WO2020037623A1 - Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique - Google Patents

Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique Download PDF

Info

Publication number
WO2020037623A1
WO2020037623A1 PCT/CN2018/102023 CN2018102023W WO2020037623A1 WO 2020037623 A1 WO2020037623 A1 WO 2020037623A1 CN 2018102023 W CN2018102023 W CN 2018102023W WO 2020037623 A1 WO2020037623 A1 WO 2020037623A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
account
data
transaction
expansion
Prior art date
Application number
PCT/CN2018/102023
Other languages
English (en)
Chinese (zh)
Inventor
袁振南
谈扬
Original Assignee
区链通网络有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 区链通网络有限公司 filed Critical 区链通网络有限公司
Priority to PCT/CN2018/102023 priority Critical patent/WO2020037623A1/fr
Priority to CN201880002203.0A priority patent/CN109691064B/zh
Publication of WO2020037623A1 publication Critical patent/WO2020037623A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present application relates to the field of blockchain technology, and in particular, the present application relates to a method, a device, and a system for expanding a quantum-resistant blockchain account system.
  • Quantum resistant public key cryptography also known as post-quantum cryptography, is a research that began to rise after Peter Shor proposed the Shor algorithm in 1994.
  • the Shor algorithm can break all the current public key cryptosystems, including ECC (Error Correcting Code), RSA, ElGamal, etc.
  • Post-quantum cryptography includes the following four categories: 1) Lattice-based; 2) Hash-based; 3) Code-based ); 4) Multivariate Public Key Cryptography.
  • the secure and efficient quantum-resistant public key scheme has a problem of excessive storage occupation, and the same applies to the quantum-resistant scheme applied in the blockchain account system.
  • the public key + signature is about 9KB (kilobytes)
  • the selected XMSS Hypertree in QRL also reaches about 9KB, even after using the quantum public key
  • the lightweight Falcon in the algorithm, the public key + signature also reached about 2.4KB.
  • the larger the storage occupied by each transaction the fewer transactions can be accommodated in each block, and the transaction concurrency of the entire network will also decrease. Therefore, in order to reduce the impact of the blockchain account system using the post-quantum public key algorithm on the transaction volume of the entire network, it is urgent to expand the capacity of the resistant quantum blockchain account system.
  • this application proposes a method, device, and system for expanding the quantum-resistant blockchain account system, so as to achieve the expansion of the quantum-resistant blockchain account system, and improve the transaction in the blockchain. Concurrency.
  • Embodiments of the present application provide a method for expanding a quantum-resistant blockchain account system according to a first aspect, including:
  • Miner nodes receive several transactions over a period of time; the transactions include data on the flow of account funds and transaction legality verification data;
  • the miner node packages the flow data of each account funds into blocks, packages each transaction legality verification data in an expansion block associated with the block, and broadcasts the block and the expansion block;
  • an ordinary node When an ordinary node receives the block and the expansion block, it verifies the flow data of the corresponding account funds in the block through each transaction legality verification data in the expansion block;
  • the ordinary node loads the block into the local blockchain and discards the extended block.
  • the embodiment of the present application also provides another method for expanding a quantum blockchain-resistant account system, including:
  • the transactions include data on the flow of account funds and transaction legality verification data;
  • the embodiment of the present application also provides another method for expanding a quantum blockchain-resistant account system, including:
  • the block receives a block broadcasted by a miner node and an expansion block associated with the block; the block stores flow data of account funds in several transactions, and the expansion block stores transaction legality verification data in several transactions;
  • the embodiments of the present application further provide a capacity expansion system that is resistant to a quantum blockchain account system, including a miner node and an ordinary node;
  • the miner node is used to receive several transactions within a period of time, and the transactions include account fund flow data and transaction legitimacy verification data; package each account fund flow data into blocks, and package each transaction legitimacy verification data. Broadcasting the block and the extension block in the extension block associated with the block;
  • the embodiments of the present application further provide a capacity expansion device capable of resisting a quantum blockchain account system, including:
  • a transaction receiving module configured to receive several transactions within a period of time; the transactions include account data flow data and transaction legality verification data;
  • a packaging module for packaging the flow data of each account funds into blocks, and packaging each transaction legality verification data in an expansion block associated with the block;
  • a broadcasting module configured to broadcast the block and the expansion block, so that an ordinary node verifies the legitimacy of the block according to the received expansion block, and loads the block into the In the regional block chain, the extended block is discarded.
  • the embodiment of the present application further provides another capacity expansion device capable of resisting a quantum blockchain account system, including:
  • a verification module configured to verify the flow data of the corresponding account funds in the block by using the validity verification data of each transaction in the extension block;
  • a processing module is configured to load the block into a local block chain and discard the extended block when all verifications pass.
  • the embodiments of the present application further provide a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the quantum-resistant blockchain according to any one of the foregoing is realized Expansion method of account system.
  • the miner node moves the transaction legality verification data, which occupies a very large storage proportion in the transaction data, into the expansion block when it is packaged.
  • ordinary nodes can only load the verified blocks into the local blockchain and discard the extended blocks, so that a transaction with a volume close to 3KB-10KB can be reduced to 30-40 Bytes, the expansion of the anti-quantum blockchain-based account system has been realized, and the concurrency of transactions in the blockchain has been greatly improved.
  • FIG. 1 is a schematic structural diagram of a communication system applicable to a capacity expansion method of a quantum blockchain-resistant account system according to an embodiment of the present application;
  • FIG. 2 is a schematic flowchart of a method for expanding a quantum-resistant blockchain account system according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of storing data in blocks and extended blocks according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a block comparison using SegWit and not using SegWit according to an embodiment of the present application
  • FIG. 5 is a schematic structural diagram of a capacity expansion device capable of resisting a quantum blockchain account system according to an embodiment of the present application
  • FIG. 6 is a schematic flowchart of a method for expanding a quantum-resistant blockchain account system according to another embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a capacity expansion device capable of resisting a quantum blockchain account system according to another embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for expanding a quantum-resistant blockchain account system according to another embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a capacity expansion device capable of resisting a quantum blockchain account system according to another embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a server according to an embodiment of the present application.
  • the same data backup (that is, the ledger) is stored between each node, and each historical transaction is stored in the ledger. Over time, the volume of the ledger will gradually expand.
  • the time interval and the size of the block generated by the blockchain are generally fixed. For example, a block is generated by Bitcoin in 10 minutes, and each block is 1MB (megabits). In other words, the transaction volume of each block is limited.
  • the transaction concurrency of Bitcoin's entire network is only 7 transactions per second, which is not enough for the high transaction concurrency scenario similar to the Double 11 promotion. Therefore, the expansion plan is a very important research direction of the current blockchain.
  • each transaction also has transaction legality verification data (sender public key + signature).
  • the transaction legality verification data is used to verify the legality of the account fund flow data. Sex.
  • the largest part of blockchain transactions that occupy block storage is generally transaction legality verification data.
  • the transaction legality verification data in Bitcoin accounts for an average of 3/4 of the size of this transaction.
  • the post-quantum scheme is used, even the lightweight falcon, the transaction legality verification data accounts for more than 98% of a transaction.
  • the occupation ratio is more than 99.5%.
  • neither HCash nor QRL have proposed related expansion solutions.
  • the expansion scheme of the anti-quantum blockchain account system can choose a segregated witness that can reduce the transaction legality verification data occupying the block storage capacity.
  • the inventors of this application have found through research that the current Segregated Witness scheme only changes the data structure of transaction data, and the transaction legality verification data will still essentially occupy the storage space of the block, and it cannot essentially achieve quantum resistance. Expansion of the blockchain account system. Therefore, the inventor of this application has improved the current Segregated Witness scheme to truly realize the expansion of the quantum blockchain-resistant account system.
  • the capacity expansion method of the anti-quantum blockchain account system can be applied to the communication system shown in FIG. 1.
  • the communication system includes: a blockchain network 10, a miner node 11, and an ordinary node 12.
  • Blockchain nodes can specifically be smartphones, tablets, laptops, etc., and combinations thereof.
  • the miner node 11 is used to package transactions, and the ordinary node 12 is used to verify the legitimacy of the block and load the verified block into the local blockchain.
  • a method for expanding a quantum blockchain-resistant account system includes:
  • the miner node receives several transactions within a period of time; the transactions include data on the flow of account funds and transaction legality verification data.
  • Quantum resistant blockchain account system is a blockchain account system applying quantum resistant scheme.
  • the blockchain account system is essentially a wallet system, and one account corresponds to one wallet address.
  • a blockchain node can respond to the terminal's transaction application and process the transaction application business. After the transaction is successfully created, the transaction will be broadcast to the blockchain network.
  • Each transaction includes data on the flow of account funds, such as A transfer of 10BTC to B, and also includes transaction legality verification data.
  • the transaction legality verification data is used to verify whether the flow of account funds is legal, and generally includes the sender's public key and signature. .
  • the role of the miner node is to confirm transactions and package multiple transactions into blocks. After the transaction is broadcast to the blockchain network, the miner node responsible for generating the block receives multiple transactions over a period of time.
  • the miner node packages the flow data of each account funds into blocks, packages each transaction legality verification data in an expansion block associated with the block, and broadcasts the block and the expansion block.
  • the miner node After the miner node receives the transaction broadcast by the user, it must verify the legality and authenticity of the transaction. The legitimacy here means that the miner node will check whether the payer's token is sufficient. According to the address of the payer in the transaction, the miner node inquires the number of "transferred" tokens in the account in previous legal transactions. When the amount is greater than or equal to the amount entered in the transaction bill, the transaction is legal. Then the miner node needs to start hash calculation with different random numbers until it finds a random number that meets the characteristics of the target value. If this random number is found, the miner node packs the verified flow data of each account funds into blocks, and The legality verification data of each transaction was moved to the extension block and hung outside the block, that is, only the flow data of the account funds were recorded in the block.
  • the transaction legality verification data (PubKey + Signature) in the transaction can be moved to the Extended Block and the block can be hung to the block.
  • the block only records the flow data of account funds.
  • FIG. 4 it is a schematic diagram of the comparison between SegWit and non-SegWit blocks, where the left is the block without SegWit and the right is the block with SegWit.
  • the Block Header is a block header.
  • the block header includes the encrypted security data of all transaction data in the block.
  • Transaction is a block.
  • a block is used to record a list of transactions.
  • Blocks that do not use SegWit are shown in the left side of Figure 4.
  • Blocks include signatures, such as Zoe ’s Signature, Alice ’s Signature, and Bob ’s Signature.
  • the block no longer includes a signature, and the signature is moved to the extension block, which no longer takes up the storage space of the block.
  • the miner node After generating the block and extension block, the miner node broadcasts the block and extension block to the entire network to tell other blockchain nodes that a new block has been generated.
  • Ordinary nodes are nodes that do not need to provide complete query of transaction data services, that is, nodes run by ordinary individual users, nodes other than exchanges, block browsers, and mining pools. After the ordinary node receives the block and the extended block, the data of the Extended Block is used to verify the legitimacy of the transaction.
  • the block In order to verify the flow data of account funds, it is necessary to determine the correspondence between the flow data of account funds in the block and the transaction legality verification data in the expansion block. Therefore, the block records the correspondence between the flow data of the account funds and the transaction legality verification data in the expansion block.
  • the block records a correspondence relationship between the flow data of the account funds and the transaction legality verification data in the expansion block through a hash pointer (that is, Hash in the figure).
  • the data of the flow direction of the corresponding account funds in the block is performed by using the transaction legality verification data of the expansion block.
  • the verification includes: when an ordinary node receives the block and the extension block, reads the flow data of an account fund from the block; and determines the extension block and the account according to the corresponding relationship.
  • the transaction legitimacy verification data corresponding to the flow of funds data is verified; the legitimacy of the flow data of the account funds is verified according to the transaction legitimacy verification data; if the verification is passed, another account fund is read from the block.
  • Flow direction data returning the step of determining transaction legitimacy verification data corresponding to the flow direction data of the account funds in the extension block according to the corresponding relationship, until the flow direction data of all account funds in the block are read .
  • the ordinary node loads the block to the local blockchain and discards the data in the extended block.
  • ordinary nodes can throw Witness away after verifying the validity of the transaction using Witness data. Therefore, using Segregated Witness, the transaction legality verification data occupying a very large proportion of the transaction data originally generated based on the post-quantum public key cryptographic algorithm can be placed outside the blockchain, making a transaction close to 3KB-10KB in size Reduced to about 30-40 bytes, greatly increasing the amount of concurrent transactions in the blockchain.
  • the data of the flow direction of the corresponding account funds in the block is performed by using the transaction legality verification data of the expansion block.
  • the method further includes: if the verification fails, the ordinary node does not perform an operation of loading the block into a local blockchain. If the verification fails, the block is not loaded into the blockchain.
  • the capacity expansion method further includes: an exchange, a block browser, and / or a mining pool storing the block and the expansion block.
  • Nodes such as exchanges, block browsers, and mining pools need to store all data. But if the entire network reaches sufficient consensus, these nodes can also throw away the data of the witness part.
  • this application also provides a capacity expansion system that is resistant to the quantum blockchain account system.
  • the specific implementation of the capacity expansion system of this application will be described in detail below with reference to the drawings.
  • the capacity expansion system 50 that is resistant to the quantum blockchain account system includes a miner node 51 and an ordinary node 52;
  • the miner node 51 is used to receive several transactions within a period of time, and the transactions include account fund flow data and transaction legitimacy verification data; package the flow data of each account fund into blocks, and verify the legitimacy verification data of each transaction Package in an extension block associated with the block, and broadcast the block and the extension block;
  • the ordinary node 52 is configured to, when receiving the block and the expansion block, verify the flow data of the corresponding account funds in the block by using each transaction legality verification data in the expansion block; When all the verifications pass, the block is loaded into the local blockchain and the extended block is discarded.
  • the block In order to verify the flow data of account funds, it is necessary to determine the correspondence between the flow data of account funds in the block and the transaction legality verification data in the expansion block. Therefore, the block records the correspondence between the flow data of the account funds and the transaction legality verification data in the expansion block.
  • the block records a correspondence relationship between the flow data of the account funds and the transaction legality verification data in the expansion block through a hash pointer (that is, Hash in the figure).
  • an ordinary node when it receives the block and the expansion block, it reads the flow data of an account fund from the block; and determines the relationship between The transaction legitimacy verification data corresponding to the account fund flow data; verify the legitimacy of the account fund flow data according to the transaction legitimacy verification data; if the verification passes, read another account from the block
  • the flow data of funds is returned to perform the function of determining the transaction legality verification data corresponding to the flow data of the account funds in the extension block according to the corresponding relationship, until the flow data of all account funds in the block are all Was read.
  • the ordinary node is further configured not to perform an operation of loading the block into a local blockchain when the verification fails. If the verification fails, the block is not loaded into the blockchain.
  • the capacity expansion system further includes an exchange, a block browser and / or a mining pool, and the exchange, the block browser and / or the mining pool stores the block and the expansion block.
  • Nodes such as exchanges, block browsers, and mining pools need to store all data. But if the entire network reaches sufficient consensus, these nodes can also throw away the data of the witness part.
  • a method for expanding a quantum blockchain-resistant account system includes:
  • S61 Receive a number of transactions over a period of time; the transactions include data on the flow of account funds and transaction legality verification data.
  • a blockchain node can respond to the terminal's transaction application and process the transaction application business. After the transaction is successfully created, the transaction will be broadcast to the blockchain network.
  • Each transaction includes data on the flow of account funds, such as A transfer of 10BTC to B, and also includes transaction legality verification data.
  • the transaction legality verification data is used to verify whether the flow of account funds is legal, and generally includes the sender's public key and signature .
  • the role of the miner node is to confirm transactions and package multiple transactions into blocks. After the transaction is broadcast to the blockchain network, the miner node responsible for generating the block receives multiple transactions over a period of time.
  • S62 Package the data of the flow of funds of each account into blocks, and package each transaction legality verification data in an expansion block associated with the block.
  • the miner node After the miner node receives the transaction broadcast by the user, it must verify the legality and authenticity of the transaction. The legitimacy here means that the miner node will check whether the payer's token is sufficient. According to the address of the payer in the transaction, the miner node inquires the number of "transferred" tokens in the account in previous legal transactions. When the amount is greater than or equal to the amount entered in the transaction bill, the transaction is legal. Then the miner node needs to start hash calculation with different random numbers until it finds a random number that meets the characteristics of the target value. If this random number is found, the miner node packs the verified flow data of each account funds into blocks, and The legality verification data of each transaction was moved to the extension block and hung outside the block, that is, only the flow data of the account funds were recorded in the block.
  • the transaction legality verification data (PubKey + Signature) in the transaction can be moved to the Extended Block and the block can be hung to the block.
  • the block only records the flow data of account funds.
  • FIG. 4 it is a schematic diagram of the comparison between SegWit and non-SegWit blocks.
  • the Block Header is a block header.
  • the block header includes the encrypted security data of all transaction data in the block.
  • Transaction is a block.
  • a block is used to record a list of transactions.
  • Blocks that do not use SegWit are shown in the left side of Figure 4.
  • Blocks include signatures, such as Zoe ’s Signature, Alice ’s Signature, and Bob ’s Signature.
  • the block no longer includes a signature, and the signature is moved to the extension block, which no longer takes up the storage space of the block.
  • the miner node After generating the block and extension block, the miner node broadcasts the block and extension block to the entire network to tell other blockchain nodes that a new block has been generated.
  • Ordinary nodes are nodes that do not need to provide complete query of transaction data services, that is, nodes run by ordinary individual users, nodes other than exchanges, block browsers, and mining pools.
  • the data of the Extended Block is used to verify the legitimacy of the transaction. If the verification passes, the ordinary node loads the block to the local blockchain and discards the data in the extended block.
  • the present application also provides a capacity expansion device that is resistant to the quantum blockchain account system. As shown in FIG. 7, in one embodiment, it includes:
  • the transaction receiving module 71 is configured to receive a number of transactions within a period of time; the transactions include account fund flow data and transaction legality verification data;
  • a packaging module 72 configured to package the flow data of each account funds into blocks, and package each transaction legality verification data in an expansion block associated with the block;
  • a broadcasting module 73 configured to broadcast the block and the extension block, so that an ordinary node verifies the legitimacy of the block according to the received extension block, and loads the block to In the local blockchain, the extended block is discarded.
  • a method for expanding a quantum blockchain-resistant account system includes:
  • S81 Receive a block broadcasted by a miner node and an expansion block associated with the block; the block stores the flow data of account funds in several transactions, and the expansion block stores the transaction legality verification in several transactions data.
  • Each transaction includes data on the flow of account funds, such as A transfer of 10BTC to B, and also includes transaction legality verification data.
  • the transaction legality verification data is used to verify whether the flow of account funds is legal, and generally includes the sender's public key and signature .
  • the role of the miner node is to confirm transactions and package multiple transactions into blocks. After the transaction is broadcast to the blockchain network, the miner nodes responsible for generating the blocks package the flow data of each account funds into blocks, and move each transaction's legality verification data to the expansion block, which is hung outside the block, that is, Only the flow data of account funds are recorded in the block.
  • the transaction legality verification data (PubKey + Signature) in the transaction can be moved to the Extended Block and the block can be hung to the block
  • the block only records the flow data of account funds.
  • FIG. 4 it is a schematic diagram of the comparison between SegWit and non-SegWit blocks.
  • the Block Header is a block header.
  • the block header includes the encrypted security data of all transaction data in the block.
  • Transaction is a block.
  • a block is used to record a list of transactions.
  • Blocks that do not use SegWit are shown in the left side of Figure 4.
  • Blocks include signatures, such as Zoe ’s Signature, Alice ’s Signature, and Bob ’s Signature.
  • the block no longer includes a signature, and the signature is moved to the extension block, which no longer takes up the storage space of the block.
  • the miner node After generating the block and extension block, the miner node broadcasts the block and extension block to the entire network to tell other blockchain nodes that a new block has been generated.
  • Ordinary nodes are nodes that do not need to provide complete query of transaction data services, that is, nodes run by ordinary individual users, nodes other than exchanges, block browsers, and mining pools. Ordinary nodes receive broadcast blocks and extension blocks.
  • the data of the Extended Block is used to verify the legitimacy of the transaction.
  • the block records the correspondence between the flow data of the account funds and the transaction legality verification data in the expansion block.
  • the block records a correspondence relationship between the flow data of the account funds and the transaction legality verification data in the expansion block through a hash pointer (that is, Hash in the figure).
  • verifying the flow data of the corresponding account funds in the block by verifying the legality verification data of each transaction in the expansion block includes: reading an account fund from the block According to the corresponding relationship, determine the transaction legality verification data corresponding to the account capital flow data in the extension block; and verify the transaction legality verification data according to the transaction legality verification data. Legitimacy; if the verification is passed, read the flow data of another account fund from the block, and return to determine the legality of the transaction corresponding to the flow data of the account fund in the extension block according to the corresponding relationship Step of data until the flow data of all account funds in the block are read.
  • the ordinary node loads the block to the local blockchain and discards the data in the extended block.
  • ordinary nodes can throw Witness away after verifying the validity of the transaction using Witness data. Therefore, using Segregated Witness, the transaction legality verification data occupying a very large proportion of the transaction data originally generated based on the post-quantum public key cryptographic algorithm can be placed outside the blockchain, making a transaction close to 3KB-10KB in size Reduced to about 30-40 bytes, greatly increasing the amount of concurrent transactions in the blockchain.
  • verifying the flow data of the corresponding account funds in the block by verifying the legality verification data of each transaction in the extension block, and after that, it further includes: The operation of loading the block into a local blockchain. If the verification fails, the block is not loaded into the blockchain.
  • the present application also provides a capacity expansion device that is resistant to the quantum blockchain account system.
  • the specific implementation of the capacity expansion device of the present application will be described in detail below with reference to the drawings.
  • a capacity expansion device 90 that is resistant to a quantum blockchain account system includes:
  • the receiving module 91 is configured to receive a block broadcasted by a miner node and an expansion block associated with the block; the block stores the flow data of the account funds in several transactions, and the expansion block stores the data in several transactions. Transaction legality verification data;
  • a verification module 92 configured to verify the flow data of the corresponding account funds in the block by using each transaction legality verification data in the extension block;
  • the processing module 93 is configured to load the block into a local block chain and discard the extended block when all the verifications pass.
  • the data of the Extended Block is used to verify the legitimacy of the transaction.
  • the block records the correspondence between the flow data of the account funds and the transaction legality verification data in the expansion block.
  • the block records a correspondence relationship between the flow data of the account funds and the transaction legality verification data in the expansion block through a hash pointer (that is, Hash in the figure).
  • the verification module 92 is configured to read the flow data of an account fund from the block; and determine, according to the correspondence relationship, the extension block corresponding to the flow data of the account fund.
  • Transaction legality verification data according to the transaction legality verification data, verify the legitimacy of the flow data of the account funds; if the verification passes, read the flow data of another account funds from the block, and return to the execution basis
  • the correspondence relationship determines a function of transaction legitimacy verification data corresponding to the flow data of the account funds in the extension block, until the flow data of all account funds in the block are read.
  • the processing module 93 is further configured not to perform an operation of loading the block into a local blockchain when the verification fails. If the verification fails, the block is not loaded into the blockchain.
  • An embodiment of the present application further provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the capacity expansion method of the quantum-resistant blockchain account system according to any one of the foregoing is implemented.
  • the storage medium includes, but is not limited to, any type of disk (including a floppy disk, a hard disk, an optical disk, a CD-ROM, and a magneto-optical disk), a ROM (Read-Only Memory, read-only memory), and a RAM (RandomAcceSS Memory, immediately (Memory), EPROM (EraSable Programmable Read-Only Memory, Erasable Programmable Read-Only Memory), EEPROM (Electrically EraSable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or optical card. That is, the storage medium includes any medium that stores or transfers information in a readable form by a device (e.g., a computer). It can be read-
  • FIG. 10 it is a schematic structural diagram of a server according to an embodiment of the present application, including a processor 102 and a storage device 103.
  • the storage device 103 may be used to store an application program 51 and various functional modules, and the processor 102 runs the application program 101 stored in the storage device 103 so as to execute various functional applications and data processing of the device.
  • the storage device 103 may be an internal memory or an external memory, or include both an internal memory and an external memory.
  • the internal memory may include a read-only memory, a programmable ROM (PROM), an electrically programmable ROM (EPROM), an electrically erasable programmable ROM (EEPROM), a flash memory, or a random access memory.
  • External storage may include hard disks, floppy disks, ZIP disks, U disks, magnetic tapes, and so on.
  • the storage devices disclosed in this application include, but are not limited to, these types of storage devices.
  • the storage device 103 disclosed in this application is merely an example and not a limitation.
  • the processor 102 is a control center of the server, and uses various interfaces and lines to connect various parts of the entire computer. By running or executing software programs and / or modules stored in the storage device 103, and calling data stored in the storage device, Perform various functions and process data. If the server is a server of a miner node, the processor 102 packages the flow data of each account funds into blocks, packages each transaction legality verification data in an expansion block associated with the block, and broadcasts the block And the extension block. If the server is a server of an ordinary node, the processor 102 verifies the block through the extension block, loads the verified block into the local blockchain, and discards the associated extension block.
  • steps in the flowchart of the drawings are sequentially displayed in accordance with the directions of the arrows, these steps are not necessarily performed in the order indicated by the arrows. Unless explicitly stated herein, the execution of these steps is not strictly limited, and they can be performed in other orders. Moreover, at least a part of the steps in the flowchart of the drawing may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily performed at the same time, but may be performed at different times. The execution order is also It is not necessarily performed sequentially, but may be performed in turn or alternately with other steps or at least a part of the sub-steps or stages of other steps.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Electromagnetism (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé, un dispositif et un système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique, appliqués au domaine technique des chaînes de blocs. Un procédé comprend les étapes suivantes : un nœud de mineur reçoit de multiples transactions sur une période de temps, les transactions comprenant des données de flux de fonds de compte et des données de vérification de validité de transaction; le nœud de mineur regroupe les données de flux de chaque fonds de compte dans un bloc, et regroupe des données de vérification de validité de transaction respectives dans un bloc d'extension associé au bloc, et diffuse le bloc et le bloc d'extension; lorsqu'un nœud ordinaire reçoit le bloc et le bloc d'extension, le nœud ordinaire utilise les données de vérification de validité de transaction respectives dans le bloc d'extension pour vérifier les données de flux de fonds du compte correspondant dans le bloc; et si toutes les vérifications sont réussies, le nœud ordinaire charge le bloc dans une chaîne de blocs locale, et rejette le bloc d'extension. Les modes de réalisation de la présente invention réalisent une expansion de capacité pour un système de compte à chaîne de blocs à résistance quantique, et augmentent la quantité de transactions simultanées dans une chaîne de blocs.
PCT/CN2018/102023 2018-08-23 2018-08-23 Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique WO2020037623A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/102023 WO2020037623A1 (fr) 2018-08-23 2018-08-23 Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique
CN201880002203.0A CN109691064B (zh) 2018-08-23 2018-08-23 可抗量子区块链账户系统的扩容方法、装置以及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/102023 WO2020037623A1 (fr) 2018-08-23 2018-08-23 Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique

Publications (1)

Publication Number Publication Date
WO2020037623A1 true WO2020037623A1 (fr) 2020-02-27

Family

ID=66191831

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/102023 WO2020037623A1 (fr) 2018-08-23 2018-08-23 Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique

Country Status (2)

Country Link
CN (1) CN109691064B (fr)
WO (1) WO2020037623A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861754A (zh) * 2020-07-30 2020-10-30 杭州复杂美科技有限公司 交易打包方法、设备和存储介质
CN116361850A (zh) * 2023-02-28 2023-06-30 北方工业大学 一种基于属性的抗量子公钥可搜索加密的方法

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572254B (zh) * 2019-09-12 2020-12-04 中国科学院信息工程研究所 一种基于格的可更改区块链方法
CN110990410B (zh) * 2019-09-20 2021-09-17 腾讯科技(深圳)有限公司 区块链中的信息查找方法、装置、存储介质和计算机设备
CN111061735B (zh) * 2019-12-13 2023-07-25 度小满科技(北京)有限公司 一种基于单链区块链的扩容方法及装置
CN113378237B (zh) * 2021-06-09 2023-06-23 中央财经大学 基于聚合签名和隔离见证的区块链数据存储方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780025A (zh) * 2016-11-30 2017-05-31 中国银行股份有限公司 区块链中数字资产的转移方法、装置及系统
WO2018104277A1 (fr) * 2016-12-08 2018-06-14 Bundesdruckerei Gmbh Structure de chaîne de blocs à chaînage bidirectionnel
CN108429759A (zh) * 2018-03-28 2018-08-21 电子科技大学成都研究院 去中心化存储安全实现方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384236B (zh) * 2016-08-31 2019-07-16 江苏通付盾科技有限公司 基于区块链的ca认证管理方法、装置及系统
US10785022B2 (en) * 2016-09-13 2020-09-22 Hiroshi Watanabe Network without abuse of a private key
CN106920097A (zh) * 2017-02-27 2017-07-04 钱德君 一种量子链共识协议的生成时间块链方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780025A (zh) * 2016-11-30 2017-05-31 中国银行股份有限公司 区块链中数字资产的转移方法、装置及系统
WO2018104277A1 (fr) * 2016-12-08 2018-06-14 Bundesdruckerei Gmbh Structure de chaîne de blocs à chaînage bidirectionnel
CN108429759A (zh) * 2018-03-28 2018-08-21 电子科技大学成都研究院 去中心化存储安全实现方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861754A (zh) * 2020-07-30 2020-10-30 杭州复杂美科技有限公司 交易打包方法、设备和存储介质
CN111861754B (zh) * 2020-07-30 2023-11-28 杭州复杂美科技有限公司 交易打包方法、设备和存储介质
CN116361850A (zh) * 2023-02-28 2023-06-30 北方工业大学 一种基于属性的抗量子公钥可搜索加密的方法

Also Published As

Publication number Publication date
CN109691064B (zh) 2021-11-05
CN109691064A (zh) 2019-04-26

Similar Documents

Publication Publication Date Title
US11750400B2 (en) Blockchain post-quantum signature scheme
WO2020037623A1 (fr) Procédé, dispositif et système d'expansion de capacité pour système de compte à chaîne de blocs à résistance quantique
US11451400B2 (en) Blockchain transaction method and apparatus
US11263605B2 (en) Weighted multiple authorizations
US11080665B1 (en) Cryptographically concealing amounts and asset types for independently verifiable transactions
US20190228386A1 (en) Recording evidence of address/account allocations in a distributed ledger
US20190103973A1 (en) Hash subtrees for grouping components by component type
US11068338B2 (en) Consenus of shared blockchain data storage based on error correction code
US11023314B2 (en) Prioritizing shared blockchain data storage
EP3769216B1 (fr) Sécurité de données d'un stockage de données de chaîne de blocs partagées sur la base d'un code de correction d'erreurs
US10963854B2 (en) Blockchain-based electronic bill reimbursement method, apparatus, and electronic device
US20200145195A1 (en) System and method for information protection
US20200082388A1 (en) Authenticating server and method for transactions on blockchain
KR102050007B1 (ko) 블록체인 기반 외부 서비스 지원 시스템 및 그 방법
CA3037833A1 (fr) Systeme et methode de protection de l'information
US20160260089A1 (en) Secure account management using tokens
CN111552991A (zh) 一种区块链交易方法及装置
US20210004791A1 (en) Guaranteeing server and method for transaction on blockchain
CN112769878B (zh) 基于区块链的业务实现系统和方法
US20230318808A1 (en) Custodial digital wallet management systems
CN115965388B (zh) 基于区块链的产业链金融密态溯源方法、装置及相关设备
JP2021047571A (ja) マルチ通貨取引システム
WO2021009530A1 (fr) Enregistrement de preuve d'attributions d'adresse/de compte dans un registre distribué
JP2021047569A (ja) マルチウォレットシステム
CN112749967A (zh) 交易数据的处理方法、装置、用户终端和服务器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18930710

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18930710

Country of ref document: EP

Kind code of ref document: A1