WO2024103854A1 - 跨链交易方法、系统、电子设备及存储介质 - Google Patents

跨链交易方法、系统、电子设备及存储介质 Download PDF

Info

Publication number
WO2024103854A1
WO2024103854A1 PCT/CN2023/111524 CN2023111524W WO2024103854A1 WO 2024103854 A1 WO2024103854 A1 WO 2024103854A1 CN 2023111524 W CN2023111524 W CN 2023111524W WO 2024103854 A1 WO2024103854 A1 WO 2024103854A1
Authority
WO
WIPO (PCT)
Prior art keywords
chain
cross
node
target
request
Prior art date
Application number
PCT/CN2023/111524
Other languages
English (en)
French (fr)
Inventor
邱炜伟
汪小益
李若欣
李伟
胡麦芳
Original Assignee
杭州趣链科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州趣链科技有限公司 filed Critical 杭州趣链科技有限公司
Publication of WO2024103854A1 publication Critical patent/WO2024103854A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Definitions

  • the present application relates to the field of blockchain technology, and more specifically, to a cross-chain transaction method, system, electronic device and storage medium.
  • the present application provides a cross-chain transaction method, comprising:
  • the cross-chain transaction request is executed through the destination chain.
  • performing secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain the target signature includes:
  • a target threshold node is obtained from the threshold node set included in the relay chain, and the target request corresponding to the signature request is broadcast to the target threshold node, so as to obtain a request result returned by the target threshold node based on the target request;
  • the request result carries a threshold signature calculated according to the private key share held by the target threshold node, verify the threshold signature to obtain a verification result;
  • the verification result is a verification failure, obtaining a malicious node in the target threshold node, broadcasting the malicious node to other threshold nodes in the threshold node set except the malicious node, and deleting the malicious node from the threshold node set after multi-party negotiation;
  • the target threshold node is used as the target node, and the threshold signature is used as the target signature.
  • the local node receiving the signature request is not one of the threshold node set in the relay chain, request each threshold node in the threshold node set to obtain target threshold information, and generate a target request corresponding to the signature request based on the target threshold information;
  • obtaining the target threshold node from the threshold node set included in the relay chain and broadcasting the target request corresponding to the signature request to the target threshold node, and obtaining the request result returned by the target threshold node based on the target request, further comprising:
  • the node cluster is updated according to the number of newly added nodes, and key negotiation is performed on the node cluster to obtain the private key share held by each threshold node in the node cluster.
  • the method before receiving the signature request sent by the first cross-chain gateway and determining the cross-chain transaction request corresponding to the signature request, the method further includes:
  • the threshold node cluster in the relay chain corresponding to the threshold node deletion request is updated to obtain the target node cluster
  • the method before receiving the signature request sent by the first cross-chain gateway and determining the cross-chain transaction request corresponding to the signature request, the method further includes:
  • Application chain used to generate cross-chain transaction requests
  • a second cross-chain gateway used to receive the cross-chain transaction request, and transmit the cross-chain transaction request to the relay chain through a preset cross-chain transmission protocol
  • a relay chain used to send the cross-chain transaction request to a first cross-chain gateway corresponding to the cross-chain transaction request
  • a first cross-chain gateway configured to send the signature request to the relay chain when receiving the cross-chain transaction request
  • the destination chain is used to verify the target signature when receiving it, and execute the transaction request if the verification passes.
  • the present application also provides a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps in any cross-chain transaction method provided in the present application are implemented.
  • the cross-chain transaction method includes: receiving a signature request sent by a first cross-chain gateway, and determining a cross-chain transaction request corresponding to the signature request; performing secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain a target signature; sending the target signature to the destination chain corresponding to the first cross-chain gateway, and verifying the target signature through the destination chain to obtain a verification result; if the verification result is verification passed, executing the cross-chain transaction request through the destination chain.
  • the cross-chain transaction method provided by the embodiment of the present application reduces the size of the signature that needs to be verified by the destination chain through threshold signature processing, thereby improving the efficiency of verifying signatures during cross-chain transactions, and reducing the handling fee during verification, thereby reducing the cost of cross-chain transactions.
  • this method adopts threshold signature technology, even if the private key shares held by some threshold nodes in the relay chain are exposed by malicious attacks, the malicious attacker cannot obtain the final private key share calculated by the private key shares held by each threshold node, and the security of cross-chain transactions is higher.
  • FIG1 is a schematic diagram of an application scenario of a cross-chain transaction method provided in an embodiment of the present application
  • FIG2 is a schematic diagram of a cross-chain transaction system provided in an embodiment of the present application.
  • FIG3 is a schematic diagram of a flow chart of a cross-chain transaction method provided in an embodiment of the present application.
  • FIG4 is a schematic diagram of a process of adding a threshold node provided in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of the structure of an embodiment of an electronic device provided in an embodiment of the present application.
  • first and second are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated.
  • the features defined as “first” and “second” may explicitly or implicitly include one or more of the features.
  • the meaning of “multiple” is two or more, unless otherwise clearly and specifically defined.
  • the embodiments of the present application provide a cross-chain transaction method, system, electronic device and storage medium.
  • the cross-chain transaction device can be integrated in an electronic device, which can be a server or a terminal.
  • the executor of the cross-chain transaction method of the embodiment of the present application can be the cross-chain transaction device provided in the embodiment of the present application, or different types of electronic devices such as a server device, a physical host or a user equipment (UE) that integrates the cross-chain transaction device.
  • the cross-chain transaction device can be implemented in hardware or software, and the UE can specifically be a terminal device such as a smart phone, a tablet computer, a laptop computer, a PDA, a desktop computer or a personal digital assistant (PDA).
  • PDA personal digital assistant
  • the electronic device may work in a single operation mode or in a device cluster mode.
  • Figure 1 is a schematic diagram of a cross-chain transaction system provided in an embodiment of the present application, wherein the cross-chain transaction system may include an electronic device 101, in which a cross-chain transaction device is integrated.
  • the cross-chain transaction system may further include a memory 102 for storing data. Such as storing text data.
  • scenario diagram of the cross-chain transaction system shown in Figure 1 is only an example.
  • the cross-chain transaction system and scenario described in the embodiment of the present application are intended to more clearly illustrate the technical solution of the embodiment of the present application, and do not constitute a limitation on the technical solution provided in the embodiment of the present application.
  • Ordinary technicians in this field can know that with the evolution of the cross-chain transaction system and the emergence of new business scenarios, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems.
  • the cross-chain transaction method includes: receiving a signature request sent by a first cross-chain gateway, and determining a cross-chain transaction request corresponding to the signature request; performing secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain a target signature; sending the target signature to the destination chain corresponding to the first cross-chain gateway, and verifying the target signature through the destination chain to obtain a verification result; if the verification result is verification passed, executing the cross-chain transaction request through the destination chain.
  • the cross-chain transaction system 200 in FIG. 2 includes an application chain 201, a second cross-chain gateway 202, a relay chain 203, a first cross-chain gateway 204, and a destination chain 205 that are sequentially connected in communication; the cross-chain transaction system 200 executes:
  • Application chain 201 used to generate cross-chain transaction requests
  • the second cross-chain gateway 202 is used to receive the cross-chain transaction request and transmit the cross-chain transaction request to the relay chain 203 through a preset cross-chain transmission protocol;
  • the relay chain 203 is used to send the cross-chain transaction request to the first cross-chain gateway 204 corresponding to the cross-chain transaction request;
  • the first cross-chain gateway 204 is used to send the signature request to the relay chain 203 when receiving the cross-chain transaction request;
  • the destination chain 205 is used to verify the target signature when receiving it, and execute the transaction request if the verification passes.
  • Figure 3 is a flow chart of a cross-chain transaction method provided in an embodiment of the present application. It should be noted that although the logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in a different order than here.
  • the cross-chain transaction method may specifically include the following steps 301-304, wherein:
  • the first cross-chain gateway refers to the cross-chain gateway between the relay chain and the destination chain in the cross-chain transaction system.
  • the first cross-chain gateway receives the cross-chain transaction request sent by the application chain through the second cross-chain gateway and the relay chain in turn, in order to determine the authenticity of the cross-chain transaction request, it needs to be verified.
  • the first cross-chain gateway can send a signature request to the relay chain and request a signature from the node of the relay chain.
  • the method may further include the following steps:
  • step (1.2) Deploy the cross-chain proxy contract in the application chain of the cross-chain transaction system, and update the threshold public key in the contract through the threshold public key in step (1.1).
  • the target node may refer to at least one threshold node in the relay chain.
  • the target signature refers to the signature generated after threshold signature processing.
  • the electronic device may request threshold information from the threshold node in the relay chain after returning the signature request to the local node of the relay chain, generate a target request for starting the signature process of the threshold signature based on the obtained threshold information, and broadcast the target request to each target threshold signature node.
  • Node in order to obtain the target signature generated after secure multi-party computation, can randomly select T as the target node from the threshold nodes included in the relay chain during broadcasting, and send a signature request to the target node, where T can refer to the preset threshold signature threshold value, that is, the consensus node threshold Quorum.
  • the above threshold information includes the address information of all threshold nodes, and the common threshold public key held by each threshold node.
  • the key negotiation is re-performed to generate the threshold node private key share and the unified threshold public key.
  • the step of "performing secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain the target signature" includes:
  • a target threshold node is obtained from the threshold node set included in the relay chain, and a target request corresponding to the signature request is broadcast to the target threshold node, so as to obtain a request result returned by the target threshold node based on the target request.
  • the preset threshold value refers to the threshold signature threshold value mentioned above, which is also the consensus node threshold Quorum (Quorum Size).
  • the target threshold node may refer to a non-local node in the threshold node set, that is, a non-local threshold node (hereinafter referred to as a non-local node).
  • the description of the target notification can be found above, and it can be used to notify non-local nodes to enter the secure multi-party computing process. If the target notification is not broadcast, only the local node attempts to obtain the signature, and the non-local node does not enter the threshold signature stage. Therefore, the non-local node will not participate in the key negotiation of the cross-chain transaction, reducing the security of the signature.
  • the target threshold node After receiving the target notification, under ideal network conditions, the target threshold node will perform secure multi-party computation based on the key share it carries, obtain the threshold signature, and return the threshold signature to the electronic device.
  • the electronic device When executing step (2.1), the electronic device first obtains the threshold node set in the relay chain, then randomly selects T as the target threshold nodes, and broadcasts the target notification to the T target threshold nodes, where T refers to the threshold value.
  • T refers to the threshold value.
  • the reason for selecting T as the target threshold nodes is to make the target threshold nodes The number of points meets the minimum consensus requirement.
  • step (2.1) Before executing step (2.1), it is necessary to request threshold information from the threshold node in the relay chain.
  • the local node that receives the signature request is a threshold node, it is no longer necessary to request threshold information from the external threshold node to improve the efficiency of requesting threshold information.
  • the step "According to the preset threshold value, obtain the target threshold node from the threshold node set included in the relay chain, and broadcast the target request corresponding to the signature request to the target threshold node, and obtain the request result returned by the target threshold node based on the target request” it also includes:
  • the target threshold information in the local node is read and obtained, and a target request corresponding to the signature request is generated based on the target threshold information.
  • the threshold signature is the threshold signature obtained after the secure multi-party computation in step (2.1).
  • the verification can be performed based on the above threshold public key, and the details are not repeated here.
  • the malicious node in the target threshold node is obtained, and the malicious node is broadcast to other threshold nodes in the threshold node set except the malicious node. After multi-party negotiation, the malicious node is deleted from the threshold node set until the target signature that passes the verification is obtained.
  • the verification result is a failure, it means that the real signature cannot be obtained through the T target threshold nodes. Therefore, the malicious nodes are obtained and excluded from the threshold node set to ensure the security of the signature calculation. If the current round of signature process fails after excluding the malicious nodes, the next round of threshold signatures will be started until the target signature that passes the verification can be obtained.
  • the target threshold node is used as the target node, and the threshold signature is used as the target signature.
  • the verification result is verification passed, it means that the real signature can be obtained through the T target threshold nodes, so the target threshold node is used as the target node and the threshold signature is used as the target signature.
  • steps (2.1) to (2.4) is to:
  • the process of calculating the threshold signature by the target threshold node may time out, and the threshold signature is not included in the above request result.
  • the local node is a threshold node
  • the local node can be used as the target node, and the signature calculated by the local node can be used as the target signature.
  • the process of calculating the signature by the local node can be performed synchronously with the process of calculating the first signature, that is, when executing step (2.1), the process of calculating the signature by the local node is also executed.
  • the target threshold node is obtained from the threshold node set included in the relay chain, and the target request corresponding to the signature request is broadcast to the target threshold node, and the request result returned by the target threshold node based on the target request is obtained", it also includes:
  • the local node receiving the signature request is one of the threshold node set in the relay chain, the local node is used as the target node to obtain the target signature calculated based on the private key share held by the target node.
  • the reason for giving priority to the signature generated by the non-local node is that the credibility of the signature generated by the non-local node is better than the signature generated by the local node. Therefore, the embodiment of the present application gives priority to the signature generated by the non-local node as the target signature. Only when the signature cannot be generated by the non-local node, the signature generated by the local node is used as the target signature.
  • the target node in the relay chain performs secure multi-party computation when signing in the embodiment of the present application, the target signature sent to the target chain is small in size, the verification efficiency is higher, and the handling fee is lower.
  • the nodes in the relay chain are usually used for multi-signature processing, and the signature transmitted to the target chain is small in size, the verification efficiency is higher, and the handling fee is lower.
  • the threshold signature technology is used in the embodiment of the present application, even if the private key share held by the threshold node is exposed by malicious attacks, the attacker cannot obtain the final private key calculated by the private key share of the threshold node, and the security is higher than that of the multi-signature method.
  • the first cross-chain gateway corresponding to the destination chain and the second cross-chain gateway corresponding to the application chain can correspond to the same cross-chain transmission protocol.
  • the cross-chain transmission protocol is introduced to unify the data formats between blockchains, and after the cross-chain gateway is introduced, different event monitoring mechanisms can be used for different blockchain consensus algorithms. That is, before the step of "receiving the signature request sent by the first cross-chain gateway and determining the cross-chain transaction request corresponding to the signature request", it also includes:
  • the cross-chain transfer protocol can be the general cross-chain transfer protocol IBTP (InterBlockchain Transfer Protocol).
  • the electronic device can package the target signature and the cross-chain transaction request and send them to the first cross-chain gateway, and then send them to the destination chain through the first cross-chain gateway.
  • the destination chain verifies the received target signature and cross-chain transaction request through the preset cross-chain proxy contract to obtain the verification result.
  • the cross-chain transaction request is executed through the destination chain.
  • the cross-chain transaction request is a real transaction request.
  • the cross-chain transaction request can be executed through the destination chain.
  • the cross-chain transaction method includes: receiving a signature request sent by a first cross-chain gateway, determining a cross-chain transaction request corresponding to the signature request; performing secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain a target signature; sending the target signature to the destination chain corresponding to the first cross-chain gateway, and The target signature is verified to obtain a verification result; if the verification result is passed, the cross-chain transaction request is executed through the destination chain.
  • the cross-chain transaction method provided by the embodiment of the present application reduces the size of the signature that needs to be verified by the destination chain through threshold signature processing, thereby improving the efficiency of cross-chain transactions, reducing the handling fee during verification, and reducing the cost of cross-chain transactions.
  • this method adopts threshold signature technology, even if the private key shares held by some threshold nodes in the relay chain are exposed by malicious attacks, the malicious attacker cannot obtain the final private key calculated by the private key shares held by each threshold node, and the security of cross-chain transactions is higher.
  • the threshold nodes in the above relay chain can also be dynamically increased, and when a threshold node increase instruction is received, the threshold nodes in the relay chain are updated.
  • a threshold node increase instruction is received, the threshold nodes in the relay chain are updated.
  • the electronic device can initiate a proposal request for a new node to the relay chain administrator, that is, when receiving a threshold node addition request, the administrator votes. After the administrator votes in favor of the proposal, the threshold nodes in the relay chain are updated. First, the number of new nodes corresponding to the threshold node addition request is determined, that is, the number of threshold nodes that need to be added to the relay chain.
  • the new threshold public key calculated from the private key shares can be broadcast to each blockchain in the cross-chain transaction system. Specifically:
  • the relay chain administrator initiates a proposal to freeze the blockchain in the cross-chain transaction system, and notifies each blockchain administrator offline of the updated threshold public key to update the cross-chain proxy contract.
  • Each blockchain administrator changes the original threshold public key to a new threshold public key and notifies the relay chain administrator offline that the update is successful.
  • the relay chain initiates a proposal to unfreeze the blockchain. After the proposal is passed, the blockchain can be Cross-chain transactions are often carried out.
  • the relay chain does not need to wait for all blockchains to be updated before unfreezing them. For example, if the threshold public key of blockchain A has not been updated in the cross-chain transaction system, and blockchain B and blockchain C have been updated, blockchain B and blockchain C can be unfrozen. At this time, blockchain B and blockchain C can conduct cross-chain transactions normally, while the cross-chain transaction of blockchain A will fail.
  • the key shares of the original nodes in the updated node cluster remain unchanged, and only the key shares of the newly added nodes are calculated.
  • the public key does not need to be updated to improve the efficiency of cross-chain transactions, and the application chain proxy contract does not need to update the threshold public key. Reduce the computing workload and computing cost of electronic devices.
  • the existing private key share sequence can be expanded through an additional multi-party secure computation, thereby allocating private key shares to the newly added participants. This process will not expose the old and newly generated private key shares, and has a higher security.
  • the new threshold value is calculated, and the preset threshold value is updated with the new threshold value.
  • the step of "updating the node cluster according to the number of newly added nodes, and performing key negotiation on the node cluster to obtain the private key share held by each threshold node in the node cluster" it also includes:
  • the first node number refers to the total number of nodes in the relay chain after the addition.
  • the preset threshold value is updated with the target threshold value.
  • the preset threshold value needs to be updated with the target threshold value.
  • the threshold node in the above relay chain can also be deleted dynamically.
  • the threshold node in the relay chain is updated. Referring to Figure 5, at this time, the step of "receiving the signature request sent by the first cross-chain gateway and determining the cross-chain transaction request corresponding to the signature request" Before, it also includes:
  • the electronic device can initiate a node deletion proposal request from the relay chain administrator, that is, when receiving a threshold node deletion request, the administrator votes. After the administrator votes in favor of the proposal, the threshold nodes in the relay chain are updated and processed. First, the number of deletion nodes corresponding to the threshold node deletion request is determined, that is, the number of threshold nodes that need to be deleted.
  • a threshold node cluster is a cluster of threshold nodes in the relay chain, including all threshold nodes in the relay chain before deletion.
  • the target node cluster refers to the threshold node cluster obtained after deletion.
  • a key negotiation process is performed on the target node cluster to obtain a private key share and a threshold public key held by each threshold node in the target node cluster.
  • the second number of nodes refers to the number of threshold nodes in the target node cluster. If the second number of nodes is less than the preset threshold value, it means that there are too many threshold nodes deleted. In order to ensure security, it is necessary to perform key negotiation on the threshold nodes in the target node cluster to obtain the private key shares held by each threshold node in the target node cluster and the threshold public key calculated from each private key share.
  • the updated threshold public key is broadcast to each blockchain in the cross-chain transaction system. The specific broadcast method can be referred to above and will not be repeated.
  • FIG6 is a schematic diagram of the structure of an embodiment of the cross-chain transaction device in the embodiment of the present application, and the cross-chain transaction device 600 includes:
  • the determining unit 601 is used to receive the signature request sent by the first cross-chain gateway, and determine the cross-chain transaction request corresponding to the signature request;
  • the signature unit 602 is used to perform secure multi-party computation according to the private key share held by the target node in the relay chain corresponding to the signature request to obtain a target signature;
  • a verification unit 603 is used to send the target signature to a destination chain corresponding to the first cross-chain gateway, and verify the target signature through the destination chain to obtain a verification result;
  • the execution unit 604 is used to execute the cross-chain transaction request through the destination chain if the verification result is verification passed.
  • the signature unit 602 is further used to:
  • a target threshold node is obtained from the threshold node set included in the relay chain, and the target notification corresponding to the cross-chain transaction request is broadcast to the target threshold node to obtain the request result returned by the target threshold node;
  • the request result carries a threshold signature calculated according to the private key share held by the target threshold node, verify the threshold signature to obtain a verification result;
  • the verification result is a verification failure
  • a malicious node in the target threshold node is obtained, the malicious node is broadcast to other threshold nodes in the threshold node set except the malicious node, and the malicious node is deleted from the threshold node set after multi-party negotiation until a target signature that passes the verification is obtained;
  • the target threshold node is used as the target node, and the threshold signature is used as the target signature.
  • the signature unit 602 is further used to:
  • the local node receiving the signature request is not one of the threshold node set in the relay chain, request each threshold node in the threshold node set to obtain target threshold information, and generate a target request corresponding to the signature request based on the target threshold information;
  • the target threshold information in the local node is read and obtained, and a target request corresponding to the signature request is generated based on the target threshold information.
  • the signature unit 602 is further used to:
  • the local node receiving the signature request is one of the threshold node set in the relay chain, the local node is used as the target node to obtain the target signature calculated based on the private key share held by the target node.
  • the determining unit 601 is further configured to:
  • the node cluster is updated according to the number of newly added nodes, and key negotiation is performed on the node cluster to obtain the private key share held by each threshold node in the node cluster.
  • the determining unit 601 is further configured to:
  • the preset threshold value is updated with the target threshold value.
  • the determining unit 601 is further configured to:
  • the threshold node cluster in the relay chain corresponding to the threshold node deletion request is updated to obtain the target node cluster
  • key negotiation processing is performed on the target node cluster to obtain the private key share and threshold public key held by each threshold node in the target node cluster.
  • the determining unit 601 is further configured to:
  • the above units can be implemented as independent entities, or can be arbitrarily combined to be implemented as the same or several entities.
  • the specific implementation of the above units can refer to the previous method embodiments, which will not be repeated here.
  • cross-chain transaction device can execute the steps of the cross-chain transaction method in any embodiment, it can achieve the beneficial effects that can be achieved by the cross-chain transaction method in any embodiment of the present application, see the previous The description will not be repeated here.
  • an embodiment of the present application further provides an electronic device.
  • Figure 7 shows a structural schematic diagram of the electronic device of the embodiment of the present application.
  • the electronic device provided by the embodiment of the present application includes a processor 701, and the processor 701 is used to execute the computer program stored in the memory 702 to implement the steps of the cross-chain transaction method in any embodiment; or, the processor 701 is used to execute the computer program stored in the memory 702 to implement the functions of each unit in the corresponding embodiment of Figure 6.
  • the computer program may be divided into one or more modules/units, one or more modules/units are stored in the memory 702, and executed by the processor 701 to complete the embodiment of the present application.
  • One or more modules/units may be a series of computer program instruction segments that can complete specific functions, and the instruction segments are used to describe the execution process of the computer program in the computer device.
  • the electronic device may include, but is not limited to, a processor 701 and a memory 702.
  • a processor 701 may be included in the electronic device.
  • a memory 702. may be included in the electronic device.
  • the illustration is merely an example of an electronic device and does not limit the electronic device, and may include more or fewer components than shown, or combine certain components, or different components.
  • Processor 701 may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field-programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor or any conventional processor, etc. The processor is the control center of the electronic device, and uses various interfaces and lines to connect various parts of the entire electronic device.
  • the memory 702 can be used to store computer programs and/or modules.
  • the processor 701 implements various functions of the computer device by running or executing the computer programs and/or modules stored in the memory 702 and calling the data stored in the memory 702.
  • the memory 702 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function (such as a sound playback function, an image playback function, etc.), etc.; the data storage area may store data created according to the use of the electronic device (such as audio data, video data, etc.), etc.
  • the memory may include a high-speed random access memory, and may also include a non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) Card, flash card, at least one disk storage device, flash memory device, or other volatile solid-state storage device.
  • a non-volatile memory such as a hard disk, a memory, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) Card, flash card, at least one disk storage device, flash memory device, or other volatile solid-state storage device.
  • an embodiment of the present application provides a storage medium on which a computer program is stored.
  • the steps of the cross-chain transaction method in any embodiment of the present application are executed.
  • specific operations refer to the description of the cross-chain transaction method in any embodiment, which will not be repeated here.
  • the storage medium may include: a read-only memory (ROM), a random access memory (RAM), a disk or an optical disk, etc. Since the instructions stored in the storage medium can execute the steps in the cross-chain transaction method in any embodiment of the present application, the beneficial effects that can be achieved by the cross-chain transaction method in any embodiment of the present application can be achieved. Please refer to the previous description for details, which will not be repeated here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

公开一种跨链交易方法、系统、电子设备及存储介质,方法包括:接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。因此本方法能够提高跨链交易时验证签名的效率,降低跨链交易的成本,并提高跨链交易的安全性。

Description

跨链交易方法、系统、电子设备及存储介质
本申请要求于2022年11月18日提交中国专利局、申请号为202211445581.0、发明名称为“跨链交易方法、装置、电子设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及区块链技术领域,更为具体而言,涉及一种跨链交易方法、系统、电子设备及存储介质。
背景技术
随着区块链技术的快速发展,目前有很多应用系统采用区块链来存储数据,通常,不同的应用系统会配置不同的区块链,不同应用系统的区块链(简称应用链)之间由于业务需求通常需要进行跨链交易,现有技术通常是通过跨链交易系统来实现不同应用链之间的跨链交易。
然而,随着区块链的发展,目前跨链交易系统中的跨链交易方法需要花费大量的手续费,跨链交易成本较高,并且跨链安全性实现难度较高。
技术解决方案
本申请提供一种跨链交易方法、系统、电子设备及存储介质,旨在解决目前的跨链交易方法在处理交易请求时验签成本较高的问题。
第一方面,本申请提供一种跨链交易方法,包括:
接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;
根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;
将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;
若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
在本申请的一种可能的实现方式中,所述根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名,包括:
根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果;
若所述请求结果中携带根据所述目标门限节点持有的私钥份额计算得到的门限签名,则对所述门限签名进行校验,得到校验结果;
若所述校验结果为校验不通过,则获取所述目标门限节点中的恶意节点,向所述门限节点集合中除所述恶意节点之外的其他门限节点广播所述恶意节点,经过多方协商后将所述恶意节点从所述门限节点集合中删除;
若所述校验结果为校验通过,则将所述目标门限节点作为目标节点,将所述门限签名作为目标签名。
在本申请的一种可能的实现方式中,所述根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果之前,还包括:
若接收签名请求的本地节点不是所述中继链中门限节点集合中的一者,则向所述门限节点集合中的各门限节点请求得到目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求;
若接收签名请求的本地节点是所述中继链中门限节点集合中的一者,则读取得到所述本地节点中的目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求。
在本申请的一种可能的实现方式中,所述根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果之后,还包括:
若所述请求结果中未携带所述目标门限节点计算得到的门限签名,并且接收签名请求的本地节点为所述中继链中门限节点集合中的一者,则将所述本地 节点作为目标节点,获取根据所述目标节点持有的私钥份额计算得到的目标签名。
在本申请的一种可能的实现方式中,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
接收门限节点新增请求,确定所述门限节点新增请求对应的新增节点数量;
根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额。
在本申请的一种可能的实现方式中,所述根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额之后,还包括:
根据所述节点集群中的第一节点数量,确定目标门限值;
若所述目标门限值与所述预设门限值不相同,则以所述目标门限值更新所述预设门限值。
在本申请的一种可能的实现方式中,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
接收门限节点删除请求,确定所述门限节点删除请求对应的删除节点数量;
根据所述删除节点数量,更新所述门限节点删除请求对应的中继链中的门限节点集群,得到目标节点集群;
若所述目标节点集群对应的第二节点数量小于预设门限值,则对所述目标节点集群进行密钥协商处理,得到所述目标节点集群中各门限节点持有的私钥份额与门限公钥。
在本申请的一种可能的实现方式中,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
接收应用链发送的跨链交易请求,通过所述应用链关联的第二跨链网关,将所述跨链交易请求发送至第一跨链网关,其中,所述第一跨链网关与所述跨链交易请求的目的链关联,所述第一跨链网关对应的跨链传输协议与所述第二跨链网关对应的跨链传输协议相同。
第二方面,本申请还提供一种跨链交易系统,包括依次通信连接的应用链、 第二跨链网关、中继链、第一跨链网关和目的链;所述跨链交易系统执行:
应用链,用于生成跨链交易请求;
第二跨链网关,用于接收所述跨链交易请求,通过预设的跨链传输协议将所述跨链交易请求至中继链;
中继链,用于将所述跨链交易请求发送至所述跨链交易请求对应的第一跨链网关;
以及,当接收到所述第一跨链网关发送的基于所述跨链交易请求的签名请求时,根据所述跨链交易请求和所述中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名,并将所述目标签名发送至所述第一跨链网关;
第一跨链网关,用于当接收到所述跨链交易请求时,向所述中继链发送所述签名请求;
以及,当接收到所述目标签名时,将所述目标签名发送至所述目的链;
目的链,用于当接收所述目标签名时,对所述目标签名进行验证,若验证通过则执行所述交易请求。
第三方面,本申请还提供一种存储介质,存储介质上存储有计算机程序,计算机程序被处理器执行时实现本申请提供的任一种跨链交易方法中的步骤。
综上所述,本申请实施例提供的跨链交易方法包括:接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
可见一方面,本申请实施例提供的跨链交易方法通过门限签名处理,减小目的链需要验证的签名的体积,因此可以提高跨链交易时验证签名的效率,并且降低验证时的手续费,降低跨链交易成本。另一方面,由于本方法采用门限签名技术,因此即使中继链中部分门限节点持有的私钥份额被恶意攻击而暴露,恶意攻击者也无法得到由各门限节点持有的私钥份额所计算得到的最终私钥份额,跨链交易的安全性更高。
本申请实施方式的各个方面、特征、优点等将在下文结合附图进行具体描述。根据以下结合附图的具体描述,本发明的上述方面、特征、优点等将会变得更加清楚。
参照后文的说明和附图,详细公开了本发明的特定实施例,指明了本发明的原理可以被采用的方式。应该理解,本发明的实施例在范围上并不因而受到限制。在所附权利要求的精神和条款的范围内,本发明的实施例包括许多改变、修改和等同。
针对一种实施例描述和/或示出的特征可以以相同或类似的方式在一个或更多个其它实施例中使用,与其它实施例中的特征相组合,或替代其它实施例中的特征。
应该强调,术语“包括/包含”在本文使用时指特征、整件、步骤或组件的存在,但并不排除一个或更多个其它特征、整件、步骤或组件的存在或附加。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的跨链交易方法的应用场景示意图;
图2是本申请实施例中提供的跨链交易系统的一种示意图;
图3是本申请实施例中提供的跨链交易方法的一种流程示意图;
图4是本申请实施例中提供的新增门限节点的一种流程示意图;
图5是本申请实施例中提供的删除门限节点的一种流程示意图;
图6是本申请实施例中提供的跨链交易装置的一个实施例结构示意图;
图7是本申请实施例中提供的电子设备的一个实施例结构示意图。
本发明的实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清 楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在本申请实施例的描述中,需要理解的是,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个所述特征。在本申请实施例的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。
为了使本领域任何技术人员能够实现和使用本申请,给出了以下描述。在以下描述中,为了解释的目的而列出了细节。应当明白的是,本领域普通技术人员可以认识到,在不使用这些特定细节的情况下也可以实现本申请。在其它实例中,不会对公知的过程进行详细阐述,以避免不必要的细节使本申请实施例的描述变得晦涩。因此,本申请并非旨在限于所示的实施例,而是与符合本申请实施例所公开的原理和特征的最广范围相一致。
本申请实施例提供一种跨链交易方法、系统、电子设备和存储介质。其中,该跨链交易装置可以集成在电子设备中,该电子设备可以是服务器,也可以是终端等设备。
本申请实施例跨链交易方法的执行主体可以为本申请实施例提供的跨链交易装置,或者集成了该跨链交易装置的服务器设备、物理主机或者用户设备(User Equipment,UE)等不同类型的电子设备,其中,跨链交易装置可以采用硬件或者软件的方式实现,UE具体可以为智能手机、平板电脑、笔记本电脑、掌上电脑、台式电脑或者个人数字助理(Personal Digital Assistant,PDA)等终端设备。
该电子设备可以采用单独运行的工作方式,或者也可以采用设备集群的工作方式。
参见图1,图1是本申请实施例所提供的跨链交易系统的场景示意图。其中,该跨链交易系统可以包括电子设备101,电子设备101中集成有跨链交易装置。
另外,如图1所示,该跨链交易系统还可以包括存储器102,用于存储数据, 如存储文本数据。
需要说明的是,图1所示的跨链交易系统的场景示意图仅仅是一个示例,本申请实施例描述的跨链交易系统以及场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着跨链交易系统的演变和新业务场景的出现,本发明实施例提供的技术方案对于类似的技术问题,同样适用。
下面,开始介绍本申请实施例提供的跨链交易方法,本申请实施例中以电子设备作为执行主体,为了简化与便于描述,后续方法实施例中将省略该执行主体,该跨链交易方法包括:接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
为了方便后续理解,首先介绍本申请实施例提供的跨链交易系统,参考图2,图2中的跨链交易系统200包括依次通信连接的应用链201、第二跨链网关202、中继链203、第一跨链网关204和目的链205;跨链交易系统200执行:
应用链201,用于生成跨链交易请求;
第二跨链网关202,用于接收所述跨链交易请求,通过预设的跨链传输协议将所述跨链交易请求至中继链203;
中继链203,用于将所述跨链交易请求发送至所述跨链交易请求对应的第一跨链网关204;
以及,当接收到所述第一跨链网关204发送的基于所述跨链交易请求的签名请求时,根据所述中继链203中目标节点持有的私钥份额,进行安全多方计算,得到目标签名,并将所述目标签名发送至所述第一跨链网关204;
第一跨链网关204,用于当接收到所述跨链交易请求时,向所述中继链203发送所述签名请求;
以及,当接收到所述目标签名时,将所述目标签名发送至所述目的链205;
目的链205,用于当接收所述目标签名时,对所述目标签名进行验证,若验证通过则执行所述交易请求。
参照图3,图3是本申请实施例提供的跨链交易方法的一种流程示意图。需要说明的是,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。该跨链交易方法具体可以包括以下步骤301-步骤304,其中:
301、接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求。
其中,第一跨链网关是指跨链交易系统中中继链与目的链之间的跨链网关。当第一跨链网关接收到应用链依次通过第二跨链网关,以及中继链发送的跨链交易请求时,为了判断跨链交易请求的真实性,需要对其进行验证。在本申请实施例中,第一跨链网关可以向中继链发送签名请求,从中继链的节点中请求签名。
在执行步骤301之前,本方法还可以包括以下步骤:
(1.1)启动跨链交易系统中的中继链,中继链的管理员发起更换门限签名的提案,管理员投票通过提案后,标识中继链使用门限签名的签名方式。中继链中各门限节点启动后,进行门限密钥生成,得到每个门限节点持有的私钥份额,以及由各私钥份额计算能得到的门限公钥,并将每个门限节点持有的私钥份额信息持久化存储至跨链交易系统的后台数据库中。
(1.2)在跨链交易系统中的应用链部署跨链代理合约,并通过步骤(1.1)中的门限公钥更新合约中的门限公钥。
302、根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名。
目标节点可以是指中继链中的至少一个门限节点。
目标签名是指通过门限签名处理后,生成的签名。
在执行步骤302时,电子设备可以在将签名请求返回至中继链的本地节点后,从中继链中的门限节点处请求得到门限信息,基于得到的门限信息生成用于开启门限签名的签名流程的目标请求,并将目标请求广播至各目标门限签名 节点,以得到安全多方计算后生成的目标签名,在广播时,可以从中继链包含的门限节点中,随机选择T个作为目标节点,向目标节点发送签名请求,其中,T可以是指预先设置的门限签名门限值,即共识节点阈值Quorum。然后,根据目标节点持有的私钥份额进行安全多方计算,并根据上述门限公钥对处理得到的签名进行验证,得到验证通过的目标签名。其中,上述门限信息包括所有门限节点的地址信息,以及各门限节点持有的共同的门限公钥。
在一些实施例中,为了避免获取的T个门限节点处理后得到的签名验证不通过,并且处理次数已经超过了预设阈值,即无法通过该T个门限节点得到真实签名,重新进行密钥协商生成门限节点私钥份额与统一的门限公钥。此时,步骤“根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名”,包括:
(2.1)根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果。
预设的门限值是指上文中的门限签名门限值,也是共识节点阈值Quorum(Quorum Size)。
目标门限节点可以是指门限节点集合中的非本地节点,即非本地的门限节点(下文中称为非本地节点)。
目标通知的说明可以参考上文,可以用于通知非本地节点进入安全多方计算流程。如果不对目标通知进行广播,则只有本地节点尝试获取签名,非本地节点未进入门限签名阶段,因此非本地节点将不会参与跨链交易的密钥协商,降低了签名的安全性。
目标门限节点接收到目标通知后,在网络环境较为理想的情况下,会根据携带的密钥份额,进行安全多方计算,得到门限签名,并将门限签名返回至电子设备。
在执行步骤(2.1)时,电子设备首先获取中继链中的门限节点集合,然后从中随机选择T个作为目标门限节点,并向该T个目标门限节点广播目标通知,其中,T是指门限值。选择T个作为目标门限节点的原因是使目标门限节 点的数量满足最小共识要求。
由上文说明可知,在执行步骤(2.1)之前,还需要从中继链中的门限节点处请求得到门限信息,而在接收到签名请求的本地节点是门限节点时,可以无需再向外部的门限节点请求门限信息,以提高请求门限信息的效率。此时,步骤“根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果”之前,还包括:
(2.11)若接收签名请求的本地节点不是所述中继链中门限节点集合中的一者,则向所述门限节点集合中的各门限节点请求得到目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求。
(2.12)若接收签名请求的本地节点是所述中继链中门限节点集合中的一者,则读取得到所述本地节点中的目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求。
(2.2)若所述请求结果中携带所述目标门限节点计算得到的门限签名,则对所述门限签名进行校验,得到校验结果。
门限签名即为步骤(2.1)中进行安全多方计算后得到的门限签名。
在对门限签名进行校验时,可以根据上述门限公钥进行校验,具体不进行赘述。
(2.3)若所述校验结果为校验不通过,则获取所述目标门限节点中的恶意节点,向所述门限节点集合中除所述恶意节点之外的其他门限节点广播所述恶意节点,经过多方协商后将所述恶意节点从所述门限节点集合中删除,直至得到校验通过的目标签名。
若校验结果为校验不通过,则说明无法通过该T个目标门限节点得到真实签名,因此获取其中的恶意节点,将其排除至门限节点集合之外,以保证签名计算的安全性,如在排除恶意节点之后,当前轮次的签名流程失败,则开始下一轮门限签名,直至能够得到校验通过的目标签名为止。
(2.4)若所述校验结果为校验通过,则将所述目标门限节点作为目标节点,将所述门限签名作为目标签名。
若校验结果为校验通过,则说明通过该T个目标门限节点能够得到真实签名,因此将目标门限节点作为目标节点,将门限签名作为目标签名。
步骤(2.1)-步骤(2.4)的目的是:
1、判断获取的非本地节点中是否包含恶意节点,以保证门限签名的准确性。
2、将目标请求转发至其他门限参与方,通知其他参与方开始安全多方计算的流程。
需要说明的是,如果在网络环境不理想的情况下,可能会导致目标门限节点计算门限签名的过程超时,上述请求结果中未包含门限签名,此时若本地节点为门限节点,则可以将本地节点作为目标节点,将本地节点计算得到的签名作为目标签名,本地节点计算签名的过程可以与计算第一签名的过程同步进行,即在执行步骤(2.1)时,也执行本地节点计算签名的过程。即步骤“根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果”之后,还包括:
若所述请求结果中未携带所述目标门限节点计算得到的门限签名,并且接收签名请求的本地节点为所述中继链中门限节点集合中的一者,则将所述本地节点作为目标节点,获取根据所述目标节点持有的私钥份额计算得到的目标签名。
其中,优先采用非本地节点生成的签名的原因是,非本地节点生成的签名可信度优于本地节点生成的签名,因此,本申请实施例优先采用非本地节点生成的签名作为目标签名,只有在无法通过非本地节点生成签名时,才采用本地节点生成的签名作为目标签名。
303、将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果。
可见,由于本申请实施例中在签名时,通过中继链中的目标节点进行安全多方计算,因此发送至目的链的目标签名体积小,验证效率更高,并且手续费较低,而传统方法中通常利用中继链中的节点进行多签处理,传输至目的链的 签名有多个,假设验证阈值为Quorum个,则目的链的验证流程需要重复Quorum次,验证逻辑较为复杂且性能不佳。并且,本申请实施例中由于采用了门限签名技术,因此即使门限节点持有的私钥份额受到恶意攻击而暴露,攻击者也无法得到由门限节点的私钥份额所计算生成的最终私钥,安全性相比多签的方法更高。
在一些实施例中,目的链对应的第一跨链网关和应用链对应的第二跨链网关可以对应相同的跨链传输协议,原因是当跨链交易系统为异构系统,即各区块链的共识算法和数据格式不一致时,交易容易出错,因此引入了跨链传输协议,使得区块链之间的数据格式统一,并且引入跨链网关后,可以针对不同的区块链共识算法有着不同的事件监听机制。即步骤“接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求”之前,还包括:
接收应用链发送的跨链交易请求,通过所述应用链关联的第二跨链网关,将所述跨链交易请求发送至第一跨链网关,其中,所述第一跨链网关与所述跨链交易请求的目的链关联,所述第一跨链网关对应的跨链传输协议与所述第二跨链网关对应的跨链传输协议相同。
其中,跨链传输协议可以是通用的跨链传输协议IBTP(InterBlockchain Transfer Protocol)。
在执行步骤303时,电子设备可以将目标签名和跨链交易请求打包发送至第一跨链网关,然后通过第一跨链网关发送至目的链。目的链根据接收到的目标签名和跨链交易请求,通过预设的跨链代理合约进行验证,得到验证结果。
304、若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
如果验证结果为验证通过,则说明跨链交易请求为真实交易请求,此时,可以通过目的链执行跨链交易请求。
综上所述,本申请实施例提供的跨链交易方法包括:接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所 述目标签名进行验证,得到验证结果;若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
可见一方面,本申请实施例提供的跨链交易方法通过门限签名处理,减小目的链需要验证的签名的体积,因此可以提高跨链交易的效率,并且降低验证时的手续费,降低跨链交易成本。另一方面,由于本方法采用门限签名技术,因此即使中继链中部分门限节点持有的私钥份额被恶意攻击而暴露,恶意攻击者也无法得到由各门限节点持有的私钥份额所计算得到的最终私钥,跨链交易的安全性更高。
在一些实施例中,上述中继链中的门限节点还可以动态增加,当接收到门限节点增加指令时,对中继链中的门限节点进行更新。参考图4,此时,步骤“接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求”之前,还包括:
401、接收门限节点新增请求,确定所述门限节点新增请求对应的新增节点数量。
电子设备可以在中继链管理员发起新增节点提案请求,即接收到门限节点新增请求时,进行管理员投票,管理员投票通过提案后,对中继链中的门限节点进行更新处理,首先确定门限节点新增请求对应的新增节点数量,即需要加入至中继链中的门限节点数量。
402、根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额。
为了保证安全性,在新增节点后,需要进行重新进行密钥协商,以确定新增后中继链中各门限节点持有的私钥份额。
在密钥协商处理结束,得到各门限节点持有的私钥份额后,可以将由私钥份额计算得到的新的门限公钥广播至跨链交易系统中的各区块链,具体地:
中继链管理员发起冻结跨链交易系统中区块链的提案,将更新后的门限公钥线下通知各区块链管理员进行跨链代理合约更新。
各区块链管理员将原有的门限公钥更改为新的门限公钥,并线下通知中继链管理员更新成功,中继链发起区块链的解冻提案,提案通过后,区块链可正 常进行跨链交易。
需要说明的是,在更新门限公钥的过程中,中继链无需等待所有区块链更新完成,再统一进行解冻。例如,若跨链交易系统中区块链A未更新门限公钥,区块链B和区块链C已更新,则可以对区块链B和区块链C进行解冻,此时区块链B与区块链C可正常进行跨链交易,而区块链A的跨链交易将会失败。
此外,在对更新后的节点集群进行密钥协商处理时,存在两种方法:
1、对更新后的节点集群中的所有门限节点,重新计算新的密钥份额,此时的更新门限公钥的流程如上文所述。
2、保留更新后的节点集群中原有节点的密钥份额不变,仅计算得到新增节点的密钥份额,此时可以不更新公钥,以提高跨链交易的效率,应用链代理合约无需更新门限公钥。减少电子设备的计算量和计算成本。
可见,在对门限节点进行新增时,通过一次额外的多方安全计算,即可以将现有的私钥份额序列进行扩充,从而给新加入的参与方分配私钥份额,这个过程不会暴露旧有的和新产生的私钥份额,安全性较高。
由于新增后中继链中门限节点的数量产生了变化,因此需要确定新的门限值,根据中继链对应的共识算法和新增后中继链中的节点总数量,计算得到新的门槛值,并以新的门槛值更新预设门槛值。此时,步骤“根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额”之后,,还包括:
(3.1)根据所述节点集群中的第一节点数量,确定目标门限值。
第一节点数量是指新增后中继链中的节点总数量。
(3.2)若所述目标门限值与所述预设门限值不相同,则以所述目标门限值更新所述预设门限值。
如果目标门限值与预设门限值不相同,则说明为了保证安全性所需要的Quorum Size发生了变化,因此需要以目标门限值更新预设门限值。
在一些实施例中,上述中继链中的门限节点还可以动态删除,当接收到门限节点删除指令时,对中继链中的门限节点进行更新。参考图5,此时,步骤“接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求”之 前,还包括:
501、接收门限节点删除请求,确定所述门限节点删除请求对应的删除节点数量。
电子设备可以在中继链管理员发起删除节点提案请求,即接收到门限节点删除请求时,进行管理员投票,管理员投票通过提案后,对中继链中的门限节点进行更新处理,首先确定门限节点删除请求对应的删除节点数量,即需要删除的门限节点数量。
502、根据所述删除节点数量,更新所述门限节点删除请求对应的中继链中的门限节点集群,得到目标节点集群。
门限节点集群是指由中继链中门限节点构成的集群,包含了删除之前中继链中的所有门限节点。
目标节点集群是指删除后得到的门限节点集群。
503、若所述目标节点集群对应的第二节点数量小于预设门限值,则对所述目标节点集群进行密钥协商处理,得到所述目标节点集群中各门限节点持有的私钥份额与门限公钥。
第二节点数量是指目标节点集群中门限节点的数量。若第二节点数量小于预设门限值,则说明删除的门限节点较多,为了保证安全性,需要对目标节点集群中的门限节点进行密钥协商处理,得到目标节点集群中各门限节点持有的私钥份额,以及由各私钥份额计算得到的门限公钥。并将更新后的门限公钥广播至跨链交易系统中的各区块链,具体广播方法可以参考上文,不进行赘述。
若第二节点数量大于或者等于预设门限值,则无需重新进行密钥协商。
为了更好实施本申请实施例中的跨链交易方法,在跨链交易方法基础之上,本申请实施例中还提供一种跨链交易装置,如图6所示,为本申请实施例中跨链交易装置的一个实施例结构示意图,该跨链交易装置600包括:
确定单元601,用于接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;
签名单元602,用于根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;
验证单元603,用于将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;
执行单元604,用于若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
在本申请的一种可能的实现方式中,签名单元602还用于:
根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述跨链交易请求对应的目标通知广播至所述目标门限节点,得到所述目标门限节点返回的请求结果;
若所述请求结果中携带根据所述目标门限节点持有的私钥份额计算得到的门限签名,则对所述门限签名进行校验,得到校验结果;
若所述校验结果为校验不通过,则获取所述目标门限节点中的恶意节点,向所述门限节点集合中除所述恶意节点之外的其他门限节点广播所述恶意节点,经过多方协商后将所述恶意节点从所述门限节点集合中删除,直至得到校验通过的目标签名;
若所述校验结果为校验通过,则将所述目标门限节点作为目标节点,将所述门限签名作为目标签名。
在本申请的一种可能的实现方式中,签名单元602还用于:
若接收签名请求的本地节点不是所述中继链中门限节点集合中的一者,则向所述门限节点集合中的各门限节点请求得到目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求;
若接收签名请求的本地节点是所述中继链中门限节点集合中的一者,则读取得到所述本地节点中的目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求。
在本申请的一种可能的实现方式中,签名单元602还用于:
若所述请求结果中未携带所述目标门限节点计算得到的门限签名,并且接收签名请求的本地节点为所述中继链中门限节点集合中的一者,则将所述本地节点作为目标节点,获取根据所述目标节点持有的私钥份额计算得到的目标签名。
在本申请的一种可能的实现方式中,确定单元601还用于:
接收门限节点新增请求,确定所述门限节点新增请求对应的新增节点数量;
获取所述门限节点新增请求对应的中继链中,节点集群对应的第一节点数量;
若所述第一节点数量与所述新增节点数量之间的数量和大于预设门限值,则根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额。
在本申请的一种可能的实现方式中,确定单元601还用于:
根据所述节点集群中的第一节点数量,确定目标门限值;
若所述目标门限值与所述预设门限值不相同,则以所述目标门限值更新所述预设门限值。
在本申请的一种可能的实现方式中,确定单元601还用于:
接收门限节点删除请求,确定所述门限节点删除请求对应的删除节点数量;
根据所述删除节点数量,更新所述门限节点删除请求对应的中继链中的门限节点集群,得到目标节点集群;
若所述目标节点集群对应的第二节点数量小于预设门限值,则对所述目标节点集群进行密钥协商处理,得到所述目标节点集群中各门限节点持有的私钥份额与门限公钥。
在本申请的一种可能的实现方式中,确定单元601还用于:
接收应用链发送的跨链交易请求,通过所述应用链关联的第二跨链网关,将所述跨链交易请求发送至第一跨链网关,其中,所述第一跨链网关与所述跨链交易请求的目的链关联,所述第一跨链网关对应的跨链传输协议与所述第二跨链网关对应的跨链传输协议相同。
具体实施时,以上各个单元可以作为独立的实体来实现,也可以进行任意组合,作为同一或若干个实体来实现,以上各个单元的具体实施可参见前面的方法实施例,在此不再赘述。
由于该跨链交易装置可以执行任意实施例中跨链交易方法中的步骤,因此,可以实现本申请任意实施例中跨链交易方法所能实现的有益效果,详见前面的 说明,在此不再赘述。
此外,为了更好实施本申请实施例中跨链交易方法,在跨链交易方法
基础之上,本申请实施例还提供一种电子设备,参阅图7,图7示出了本申请实施例电子设备的一种结构示意图,具体的,本申请实施例提供的电子设备包括处理器701,处理器701用于执行存储器702中存储的计算机程序时实现任意实施例中跨链交易方法的各步骤;或者,处理器701用于执行存储器702中存储的计算机程序时实现如图6对应实施例中各单元的功能。
示例性的,计算机程序可以被分割成一个或多个模块/单元,一个或者多个模块/单元被存储在存储器702中,并由处理器701执行,以完成本申请实施例。一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述计算机程序在计算机装置中的执行过程。
电子设备可包括,但不仅限于处理器701、存储器702。本领域技术人员可以理解,示意仅仅是电子设备的示例,并不构成对电子设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件。
处理器701可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,处理器是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分。
存储器702可用于存储计算机程序和/或模块,处理器701通过运行或执行存储在存储器702内的计算机程序和/或模块,以及调用存储在存储器702内的数据,实现计算机装置的各种功能。存储器702可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备的使用所创建的数据(比如音频数据、视频数据等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD) 卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的跨链交易装置、电子设备及其相应单元的具体工作过程,可以参考任意实施例中跨链交易方法的说明,具体在此不再赘述。
本领域普通技术人员可以理解,上述实施例的各种方法中的全部或部分步骤可以通过指令来完成,或通过指令控制相关的硬件来完成,该指令可以存储于一存储介质中,并由处理器进行加载和执行。
为此,本申请实施例提供一种存储介质,存储介质上存储有计算机程序,该计算机程序被处理器执行时执行本申请任意实施例中跨链交易方法中的步骤,具体操作可参考任意实施例中跨链交易方法的说明,在此不再赘述。
其中,该存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁盘或光盘等。由于该存储介质中所存储的指令,可以执行本申请任意实施例中跨链交易方法中的步骤,因此,可以实现本申请任意实施例中跨链交易方法所能实现的有益效果,详见前面的说明,在此不再赘述。
以上对本申请实施例所提供的一种跨链交易方法、装置、存储介质及电子设备进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (10)

  1. 一种跨链交易方法,其特征在于,包括:
    接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求;
    根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名;
    将所述目标签名发送至所述第一跨链网关对应的目的链,通过所述目的链对所述目标签名进行验证,得到验证结果;
    若所述验证结果为验证通过,则通过所述目的链执行所述跨链交易请求。
  2. 根据权利要求1所述的跨链交易方法,其特征在于,所述根据所述签名请求对应的中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名,包括:
    根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果;
    若所述请求结果中携带根据所述目标门限节点持有的私钥份额计算得到的门限签名,则对所述门限签名进行校验,得到校验结果;
    若所述校验结果为校验不通过,则获取所述目标门限节点中的恶意节点,向所述门限节点集合中除所述恶意节点之外的其他门限节点广播所述恶意节点,经过多方协商后将所述恶意节点从所述门限节点集合中删除;
    若所述校验结果为校验通过,则将所述目标门限节点作为目标节点,将所述门限签名作为目标签名。
  3. 根据权利要求2所述的跨链交易方法,其特征在于,所述根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果之前,还包括:
    若接收签名请求的本地节点不是所述中继链中门限节点集合中的一者,则向所述门限节点集合中的各门限节点请求得到目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求;
    若接收签名请求的本地节点是所述中继链中门限节点集合中的一者,则读取得到所述本地节点中的目标门限信息,并基于所述目标门限信息生成所述签名请求对应的目标请求。
  4. 根据权利要求2所述的跨链交易方法,其特征在于,所述根据预设的门限值,从所述中继链包含的门限节点集合中获取目标门限节点,并将所述签名请求对应的目标请求广播至所述目标门限节点,得到基于所述目标请求,所述目标门限节点返回的请求结果之后,还包括:
    若所述请求结果中未携带所述目标门限节点计算得到的门限签名,并且接收签名请求的本地节点为所述中继链中门限节点集合中的一者,则将所述本地节点作为目标节点,获取根据所述目标节点持有的私钥份额计算得到的目标签名。
  5. 根据权利要求1所述的跨链交易方法,其特征在于,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
    接收门限节点新增请求,确定所述门限节点新增请求对应的新增节点数量;
    根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额。
  6. 根据权利要求5所述的跨链交易方法,其特征在于,所述根据所述新增节点数量更新所述节点集群,并对所述节点集群进行密钥协商处理,得到所述节点集群中各门限节点持有的私钥份额之后,还包括:
    根据所述节点集群中的第一节点数量,确定目标门限值;
    若所述目标门限值与所述预设门限值不相同,则以所述目标门限值更新所述预设门限值。
  7. 根据权利要求1所述的跨链交易方法,其特征在于,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
    接收门限节点删除请求,确定所述门限节点删除请求对应的删除节点数量;
    根据所述删除节点数量,更新所述门限节点删除请求对应的中继链中的门限节点集群,得到目标节点集群;
    若所述目标节点集群对应的第二节点数量小于预设门限值,则对所述目标节点集群进行密钥协商处理,得到所述目标节点集群中各门限节点持有的私钥 份额与门限公钥。
  8. 根据权利要求1所述的跨链交易方法,其特征在于,所述接收第一跨链网关发送的签名请求,确定所述签名请求对应的跨链交易请求之前,还包括:
    接收应用链发送的跨链交易请求,通过所述应用链关联的第二跨链网关,将所述跨链交易请求发送至第一跨链网关,其中,所述第一跨链网关与所述跨链交易请求的目的链关联,所述第一跨链网关对应的跨链传输协议与所述第二跨链网关对应的跨链传输协议相同。
  9. 一种跨链交易系统,其特征在于,包括依次通信连接的应用链、第二跨链网关、中继链、第一跨链网关和目的链;所述跨链交易系统执行:
    应用链,用于生成跨链交易请求;
    第二跨链网关,用于接收所述跨链交易请求,通过预设的跨链传输协议将所述跨链交易请求至中继链;
    中继链,用于将所述跨链交易请求发送至所述跨链交易请求对应的第一跨链网关;
    以及,当接收到所述第一跨链网关发送的基于所述跨链交易请求的签名请求时,根据所述中继链中目标节点持有的私钥份额,进行安全多方计算,得到目标签名,并将所述目标签名发送至所述第一跨链网关;
    第一跨链网关,用于当接收到所述跨链交易请求时,向所述中继链发送所述签名请求;
    以及,当接收到所述目标签名时,将所述目标签名发送至所述目的链;
    目的链,用于当接收所述目标签名时,对所述目标签名进行验证,若验证通过则执行所述交易请求。
  10. 一种存储介质,其特征在于,所述存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至8任一项所述的跨链交易方法中的步骤。
PCT/CN2023/111524 2022-11-18 2023-08-07 跨链交易方法、系统、电子设备及存储介质 WO2024103854A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211445581.0A CN116132052A (zh) 2022-11-18 2022-11-18 跨链交易方法、装置、电子设备及存储介质
CN202211445581.0 2022-11-18

Publications (1)

Publication Number Publication Date
WO2024103854A1 true WO2024103854A1 (zh) 2024-05-23

Family

ID=86305300

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/111524 WO2024103854A1 (zh) 2022-11-18 2023-08-07 跨链交易方法、系统、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN116132052A (zh)
WO (1) WO2024103854A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132052A (zh) * 2022-11-18 2023-05-16 杭州趣链科技有限公司 跨链交易方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200322175A1 (en) * 2019-04-04 2020-10-08 Moac Blockchain Tech Inc Cross-Chain Messaging and Message Validation
CN112446785A (zh) * 2020-11-06 2021-03-05 杭州趣链科技有限公司 跨链交易方法、系统、装置、设备和存储介质
CN114493862A (zh) * 2021-12-29 2022-05-13 杭州趣链科技有限公司 跨链交易的验证方法、装置、电子设备、系统及存储介质
CN114553429A (zh) * 2022-01-12 2022-05-27 盐城矩阵运营管理有限公司 基于变色龙哈希的区块链跨链交易方法及装置、存储介质
CN115361141A (zh) * 2022-08-19 2022-11-18 杭州趣链科技有限公司 中继跨链校验方法、装置、存储介质及电子设备
CN116132052A (zh) * 2022-11-18 2023-05-16 杭州趣链科技有限公司 跨链交易方法、装置、电子设备及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200322175A1 (en) * 2019-04-04 2020-10-08 Moac Blockchain Tech Inc Cross-Chain Messaging and Message Validation
CN112446785A (zh) * 2020-11-06 2021-03-05 杭州趣链科技有限公司 跨链交易方法、系统、装置、设备和存储介质
CN114493862A (zh) * 2021-12-29 2022-05-13 杭州趣链科技有限公司 跨链交易的验证方法、装置、电子设备、系统及存储介质
CN114553429A (zh) * 2022-01-12 2022-05-27 盐城矩阵运营管理有限公司 基于变色龙哈希的区块链跨链交易方法及装置、存储介质
CN115361141A (zh) * 2022-08-19 2022-11-18 杭州趣链科技有限公司 中继跨链校验方法、装置、存储介质及电子设备
CN116132052A (zh) * 2022-11-18 2023-05-16 杭州趣链科技有限公司 跨链交易方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN116132052A (zh) 2023-05-16

Similar Documents

Publication Publication Date Title
US11411721B2 (en) Systems and methods for selecting and utilizing a committee of validator nodes in a distributed system
WO2020168937A1 (zh) 区块链多方见证方法、装置、设备及计算机可读存储介质
TWI662435B (zh) 分散式系統及訊息處理方法
WO2022188831A1 (zh) 一种基于区块链的区块共识方法以及相关设备
WO2018076760A1 (zh) 基于区块链的交易事务处理方法、系统、电子装置及存储介质
WO2020258912A1 (zh) 一种区块链共识方法、装置和系统
WO2021023200A1 (zh) 跨链交易方法、装置、多区块链系统及计算设备
TWI727467B (zh) 聯盟鏈的可信度驗證方法、系統、裝置及設備
US11410171B2 (en) Blockchain consensus method and device and electronic equipment
US11444783B2 (en) Methods and apparatuses for processing transactions based on blockchain integrated station
WO2020224239A1 (zh) 区块链实现方法、装置、系统及存储介质
WO2023045620A1 (zh) 一种交易数据处理方法、装置、计算机设备以及存储介质
US20210326887A1 (en) Methods and apparatuses for transferring transaction based on blockchain integrated station
US20210326863A1 (en) Methods and apparatuses for identifying replay transaction based on blockchain integrated station
US11665234B2 (en) Methods and apparatuses for synchronizing data based on blockchain integrated station
WO2024103854A1 (zh) 跨链交易方法、系统、电子设备及存储介质
WO2023016428A1 (zh) 一种拜占庭容错方法、装置、电子设备及存储介质
US11463553B2 (en) Methods and apparatuses for identifying to-be-filtered transaction based on blockchain integrated station
WO2021184878A1 (zh) 用于区块链系统的节点管理的方法、节点和计算设备
CN111460458B (zh) 一种数据处理方法、相关装置及计算机可存储介质
US20220158836A1 (en) Fork Processing Method And Blockchain Node
WO2023184881A1 (zh) 提案共识执行方法、区块链系统、设备和存储介质
WO2022041902A1 (zh) 数据处理方法及装置
WO2023040453A1 (zh) 一种交易信息处理方法及装置
WO2022183518A1 (zh) 一种面向云计算的高性能区块链架构方法