CN115766040A - High-throughput cross-chain transaction method based on atomic exchange - Google Patents
High-throughput cross-chain transaction method based on atomic exchange Download PDFInfo
- Publication number
- CN115766040A CN115766040A CN202211557241.7A CN202211557241A CN115766040A CN 115766040 A CN115766040 A CN 115766040A CN 202211557241 A CN202211557241 A CN 202211557241A CN 115766040 A CN115766040 A CN 115766040A
- Authority
- CN
- China
- Prior art keywords
- block chain
- transaction
- information
- chain
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012795 verification Methods 0.000 claims abstract description 28
- 230000003993 interaction Effects 0.000 claims abstract description 8
- 238000004364 calculation method Methods 0.000 claims description 5
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 230000002452 interceptive effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 9
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 238000002955 isolation Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000004132 cross linking Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a high-throughput cross-chain transaction method based on atomic exchange, which comprises the following steps: the method comprises the steps that firstly, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of a first block chain and a second block chain are encrypted; after an interaction channel is created, a first block chain uses information to interact with a second block chain, and the first block chain encrypts the information of the first block chain through a unique identity of the second block chain and initiates a transaction request; and the second block chain carries out simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to the private key of the second block chain and stores the information into the block chain of the second block chain. The two parties performing the transaction directly perform cross-link data exchange, so that the risk of network blockage caused by the fact that an attacker creates a large number of transaction channels in the original Hash time lock technology is avoided, and the throughput of cross-link data transmission is improved.
Description
Technical Field
The invention relates to the technical field of block chain cross-linking, in particular to a high-throughput cross-linking transaction method based on atomic exchange.
Background
In recent years, distributed trust and value systems represented by block chains are forming at an unprecedented speed and scale, and the development of the block chains is also concerned, but the block chains have obvious defects of low throughput, high propagation delay, network isolation and the like. Among all the problems faced by blockchains, network isolation has the greatest impact on blockchain development space, and seriously hinders the cooperative operation between blockchains.
The cross-link technology is a solution for the network isolation problem faced by the blockchain, and a bridge for communication between information islands is built, so that the value internet becomes a reality, and the cross-link technology is a communication protocol from one link to another and is the core content of the blockchain at the 3.0 stage. Existing cross-chaining approaches include notary mechanisms, sidechains/relays, hash locking, and distributed private key control.
The notary mechanism is a weak centralized cross-chain project solution, supports bidirectional cross-chain, has simple realization principle and does not need complex workload proof.
The side chain/relay mode, using a third party intermediary as a repeater for the customer chain, relays the blocks of the cross-chain sub-transaction onto the corresponding block chain. Its advantages are high efficiency, supporting the transform transfer of cross-chain assets, cross-chain contract and mortgage, and the confirmation and verification of transaction is performed by application chain.
Hash locking is a cross-chain technique that enables inter-heterogeneous asset exchanges, requiring that the middleman and recipient of a transaction give the correct hash value at a given time. The hash locking has the advantages that cross-link information interaction is realized by running a specific intelligent contract on two chains between block chains, and the hash locking strictly depends on the execution of the intelligent contract.
Distributed private key control is the separation of ownership and usage rights of digital assets to reduce the risk of centralization. The advantage of distributed private key control is that the user has control of the asset with only the private key.
The existing chain crossing has the following problems:
1. the existing chain crossing technology does not completely and comprehensively support heterogeneous block chain crossing;
2. the class centralization of the notary is easy to cause centralization risk, and the problem of single-point failure exists;
3. the side chain/relay mode has the defects that the bottom layer of an application chain needs to be expanded, and the development cost is high;
4. hash locking is relatively limited in the current application scene, and a transaction channel can be closed due to the fact that the time lock limit is exceeded due to normal network delay, so that normal cross-link data exchange is influenced;
5. distributed private key control smart contracts require more aspects to implement.
Disclosure of Invention
The invention provides a high-throughput cross-chain transaction method based on atomic exchange, and aims to solve the problem of low throughput in the existing cross-chain transaction technology.
The invention has the main characteristics that: an encryption method (IBE) based on block chain identity, a gateway intelligent contract and Simple Payment Verification (SPV). The encryption method based on the block chain identity comprises the following steps: and a password generation module. The gateway intelligent contract comprises: identity registration contract, SPV verification module. The simple payment verification module includes: and a transaction verification module.
The high-throughput cross-chain transaction method based on atomic exchange adopts a triple algorithm, wherein the triple algorithm comprises a public and private key generating algorithm, an encryption algorithm and a decoding algorithm.
A high-throughput cross-chain transaction method based on atomic exchange comprises the following steps:
(1) The method comprises the steps that a first block chain and a second block chain under different scenes are adopted, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of the first block chain and the second block chain are encrypted, and a command of successfully registering the corresponding block chain is returned according to the registration request;
(2) After the first block chain and the second block chain receive the command of successful registration, an interaction channel is established;
(3) After the interactive channel is established, the first block chain wants to interact with the information of the second block chain, and the first block chain encrypts the information of the first block chain through the unique identity of the second block chain and initiates a transaction request;
(4) And after a transaction request is initiated, the second block chain performs simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to a private key of the second block chain and stores the information into the block chain of the second block chain.
According to the invention, the transaction channel is established through the encryption method based on the blockchain identity and the transaction is verified through the simple payment verification technology, so that the transaction time under the cross-chain transaction scene is reduced, and the transaction throughput is improved.
In the step (1), the encryption of the respective unique identities of the first block chain and the second block chain adopts a public-private key algorithm to generate a private key, which specifically comprises:
inputting the unique identity of a blockchain by generating a public-private key algorithmAnd outputting a public key PK and a private key SK corresponding to the identity, wherein the public key PK is used as the unique identity of the identity.
The encryption method based on the unique identity belongs to an asymmetric encryption algorithm, the security is higher than that of symmetric encryption, the encryption method based on the identity is more efficient than that of other asymmetric encryption, and the public key information is more complete.
In step (3), the information of the first blockchain is a block hash value of the first blockchain with the transaction information.
In step (3), the first blockchain encrypts the information of the first blockchain through the unique identity of the second blockchain, and initiates a transaction request, which specifically includes: and carrying out hash calculation on the block hash value of the first block chain with the transaction information and the unique identity of the second block chain, and initiating a transaction request through the calculated hash value.
The characteristic of the irreversible operation of the Hash calculation can ensure that the transaction information cannot be easily cracked, thereby protecting the transaction information from being directly acquired by an illegal visitor.
In the step (4), the second blockchain performs a simple payment verification transaction of the light client through the gateway, which specifically includes: the light client side initiates a request, and after all nodes receive a transaction, the Merkle Tree of the block is calculated according to the block to which the transaction belongs. Then, after receiving the partial Merkle Tree, the light node locally calculates the hash of the transaction, and always calculates to obtain the Merkle Root according to each hash value on the partial Merkle Tree, and if the value is exactly matched with the header of the block, the transaction is successfully verified.
The advantage of using light client authentication is that the Merkle Tree can be used only by sending part of the Merkle Tree related to the current transaction without sending the whole Merkle Tree to the light node in order to confirm whether a transaction belongs to a Merkle Root.
Compared with the prior art, the invention has the following beneficial effects:
1. the block chain is registered to the relay terminal based on the identity encryption method, and the relay terminal only provides a registration function for the cross-chain transaction and does not participate in the specific details of cross-chain exchange;
2. after successful registration, both parties performing transaction directly perform cross-link data exchange without maintaining the time period specified by the hash time atomic exchange of the existing method, thereby avoiding the risk of network blockage caused by creating a large number of transactions by an attacker in the original hash time atomic exchange technology, and further improving the throughput of cross-link data transmission;
3. by adopting the SPV simple payment verification technology, the light client side SPV verification does not need to download all block chain information, and only needs to download the block head for verification, thereby ensuring the correctness of the transaction, reducing the time of the transaction and improving the throughput of the transaction.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
FIG. 2 is a timing diagram of cross-chain data interaction according to the present invention.
FIG. 3 is a schematic diagram of data encryption, broadcast, verification, and decryption according to the present invention.
Fig. 4 is a schematic diagram of an SPV simple payment verification method of the present invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings.
As shown in fig. 1, a high-throughput cross-link transaction method based on atomic exchange is mainly characterized in that: an encryption method based on block chain identity, a gateway intelligent contract and simple payment verification. The encryption method based on the block chain identity comprises the following steps: and a password generation module. The gateway intelligent contract comprises: identity registration contract, SPV verification module. The simple payment verification module includes: a transaction verification module. The method mainly comprises the following steps:
(1) A block chain for transaction generates a private key by using the unique identity in the block chain network through an IBE identity encryption method, and both parties of the block chain for transaction initiate a registration request to a relay end through a gateway intelligent contract by using the unique identity;
(2) The relay intelligent contract returns a registration success command to the corresponding block chain according to the registration request;
(3) The block chain uses the unique identity of the block chain with which information interaction is desired to encrypt the information through the identity, and initiates a transaction request;
(4) The corresponding block chain carries out SPV verification transaction of the light client through the gateway;
(5) And the corresponding block chain decrypts the information through the private key corresponding to the identity identification to obtain the information.
The cross-chain data interaction timing diagram is shown in fig. 2.
In the step (1), the specific steps of encrypting the two block chain parties through IBE identities to generate a private key and initiating a registration request to the relay end through a gateway intelligent contract by using the unique identity are as follows: and (1-1) generating a corresponding private key by using an encryption and decryption method based on identity authentication and using an elliptic curve algorithm according to the uniqueness of the identity of each blockchain in a cross-chain system as a public key.
Block chainIs a collection of identities, wherein. Suppose M is plaintext information to be encrypted and S represents ciphertext after plaintext encryption.
Improved scheme based on IBE identity encryptionThe method consists of three steps of extract, encrypt and decrypt, and forms a triple about the algorithmWherein, extract is a key generation algorithm, encrypt is a plaintext encryption algorithm, decrypt is a ciphertext decryption algorithm, and the specific description is as follows:
the algorithm K is executed in the extract stage, and the input is an identityAnd is andthe public key PK and private key SK corresponding to the identity are output:the algorithm K is a public-private key generation algorithm, PK is a public key, SK is a private key, and ID is the unique identity of the block chain in the cross-chain system.
And (1-2) storing the Private Key SK into a Private Key Generator (PKG), wherein the PKG adopts a management mechanism construction mode of a hierarchical tree structure and is used for later information decryption.
And (1-3) writing an intelligent contract at the gateway end according to the public key PK generated by the unique identity in the step (1-1), wherein the intelligent contract comprises the unique identity information of the corresponding block chain.
And (1-4) sending the intelligent contract to the relay terminal through the gateway to initiate a registration request for the block chain.
In the step (2), the specific steps of the relay intelligent contract for returning the successful registration are as follows: and (2-1) after the relay intelligent contract receives the registration request from the gateway end, checking whether the registration request meets the requirement, and if so, returning a command of successful registration to the gateway.
And (2-2) the returned information also comprises public keys corresponding to the identity IDs of all block chains registered at the relay terminal so as to facilitate the subsequent information interactive use.
The schematic diagram of data encryption, broadcasting, verification and decryption is shown in fig. 3.
In step (3), the specific steps of initiating the transaction request are as follows: (3-1) the block chain A encrypts the information to be interacted by using the unique identifier of the block chain of the opposite side through the corresponding gateway, and then the gateway side broadcasts the encrypted information to the whole network to initiate a transaction request.
The algorithm E is executed in the encryption stage of encrypt, and the input is the message to be encryptedPublic key PK, output encrypted ciphertext S for M:the algorithm E is an encryption algorithm, S is an encrypted ciphertext, M is transaction information, and PK is a generated public key.
In the step (4), the transaction verification is carried out by the following specific steps: (4-1) the gateway D receives the transaction request broadcasted by the block chain A, and the transaction request is simply paid and verified by the SPV of the light client. A schematic diagram of the SPV simple payment verification method is shown in fig. 4.
And (4-2) calculating the hash value of the transaction to be verified.
And (4-3) acquiring and storing all block headers from the block chain network to the local.
(4-4) obtaining a hash authentication path of the corresponding Merkle Tree to be verified from the blockchain.
And (4-5) calculating a root hash value of the Merkle Tree according to the hash authentication path, comparing the calculation result with the root hash value of the Merkle Tree at the head of the local block, and if the calculation result is the same as the root hash value of the Merkle Tree, positioning the block containing the block to be verified.
(4-6) according to the position of the block head, it can be verified whether the block head of the block is in the block chain, so as to determine that the transaction is true and valid.
In the step (5), the specific steps of obtaining information are as follows: and (5-1) after the transaction request is confirmed, the gateway D requests a private key from the key server to perform decryption operation.
And (5-2) the gateway D obtains the private key of the block chain B sent by the key server, decrypts the private key and stores the information sent by the block chain A into the block chain B.
The algorithm J is executed in a decryption stage, encrypted ciphertext S and a private key SK are input, and a plaintext message M corresponding to the ciphertext S is output:wherein M is transmitted transaction information, the algorithm J is a decryption algorithm, S is a ciphertext generated by the last algorithm, and SK is a private key.
At this point, the information on the block chain a is written into the block chain B, and the information interaction is completed. If the block chain A wants to acquire the information on the block chain B, the steps (4) and (5) are performed. When the IBE encryption algorithm is used, encryption can be carried out only according to the identity information, and a digital certificate is not required to be applied like other encryption algorithms, so that a series of complicated processes of certificate issuing, revocation, verification, custody and the like are avoided. Through direct cross-link data exchange between two parties performing transaction and the adoption of SPV simple payment verification technology, the correctness of transaction is ensured, and the throughput of cross-link data transmission is improved.
The above description is only exemplary of the embodiments of the present disclosure. It should be noted that the technical features of the present invention are not limited thereto but are to be accorded the widest scope consistent with the principles and novel features disclosed herein. Any modification or improvement made by one of ordinary skill in the art within the field of the present invention is within the scope of the present invention.
Claims (5)
1. A high-throughput cross-chain transaction method based on atomic exchange is characterized by comprising the following steps:
(1) The method comprises the steps that a first block chain and a second block chain under different scenes are adopted, a registration request is sent to a relay terminal through a gateway intelligent contract after respective unique identities of the first block chain and the second block chain are encrypted, and a command of successfully registering the corresponding block chain is returned according to the registration request;
(2) After the first block chain and the second block chain receive the command of successful registration, an interaction channel is established;
(3) After the interactive channel is established, the first block chain wants to interact with the information of the second block chain, and the first block chain encrypts the information of the first block chain through the unique identity of the second block chain and initiates a transaction request;
(4) And after a transaction request is initiated, the second block chain performs simple payment verification transaction of the light client through the gateway, and if the verification is successful, the second block chain decrypts the information through a decryption algorithm according to a private key of the second block chain and stores the information into the block chain of the second block chain.
2. The atomic exchange-based high-throughput cross-chain transaction method according to claim 1, wherein in the step (1), the unique identity encryption of each of the first blockchain and the second blockchain generates the private key by using a public-private key algorithm.
3. The method for high throughput cross-chain transaction based on atomic exchange according to claim 2, wherein in the step (1), the encryption of the unique identities of the first blockchain and the second blockchain respectively generates the private key by using a public-private key algorithm, which specifically includes:
and outputting the unique identity of the input block chain to a public key and a private key corresponding to the identity by generating a public-private key algorithm, wherein the public key is used as the unique identity of the identity.
4. The method for high throughput cross-chain transaction based on atomic exchange according to claim 1, wherein in step (3), the information of the first blockchain is a blockhash value of the first blockchain with the transaction information.
5. The method for high throughput cross-chain transaction based on atomic exchange according to claim 1, wherein in step (3), the first blockchain encrypts the information of the first blockchain through the unique id of the second blockchain, and initiates the transaction request, specifically comprising:
and carrying out hash calculation on the block hash value of the first block chain with the transaction information and the unique identity of the second block chain, and initiating a transaction request through the calculated hash value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211557241.7A CN115766040A (en) | 2022-12-06 | 2022-12-06 | High-throughput cross-chain transaction method based on atomic exchange |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211557241.7A CN115766040A (en) | 2022-12-06 | 2022-12-06 | High-throughput cross-chain transaction method based on atomic exchange |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115766040A true CN115766040A (en) | 2023-03-07 |
Family
ID=85343663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211557241.7A Pending CN115766040A (en) | 2022-12-06 | 2022-12-06 | High-throughput cross-chain transaction method based on atomic exchange |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115766040A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112636930A (en) * | 2020-12-31 | 2021-04-09 | 重庆邮电大学 | Asset transaction method and system based on atomic exchange |
CN113837760A (en) * | 2021-11-25 | 2021-12-24 | 腾讯科技(深圳)有限公司 | Data processing method, data processing device, computer equipment and storage medium |
US20220166602A1 (en) * | 2020-11-20 | 2022-05-26 | Hong Kong Applied Science and Technology Research Institute Company Limited | Apparatus and Method of Lightweight Communication Protocols between Multiple Blockchains |
CN114615095A (en) * | 2022-05-12 | 2022-06-10 | 北京邮电大学 | Block chain cross-chain data processing method, relay chain, application chain and cross-chain network |
CN114730421A (en) * | 2019-11-08 | 2022-07-08 | 阿尔戈兰德公司 | Trading using private and public blockchains |
-
2022
- 2022-12-06 CN CN202211557241.7A patent/CN115766040A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114730421A (en) * | 2019-11-08 | 2022-07-08 | 阿尔戈兰德公司 | Trading using private and public blockchains |
US20220166602A1 (en) * | 2020-11-20 | 2022-05-26 | Hong Kong Applied Science and Technology Research Institute Company Limited | Apparatus and Method of Lightweight Communication Protocols between Multiple Blockchains |
CN112636930A (en) * | 2020-12-31 | 2021-04-09 | 重庆邮电大学 | Asset transaction method and system based on atomic exchange |
CN113837760A (en) * | 2021-11-25 | 2021-12-24 | 腾讯科技(深圳)有限公司 | Data processing method, data processing device, computer equipment and storage medium |
CN114615095A (en) * | 2022-05-12 | 2022-06-10 | 北京邮电大学 | Block chain cross-chain data processing method, relay chain, application chain and cross-chain network |
Non-Patent Citations (1)
Title |
---|
陈园: ""基于区块链的物联网网关的研究与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》, no. 2021, 15 February 2021 (2021-02-15), pages 136 - 512 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109922077B (en) | Identity authentication method and system based on block chain | |
CN110719165B (en) | Block chain distributed dynamic network key generation and encryption method | |
US7386722B2 (en) | Certificate management system and method | |
CN110046521A (en) | Decentralization method for secret protection | |
USRE36946E (en) | Method and apparatus for privacy and authentication in wireless networks | |
CN106600252A (en) | Payment method and system based on block chain | |
Kim et al. | A secure smart-metering protocol over power-line communication | |
CN101964791B (en) | Communication authenticating system and method of client and WEB application | |
CN110059503A (en) | The retrospective leakage-preventing method of social information | |
CN114499898B (en) | Block chain cross-chain secure access method and device | |
EP1508993A1 (en) | Information processing system and method, information processing device and method, recording medium, and program | |
CN112134892B (en) | Service migration method in mobile edge computing environment | |
US8892882B2 (en) | Content transmission security protection device system and method | |
JPH11289329A (en) | Verification type search tree | |
CN111163109B (en) | Block chain center-removing type node anti-counterfeiting method | |
CN110071807B (en) | Block chain point-to-point node authentication method, system and computer readable storage medium | |
CN101388774A (en) | Method for automatically authenticate and recognize customer identity between different customers and login | |
CN115021958B (en) | Mist calculation and blockchain fusion intelligent home identity authentication method and system | |
CN113360861B (en) | Mortgage loan oriented decentralized identity method based on repeater cross-chain | |
CN114499876B (en) | Internet of things data storage and verification method based on blockchain and NB-IoT chip | |
CA2381108A1 (en) | Secure mutual authentication system | |
CN114531680B (en) | Light-weight IBC bidirectional identity authentication system and method based on quantum key | |
CN114938280A (en) | Authentication method and system based on non-interactive zero-knowledge proof and intelligent contract | |
CN111339509A (en) | Block chain cross-chain identity authentication method based on side chain | |
Hou et al. | Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |