CN117955742A - Verification method and device for data cross-link interaction, challenge node and storage medium - Google Patents

Verification method and device for data cross-link interaction, challenge node and storage medium Download PDF

Info

Publication number
CN117955742A
CN117955742A CN202410346185.5A CN202410346185A CN117955742A CN 117955742 A CN117955742 A CN 117955742A CN 202410346185 A CN202410346185 A CN 202410346185A CN 117955742 A CN117955742 A CN 117955742A
Authority
CN
China
Prior art keywords
chain
cross
network system
blockchain network
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410346185.5A
Other languages
Chinese (zh)
Other versions
CN117955742B (en
Inventor
汪小益
夏立伟
张帅
韦懿杰
李瑞阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou High Tech Zone Binjiang Blockchain And Data Security Research Institute
Original Assignee
Hangzhou High Tech Zone Binjiang Blockchain And Data Security Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou High Tech Zone Binjiang Blockchain And Data Security Research Institute filed Critical Hangzhou High Tech Zone Binjiang Blockchain And Data Security Research Institute
Priority to CN202410346185.5A priority Critical patent/CN117955742B/en
Publication of CN117955742A publication Critical patent/CN117955742A/en
Application granted granted Critical
Publication of CN117955742B publication Critical patent/CN117955742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application is applicable to the technical field of blockchain, and provides a verification method and device for data cross-chain interaction, a challenge node and a storage medium, wherein the verification method comprises the following steps: if the source blockchain network system generates a cross-chain message, the target node in the under-chain node submits a cross-chain proof of the cross-chain message to the target blockchain network system; if the submitting node in the under-chain node determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, submitting the cross-chain message to the target blockchain network system; if the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation for sending proof to the destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine a cross-chain attestation error. By setting the node under the chain, the application verifies the cross-chain certification of the cross-chain message submitted to the target block chain network system, and ensures the safety and reliability of the interaction process of different block chain network systems.

Description

Verification method and device for data cross-link interaction, challenge node and storage medium
Technical Field
The application belongs to the technical field of blockchain, and particularly relates to a verification method and device for data cross-chain interaction, a challenge node and a storage medium.
Background
For different blockchain network systems, each blockchain network system has an account book, a consensus mechanism and an intelligent contract, so that the information island problem is generated, and the goal of blockchain cross-linking is to enable the independent blockchain network systems to effectively communicate and cooperate with each other so as to realize the cross-linking transfer of data information. However, actions such as error or malicious fraud of interaction information may exist in the cross-chain interaction, which affect the reliability of the interaction, so how to ensure the information security and reliability in the interaction process of different blockchain network systems is a problem which needs to be solved at present.
Disclosure of Invention
The embodiment of the application provides a verification method and device for data cross-chain interaction, a challenge node and a storage medium, which can solve the security problem of cross-chain messages in the interaction process of different block chain network systems.
In a first aspect, an embodiment of the present application provides a verification method for data cross-chain interaction, applied to an under-chain component, where the under-chain component includes: a plurality of under-link nodes, the method comprising:
if the source blockchain network system generates a cross-chain message, the target node in the under-chain node submits a cross-chain proof of the cross-chain message to the target blockchain network system;
if a submitting node in the under-chain nodes determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system;
If the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation, wherein the challenge operation is used for sending evidence for verifying the cross-chain certification to the destination blockchain network system so that the destination blockchain network system determines the cross-chain certification error.
In the embodiment of the application, the task of the cross-link is divided by introducing the witness node, the submitting node and the challenge node under the link, the witness node is responsible for submitting the cross-link evidence to the target blockchain network system, the submitting node is responsible for submitting the cross-link message to the target blockchain network system after confirming that the cross-link evidence is sent, and the challenge node is responsible for triggering the challenge operation to enable the target blockchain network system to verify the cross-link evidence, so that the witness node is prevented from sending the wrong cross-link evidence, and the authenticity of the cross-link message is ensured. Through the division cooperation among the nodes, the interaction safety among different block chain network systems can be effectively improved, and the reality and reliability of the cross-chain message are ensured.
In one possible implementation, the cross-chain attestation includes: when a current cross-chain message is generated, a current block height and a current block hash of a source blockchain network system, at least one challenge node of the under-chain nodes determining whether to trigger a challenge operation includes:
At least one of the under-chain nodes verifies that the cross-chain attestation is correct based on a current challenge-checking credential, wherein the current challenge-checking credential includes: when the last cross-chain message is generated, the current block height and the current block hash of the source block chain network system are generated;
If so, updating the current challenge verification credential as: when the current cross-chain message is generated, the current block height and the current block hash of the source blockchain network system.
In one possible implementation, the challenge operation includes:
the at least one challenge node sends a current block hash of a current check credential to the source blockchain network system as evidence information to the destination blockchain network system, the current check credential comprising: the last time a cross-chain message was generated, the current block hash of the source blockchain network system.
In one possible implementation, the determining, by at least one challenge node of the under-chain nodes, whether to trigger a challenge operation includes:
Acquiring the current block height and the current block hash sent by the source block chain network system;
Comparing whether the current block hash is consistent with the current block hash in the cross-chain certification;
And if the current block hash is consistent, updating the current block hash to a current check certificate.
In one possible implementation, the cross-chain attestation further includes: the response piece root hash, and/or,
The challenge verification credential further includes: the current block height of the source chain.
In one possible implementation, the verification method further includes:
the witness node generates first cost data for the cross-chain evidence;
if the target blockchain network system determines that the cross-chain proving is wrong, deleting the first cost data from the witness node; and/or the number of the groups of groups,
The submitting node generates second cost data for the cross-link message;
And if the target blockchain network system determines that the cross-chain message is wrong, deleting the second cost data from the submitting node.
In a second aspect, an embodiment of the present application provides a verification apparatus for data cross-link interaction, including:
The cross-chain proof submitting module is used for submitting the cross-chain proof of the cross-chain message to the target blockchain network system if the source blockchain network system generates the cross-chain message;
A cross-chain message submitting module, wherein if a submitting node in the under-chain node determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system;
And the verification module is used for determining whether to trigger a challenge operation or not by at least one challenge node in the under-chain nodes if the cross-chain message is sent to the target blockchain network system, wherein the challenge operation is used for sending evidence for verifying the cross-chain certification to the target blockchain network system so as to enable the target blockchain network system to determine the cross-chain certification error.
In a third aspect, an embodiment of the present application provides a verification method for data cross-link interaction, which is applied to a challenge node, and includes:
If the cross-chain message generated by the source blockchain network system is sent to the target blockchain network system, at least one challenge node determines whether to trigger a challenge operation;
The cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
In a fourth aspect, an embodiment of the present application provides a challenge node, including:
The challenge operation triggering module is used for determining whether to trigger a challenge operation or not by at least one challenge node if a cross-chain message generated by the source blockchain network system is sent to the target blockchain network system; the cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
In a fifth aspect, embodiments of the present application provide a computer readable storage medium storing a computer program which, when executed by a processor, implements a method as described above.
It will be appreciated that the advantages of the second to fifth aspects may be found in the relevant description of the first aspect, and are not described here again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a verification method for data cross-chain interaction according to another embodiment of the present application;
FIG. 2is a flow chart of a challenge operation trigger according to another embodiment of the present application;
FIG. 3 is a schematic structural diagram of a verification device for data cross-chain interaction according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a network architecture for data cross-chain interaction provided by an embodiment of the present application;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the present description and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Furthermore, the terms "first," "second," "third," and the like in the description of the present specification and in the appended claims, are used for distinguishing between descriptions and not necessarily for indicating or implying a relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Blockchain technology is a decentralised, distributed, non-tamperable data storage technology. Each blockchain network is an independent system with its own ledger and authentication mechanism. However, in practice, it is sometimes necessary to transfer information or value between different blockchain networks, which requires cross-chain interactions. Cross-chain interactions involve multiple blockchain networks, so the authenticity and integrity of the information during delivery must be ensured.
The application provides a verification method for data cross-chain interaction, which divides a cross-chain task by introducing a witness node, a submitting node and a challenge node under a chain, wherein the witness node is responsible for submitting a cross-chain evidence to a target block chain network system, the submitting node is responsible for submitting a cross-chain message to the target block chain network system after confirming that the cross-chain evidence is sent, and the challenge node is responsible for triggering a challenge operation so as to enable the target block chain network system to verify the cross-chain evidence.
In order to illustrate the technical scheme of the application, the following description is given by specific examples.
Referring to the flow of one embodiment of a verification method of data cross-chain interaction shown in FIG. 1, by way of example and not limitation, the method comprises the steps of:
step S100: if the source blockchain network system generates a cross-chain message, the target node in the under-chain node submits a cross-chain proof of the cross-chain message to the target blockchain network system;
Step S200: if a submitting node in the under-chain nodes determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system;
Step S300: if the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation, wherein the challenge operation is used for sending evidence for verifying the cross-chain certification to the destination blockchain network system so that the destination blockchain network system determines the cross-chain certification error.
It should be noted that, the source blockchain network system refers to the blockchain network where the cross-chain message is originally located. Cross-chain requirements may arise in source blockchain network systems, such as the need to transfer certain assets or data to another blockchain network, or the need to share certain information among multiple blockchain networks. The target blockchain network system is the target blockchain network of the cross-chain message. The cross-chain message generated by the source blockchain network system is sent to the destination blockchain network system, which verifies the authenticity and integrity of the received cross-chain message and incorporates the information or asset into its own ledger after confirming that it is correct. In the process of cross-chain interaction, the source blockchain network system and the destination blockchain network system need to realize information transmission and verification through specific cross-chain protocols or technologies. In the application, by setting the under-chain nodes, a plurality of under-chain nodes work cooperatively to ensure the safety, reliability and efficiency of cross-chain interaction.
Specifically, three kinds of nodes under the chain are arranged in the scheme provided by the application, and the scheme comprises the following steps: witness nodes, submittal nodes, and challenge nodes.
When the source blockchain network system generates the cross-chain information, the witness node in the under-chain node collects the related information and generates a cross-chain evidence, the cross-chain evidence comprises verification information of the integrity and the source of the cross-chain information, and the witness node submits the cross-chain evidence to the target blockchain network system for subsequent verification.
The submitting node in the under-chain node further submits the cross-chain information to the target block chain network system after confirming that the cross-chain certification is successfully sent to the target block chain network system, so that the cross-chain information can be processed in the target block chain network system.
The challenge node in the under-chain node is responsible for supervising the process of cross-chain interaction and triggering the challenge operation when necessary, and the core of the challenge operation is to send proof for verifying the cross-chain proof to the target blockchain network system, wherein the proof can be information contradicting the cross-chain proof or data for further verifying the authenticity of the cross-chain proof.
After the challenge node triggers the challenge operation, the target blockchain network system verifies the cross-chain certification according to the evidence provided by the challenge node. If the verification result shows that there is an error in the cross-chain proof, the destination blockchain network system may refuse to accept the cross-chain information, thereby preventing potential fraud and errors.
According to the verification method for data cross-chain interaction, by introducing the witness node, the submitting node and the challenge node under the chain, the witness node is responsible for submitting the cross-chain evidence to the target block chain network system, the submitting node is responsible for submitting the cross-chain information to the target block chain network system after confirming that the cross-chain evidence is sent, and the challenge node is responsible for triggering the challenge operation so that the target block chain network system verifies the cross-chain evidence, and through the cooperation of the witness between the nodes, the interaction safety between different block chain network systems can be effectively improved, and the reality and reliability of the cross-chain information are ensured.
It should be noted that, the scenario where the verification method for data cross-link interaction provided by the present application may be applied includes: cross-chain asset transactions, cross-chain data sharing, cross-chain service invocation, cross-chain identity verification, and the like.
By way of example, when digital assets on different blockchain networks need to be transacted, the verification method of data cross-chain interaction provided by the application can provide a safe and reliable cross-chain interaction verification mechanism, and can ensure the authenticity and the integrity of the cross-chain transaction and prevent double payment and fraud through cooperative work of a witness node, a submitting node and a challenge node; as another example, in the areas of supply chain finance, medical data sharing, etc., different participants may use different blockchain networks, and the method provided by the application may help them securely share and verify data; for another example, in the case that the service is required to be called or the intelligent contract is required to be executed on different blockchain networks, the method provided by the application can ensure the correctness and the safety of the service call, and can ensure the source of the call request and the authenticity of the content through a cross-chain proving and verifying mechanism, thereby preventing malicious attack and tampering.
In the following, a specific usage scenario is described, taking a cross-link information interaction process between a blockchain network a and a blockchain network B as an example, assuming that an a blockchain network is a source blockchain network system and a B blockchain network is a destination blockchain network system, when the a blockchain network wants to send a cross-link message to the B blockchain network, firstly, generating a cross-link proof of the cross-link message by a witness node in a node under the chain and submitting the cross-link proof to the B blockchain network; then, determining whether the cross-chain proof is sent to the B block chain network by the submitting node, if the cross-chain proof is sent successfully, the submitting node submits a cross-chain message from the A block chain network to the B block chain network; finally, if the cross-chain message is sent to the B-blockchain network, determining, by the at least one challenge node, whether to trigger a challenge operation for sending proof to the B-blockchain network to verify the cross-chain attestation to cause the B-blockchain network to determine a cross-chain attestation error.
In one possible implementation, the cross-chain attestation includes: when the current cross-chain message is generated, determining whether to trigger a challenge operation by at least one challenge node of the under-chain nodes includes:
Step S301: at least one challenge node in the under-chain nodes verifies whether the cross-chain attestation is correct based on a current challenge-checking credential, wherein the current challenge-checking credential comprises: when the previous cross-chain message is generated, the current block height and the current block hash of the source block chain network system are updated, if correct, the current challenge verification certificate is: when the current cross-chain message is generated, the current block height and the current block hash of the source blockchain network system.
It should be noted that, the cross-chain proof is to ensure the authenticity and integrity of the cross-chain message in the transmission process, and it contains two key information: the current block height of the source blockchain network system when the current cross-chain message is generated, and the current block hash of the source blockchain network system when the current cross-chain message is generated.
It should be noted that, the block height refers to the height of the current latest block on the blockchain, i.e. the number of blocks, and this information is used to identify at which height (or which point in time) the cross-chain message is generated by the source blockchain network system, so as to ensure the timing of the message.
The block hash is a unique identifier obtained by performing a hash operation on a block content, and the hash value is used for verifying the integrity of the block and confirming that the information is not tampered. By including the blockhash in the cross-chain proof, the destination blockchain network system of the seat cross-chain message recipient can verify the state of the source blockchain network system when the cross-chain message is generated, ensuring the authenticity of the source of the message.
In the present application, the challenge operation is a key step in the cross-chain interactive verification mechanism for verifying cross-chain attestation when necessary. The challenge operation needs to be triggered by the challenge node after verifying the correctness of the cross-chain proof according to the current challenge verification certificate.
Specifically, the current challenge verification credential includes a current block height and a current block hash of the source blockchain network system when the previous cross-chain message is generated, the challenge node compares the current block height and the current block hash in the cross-chain certificate by using the current challenge verification credential, and if the verification is passed, the challenge node updates the current challenge verification credential to change the current challenge verification credential to the block height and the block hash when the current cross-chain message is generated, so as to prepare for the next verification.
It should be noted that, after step S301, the challenge verification credential may be updated, so that the challenge node only needs to determine the correctness of the cross-chain credential according to the current challenge verification credential, and does not need to verify the block hashes of all the blocks in the source blockchain network system one by one, thereby improving the verification efficiency.
In one possible implementation, the challenge operation includes:
At least one challenge node sends a current blockhash of a current verification credential to a source blockchain network system as evidence information to a destination blockchain network system, the current verification credential comprising: the last time a cross-chain message was generated, the current block hash of the source blockchain network system.
It should be noted that the challenge operation is an important link in the cross-chain interactive verification mechanism, and the purpose of this step is to verify the authenticity of the cross-chain proof according to the evidence information provided by the challenger. In the challenge operation, at least one challenge node sends the current block hash from the current verification certificate to the source blockchain network system as evidence information to the destination blockchain network system, and the destination blockchain network system verifies the evidence information after receiving the evidence information, so as to confirm the authenticity of the cross-chain certification.
It should be noted that, the evidence information includes a plurality of block hashes, which start from the current block hash of the source blockchain network system at the time of the last generation of the cross-chain message and extend all the way to the current latest block hash, and it is understood that the evidence information includes at least two block hashes.
It should be noted that, the current verification credential is a special evidence, and includes the current block hash of the source blockchain network system at the time of the last generation of the cross-chain message, and uses it as the starting point of the evidence information, because the verification credential is a continuously updated credential, and the information included in the verification credential is verified correct information. Therefore, when evidence is submitted to the target block chain network system, only the current verification certificate is needed, and all block hashes of all blocks in the source block chain network are not needed to be submitted to the target block chain network.
Illustratively, taking the example that the proof information submitted by the challenger includes four block hashes, namely, the proof information includes: the target block chain network system can deduce a correct fourth block hash according to the first block hash, the second block hash and the third block hash, compare the correct fourth block hash with the fourth block hash contained in evidence information, and prove that the cross-chain evidence submitted by a witness is wrong if the comparison is wrong.
In one possible implementation, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation, referring to fig. 2, comprising:
Step A101: acquiring the current block height and the current block hash sent by the source block chain network system;
step A102: comparing whether the current block hash is consistent with the current block hash in the cross-chain certification;
Step A103: and if the current block hash is consistent, updating the current block hash to a current check certificate.
It should be noted that, in this embodiment, the challenge node compares the current block hash of the source blockchain network system with the current block hash in the cross-chain proof, and if the comparison results are consistent, the cross-chain proof is valid, and the challenge node updates the current block hash to the current check certificate. This updated check certificate will serve as the starting point for the next challenge operation, ensuring continuity and consistency of the challenge operation. If the comparison fails, a challenge operation is triggered.
By comparing the current blockhash of the source blockchain network system to the blockhashes in the cross-chain attestation, the challenge node is able to verify the authenticity of the cross-chain attestation, which helps to prevent potential fraud and error behavior, thereby improving the security of cross-chain interactions. Meanwhile, compared with a complex verification mechanism, the verification mode based on block hash comparison is simpler and more direct, and the challenge node can quickly judge the validity of the cross-chain evidence only by acquiring the latest block hash and comparing.
In one possible implementation, the cross-chain attestation further includes: receipt root hash.
For a better understanding of the present application, a simple introduction is first made to the root hash.
Root Hash (Root Hash) is the top Hash value of the Merkle tree (or Hash tree) that is formed by hashing and combining a series of data blocks. The Merkle tree is a binary tree (or multi-way tree) that splits a large number of data blocks into smaller units, then hashes the units, and repeats this process until only one hash value remains, the root hash. In blockchain technology, merkle trees are widely used. Each block or transaction of data is a leaf node in the tree that contains the data or its hash value. The values of each pair of leaf nodes are then combined by a hashing algorithm into a new hash value, which serves as an intermediate node. This process continues until only one hash value remains, the root hash. Root hashes play a very important role in blockchains. It is a compact representation of all transactions in a block that can be used to verify the existence of a transaction within the block. Any modification to the transactions in the block will result in a change to the root hash value, a mechanism that ensures the integrity and authenticity of the data.
It should be noted that root hash is a key component in blockchain technology, and provides an efficient and secure way to organize, verify and query data in a block, so that in this embodiment, the accuracy of verifying the cross-chain attestation can be improved by using the receipt root hash as the cross-chain attestation.
In one possible implementation, the verification method further includes:
the witness node generates first cost data for the cross-chain evidence;
if the target blockchain network system determines that the cross-chain proving is wrong, deleting the first cost data from the witness node; and/or the number of the groups of groups,
The submitting node generates second cost data for the cross-link message;
And if the target blockchain network system determines that the cross-chain message is wrong, deleting the second cost data from the submitting node.
In this embodiment, cost data is introduced, which may be regarded as an incentive mechanism to encourage the nodes to provide correct and efficient data such as cross-chain proof and cross-chain messages. If the relevant data provided by the node is determined to be erroneous by the destination blockchain network system, then the cost data is deleted. This cost mechanism helps to ensure that nodes participating in cross-chain interactions can be responsible for their own behavior, reducing the likelihood of malicious behavior or misoperations. This is effectively a penalty to the node that helps maintain the security and reliability of cross-chain interactions.
It should be noted that, when generating the first price data for the witness node, the challenge node submits evidence and the price data generated when the target blockchain network system verifies the evidence needs to be considered, and it can be understood that if the number of blocks involved in the evidence is larger, the first price data generated by the witness node is larger.
The present application also provides a verification apparatus 400 for data cross-link interaction, referring to fig. 3, including:
the cross-chain proof submitting module 401 submits the cross-chain proof of the cross-chain message to the target blockchain network system by the target node in the under-chain node if the source blockchain network system generates the cross-chain message;
a cross-chain message submitting module 402, wherein if a submitting node in the under-chain node determines that a cross-chain proof of the cross-chain message has been sent to the destination blockchain network system, the submitting node submits the cross-chain message to the destination blockchain network system;
A verification module 403, if the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation, where the challenge operation is used to send proof for verifying the cross-chain attestation to the destination blockchain network system, so that the destination blockchain network system determines the cross-chain attestation error. It should be noted that, when the source blockchain network system generates the cross-chain information, the cross-chain proof submitting module 401 may collect related information and generate a cross-chain proof through the witness node in the under-chain node, where the cross-chain proof includes the integrity and the verification information of the source of the cross-chain message, and the witness node submits the cross-chain proof to the destination blockchain network system for subsequent verification.
The cross-chain message submitting module 402 further submits the cross-chain information to the target blockchain network system after confirming that the cross-chain proof has been successfully sent to the target blockchain network system through the submitting node in the under-chain nodes, so as to ensure that the cross-chain information can be processed in the target blockchain network system.
The verification module 403 is responsible for supervising the process of cross-chain interaction by the challenge node in the under-chain node and triggering the challenge operation if necessary, the core of which is to send proof to the destination blockchain network system that verifies the cross-chain attestation, which can be information contradicting the cross-chain attestation or data for further verifying the authenticity of the cross-chain attestation. After the challenge node triggers the challenge operation, the target blockchain network system verifies the cross-chain certification according to the evidence provided by the challenge node. If the verification result shows that there is an error in the cross-chain proof, the destination blockchain network system may refuse to accept the cross-chain information, thereby preventing potential fraud and errors.
According to the verification device 400 for data cross-chain interaction, through the collocation of the cross-chain proof submitting module 401, the cross-chain message submitting module 402 and the verification module 403, the interaction safety among different block chain network systems can be effectively improved, and the real and reliable cross-chain messages are ensured.
It should be noted that, the verification apparatus 400 for data cross-link interaction provided in this embodiment may be used to implement the verification method for data cross-link interaction described in any of the foregoing embodiments.
The cross-chain interaction process is described with reference to a network architecture diagram of data cross-chain interactions shown in fig. 4. If the source blockchain network system generates a cross-chain message, the target node in the under-chain node submits a cross-chain proof of the cross-chain message to the target blockchain network system; then if the submitting node in the under-chain node determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system; finally, if the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation for sending proof to the destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine a cross-chain attestation error.
The application also provides a verification method of data cross-chain interaction, which is applied to the challenge node and comprises the following steps:
If the cross-chain message generated by the source blockchain network system is sent to the target blockchain network system, at least one challenge node determines whether to trigger a challenge operation;
The cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
It should be noted that, in this embodiment, the execution body is a challenge node, where the challenge node is used as a key node in the under-chain nodes, and after the cross-chain message and the cross-chain credential have been submitted to the target blockchain network system, it is determined whether to trigger a challenge operation, where the challenge operation is used to send evidence for verifying the cross-chain credential to the target blockchain network system, so that the target blockchain network system determines that the cross-chain credential is wrong. According to the embodiment, the challenge node is used for triggering the challenge operation so that the target blockchain network system can determine the cross-chain proof error, the interaction safety between different blockchain network systems can be effectively improved, and the reality and reliability of the cross-chain information are ensured.
The present application also provides a challenge node comprising:
The challenge operation triggering module is used for determining whether to trigger a challenge operation or not by at least one challenge node if a cross-chain message generated by the source blockchain network system is sent to the target blockchain network system; the cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
It should be noted that, in this embodiment, after the cross-chain message and the cross-chain credential have been submitted to the target blockchain network system, the challenge operation triggering module determines whether to trigger a challenge operation, where the challenge operation is used to send evidence for verifying the cross-chain credential to the target blockchain network system, so that the target blockchain network system determines a cross-chain credential error. According to the embodiment, the challenge operation triggering module is used for triggering the challenge operation so that the target block chain network system can determine the cross-chain proof error, the interaction safety between different block chain network systems can be effectively improved, and the reality and reliability of the cross-chain information are ensured.
It should be noted that, in different data cross-link interaction processes, each node may perform role conversion, that is, the same node may play different roles in different interaction processes. The roles of the nodes may be specified by the contracts of the destination blockchain network system, and when the contracts determine which node is the commit node and which node is the witness node for the current time period, the remaining under-chain nodes that are not the witness and commit nodes will automatically be converted to the challenge nodes.
It should be noted that, the contracts of the target blockchain network system will change the submitting node and the witness node after a certain condition, at this time, all the nodes under the chain will monitor the role change event thrown by the contracts of the target blockchain network system. When each node monitors the event, the role is changed. Wherein nodes changed to commit nodes or witness nodes need to generate corresponding cost data. If the cost data is not generated, the commit node or witness node needs to be reselected.
In some cases, if a network error or downtime occurs in the current witness or submitter node, a challenge or submitter node is required to apply for a mandatory role change. Generally, after the source blockchain network system chain generates the cross-chain message, the destination blockchain network system does not find the cross-chain proof or the cross-chain message is submitted within a certain time, at this time, the submitting node or the witness node can be considered to have an error, the role change application can be submitted to the destination blockchain network system, the destination blockchain network system can check after receiving the application, whether the change condition is met or not, if so, the change flow is performed, and a new submitting node or witness node is appointed.
Specifically, the downtime change application of the witness node can be initiated by the submitting node or the challenge node, and after the submitting node or the challenge node is initiated, the contract of the target blockchain network system throws out the witness node change preparation event. If the witness node is still alive, submitting the non-submitted certificate in the next preparation time, so that the contract of the target blockchain network system cancels the witness change; if the witness node is not alive, after the preparation event is completed, the commit node or the challenge node may initiate a witness node change acknowledgement, at which point the contract of the destination blockchain network system may reselect a new witness node and throw the new witness node as an event informing all of the under-chain nodes.
Similarly, the commit node change may be initiated by the witness or challenge node, which may initiate the commit node change if it is not yet found that the commit node commits the cross-chain message within a number of times after the witness node commits the cross-chain proof and the challenge period has elapsed, and the contract of the destination blockchain network system may check whether the validity period has elapsed, and initiate the commit node change if the validity period has elapsed.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application. The terminal device 1000 includes: at least one processor 1001 (only one processor is shown in fig. 5), a memory 1002 and a computer program 1003 stored in the memory 1002 and executable on the at least one processor 1001, the processor 1001 implementing the steps in any of the method embodiments described above when executing the computer program 1003.
The terminal device 1000 may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The terminal device may include, but is not limited to, a processor 1001, a memory 1002. It will be appreciated by those skilled in the art that fig. 5 is merely an example of terminal device 1000 and is not intended to limit terminal device 1000, and may include more or fewer components than shown, or may combine certain components, or may include different components, such as input-output devices, network access devices, etc.
The Processor 1001 may be a central processing unit (Central Processing Unit, CPU), the Processor 1001 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL processors, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), off-the-shelf Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 1002 may in some embodiments be an internal storage unit of the terminal device 1000, such as a hard disk or a memory of the terminal device 1000. The memory 1002 may also be an external storage device of the terminal device 1000 in other embodiments, such as a plug-in hard disk provided on the terminal device 1000, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), etc. Further, the memory 1002 may also include both an internal storage unit and an external storage device of the terminal device 1000. The memory 1002 is used to store an operating system, application programs, boot loader (BootLoader), data, and other programs, etc., such as program code of the computer program, etc. The memory 1002 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Embodiments of the present application also provide a computer readable storage medium storing a computer program which, when executed by a processor, performs the steps of the respective method embodiments described above.
Embodiments of the present application provide a computer program product which, when run on a mobile terminal, causes the mobile terminal to perform steps that enable the implementation of the method embodiments described above.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiments, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing device/terminal apparatus, recording medium, computer Memory, read-Only Memory (ROM), random access Memory (RAM, random Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. Such as a U-disk, removable hard disk, magnetic or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other manners. For example, the apparatus/network device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. A method of verification of data cross-chain interactions, applied to an under-chain component, the under-chain component comprising: a plurality of under-link nodes, the method comprising:
if the source blockchain network system generates a cross-chain message, the target node in the under-chain node submits a cross-chain proof of the cross-chain message to the target blockchain network system;
if a submitting node in the under-chain nodes determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system;
If the cross-chain message is sent to the destination blockchain network system, at least one challenge node in the under-chain nodes determines whether to trigger a challenge operation, wherein the challenge operation is used for sending evidence for verifying the cross-chain certification to the destination blockchain network system so that the destination blockchain network system determines the cross-chain certification error.
2. The method of verification of data cross-chain interactions of claim 1, wherein the cross-chain attestation comprises: when a current cross-chain message is generated, a current block height and a current block hash of a source blockchain network system, at least one challenge node of the under-chain nodes determining whether to trigger a challenge operation includes:
At least one of the under-chain nodes verifies that the cross-chain attestation is correct based on a current challenge-checking credential, wherein the current challenge-checking credential includes: when the last cross-chain message is generated, the current block height and the current block hash of the source block chain network system are generated;
If so, updating the current challenge verification credential as: when the current cross-chain message is generated, the current block height and the current block hash of the source blockchain network system.
3. The method of verification of data cross-chain interactions of claim 2, wherein the challenge operation comprises:
the at least one challenge node sends a current block hash of a current check credential to the source blockchain network system as evidence information to the destination blockchain network system, the current check credential comprising: the last time a cross-chain message was generated, the current block hash of the source blockchain network system.
4. The method of verification of data cross-chain interactions of claim 3, wherein at least one challenge node of the under-chain nodes determines whether to trigger a challenge operation, comprising:
Acquiring the current block height and the current block hash sent by the source block chain network system;
Comparing whether the current block hash is consistent with the current block hash in the cross-chain certification;
And if the current block hash is consistent, updating the current block hash to a current check certificate.
5. The method of verifying data cross-chain interactions of claim 3 or 4, wherein the cross-chain attestation further comprises: receipt root hash.
6. The method of verification of data cross-chain interactions of claim 1, wherein the method of verification further comprises:
the witness node generates first cost data for the cross-chain evidence;
if the target blockchain network system determines that the cross-chain proving is wrong, deleting the first cost data from the witness node; and/or the number of the groups of groups,
The submitting node generates second cost data for the cross-link message;
And if the target blockchain network system determines that the cross-chain message is wrong, deleting the second cost data from the submitting node.
7. A verification device for data cross-chain interaction, comprising:
The cross-chain proof submitting module is used for submitting the cross-chain proof of the cross-chain message to the target blockchain network system if the source blockchain network system generates the cross-chain message;
A cross-chain message submitting module, wherein if a submitting node in the under-chain node determines that the cross-chain proof of the cross-chain message is sent to the target blockchain network system, the submitting node submits the cross-chain message to the target blockchain network system;
And the verification module is used for determining whether to trigger a challenge operation or not by at least one challenge node in the under-chain nodes if the cross-chain message is sent to the target blockchain network system, wherein the challenge operation is used for sending evidence for verifying the cross-chain certification to the target blockchain network system so as to enable the target blockchain network system to determine the cross-chain certification error.
8. The verification method of data cross-chain interaction is characterized by being applied to a challenge node and comprising the following steps:
if the cross-chain message generated by the source blockchain network system is sent to the target blockchain network system, at least one challenge node determines whether to trigger a challenge operation;
The cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
9. A challenge node, comprising:
The challenge operation triggering module is used for determining whether to trigger a challenge operation or not by at least one challenge node if a cross-chain message generated by the source blockchain network system is sent to the target blockchain network system; the cross-chain evidence of the cross-chain message is submitted to a target blockchain network system by a witness node in the under-chain nodes; the cross-chain information is submitted to the target block chain network system after a submitting node determines that the cross-chain evidence of the cross-chain information is sent to the target block chain network system; the challenge operation is to send proof to a destination blockchain network system to verify the cross-chain attestation to cause the destination blockchain network system to determine the cross-chain attestation error.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 6 and claim 8.
CN202410346185.5A 2024-03-26 2024-03-26 Verification method and device for data cross-link interaction, challenge node and storage medium Active CN117955742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410346185.5A CN117955742B (en) 2024-03-26 2024-03-26 Verification method and device for data cross-link interaction, challenge node and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410346185.5A CN117955742B (en) 2024-03-26 2024-03-26 Verification method and device for data cross-link interaction, challenge node and storage medium

Publications (2)

Publication Number Publication Date
CN117955742A true CN117955742A (en) 2024-04-30
CN117955742B CN117955742B (en) 2024-06-14

Family

ID=90798267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410346185.5A Active CN117955742B (en) 2024-03-26 2024-03-26 Verification method and device for data cross-link interaction, challenge node and storage medium

Country Status (1)

Country Link
CN (1) CN117955742B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866825A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Public link-based block chain information storage method and system
US20200118068A1 (en) * 2018-10-10 2020-04-16 QuestaWeb, Inc. Hierarchical Blockchain Architecture for Global Trade Management
CN111541785A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Block chain data processing method and device based on cloud computing
CN112636930A (en) * 2020-12-31 2021-04-09 重庆邮电大学 Asset transaction method and system based on atomic exchange
CN113592475A (en) * 2021-08-02 2021-11-02 杭州复杂美科技有限公司 Cross-chain asset transfer method, computer device, and storage medium
CN114363162A (en) * 2021-12-31 2022-04-15 支付宝(杭州)信息技术有限公司 Block chain log generation method and device, electronic equipment and storage medium
WO2022205958A1 (en) * 2021-03-30 2022-10-06 蚂蚁区块链科技(上海)有限公司 Cross-chain transfer data method and apparatus based on relay device network
CN115796861A (en) * 2021-09-08 2023-03-14 区块链新科技(广州)有限公司 Cross-link transaction method, system, equipment and storage medium on block chain
CN116797364A (en) * 2023-05-31 2023-09-22 北京工业大学 Edge calculation cross-chain computing force transaction method based on predictors

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866825A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Public link-based block chain information storage method and system
US20200118068A1 (en) * 2018-10-10 2020-04-16 QuestaWeb, Inc. Hierarchical Blockchain Architecture for Global Trade Management
CN111541785A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Block chain data processing method and device based on cloud computing
CN112636930A (en) * 2020-12-31 2021-04-09 重庆邮电大学 Asset transaction method and system based on atomic exchange
WO2022205958A1 (en) * 2021-03-30 2022-10-06 蚂蚁区块链科技(上海)有限公司 Cross-chain transfer data method and apparatus based on relay device network
CN113592475A (en) * 2021-08-02 2021-11-02 杭州复杂美科技有限公司 Cross-chain asset transfer method, computer device, and storage medium
CN115796861A (en) * 2021-09-08 2023-03-14 区块链新科技(广州)有限公司 Cross-link transaction method, system, equipment and storage medium on block chain
CN114363162A (en) * 2021-12-31 2022-04-15 支付宝(杭州)信息技术有限公司 Block chain log generation method and device, electronic equipment and storage medium
CN116797364A (en) * 2023-05-31 2023-09-22 北京工业大学 Edge calculation cross-chain computing force transaction method based on predictors

Also Published As

Publication number Publication date
CN117955742B (en) 2024-06-14

Similar Documents

Publication Publication Date Title
JP7181232B2 (en) Blockchain for general computation
Guerraoui et al. The consensus number of a cryptocurrency
CN108764870B (en) Transaction processing method and device based on block chain and electronic equipment
CN112837048B (en) Cross-block-chain data processing method, device, equipment and computer storage medium
CN109426949B (en) Cross-chain transaction method and device
CN110011996B (en) Application authorization method and device based on block chain and electronic equipment
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN110688425A (en) Conditional deferred transactions for blockchains
CN110060155B (en) Intelligent contract execution method and device of block chain and electronic equipment
US11403281B2 (en) Parallel blockchain processing
CN111383114A (en) Asset information management method and device based on block chain
CN111402033A (en) Asset information management method and device based on block chain
US11354278B2 (en) Linking of tokens
CN111010284B (en) Processing method of block to be identified, related device and block chain system
CN111340628A (en) Asset information management method and device based on block chain
CN111429250A (en) Data management method and device in escort scene
CN112396427A (en) Cross-chain interchange operation method for general scenes
CN117955742B (en) Verification method and device for data cross-link interaction, challenge node and storage medium
CN112037062A (en) Transaction consensus method, device, electronic equipment and readable storage medium
CN112037055A (en) Transaction processing method and device, electronic equipment and readable storage medium
CN116415955A (en) Cross-chain transaction method and system based on combination of hash locking and notary
CN111738855A (en) Intelligent contract management method and device
CN112633893A (en) Block chain rollback method and electronic equipment
CN115701078A (en) Cross-chain transaction processing method and device, electronic equipment and storage medium
CN112950183A (en) Cross-link data interchange method, system, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant