CN115632835B - Multi-element Ha Xisuo-based data transmission method under chain - Google Patents

Multi-element Ha Xisuo-based data transmission method under chain Download PDF

Info

Publication number
CN115632835B
CN115632835B CN202211225667.2A CN202211225667A CN115632835B CN 115632835 B CN115632835 B CN 115632835B CN 202211225667 A CN202211225667 A CN 202211225667A CN 115632835 B CN115632835 B CN 115632835B
Authority
CN
China
Prior art keywords
data
chain
under
xisuo
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211225667.2A
Other languages
Chinese (zh)
Other versions
CN115632835A (en
Inventor
冯立波
余倍
邱飞
蔺春艳
周维
姚绍文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan University YNU
Original Assignee
Yunnan University YNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan University YNU filed Critical Yunnan University YNU
Priority to CN202211225667.2A priority Critical patent/CN115632835B/en
Publication of CN115632835A publication Critical patent/CN115632835A/en
Application granted granted Critical
Publication of CN115632835B publication Critical patent/CN115632835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a multi-element Ha Xisuo-based method for transmitting downlink data on a chain, which comprises the following steps: the first stage: a pretreatment stage; and a second stage: a commit and lock phase; and a third stage: a release phase; the invention provides a method for constructing an under-chain transmission channel network as a transmission medium, which is composed of a group of transmission channels between a pair of users and is used for under-chain transmission between two sides without directly establishing the transmission channels, and provides an under-chain data uplink mechanism based on Ha Xisuo, time lock, position lock, organization lock and other multi-element hash locking, different types of locks are set and selected according to application scenes, and the integrity, atomicity and consistency of data are ensured through hash locking, so that the integrity verification of under-chain transaction data or under-chain assets is realized, and the data security and processing performance requirements under specific scenes are met.

Description

Multi-element Ha Xisuo-based data transmission method under chain
Technical Field
The invention relates to the field of data transmission, in particular to a multi-element Ha Xisuo-based method for transmitting data under a chain.
Background
In recent years, blockchain technology has evolved dramatically, and particularly after the advent of blockchain intelligence contracts, has rapidly become an important component of blockchain solutions. However, some intelligent contracts for implementing complex functions are supported by external data, and the execution environment of the blockchain is relatively independent from the outside, so that a safe and efficient downlink data uplink technology is particularly important.
At present, a popular technology of the secure transmission technology of the data under the upper chain of the blockchain is a predictor technology, and the predictor has the function of writing external information into the blockchain to finish the data intercommunication between the blockchain and the real world. Predictors also have many security issues, such as data quality issues, and how to guarantee data quality is a problem because on-chain nodes may access different off-chain data sources; the problem of expansibility is that a large amount of network management and coordination work are needed to reach consensus among all nodes in the network whenever a new data source is added to the network or an existing data aggregation mode is needed to be adjusted, which increases the time required for consensus and may cause the whole blockchain to be inoperable in severe cases. In addition to the predictor technology, the other is a hash locking technology, after the data is hashed and locked, the hash value is uplink, and the safety of the data in the transmission process is ensured through the irreversibility of a hash algorithm. However, this method only knows whether the data is tampered, does not guarantee the atomicity of data transmission, and generally operates on the whole data. However, in the practical application scenario, there are various customization requirements for data, for example, as long as data of a specific location or organization is uplink, and to achieve these customization requirements, specific consideration needs to be given to various elements behind the requirements, for example, elements of location, organization, and the like. Therefore, the main aim of the method is to construct a safe and customizable data-under-chain uplink mechanism so as to realize data-under-chain integrity verification, ensure the atomicity and consistency of data and meet the data safety and processing performance requirements in specific scenes.
Prior art one
Chinese invention patent, name: an on-chain and under-chain collaborative resource transaction method based on a state channel is provided in application number CN202110688709.5 and publication number CN113411338B, after the state channel is opened on the chain, the two resource transaction parties can conduct multiple resource transaction activities under the chain, and only when the channel is opened and closed or a dispute event occurs, the two resource transaction parties need to communicate with a blockchain system, so that the number of transactions required to be processed by the blockchain system and the number of times of communication between the two transaction parties and the blockchain system can be reduced, and the throughput pressure of the blockchain system and the time required by the resource transaction flow can be reduced. In addition, a dispute handling method is introduced in the method, and when the two parties of the resource transaction do not follow the specified flow of the system, the two parties of the resource transaction can force the other party to follow the resource transaction protocol by creating the dispute, so that the safety and fairness of the resource transaction are ensured.
Shortcomings of the prior art
The method can carry out multiple resource transaction activities under the chain by opening the state channel under the chain, only needs to communicate with the blockchain system when the channel is opened and closed or a dispute event occurs, but only two parties of the resource transaction can not complete the resource transaction demands of a plurality of parties, and the opening demands of the state channel consume certain resources, and each two resource transaction parties need to newly open one state channel, so that the resource consumption is larger and the utilization rate is lower.
Technical proposal of the second prior art
Chinese invention patent, name: an implementation method and a system for information security protection in a multi-person under-link state channel are provided in application number CN202210288131.9 and publication number CN114826603A, and after an executor establishes the multi-person under-link state channel and generates system public parameters, an initiator and a receiver join the multi-person under-link state channel and update the under-link state, and after verification by the executor, update the state of the multi-person under-link state channel to realize protection of users in the channel.
Disadvantages of the second prior art
The method adopts cryptography with zero knowledge proof to ensure the data security in the under-chain state channel, and a plurality of participants are required to carry out verification and confirmation. In general, the requirement of data transmission on performance is high, and the time cost and the calculation cost of zero knowledge proving are large, so that the data transmission is greatly influenced. And it takes time to wait for a plurality of participants to verify the acknowledgement, if one party delays giving the acknowledgement, the performance of the data transmission will be greatly reduced.
Technical problem to be solved by the invention
The invention provides a method for constructing an under-chain transmission channel network as a transmission medium, which consists of a group of transmission channels between a pair of users and is used for under-chain transmission between two sides without directly establishing the transmission channels. And put forward the chain under the chain data of locking based on many factor hash such as Ha Xisuo, time lock, position lock, organization lock, etc. and set up and select different kinds of locks according to the application scenario, through the locking of hash, guarantee integrality, atomicity and the uniformity of data, realize the integrality verification of trade data under the chain or under the chain asset, satisfy data security and handling performance requirement under the specific scene.
Disclosure of Invention
In order to solve the technical problems, the invention provides a multi-element Ha Xisuo-based downlink and uplink data transmission method.
The technical scheme of the invention is as follows:
a multi-element Ha Xisuo based method of data transmission in a chain uplink and downlink comprising the following stages:
the first stage: a pretreatment stage;
and a second stage: a commit and lock phase;
and a third stage: and a release stage.
Preferably, the first stage comprises the steps of:
s11: a multi-element Ha Xisuo selection and generation mechanism;
s12: and constructing an under-chain data transmission channel network.
Preferably, S11 comprises the sub-steps of:
s111: selecting an element lock;
s112: forming an element mark;
s113: a multi-element Ha Xisuo is generated.
Preferably, S12 comprises the sub-steps of:
s121: opening a channel;
s122: data transmission;
s123: closing the channel.
Preferably, the second stage comprises 3 aspects:
sender of aspect 1: sender u 0 Creation ofMeHTLC multi-element hash time lock contract, i.e. MeHTLC (u 0 ,u 1 ,v 1 ,s,t 1 D) to its next neighbor u 1
Intermediate user of aspect 2: during the commit and lock phase, each intermediate user { u } i } i∈[1,n] From its previous neighbor u i-1 MeHTLC was received. Each intermediate user u i Verifying correctness of MeHTLC contracts: a. checking the lock time t i-1 (t i+1 >t i ) Is effective in (1);
b. checking user u i-1 Whether or not there is a sufficient commission gamma <i,i+1><i,i+1> ≥v i+1 ) Wherein v is i+1 Is from v i The commission after subtractionRe-following right neighbor u i+1 Creating a new MeHTLC contract;
recipient of aspect 3: receiver u n+1 From his left neighbor u n Receiving MeHTLC (u) n ,u n+1 ,v n+1 ,s,t n+1 D) and then checking if the contract satisfies t n+1 >t now +Δ, if satisfied, sending the original image R of the element-identified hash S to the left neighbor, if t is not satisfied n+1 >t now If +delta or the hash calculated by the given original image R is not matched with the hash S of the element identifier, transmission is stopped, and data and commission fees are returned;
where Δ is a small positive value, u 0 As sender, u n+1 As the receiver, { u i } i∈[1,n] For intermediate users, fee (u) i ) For user u i Is the commission of (a), gamma <i,j> For user u i And u j Is placed in the channel deposit.
Preferably, stage 3 comprises 2 aspects:
sender of aspect 1: if user u 1 At time t 1 Inside which is provided a pre-image R of a hash S, then u 0 V to be locked 1 The commission and data d are released to its next neighbor u 1
Intermediate user of aspect 2: each user u i At time t i The original image R of a hash S is provided, and then the locked handling fee and the data d are released to the next neighbor u i-1
Wherein u is 0 As sender, u n+1 As the receiver, { u i } i∈[1,n] For intermediate users, fee (u) i ) For user u i Is a fee for the handling of the (c).
The multi-element Ha Xisuo-based method for transmitting the data under the chain uplink has the following beneficial effects:
1. the invention provides the definition of the multi-element Ha Xisuo based on Ha Xisuo, time lock, position lock, organization lock and the like, different kinds of locks are set and selected according to application scenes, and the integrity, atomicity and consistency of data are ensured through hash locking, so that the integrity verification of the transaction data under the chain or the assets under the chain is realized, and the data security and processing performance requirements under specific scenes are met.
2. The invention designs the overall flow of the data transmission channel network under the chain, the flow describes the main steps of constructing the data transmission channel network under the chain, and the operation which can be carried out by each channel in the network comprises the definition of the parameters of the operation, and the method flow.
3. The under-chain data transmission channel network of the invention realizes the under-chain transmission between two sides without directly establishing a transmission channel, and improves the recycling rate of the channel.
4. The invention designs the multi-element hash time locking contract MeHTLC (Multi element Hashed Timelock Contract), and improves the mobility and the security of the data transmission channel network under the chain.
5. The invention designs the overall flow of the data transmission mechanism of the link up and link down based on the multi-element Ha Xisuo and the data transmission channel network of the link down, and the flow describes the phase flow of the data up and link down.
6. The invention improves the safety of data transmission and ensures the integrity, atomicity and consistency of data.
Drawings
FIG. 1 is a schematic representation of the process of the present invention.
Fig. 2 is a general flow chart of the data transmission of the present invention.
Fig. 3 is a flow chart illustrating the generation of the multi-element Ha Xisuo of the present invention.
Fig. 4 is a diagram of an under-link data transmission channel network according to the present invention.
Fig. 5 is a diagram of a data transmission uplink according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and all the inventions which make use of the inventive concept are protected by the spirit and scope of the present invention as defined and defined in the appended claims to those skilled in the art.
1. Method model
The specific description of the roles and functions of the system based on the multi-element Ha Xisuo link-up-link-down data transfer model, as shown in fig. 1, is as follows:
under-chain data sources: the under-chain data source is a device that needs to upload its own data onto the blockchain at the current time. The resource demand devices are typically internet of things devices with limited resources, such as industrial internet of things sensors, intelligent vehicles, virtual reality devices, and the like.
Downlink data transmission network: the downlink data transmission channel network is a network composed of data transmission channels between different devices, and is used for downlink transmission between two parties without directly establishing a transmission channel.
Multi-element Ha Xisuo: the multi-element Ha Xisuo locks data from multiple dimensions, and ensures the security, atomicity and consistency of the data in the transmission process. The multi-element is to extract corresponding elements to be considered according to the requirements of specific application scenes, for example, only the data of a specific position is needed to be uplink, and the position elements are needed to be considered; only the specific organization or enterprise data needs to be uplinked, the organization elements and the like need to be considered. The data is mapped to a multi-element identifier, which is locked by Ha Xisuo.
Blockchain nodes: the blockchain node is responsible for processing and recording data from the transmission channel network, generating the random numbers required by the multi-element Ha Xisuo.
2. General procedure
The overall flow of data transmission is shown in fig. 2, and can be generally divided into 3 stages, 6 main steps, respectively:
(1) Generation of multi-element Ha Xisuo: the under-chain data source determines multiple elements according to own requirements, generates element identifiers, and finally forms multiple elements Ha Xisuo.
(2) Constructing a chain transmission channel network: an under-link data transmission channel network is formed by a set of transmission channels between every two under-link data source users, which are used for under-link transmission between two parties that do not directly establish the transmission channels. One transmission channel has three operations: offchainOpenChannel, offchainTransmission and OffchainCloseChannel, respectively.
(3) And (3) data transmission: on the basis of the multi-element Ha Xisuo and the downlink transmission channel network, the intelligent contract interface of the multi-element hash time locking contract MeHTLC (Multi element Hashed Timelock Contract) is utilized to realize the mechanism of downlink data uplink, and data flows through the downlink data transmission channel network and finally is uplink.
(4) Data transmission condition verification is successful: the comparison verifies whether the conditions in the MeHTLC are met.
(5) Data transmission condition verifies whether the time-out: a comparison verifies if the conditions of the MeHTLC are timed out.
(6) Whether to close the channel: after the data transmission is completed by the off-chain data source, the offchainCloseChannel can be executed to close the channel and broadcast the latest balance to the chain. Steps 1,2 are pretreatment stages, steps 3,4,5 are commit and lock stages, and step 6 is release stage.
The specific flow of each stage is described in detail in the following section.
3. Generation of multiple elements Ha Xisuo
As shown in fig. 3, the multi-element Ha Xisuo generation flow mainly includes three stages, respectively as follows:
(1) Selection of element lock: extracting corresponding elements to be considered according to the requirements of specific application scenes, for example, only the data of a specific position is required to be linked up, and the position elements are required to be considered; only the specific organization or enterprise data needs to be uplinked, the organization elements and the like need to be considered. The Multi-element (Multi element) extracts the corresponding element value according to the requirement of the specific application scene, and the formula is as follows:
wherein e1, e2, e3, e4 are the location elements, organization elements, time elements and other elements input by the user, alpha (x), beta (x), eta (x), and zeta (x) are element mapping functions of the elements, alpha (x) maps the specific location information input by the user to longitude and latitude coordinates of the location, beta (x) maps a specific organization input by the user to a unique organization number, eta (x) maps the time input by the user to block time, and zeta (x) is a user-defined mapping function. The whole formula shows that after the user inputs the corresponding element, the corresponding element mapping function is entered, the input element is mapped, and a specific element value is finally output.
(2) Formation of element identification: the multi-element identifier R is a character string composed of a multi-element and a Random number r=random (i) i∈[0,n+1] The Multi-element identifier r= (Multi-element) +r, where Multi-element is a Multi-element value mapped by a Multi-element mapping function, such as longitude and latitude of a location, a unique identifier of a certain enterprise organization, and so on, and R is a blockchain generated corresponding random number.
(3) Generating multi-element Ha Xisuo: hashing this generated multi-element identification is multi-element Ha Xisuo s=hash (R)
4. Constructing a link-down data transmission channel network:
an under-link data transmission channel network is formed by a set of transmission channels between every two under-link data source users, which are used for under-link transmission between two parties that do not directly establish the transmission channels. One transmission channel has three operations: offchainOpenChannel, offchainTransmission and OffchainCloseChannel, respectively. Any two users can open the transmission channel by both parties agreeing to and storing a guarantee to perform an OffchainOpenChannel operation on the chain. Thereafter, both users can complete the data transfer by performing an OffchainTransmission operation without broadcasting it on the blockchain. Finally, either party may close the channel by performing an OffchainCloseChannel operation and broadcast the latest mutual acceptance state on the blockchain.
These three operations are described in detail below:
(1) Opening a channel: offchainOpenChannel (u) i ,u jijji ,fee,t)→{1,0},u i ,u j Is a user pair, channel capacity γ=γ ijji ;γ ij (≤β[u i ]) And gamma ji (≤β[u j ]) Is the balance on the chain of the corresponding user; fee and t represent the commission and the channel time, respectively. This operation is to open a channel identifierIs provided. If this operation is successful, the blockchain β updates the balance (βu i ]=β[u i ]–γ ij And beta [ u ] j ]=β[u j ]-γ ji ) And returns 1, otherwise returns 0.
(2) And (3) data transmission:given a set of channelsData d from sender u 0 To the recipient u n+1 And will in turn deduct the commission from v. This operation retrieves channel information->From the blockchain. It checks the condition (γ 'of each intermediate user' ij ≥ν i ). If so, the channel balance is updated toReturning to 1. Otherwise, the channel is not updated, returning to 0.
(3) Closing a channel:given a channel identifierThis operation retrieves channel information->Wherein gamma is ij And gamma ji Is the deposit agreed by the two parties at last, and gamma' ij And gamma' ji Is the current deposit. If the timeout occurs or the user initiates an application, blockchain B updates the balance (βu i ]=β-γ ij And beta [ u ] j ]=β–γ ji Or beta [ u ] i ]=β-γ' ij And beta [ u ] j ]=β–γ' ji ) The channel is then eliminated from the network>And returns 1 (0) to perform a success (failure) operation, respectively.
u i Representing the user of the data source under the chain, beta represents the blockchain,representing data source u i And u j Channel identifier, fe (u) i ) Representing user u i When multiple parties have opened up multiple transmission channels under the chain, the channels are integrated into a network of data transmission channels under the chain, and the specific flow is as follows:
as shown in FIG. 4, u 0 、u 1 、u 2 、u 3 Are all under the chainIs assumed to be data source u 0 To transfer data onto the blockchain, it is desirable to follow the path p=u 0 →u 1 →u 2 The data d is transmitted by Block chain. In step 1, a random number R is randomly generated by a blockchain, and a hash value S of the R is sent to u by a secure and private mode 0 Where s=h (R), H is a hash function. Steps 2 to 9 are the transmission process of data d. In step 2, sender u 0 To which a transmission request OffchainTransmit (u) 0 ,u 1 ,v 1 ,s,t 1 D) to the next right neighbor u 1 V is the cost of the transmission of data (excluding the cost of the sender and the receiver), and the cost of each hop increases accordingly, whereIt then locks the funds and data to be sent and asks user u 1 At time t 1 R is given in the inner. Otherwise, the transfer will be aborted and returned to u 0 . After receiving the transmission request OffchainTransmission, it is transmitted from v in step 3 1 Subtracting the fee from the time of the operation and giving the next neighbor u 2 Sending a transmission request OffchainTransmit (u) 1 ,u 2 ,v 2 ,s,t 2 D), the same procedure is performed at each intermediate node. Finally, when the block link receives the transmission request OffchainTransmit (u) 3 ,Blockchain,v 4 ,s,t 4 When d) it verifies the OffchainTransmit condition and sends the random number R to the previous data source u 2 . Subsequently, after receiving R, each intermediate data source u will lock v i The commission and data d are sent to the next neighbor data source and R is sent to the previous neighbor data source in the opposite direction along the path. Finally, the data source u, which transmits the data 0 Receiving R, transmitting the locked data and the commission to the user u 1 And completing transmission, and closing the channel by executing an OffchainCloseChannel operation.
5. Data transmission uplink
Based on the multi-element Ha Xisuo and the downlink transmission channel network, the intelligent contract interface of the multi-element hash time locking contract MeHTLC (Multi element Hashed Timelock Contract) is utilized to realize the mechanism of downlink data uplink, the data flows through the downlink data transmission channel network, and finally the uplink is realized, and the specific flow is as follows:
as shown in FIG. 5, u in the drawing 0 、u 1 、u 2 、u 3 Are all different data sources under the chain, and assume that data source u 0 To transfer data d at a specified location onto the blockchain, it is desirable to follow path p=u 0 →u 1 →u 2 The data d is transmitted by Block chain. In step 1, a user inputs information of the position and maps the information into longitude and latitude of the position through a multi-element mapping function, the longitude and latitude are sent to a blockchain through an anonymous onion network, the blockchain combines the longitude and latitude with a generated random array to generate a multi-element identifier R, and a hash value S of the R is sent to u through a secure private mode 0 Where s=h (R), H is a hash function. From step 2 to step 9 is the transmission process of data d, in step 2, sender u 0 And the next right neighbor u 1 Creation of MeHTLC (u) 0 ,u 1 ,v 1 ,s,t 1 V is the cost of the transmission (excluding the cost of the sender and the receiver), and the cost of each hop increases correspondingly, whereinIt then locks the funds and data to be sent and asks user u 1 At time t 1 R is given in the inner. Otherwise, the transmission will abort the commission and the data will be returned to u 0 . After receiving the MeHTLC contract, it is then, in step 3, checked from v 1 Subtracting the fee from the time of the operation and giving the next neighbor u 2 Creation of MeHTLC (u) 1 ,u 2 ,v 2 ,s,t 2 D), the same procedure is performed at each intermediate node. Finally, when the block link receives the MeHTLC (u 3 ,Blockchain,v 4 ,s,t 4 When d) it verifies the MeHTLC condition and sends the multi-element identity R to the previous data source u 3 . Subsequently, after receiving R, eachV to be locked by the intermediate data sources u i The commission and data d are sent to the next neighbor data source and R is sent to the previous neighbor data source in the opposite direction along the path. Finally, the data source u, which transmits the data 0 Receiving R, transmitting the locked data and the commission to the user u 1 And completing transmission, and executing OffchainCloseChannel.
6. Whether the intelligent contract data transmission condition verification is successful
The MeHTLC includes a multi-element Ha Xisuo and a time lock, and needs to verify whether the multi-element Ha Xisuo original image R transmitted by the neighbor in the transport network is the same as the existing multi-element Ha Xisuo S, and if the verification passes, it also needs to verify whether the time-out occurs.
7. Smart contract data transfer condition verification for timeout
The MeHTLC includes a multi-element Ha Xisuo and a time lock, and after verifying whether the original image R of the multi-element Ha Xisuo transmitted by the neighbor in the transmission network is the same as the existing multi-element Ha Xisuo S, the time lock is required to be verified, that is, the multi-element Ha Xisuo cannot be verified within a specified time, and the next hop transmission can be performed through verification data, otherwise, the data and the commission fee will be returned.
8. Closing the passage
The data transmission is completed, the channel opening time is overtime or the verification in the transmission process is overtime, the OffchainCloseChannel is executed to close the channel, and the balance is updated and broadcast to the chain. The specific flow of the closing channel is as follows:
given a channel identifier->This operation retrieves channel information->Wherein gamma is ij And gamma ji Is the deposit agreed by the two parties at last, and gamma' ij And gamma' ji Is the current deposit. If overtime or otherwiseThe user initiates an application, the blockchain B updates the balance (βu i ]=β-γ ij And beta [ u ] j ]=β–γ ji Or beta [ u ] i ]=β-γ' ij And beta [ u ] j ]=β–γ' ji ) The channel is then eliminated from the network>And returns 1 (0) to perform a success (failure) operation, respectively.

Claims (2)

1. The multi-element Ha Xisuo-based method for transmitting the downlink and uplink data is characterized by comprising the following steps:
the first stage: a pretreatment stage;
and a second stage: a commit and lock phase;
and a third stage: a release phase;
the first stage comprises the steps of:
s11: a multi-element Ha Xisuo selection and generation mechanism;
generation of multi-element Ha Xisuo: the under-chain data source determines multiple elements according to own requirements, generates element identifiers and finally forms multiple elements Ha Xisuo;
the method specifically comprises the following steps:
generation of multi-element Ha Xisuo: the under-chain data source determines multiple elements according to own requirements, generates element identifiers and finally forms multiple elements Ha Xisuo; selection of element lock: extracting corresponding elements to be considered according to the requirements of specific application scenes; formation of element identification: the Multi-element identifier R is a character string composed of a Multi-element and a Random number R, wherein the Random number r=random (i) i epsilon [0, n+1], and the Multi-element identifier r= (Multi-element) +r, wherein the Multi-element is a Multi-element value mapped by a Multi-element mapping function; generating multi-element Ha Xisuo: hashing this generated multi-element identification is multi-element Ha Xisuo s=hash (R);
s12: constructing a data transmission channel network under a chain;
constructing a chain transmission channel network: the under-link data transmission channel network is composed of a group of transmission channels between every two under-link data source users, and is used for carrying out under-link transmission between two parties without directly establishing the transmission channels;
the second stage includes 3 aspects:
sender of aspect 1: sender u 0 Creating MeHTLC multi-element hash time lock contracts, i.e. MeHTLC (u 0 ,u 1 ,v 1 ,s,t 1 D) to its next neighbor u 1
Wherein v is 1 Is the data source u under the chain 0 Transmitting data to u 1 The required fee is deducted by the amount after the commission fee, t 1 Is the data source u under the chain 0 Transmitting data to u 1 Time limit, d is the transmitted data, v n+1 Is the data source u under the chain n Transmitting data to u n+1 The required fee is deducted by the amount after the commission fee, t n+1 Is the data source u under the chain n Transmitting data to u n+1 Time limitation;
intermediate user of aspect 2: during the commit and lock phase, each intermediate user { u } i } i∈[1,n] From its previous neighbor u i-1 Receiving MeHTLC, each intermediate user u i Verifying correctness of MeHTLC contracts: a. checking the lock time t i-1 (t i+1 >t i ) Is effective in (1);
b. checking user u i-1 Whether or not there is a sufficient commission gamma <i,i+1><i,i+1> ≥v i+1 ) Wherein v is i+1 Is from v i The commission after subtractionRe-following right neighbor u i+1 Creating a new MeHTLC contract; recipient of aspect 3: receiver u n+1 From his left neighbor u n Receiving MeHTLC (u) n ,u n+1 ,v n+1 ,s,t n+1 D) and then checking if the contract satisfies t n+1 >t now +Δ, if satisfied, sending the original image R of the element-identified hash S to the left neighbor, if t is not satisfied n+1 >t now +Δ or the hash and element calculated from the given original image RIf the hash S of the identification is not matched, transmission is stopped, and the data and the commission fee are returned;
where Δ is a small positive value, u 0 As sender, u n+1 As the receiver, { u i } i∈[1,n] For intermediate users, fee (u) i ) For user u i Is the commission of (a), gamma <i,j> For user u i And u j Is deposited on the channel;
the third stage includes 2 aspects:
sender of aspect 1: if user u 1 At time t 1 Inside which is provided a pre-image R of a hash S, then u 0 V to be locked 1 The commission and data d are released to its next neighbor u 1
Intermediate user of aspect 2: each user u i At time t i The original image R of a hash S is provided, and then the locked handling fee and the data d are released to the next neighbor u i-1
Wherein u is 0 As sender, u n+1 As the receiver, { u i } i∈[1,n] For intermediate users, fee (u) i ) For user u i Is a fee for the handling of the (c).
2. The multi-element Ha Xisuo based method of downlink data transmission of claim 1, wherein S12 comprises the sub-steps of:
s121: opening a channel;
s122: data transmission;
s123: closing the channel.
CN202211225667.2A 2022-10-09 2022-10-09 Multi-element Ha Xisuo-based data transmission method under chain Active CN115632835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211225667.2A CN115632835B (en) 2022-10-09 2022-10-09 Multi-element Ha Xisuo-based data transmission method under chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211225667.2A CN115632835B (en) 2022-10-09 2022-10-09 Multi-element Ha Xisuo-based data transmission method under chain

Publications (2)

Publication Number Publication Date
CN115632835A CN115632835A (en) 2023-01-20
CN115632835B true CN115632835B (en) 2023-09-26

Family

ID=84904744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211225667.2A Active CN115632835B (en) 2022-10-09 2022-10-09 Multi-element Ha Xisuo-based data transmission method under chain

Country Status (1)

Country Link
CN (1) CN115632835B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8954409B1 (en) * 2011-09-22 2015-02-10 Juniper Networks, Inc. Acquisition of multiple synchronization objects within a computing device
CN113411338A (en) * 2021-06-17 2021-09-17 北京工业大学 Resource transaction method based on-chain-down cooperation of state channel
CN113987526A (en) * 2021-09-26 2022-01-28 海南火链科技有限公司 Resource exchange method, device and equipment based on block chain and readable storage medium
CN114465817A (en) * 2022-03-22 2022-05-10 暨南大学 Digital certificate system and method based on TEE (text exchange engine) prediction machine cluster and block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8954409B1 (en) * 2011-09-22 2015-02-10 Juniper Networks, Inc. Acquisition of multiple synchronization objects within a computing device
CN113411338A (en) * 2021-06-17 2021-09-17 北京工业大学 Resource transaction method based on-chain-down cooperation of state channel
CN113987526A (en) * 2021-09-26 2022-01-28 海南火链科技有限公司 Resource exchange method, device and equipment based on block chain and readable storage medium
CN114465817A (en) * 2022-03-22 2022-05-10 暨南大学 Digital certificate system and method based on TEE (text exchange engine) prediction machine cluster and block chain

Also Published As

Publication number Publication date
CN115632835A (en) 2023-01-20

Similar Documents

Publication Publication Date Title
CN106899698B (en) Cross-chain interoperation method between block chains
CN108881187A (en) A kind of across chain data transferring method and equipment suitable for permitting chain scene
Ou et al. An overview on cross-chain: Mechanism, platforms, challenges and advances
CN109257346B (en) Concealed transmission system based on block chain
WO2020119298A1 (en) Event processing method and apparatus based on blockchain, and electronic device
TWI705691B (en) Block chain-based event processing method and device, and electronic equipment
CN110223064A (en) A kind of undeniable safety data transmission method based on block chain
CN105678151A (en) Block chain transmitting method and system for constructing trustable nodes/satellite nodes
CN112488682B (en) Three-party transfer method and device for block chain
Jourenko et al. Lightweight virtual payment channels
CN113095826A (en) Covert communication method and system based on block chain multi-signature
EP3750129A1 (en) System and method for transferring resources using a blockchain
CN113407977A (en) Cross-chain extension method and system based on aggregated signature
Nguyen et al. A blockchain-based iterative double auction protocol using multiparty state channels
Ranchal-Pedrosa et al. Platypus: Offchain protocol without synchrony
CN115632835B (en) Multi-element Ha Xisuo-based data transmission method under chain
Sui et al. Monet: A fast payment channel network for scriptless cryptocurrency monero
Guo et al. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin.
US11811866B2 (en) Computer-implemented system and method for controlling processing steps of a distributed system
US11831408B2 (en) Computer-implemented methods and systems for controlling tasks implemented by a cyclically-ordered set of nodes participating in a blockchain network
Kiayias et al. Elmo: Recursive virtual payment channels for bitcoin
CN113411338B (en) Resource transaction method based on-chain-down cooperation of state channel
CN116108482A (en) Unbalanced privacy set intersection method and system
CN114547695A (en) Block chain transaction privacy protection method based on homomorphic encryption in Internet of things
US20240163098A1 (en) Computer-implemented methods and systems for controlling tasks implemented by a cyclically-ordered set of nodes participating in a blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant