CN115766040A - High-throughput cross-chain transaction method based on atomic exchange - Google Patents

High-throughput cross-chain transaction method based on atomic exchange Download PDF

Info

Publication number
CN115766040A
CN115766040A CN202211557241.7A CN202211557241A CN115766040A CN 115766040 A CN115766040 A CN 115766040A CN 202211557241 A CN202211557241 A CN 202211557241A CN 115766040 A CN115766040 A CN 115766040A
Authority
CN
China
Prior art keywords
block chain
transaction
information
chain
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211557241.7A
Other languages
Chinese (zh)
Inventor
陈铁明
方鑫鑫
李英龙
王婷
吕明琪
朱建明
季白杨
周君良
俞荣栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202211557241.7A priority Critical patent/CN115766040A/en
Publication of CN115766040A publication Critical patent/CN115766040A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a high-throughput cross-chain transaction method based on atomic exchange, which comprises the following steps: the method comprises the steps that firstly, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of a first block chain and a second block chain are encrypted; after an interaction channel is created, a first block chain uses information to interact with a second block chain, and the first block chain encrypts the information of the first block chain through a unique identity of the second block chain and initiates a transaction request; and the second block chain carries out simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to the private key of the second block chain and stores the information into the block chain of the second block chain. The two parties performing the transaction directly perform cross-link data exchange, so that the risk of network blockage caused by the fact that an attacker creates a large number of transaction channels in the original Hash time lock technology is avoided, and the throughput of cross-link data transmission is improved.

Description

High-throughput cross-chain transaction method based on atomic exchange
Technical Field
The invention relates to the technical field of block chain cross-linking, in particular to a high-throughput cross-linking transaction method based on atomic exchange.
Background
In recent years, distributed trust and value systems represented by block chains are forming at an unprecedented speed and scale, and the development of the block chains is also concerned, but the block chains have obvious defects of low throughput, high propagation delay, network isolation and the like. Among all the problems faced by blockchains, network isolation has the greatest impact on blockchain development space, and seriously hinders the cooperative operation between blockchains.
The cross-link technology is a solution for the network isolation problem faced by the blockchain, and a bridge for communication between information islands is built, so that the value internet becomes a reality, and the cross-link technology is a communication protocol from one link to another and is the core content of the blockchain at the 3.0 stage. Existing cross-chaining approaches include notary mechanisms, sidechains/relays, hash locking, and distributed private key control.
The notary mechanism is a weak centralized cross-chain project solution, supports bidirectional cross-chain, has simple realization principle and does not need complex workload proof.
The side chain/relay mode, using a third party intermediary as a repeater for the customer chain, relays the blocks of the cross-chain sub-transaction onto the corresponding block chain. Its advantages are high efficiency, supporting the transform transfer of cross-chain assets, cross-chain contract and mortgage, and the confirmation and verification of transaction is performed by application chain.
Hash locking is a cross-chain technique that enables inter-heterogeneous asset exchanges, requiring that the middleman and recipient of a transaction give the correct hash value at a given time. The hash locking has the advantages that cross-link information interaction is realized by running a specific intelligent contract on two chains between block chains, and the hash locking strictly depends on the execution of the intelligent contract.
Distributed private key control is the separation of ownership and usage rights of digital assets to reduce the risk of centralization. The advantage of distributed private key control is that the user has control of the asset with only the private key.
The existing chain crossing has the following problems:
1. the existing chain crossing technology does not completely and comprehensively support heterogeneous block chain crossing;
2. the class centralization of the notary is easy to cause centralization risk, and the problem of single-point failure exists;
3. the side chain/relay mode has the defects that the bottom layer of an application chain needs to be expanded, and the development cost is high;
4. hash locking is relatively limited in the current application scene, and a transaction channel can be closed due to the fact that the time lock limit is exceeded due to normal network delay, so that normal cross-link data exchange is influenced;
5. distributed private key control smart contracts require more aspects to implement.
Disclosure of Invention
The invention provides a high-throughput cross-chain transaction method based on atomic exchange, and aims to solve the problem of low throughput in the existing cross-chain transaction technology.
The invention has the main characteristics that: an encryption method (IBE) based on block chain identity, a gateway intelligent contract and Simple Payment Verification (SPV). The encryption method based on the block chain identity comprises the following steps: and a password generation module. The gateway intelligent contract comprises: identity registration contract, SPV verification module. The simple payment verification module includes: and a transaction verification module.
The high-throughput cross-chain transaction method based on atomic exchange adopts a triple algorithm, wherein the triple algorithm comprises a public and private key generating algorithm, an encryption algorithm and a decoding algorithm.
A high-throughput cross-chain transaction method based on atomic exchange comprises the following steps:
(1) The method comprises the steps that a first block chain and a second block chain under different scenes are adopted, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of the first block chain and the second block chain are encrypted, and a command of successfully registering the corresponding block chain is returned according to the registration request;
(2) After the first block chain and the second block chain receive the command of successful registration, an interaction channel is established;
(3) After the interactive channel is established, the first block chain wants to interact with the information of the second block chain, and the first block chain encrypts the information of the first block chain through the unique identity of the second block chain and initiates a transaction request;
(4) And after a transaction request is initiated, the second block chain performs simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to a private key of the second block chain and stores the information into the block chain of the second block chain.
According to the invention, the transaction channel is established through the encryption method based on the blockchain identity and the transaction is verified through the simple payment verification technology, so that the transaction time under the cross-chain transaction scene is reduced, and the transaction throughput is improved.
In the step (1), the encryption of the respective unique identities of the first block chain and the second block chain adopts a public-private key algorithm to generate a private key, which specifically comprises:
inputting the unique identity of a blockchain by generating a public-private key algorithm
Figure 316036DEST_PATH_IMAGE001
And outputting a public key PK and a private key SK corresponding to the identity, wherein the public key PK is used as the unique identity of the identity.
The encryption method based on the unique identity belongs to an asymmetric encryption algorithm, the security is higher than that of symmetric encryption, the encryption method based on the identity is more efficient than that of other asymmetric encryption, and the public key information is more complete.
In step (3), the information of the first blockchain is a block hash value of the first blockchain with the transaction information.
In step (3), the first blockchain encrypts the information of the first blockchain through the unique identity of the second blockchain, and initiates a transaction request, which specifically includes: and carrying out hash calculation on the block hash value of the first block chain with the transaction information and the unique identity of the second block chain, and initiating a transaction request through the calculated hash value.
The characteristic of the irreversible operation of the Hash calculation can ensure that the transaction information cannot be easily cracked, thereby protecting the transaction information from being directly acquired by an illegal visitor.
In the step (4), the second blockchain performs a simple payment verification transaction of the light client through the gateway, which specifically includes: the light client side initiates a request, and after all nodes receive a transaction, the Merkle Tree of the block is calculated according to the block to which the transaction belongs. Then, after receiving the partial Merkle Tree, the light node locally calculates the hash of the transaction, and always calculates to obtain the Merkle Root according to each hash value on the partial Merkle Tree, and if the value is exactly matched with the header of the block, the transaction is successfully verified.
The advantage of using light client authentication is that the Merkle Tree can be used only by sending part of the Merkle Tree related to the current transaction without sending the whole Merkle Tree to the light node in order to confirm whether a transaction belongs to a Merkle Root.
Compared with the prior art, the invention has the following beneficial effects:
1. the block chain is registered to the relay terminal based on the identity encryption method, and the relay terminal only provides a registration function for the cross-chain transaction and does not participate in the specific details of cross-chain exchange;
2. after successful registration, both parties performing transaction directly perform cross-link data exchange without maintaining the time period specified by the hash time atomic exchange of the existing method, thereby avoiding the risk of network blockage caused by creating a large number of transactions by an attacker in the original hash time atomic exchange technology, and further improving the throughput of cross-link data transmission;
3. by adopting the SPV simple payment verification technology, the light client side SPV verification does not need to download all block chain information, and only needs to download the block head for verification, thereby ensuring the correctness of the transaction, reducing the time of the transaction and improving the throughput of the transaction.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
FIG. 2 is a timing diagram of cross-chain data interaction according to the present invention.
FIG. 3 is a schematic diagram of data encryption, broadcast, verification, and decryption according to the present invention.
Fig. 4 is a schematic diagram of an SPV simple payment verification method of the present invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings.
As shown in fig. 1, a high-throughput cross-link transaction method based on atomic exchange is mainly characterized in that: an encryption method based on block chain identity, a gateway intelligent contract and simple payment verification. The encryption method based on the block chain identity comprises the following steps: and a password generation module. The gateway intelligent contract comprises: identity registration contract, SPV verification module. The simple payment verification module includes: a transaction verification module. The method mainly comprises the following steps:
(1) A block chain for transaction generates a private key by using the unique identity in the block chain network through an IBE identity encryption method, and both parties of the block chain for transaction initiate a registration request to a relay end through a gateway intelligent contract by using the unique identity;
(2) The relay intelligent contract returns a registration success command to the corresponding block chain according to the registration request;
(3) The block chain uses the unique identity of the block chain with which information interaction is desired to encrypt the information through the identity, and initiates a transaction request;
(4) The corresponding block chain carries out SPV verification transaction of the light client through the gateway;
(5) And the corresponding block chain decrypts the information through the private key corresponding to the identity identification to obtain the information.
The cross-chain data interaction timing diagram is shown in fig. 2.
In the step (1), the specific steps of encrypting the two block chain parties through IBE identities to generate a private key and initiating a registration request to the relay end through a gateway intelligent contract by using the unique identity are as follows: and (1-1) generating a corresponding private key by using an encryption and decryption method based on identity authentication and using an elliptic curve algorithm according to the uniqueness of the identity of each blockchain in a cross-chain system as a public key.
Block chain
Figure 702018DEST_PATH_IMAGE002
Is a collection of identities, wherein
Figure 950597DEST_PATH_IMAGE003
. Suppose M is plaintext information to be encrypted and S represents ciphertext after plaintext encryption.
Improved scheme based on IBE identity encryption
Figure 549069DEST_PATH_IMAGE004
The method consists of three steps of extract, encrypt and decrypt, and forms a triple about the algorithm
Figure 832282DEST_PATH_IMAGE005
Wherein, extract is a key generation algorithm, encrypt is a plaintext encryption algorithm, decrypt is a ciphertext decryption algorithm, and the specific description is as follows:
the algorithm K is executed in the extract stage, and the input is an identity
Figure 123587DEST_PATH_IMAGE006
And is and
Figure 656199DEST_PATH_IMAGE007
the public key PK and private key SK corresponding to the identity are output:
Figure 58362DEST_PATH_IMAGE008
the algorithm K is a public-private key generation algorithm, PK is a public key, SK is a private key, and ID is the unique identity of the block chain in the cross-chain system.
And (1-2) storing the Private Key SK into a Private Key Generator (PKG), wherein the PKG adopts a management mechanism construction mode of a hierarchical tree structure and is used for later information decryption.
And (1-3) writing an intelligent contract at the gateway end according to the public key PK generated by the unique identity in the step (1-1), wherein the intelligent contract comprises the unique identity information of the corresponding block chain.
And (1-4) sending the intelligent contract to the relay terminal through the gateway to initiate a registration request for the block chain.
In the step (2), the specific steps of the relay intelligent contract for returning the successful registration are as follows: and (2-1) after the relay intelligent contract receives the registration request from the gateway end, checking whether the registration request meets the requirement, and if so, returning a command of successful registration to the gateway.
And (2-2) the returned information also comprises public keys corresponding to the identity IDs of all block chains registered at the relay terminal so as to facilitate the subsequent information interactive use.
The schematic diagram of data encryption, broadcasting, verification and decryption is shown in fig. 3.
In step (3), the specific steps of initiating the transaction request are as follows: (3-1) the block chain A encrypts the information to be interacted by using the unique identifier of the block chain of the opposite side through the corresponding gateway, and then the gateway side broadcasts the encrypted information to the whole network to initiate a transaction request.
The algorithm E is executed in the encryption stage of encrypt, and the input is the message to be encrypted
Figure 992819DEST_PATH_IMAGE009
Public key PK, output encrypted ciphertext S for M:
Figure 687981DEST_PATH_IMAGE010
the algorithm E is an encryption algorithm, S is an encrypted ciphertext, M is transaction information, and PK is a generated public key.
In the step (4), the transaction verification is carried out by the following specific steps: (4-1) the gateway D receives the transaction request broadcasted by the block chain A, and the transaction request is simply paid and verified by the SPV of the light client. A schematic diagram of the SPV simple payment verification method is shown in fig. 4.
And (4-2) calculating the hash value of the transaction to be verified.
And (4-3) acquiring and storing all block headers from the block chain network to the local.
(4-4) obtaining a hash authentication path of the corresponding Merkle Tree to be verified from the blockchain.
And (4-5) calculating a root hash value of the Merkle Tree according to the hash authentication path, comparing the calculation result with the root hash value of the Merkle Tree at the head of the local block, and if the calculation result is the same as the root hash value of the Merkle Tree, positioning the block containing the block to be verified.
(4-6) according to the position of the block head, it can be verified whether the block head of the block is in the block chain, so as to determine that the transaction is true and valid.
In the step (5), the specific steps of obtaining information are as follows: and (5-1) after the transaction request is confirmed, the gateway D requests a private key from the key server to perform decryption operation.
And (5-2) the gateway D obtains the private key of the block chain B sent by the key server, decrypts the private key and stores the information sent by the block chain A into the block chain B.
The algorithm J is executed in a decryption stage, encrypted ciphertext S and a private key SK are input, and a plaintext message M corresponding to the ciphertext S is output:
Figure 707889DEST_PATH_IMAGE011
wherein M is transmitted transaction information, the algorithm J is a decryption algorithm, S is a ciphertext generated by the last algorithm, and SK is a private key.
At this point, the information on the block chain a is written into the block chain B, and the information interaction is completed. If the block chain A wants to acquire the information on the block chain B, the steps (4) and (5) are performed. When the IBE encryption algorithm is used, encryption can be carried out only according to the identity information, and a digital certificate is not required to be applied like other encryption algorithms, so that a series of complicated processes of certificate issuing, revocation, verification, custody and the like are avoided. Through direct cross-link data exchange between two parties performing transaction and the adoption of SPV simple payment verification technology, the correctness of transaction is ensured, and the throughput of cross-link data transmission is improved.
The above description is only exemplary of the embodiments of the present disclosure. It should be noted that the technical features of the present invention are not limited thereto but are to be accorded the widest scope consistent with the principles and novel features disclosed herein. Any modification or improvement made by one of ordinary skill in the art within the field of the present invention is within the scope of the present invention.

Claims (5)

1. A high-throughput cross-chain transaction method based on atomic exchange is characterized by comprising the following steps:
(1) The method comprises the steps that a first block chain and a second block chain under different scenes are adopted, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of the first block chain and the second block chain are encrypted, and a command of successfully registering the corresponding block chain is returned according to the registration request;
(2) After the first block chain and the second block chain receive the command of successful registration, an interaction channel is established;
(3) After the interactive channel is established, the first block chain wants to interact with the information of the second block chain, and the first block chain encrypts the information of the first block chain through the unique identity of the second block chain and initiates a transaction request;
(4) And after a transaction request is initiated, the second block chain performs simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to a private key of the second block chain and stores the information into the block chain of the second block chain.
2. The atomic exchange-based high-throughput cross-chain transaction method according to claim 1, wherein in the step (1), the unique identity encryption of each of the first blockchain and the second blockchain generates the private key by using a public-private key algorithm.
3. The method for high throughput cross-chain transaction based on atomic exchange according to claim 2, wherein in the step (1), the encryption of the unique identities of the first blockchain and the second blockchain respectively generates the private key by using a public-private key algorithm, which specifically includes:
and outputting the unique identity of the input block chain to a public key and a private key corresponding to the identity by generating a public-private key algorithm, wherein the public key is used as the unique identity of the identity.
4. The method for high throughput cross-chain transaction based on atomic exchange according to claim 1, wherein in step (3), the information of the first blockchain is a blockhash value of the first blockchain with the transaction information.
5. The method for high throughput cross-chain transaction based on atomic exchange according to claim 1, wherein in step (3), the first blockchain encrypts the information of the first blockchain through the unique id of the second blockchain, and initiates the transaction request, specifically comprising:
and carrying out hash calculation on the block hash value of the first block chain with the transaction information and the unique identity of the second block chain, and initiating a transaction request through the calculated hash value.
CN202211557241.7A 2022-12-06 2022-12-06 High-throughput cross-chain transaction method based on atomic exchange Pending CN115766040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211557241.7A CN115766040A (en) 2022-12-06 2022-12-06 High-throughput cross-chain transaction method based on atomic exchange

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211557241.7A CN115766040A (en) 2022-12-06 2022-12-06 High-throughput cross-chain transaction method based on atomic exchange

Publications (1)

Publication Number Publication Date
CN115766040A true CN115766040A (en) 2023-03-07

Family

ID=85343663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211557241.7A Pending CN115766040A (en) 2022-12-06 2022-12-06 High-throughput cross-chain transaction method based on atomic exchange

Country Status (1)

Country Link
CN (1) CN115766040A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112636930A (en) * 2020-12-31 2021-04-09 重庆邮电大学 Asset transaction method and system based on atomic exchange
CN113837760A (en) * 2021-11-25 2021-12-24 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and storage medium
US20220166602A1 (en) * 2020-11-20 2022-05-26 Hong Kong Applied Science and Technology Research Institute Company Limited Apparatus and Method of Lightweight Communication Protocols between Multiple Blockchains
CN114615095A (en) * 2022-05-12 2022-06-10 北京邮电大学 Block chain cross-chain data processing method, relay chain, application chain and cross-chain network
CN114730421A (en) * 2019-11-08 2022-07-08 阿尔戈兰德公司 Trading using private and public blockchains

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114730421A (en) * 2019-11-08 2022-07-08 阿尔戈兰德公司 Trading using private and public blockchains
US20220166602A1 (en) * 2020-11-20 2022-05-26 Hong Kong Applied Science and Technology Research Institute Company Limited Apparatus and Method of Lightweight Communication Protocols between Multiple Blockchains
CN112636930A (en) * 2020-12-31 2021-04-09 重庆邮电大学 Asset transaction method and system based on atomic exchange
CN113837760A (en) * 2021-11-25 2021-12-24 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and storage medium
CN114615095A (en) * 2022-05-12 2022-06-10 北京邮电大学 Block chain cross-chain data processing method, relay chain, application chain and cross-chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈园: ""基于区块链的物联网网关的研究与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》, no. 2021, 15 February 2021 (2021-02-15), pages 136 - 512 *

Similar Documents

Publication Publication Date Title
CN109922077B (en) Identity authentication method and system based on block chain
CN110719165B (en) Block chain distributed dynamic network key generation and encryption method
US7386722B2 (en) Certificate management system and method
CN110046521A (en) Decentralization method for secret protection
USRE36946E (en) Method and apparatus for privacy and authentication in wireless networks
CN106600252A (en) Payment method and system based on block chain
Kim et al. A secure smart-metering protocol over power-line communication
CN101964791B (en) Communication authenticating system and method of client and WEB application
CN110059503A (en) The retrospective leakage-preventing method of social information
CN114499898B (en) Block chain cross-chain secure access method and device
EP1508993A1 (en) Information processing system and method, information processing device and method, recording medium, and program
CN112134892B (en) Service migration method in mobile edge computing environment
US8892882B2 (en) Content transmission security protection device system and method
JPH11289329A (en) Verification type search tree
CN111163109B (en) Block chain center-removing type node anti-counterfeiting method
CN110071807B (en) Block chain point-to-point node authentication method, system and computer readable storage medium
CN101388774A (en) Method for automatically authenticate and recognize customer identity between different customers and login
CN115021958B (en) Mist calculation and blockchain fusion intelligent home identity authentication method and system
CN113360861B (en) Mortgage loan oriented decentralized identity method based on repeater cross-chain
CN114499876B (en) Internet of things data storage and verification method based on blockchain and NB-IoT chip
CA2381108A1 (en) Secure mutual authentication system
CN114531680B (en) Light-weight IBC bidirectional identity authentication system and method based on quantum key
CN114938280A (en) Authentication method and system based on non-interactive zero-knowledge proof and intelligent contract
CN111339509A (en) Block chain cross-chain identity authentication method based on side chain
Hou et al. Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination