kept, so that centralized multi-signature addresses are avoided.
In particular, the verification node verifies the hosting address as follows:
obtaining public key scripts corresponding to any one of the partial managed nodes and hash values corresponding to other public key scripts from a MAST tree structure, calculating a merkle root, carrying out combined hash on the merkle root and a second combined public key, calculating a derived address, comparing whether the derived address is consistent with the managed address, and if so, indicating that the managed address is correct.
Firstly confirming an execution hosting address conforming to each public key script, acquiring script branches and associated hash values in a MAST tree structure, acquiring a merkle root, then further combining a second aggregation public key to calculate an aggregation public key, and further utilizing random number hash to generate a derived address by the aggregation public key, wherein the derived address is consistent with the provided hosting address. The process implements autonomous verification of the hosted address on the chain, which can be implemented by deploying a verification contract.
Further, in response to the redemption request of the digital asset, the escrow node performs an aggregate multi-sign-based threshold signature on the redemption transaction, and the verification node further verifies the threshold signature, specifically as follows:
responding to a redemption request of the digital asset, generating a plurality of temporary public and private key pairs by each hosting node of the n hosting nodes by using an elliptic curve algorithm, and transmitting the public keys and the temporary public keys of the plurality of temporary public and private key pairs to other hosting nodes of the n hosting nodes;
each hosting node of the n hosting nodes aggregates all the public keys held to generate an aggregated public key, all the temporary public keys linearly combine and sum the aggregated public keys to generate an aggregated temporary public key, the aggregated public key and the aggregated temporary public key are broadcast on a second blockchain, the redemption transaction is signed by using the private key and the temporary private key of the aggregated public key, and all the signatures are summed to generate a threshold signature;
and the verification node verifies the threshold signature by using the aggregation public key pair and the aggregation temporary public key, and if the threshold signature is consistent, the threshold signature is correct. The process uses the aggregated public key pair and the aggregated temporary public key pair to redeem the transaction signature and compares the transaction signature with the elliptic curve calculation result of the aggregated signature, and if the transaction signature is consistent with the elliptic curve calculation result of the aggregated signature, the aggregated signature is correct.
The escrow node generates an aggregate threshold signature, signs the redemption transaction, replaces the tedious process of signing the redemption transaction by all escrow nodes, and only generates one aggregate threshold signature through aggregation, so that the verification node is prevented from sequentially verifying multiple signatures one by one, the verification process is shortened, byte space is further reduced, and the reverse cross-chain running performance is improved.
Further, after the verification is successful, the hosting node is permitted to release the digital asset to the first blockchain original account address, which is specifically as follows:
and after the verification is passed, the verification node sends out a consensus vote of the cross-chain asset redemption transaction, and when more than two thirds of verification nodes pass the vote, a permission mechanism is started to permit the management node to release the cross-chain asset in the managed address and return the first blockchain client account address.
After verification node verification is successful, POS cross-chain consensus is carried out, and by utilizing a Bayesian fault-tolerant algorithm, more than 2/3 verification nodes can be considered to be executable by the redemption transaction through voting, and a permission mechanism is that a permission release instruction is sent to a hosting node after a verification node voting result is received.
The invention designs a bidirectional cross-link method and a bidirectional cross-link system for digital assets, which have the following advantages:
(1) The light node and the relay program are combined to realize the one-way cross-chain of the decentralization;
(2) Selecting a hosting node from verification nodes by adopting a small mortgage game mechanism in the reverse redemption process, promoting the verification nodes to participate in cross-chain hosting, fusing the cross-chain asset hosting at a consensus layer, and further realizing the decentralization of the hosting;
(3) And the aggregation threshold signature is used for replacing multiple signatures, so that the efficiency and the safety of the signatures are improved, the signature threshold is increased, and the cross-chain based on a POS consensus mechanism is expanded.
Drawings
FIG. 1 is a diagram of a bi-directional cross-chain architecture for a digital asset in accordance with the present invention;
FIG. 2 is a flow chart of a first blockchain digital asset flowing across a chain to a second blockchain;
FIG. 3 is a first blockchain digital asset reverse redemption flow chart.
Detailed Description
In order to more particularly describe the present invention, the following detailed description of the technical scheme of the present invention is provided with reference to the accompanying drawings and the specific embodiments.
Example 1:
the invention provides a bidirectional cross-chain method of digital assets, as shown in figure 1, which is a structure diagram of the bidirectional cross-chain of the digital assets, wherein a plurality of verification nodes are deployed in a second blockchain for participating in the common-knowledge verification of the cross-chain, and the verification nodes acquire the authority of the verification nodes by mortgage of the digital assets of the second blockchain held by the verification nodes;
to achieve secure and reverse cross-linking of the first blockchain digital asset to the second blockchain, multiple hosting nodes are bid from the validation node for hosting the cross-chain asset through a micro-mortgage gaming mechanism.
In addition, a shared resource pool (storage contract or storage node or server) is provided in the second blockchain for storing mortgage assets, including collateral for the validation node and escrow node elections.
The small mortgage game mechanism is as follows:
setting a shared resource pool in a second blockchain, and transferring the small share mapping assets held by the verification node into the shared resource pool as collateral deposit of an competitive escrow node by the verification node;
the verification node gives a reputation value to the verification node during initial registration, and the reputation value is accumulated according to the times that the verification node successfully participates in cross-chain consensus verification and successfully hosts the cross-chain asset;
and determining whether the verification node becomes a hosting node according to the collateral deposit and the reputation value and the fixed share proportion.
If 50 verification nodes participate in the competitive escrow node, each verification node is mortgage marked as S i (i=1, 2,.. 50.) since the multiple escrow with the escrow node participation has aggregated signatures to form a unified signature and check signature, a single escrow node cannot be reputed, and must collusion is necessary for collusion, the cost of collusion is large enough, node mortgages are guarantees of future benefits and reputation values, and once reputed, both the future benefits and node accumulated reputation values and collateral deposit are lost.
The bidirectional cross-chain of the digital asset in the invention specifically comprises two processes:
(1) The first blockchain digital asset is circulated across the chain to the second blockchain;
verifying the first blockchain cross-chain information in the second blockchain through the light node, locking the first blockchain digital asset as a cross-chain asset in the managed address by the managed node after the verification is passed, and generating a mapping asset corresponding to the cross-chain asset in the second blockchain for circulation;
(2) Reverse redemption of the first blockchain digital asset.
Responding to the redemption request of the digital asset, the hosting node performs threshold signature based on the aggregate multi-signature on the redemption transaction, and the verification node further verifies the threshold signature;
after verification is successful, the hosting node is permitted to release the digital asset to the first blockchain original account address.
The generation and verification of the managed address is as follows:
the hosting node generates a hosting address by combining public key aggregation with a MAST tree structure, and the hosting address supports cross-chain transactions with threshold signatures, specifically as follows:
1) 1) transmitting the respective signature public keys to other signature nodes by using an encryption communication protocol in the N signature nodes, and aggregating all the signature public keys to generate a first aggregation public key C;
C=hash(L,PK 1 )·PK 1 + hash(L,PK i )·PK i +…+hash(L,PK N )·PK N );
where L is a public key list: l= { PK 1, ...PK i, …PK N -represents an ordered set of all public keys involved in the signing process;
signature public key PK i =sk i G (G is a uniform elliptic curve base point); sk (sk) i A random private key that is a signature node; i is any one of the N signature nodes.
2) Selecting N signature nodes from the N signature nodes to generateN signature node combinations, and public key aggregation is carried out on signature public keys of the n signature nodes to generate generation +.>Seed aggregation public key combination;
3) Based onEach aggregation public key script in the seed aggregation public key combination creates a Merkle tree structure of a MAST structure and acquires a Merkle Root of the Merkle tree structure;
4) The first aggregation public keys of the N signature nodes and Merkle Root derivative threshold signature addresses:
adding Merkle Root, and calculating a final second public key aggregation P as follows:
p=c+h (c|merkle Root) G, where H (c|merkle Root) represents the aggregate hash of C and Merkle Root;
deriving a escrow address from the aggregated public key: d: hash (P, s), s being a random number.
The verification node verifies the managed address, and the specific steps are as follows:
acquiring Script branch Script corresponding to any hosting node i in n hosting nodes from the merck tree structure of the created MAST structure i And Hash values of other script branches, obtaining verifiable merkle root through calculation, and verifying the hosting address by the second aggregation public key p=c+h (c|merkle root) G: d: hash (P, s), s being a random number; comparing whether D and D are consistent, if so, indicating that the managed address is correct, and if not, indicating that the provided threshold signature address is incorrect, and refusing to execute the cross-chain transaction.
Example 2:
the specific flow of the first blockchain digital asset through-chain to the second blockchain and reverse redemption is described in this embodiment.
(1) As shown in fig. 2, the flow of the first blockchain digital asset across the chain to the second blockchain is as follows:
1) Based on a light node of the first block chain deployed on the second block chain, real-time recording asset cross-chain information sent by the first block chain through the light node;
2) A relay program (which can be a distributed server) is arranged between the first block chain and the second block chain, a Sync synchronization tool is loaded in the relay program, and a cross-chain transaction corresponding to the cross-chain information is synchronized through the Sync synchronization tool in response to verification of the light node on the cross-chain information;
3) The verification node acquires a cross-chain transaction, carries out consensus voting on the executed cross-chain transaction by combining a light node verification result, and allows the execution of the cross-chain transaction when more than 2/3 verification nodes participate in the consensus voting executed by the cross-chain transaction;
4) The validation node validates the hosting address according to the MAST structure, and the validation passes a post-boot permit mechanism to inform the hosting node to lock the corresponding first blockchain digital asset in the hosting address while generating an equivalent mapped asset in the second blockchain for cross-chain circulation of the second blockchain.
The grant mechanism is an execution instruction deployed in the second blockchain, is invoked by the validating node, and causes the hosting node to perform a related operation in response to sending the instruction to the hosting node.
The equivalent mapping assets are generated by mirroring the cross-chain mode, the first blockchain digital assets and the second blockchain mapping assets are mapped according to a fixed exchange ratio, the exchange ratio is written into an intelligent contract at the initial time of creation of the blockchain, and the intelligent contract can be permanently fixed according to actual conditions or can be dynamically adjusted according to the total amount and distribution conditions of the digital assets on the chain.
(2) As shown in fig. 3, the reverse redemption of the first blockchain digital asset:
1) Generating a threshold signature for aggregating multiple signatures based on the n managed nodes:
in response to a redemption request for the digital asset, each escrow node i of the n escrow nodes is based on the held private key sk i Calculate the corresponding public key PK i =sk i G (G is a uniform elliptic curve base point);
v random private keys are generated based on a random function, corresponding random public keys are generated by using an elliptic curve algorithm in sequence, and a random public-private key pair (r) is generated i,1, ,R i,1 )…(r i,j, ,R i,j )(1=<j<=v);
PK is processed i ,(R i,1 …R i,j ) To other ones of the n managed nodes;
calculating a public key list l=hash (PK) after all public keys are to be collected 1… PK n );
Further carrying out hash operation on the public key list and the signature public key to obtain an aggregation public key:
P n =hash(L,PK 1 )·PK 1 +…+hash(L,PK n )·PK n );
linearly combining and summing the temporary public keys to generate an aggregate temporary public key:
R j =b 1 R i,1 +b 2 *R i,2 +…b j R i,j ;(j∈[1,…,v])
(b 1 ,b 2 ,...b j )=(1,H(2,P n ,((R 1 ,R 2 ,...R v )))
aggregate random public key r= (R 1 +…+R j );
The hosting node utilizes the private key sk i Random private key r i,j, For redemption transaction T X Signature is performed, all signatures are summed to generate n escrow nodes, all random public keys are collected, and a fixed linear coefficient set (b) 1 ,b 2 ,...b j ) Calculating to obtain an aggregate signature of point participation:
S i =r i +hash(P n ,R,T X )·sk i
summing all signatures s= (S) 1 +…+S i );
And an aggregate random number to generate an aggregate threshold signature (R, S).
2) The verification node verifies the aggregation threshold signature:
the hosting node aggregates its generated public key P n Broadcasting the aggregate random public key R on the second blockchain;
authentication node utilizes an aggregated public key pair P n And aggregating the random public key R to redeem the transaction signature: r+ hash (P) n ,R,T X )·P n
And comparing with the elliptic curve calculation result S.G of the aggregation threshold signature to verify whether S.G=R+hash (P n ,R,T X )·P n And if the aggregate threshold signatures are consistent, the aggregate threshold signatures are correct.
If not, the verification fails.
3) Performing a cross-chain asset redemption transaction:
after verification passes, the verification node issues a consensus vote for the cross-chain asset redemption transaction, and when more than 2/3 of the verification nodes pass the vote, a permit mechanism is initiated, permitting the conduit node to release the cross-chain asset in the conduit address and return to the first blockchain client account address.
The previous description of the embodiments is provided to facilitate a person of ordinary skill in the art in order to make and use the present invention. It will be apparent to those having ordinary skill in the art that various modifications to the above-described embodiments may be readily made and the generic principles described herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above-described embodiments, and those skilled in the art, based on the present disclosure, should make improvements and modifications within the scope of the present invention.

Claims (9)

1. A bi-directional cross-link method of a digital asset, comprising the steps of:
the second block chain acquires cross-chain information sent by the first block chain and verifies the cross-chain information through a light node, wherein the cross-chain information comprises digital assets, and the light node is a node in the second block chain;
after verification is passed, locking the first blockchain digital asset in a managed address as a cross-chain asset managed node and generating a mapped asset corresponding to the cross-chain asset for circulation, wherein the managed node generates the managed address by combining public key aggregation with a MAST tree structure;
in response to the first blockchain sending a redemption request for the digital asset, the escrow node threshold signing information related to the redemption request;
and verifying the threshold signature based on a verification node, and releasing the digital asset to an original account address in a first blockchain after the verification is passed, wherein the verification based on the verification node comprises the following steps: responding to the redemption request of the digital asset, generating a plurality of temporary public and private key pairs by each hosting node of the n hosting nodes by using an elliptic curve algorithm, and transmitting the public keys and the temporary public keys of the plurality of temporary public and private key pairs to other hosting nodes of the n hosting nodes; each hosting node of the n hosting nodes aggregates all the public keys held to generate an aggregated public key, all the temporary public keys linearly combine and sum the aggregated public keys to generate an aggregated temporary public key, the aggregated public key and the aggregated temporary public key are broadcast on a second blockchain, the redemption transaction is signed by using the private key and the temporary private key of the aggregated public key, and all the signatures are summed to generate a threshold signature; and the verification node verifies the threshold signature by using the aggregation public key pair and the aggregation temporary public key, and if the threshold signature is consistent, the threshold signature is correct.
2. The method of bi-directional cross-linking of digital assets according to claim 1, wherein the validation node is disposed in the second blockchain;
the verification node is used for executing the consensus verification of the cross-chain transaction;
the hosting node is screened out by the verification node through a small mortgage game mechanism and is used for locking and releasing the cross-chain asset.
3. A bi-directional cross-link method of a digital asset according to claim 2, wherein the micro-mortgage gaming mechanism is embodied as follows:
the verification node transfers the small share mapping assets held by the verification node into a shared resource pool as collateral deposit of an election hosting node, wherein the shared resource pool is arranged in a second blockchain;
and determining whether the verification node becomes a hosting node according to the collateral deposit and the reputation value and a fixed share ratio, wherein the reputation value is formed by accumulating the times of successful participation of the verification node in cross-chain consensus verification and successful hosting of the cross-chain asset.
4. The bi-directional cross-chain method of digital assets as in claim 1 wherein the hosting node generates a hosting address using public key aggregation in combination with a MAST tree structure, comprising the steps of:
aggregating all public keys to generate a first aggregated public key based on the transmission of the respective public key to other managed nodes;
randomly selecting n managed nodes, and aggregating public keys of the n managed nodes to generate an aggregate public key combination serving as a second aggregate public key;
and constructing a MAST tree structure by taking each second aggregation public key as a public key script, obtaining a Merkle Root of the MAST tree structure, carrying out combined hash on the Merkle Root and the first aggregation public key to obtain a third aggregation public key, and deriving the managed address from the third aggregation public key.
5. The bi-directional cross-chain method of digital assets according to claim 1 or 4, wherein said locking a first blockchain digital asset in a hosted address as a cross-chain asset hosted node and generating a mapped asset corresponding to the cross-chain asset for circulation comprises the steps of:
verifying the managed address, wherein the verification process is as follows: obtaining public key scripts corresponding to any one of the managed nodes and hash values corresponding to other public key scripts from the MAST tree structure, calculating a merkle root, carrying out combined hash on the merkle root and a second polymerized public key, calculating a derived address, and comparing whether the derived address is consistent with the managed address or not;
if the cross-link transaction information is consistent, verifying to pass, and notifying a hosting node to lock the cross-link asset in a hosting address according to the cross-link transaction;
a mapped asset corresponding to the cross-chain asset is generated in the second blockchain for conversion circulation in the second blockchain based on the mirror ratio.
6. The method of bi-directional cross-linking of digital assets according to claim 1, wherein said validating is followed by releasing the digital assets into the original account addresses in the first blockchain, comprising the steps of:
issuing a consensus vote for the cross-chain asset redemption transaction;
when more than two thirds of the verification nodes pass the voting, a permission mechanism is started;
the hosting node is permitted to release the cross-chain asset in the hosted address and return the first blockchain client account address.
7. The bidirectional cross-chain system of the digital asset is characterized by comprising an acquisition and verification module, a locking circulation module, a response signature module and a verification and release module;
the acquisition verification module is configured to: the second block chain acquires cross-chain information sent by the first block chain and verifies the cross-chain information through a light node, wherein the cross-chain information comprises digital assets, and the light node is a node in the second block chain;
a locked flow-through module configured to: after verification is passed, locking the first blockchain digital asset in a managed address as a cross-chain asset managed node and generating a mapped asset corresponding to the cross-chain asset for circulation, wherein the managed node generates the managed address by combining public key aggregation with a MAST tree structure;
the response signature module is configured to: in response to the first blockchain sending a redemption request for the digital asset, the escrow node threshold signing information related to the redemption request;
the authentication release module is configured to: verifying the threshold signature based on a verification node, releasing the digital asset to an original account address in a first blockchain after the digital asset passes the verification, and verifying the threshold signature based on the verification node specifically comprises the following steps: responding to the redemption request of the digital asset, generating a plurality of temporary public and private key pairs by each hosting node of the n hosting nodes by using an elliptic curve algorithm, and transmitting the public keys and the temporary public keys of the plurality of temporary public and private key pairs to other hosting nodes of the n hosting nodes; each hosting node of the n hosting nodes aggregates all the public keys held to generate an aggregated public key, all the temporary public keys linearly combine and sum the aggregated public keys to generate an aggregated temporary public key, the aggregated public key and the aggregated temporary public key are broadcast on a second blockchain, the redemption transaction is signed by using the private key and the temporary private key of the aggregated public key, and all the signatures are summed to generate a threshold signature; and the verification node verifies the threshold signature by using the aggregation public key pair and the aggregation temporary public key, and if the threshold signature is consistent, the threshold signature is correct.
8. A computer-readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the method steps of any one of claims 1 to 6.
9. A bi-directional cross-chain apparatus of digital assets, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method steps of any one of claims 1 to 6 when the computer program is executed.
CN202111467461.6A 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset Active CN114172661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111467461.6A CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111467461.6A CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Publications (2)

Publication Number Publication Date
CN114172661A CN114172661A (en) 2022-03-11
CN114172661B true CN114172661B (en) 2023-12-08

Family

ID=80482780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111467461.6A Active CN114172661B (en) 2021-12-03 2021-12-03 Bidirectional cross-link method, system and device for digital asset

Country Status (1)

Country Link
CN (1) CN114172661B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117592991B (en) * 2024-01-18 2024-04-26 暨南大学 Efficient blockchain cross-chain data exchange method based on threshold signature

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112784306A (en) * 2021-02-01 2021-05-11 杭州链网科技有限公司 Cross-chain escrow method and system based on key fragmentation and multi-signature
CN112887380A (en) * 2021-01-15 2021-06-01 杭州链网科技有限公司 Cross-chain intercommunication method and system
CN113032482A (en) * 2021-03-10 2021-06-25 杭州链网科技有限公司 Construction method and system of cross-chain transfer bridge
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112887380A (en) * 2021-01-15 2021-06-01 杭州链网科技有限公司 Cross-chain intercommunication method and system
CN112784306A (en) * 2021-02-01 2021-05-11 杭州链网科技有限公司 Cross-chain escrow method and system based on key fragmentation and multi-signature
CN113032482A (en) * 2021-03-10 2021-06-25 杭州链网科技有限公司 Construction method and system of cross-chain transfer bridge
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链跨链技术分析;郭朝;郭帅印;张胜利;宋令阳;王晖;;物联网学报(02);全文 *

Also Published As

Publication number Publication date
CN114172661A (en) 2022-03-11

Similar Documents

Publication Publication Date Title
CN109685489B (en) Cross-chain transaction method for assets between block chains
KR102652551B1 (en) Smart contract execution using distributed coordination
US11128522B2 (en) Changing a master node in a blockchain system
CN110990408B (en) Business information collaboration method based on block chain, business system and alliance chain
Zheng et al. An overview of blockchain technology: Architecture, consensus, and future trends
CN111090892B (en) Block chain consensus method and device based on VRF and threshold signature
CN110046894B (en) Erasure code-based block chain establishing method capable of reconstructing groups
CN111598566A (en) Network payment system based on mixed cross-chain
JP2020522919A (en) Computer-implemented system and method for managing transactions in a blockchain network
CN110945548A (en) Computer-implemented system and method for managing large distributed storage pools in a blockchain network
CN108833081A (en) Block chain-based equipment networking authentication method
CN112329051A (en) Safe and efficient consensus mechanism implementation method and system
CN111047316A (en) Tamper-resistant intelligent block chain system and implementation method
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
CN110445795B (en) Block chain authentication uniqueness confirmation method
Sun et al. A decentralized cross-chain service protocol based on notary schemes and hash-locking
Lan et al. Horizon: A gas-efficient, trustless bridge for cross-chain transactions
CN116527684B (en) Multi-chain information interaction method based on 1+1+N relay consensus committee
CN115270145A (en) User electricity stealing behavior detection method and system based on alliance chain and federal learning
CN114172661B (en) Bidirectional cross-link method, system and device for digital asset
Xi et al. [Retracted] A Comprehensive Survey on Sharding in Blockchains
Xu et al. Trusted and flexible electronic certificate catalog sharing system based on consortium blockchain
CN115174570A (en) Cross-chain consensus method and system based on dynamic committee
CN112950180A (en) Community certificate method and system based on alliance chain, electronic device and storage medium
CN110276693B (en) Insurance claim settlement method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant