CN117592991A - Efficient blockchain cross-chain data exchange method based on threshold signature - Google Patents

Efficient blockchain cross-chain data exchange method based on threshold signature Download PDF

Info

Publication number
CN117592991A
CN117592991A CN202410070757.1A CN202410070757A CN117592991A CN 117592991 A CN117592991 A CN 117592991A CN 202410070757 A CN202410070757 A CN 202410070757A CN 117592991 A CN117592991 A CN 117592991A
Authority
CN
China
Prior art keywords
data
transaction
signature
data exchange
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410070757.1A
Other languages
Chinese (zh)
Other versions
CN117592991B (en
Inventor
翁健
林志楷
黎定成
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202410070757.1A priority Critical patent/CN117592991B/en
Publication of CN117592991A publication Critical patent/CN117592991A/en
Application granted granted Critical
Publication of CN117592991B publication Critical patent/CN117592991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a high-efficiency block chain crossing-chain data exchange method based on threshold signature, which comprises the following steps: the data exchange parties select collateral deposit and generate transaction signature according to the collateral deposit; the service provider generates an aggregation public key through a threshold signature algorithm, and the data exchange parties respectively generate mortgage addresses on corresponding blockchains through the aggregation public key; the data exchange parties store the collateral deposit into the collateral address, and the service provider verifies the transaction signature in the collateral address; based on the verification result, the data exchange party selects transaction data and transaction amount, and the data provider generates an index hash value based on the transaction data; the data consumer verifies whether the data index exists or not through the index hash value; when the verification is passed, the data consumer transmits the token through the first user contract according to the transaction amount, and the data provider transmits the data index through the second user contract; the data consumer obtains transaction data through the data index.

Description

Efficient blockchain cross-chain data exchange method based on threshold signature
Technical Field
The invention relates to the technical field of blockchains and the Internet of things, in particular to a high-efficiency blockchain cross-chain data exchange method based on threshold signatures.
Background
The internet of things (IoT) is a global network in which devices have unique identifiers for communicating and transmitting data. Traditional systems use a centralized server as the communication medium for the internet of things devices. Due to the rapid increase of connecting equipment, the growth rate of the Internet of things rises year by year, and the Internet of things becomes a scene used in many industries. The data transmission application of the Internet of things can be used in a plurality of application scenes such as factory production, environmental protection monitoring, water conservancy, fire protection, sharing, medical equipment and the like. The application of the internet of things has a plurality of advantages, such as reducing cost and resource use, and improving productivity level. But the internet of things also has some weaknesses, which are caused by the centralization of the IoT itself and the inability to guarantee privacy and non-traceability during data transmission. First, the internet of things network generates a lot of data, requires a lot of energy to work, and because they are centralized, trust problems controlled by an administrator who can manipulate the bottom layer. The internet of things system enables devices to collect data about themselves and the surrounding environment, then share the collected data with the devices, and finally send the data to a central server. When a central server in the internet of things network fails, paralysis of the whole internet of things network is most likely to be caused, and the phenomenon can be effectively solved through the decentralization characteristic of the blockchain technology. The distributed network structure of the block chain ensures that the equipment keeps the consensus without verification with the center, so that even if one or more nodes are broken, the data of the whole network system is reliable and safe. And the blockchain technology allows the internet of things devices to exchange the collected data with each other or to purchase the internet of things data for the user to obtain the corresponding service. In order to better utilize the internet of things data, many attempts have been made to improve and adjust business workflow, with internet of things data exchange being one of the most popular. Internet of things data exchange platforms are emerging to connect various distributed data sources, which facilitate data owners to exchange their internet of things data.
Cross-chain technology is a solution that allows interoperability between different blockchain networks, expanding the scope of blockchain applications. The intelligent system realizes data and asset transmission among different blockchains through mechanisms such as intelligent contracts, relay chains or side chains, and promotes collaborative cooperation in the fields of decentralization finance, cross-chain digital asset exchange, cross-chain identity verification and the like. The cross-chain process typically includes locking the assets on the original chain, creating corresponding asset tokens on the target chain, performing a cross-chain transmission, and finally unlocking the assets on the original chain. The threshold signature technology is a cryptography technology and has a wide application range, including the fields of information security, digital currency, blockchain and the like. The basic process is to divide the signing key into parts which can only be combined to generate a valid signature when a set threshold is reached.
However, when the scenario of data exchange occurs between different IoT network devices, a new problem may be introduced, which is a cross-chain challenge problem that occurs when different IoT networks employ different blockchain architectures, i.e., in an IoT environment, there are data exchange real-time and security problems across chains.
Disclosure of Invention
In order to solve the problem that the real-time performance and the safety of data exchange are insufficient in the prior art, the invention provides a high-efficiency block chain cross-chain data exchange method based on a threshold signature, which can improve the real-time performance and the safety of cross-chain data exchange.
In order to better realize the technical purposes, the invention provides the following technical scheme: a high-efficiency block chain cross-chain data exchange method based on threshold signature comprises the following steps:
the method comprises the steps that a collateral deposit is selected by two data exchange parties, signature is carried out on the collateral deposit, and a transaction signature is generated, wherein the two data exchange parties comprise a data consumer and a data provider;
the service provider generates an aggregation public key through a threshold signature algorithm, and the two data exchange parties respectively generate mortgage addresses on corresponding blockchains through the aggregation public key, wherein the blockchains corresponding to the data consumers are user blockchains, and the blockchains corresponding to the data provider are data blockchains;
the data exchange parties store collateral deposit in the mortgage address, and the service provider verifies the transaction signature;
based on the verification result, the data exchange party selects transaction data and transaction amount, the data provider generates a data index based on the transaction data, and generates an index hash value based on the data index; the data consumer verifies whether the data index exists or not through the index hash value transmitted by the data provider;
when passing the verification, the data consumer transmits the token through the first user contract according to the transaction amount, and the data provider transmits the data index through the second user contract; the data consumer obtains transaction data through the data index.
Optionally, the aggregation public key generation process includes:
the service provider comprises a plurality of notarized members;
the notarization member selects a polynomial of a blockchain corresponding to both data exchange sides, wherein the polynomial comprises a minimum threshold value of the number of notarization members required by the generating polynomial; the public certificate member obtains an initial public key and a private key, a reconstruction fragment is obtained through polynomial calculation, and other public certificate members verify the reconstruction fragment and the initial public key;
based on the verification result and the reconstruction fragment, the notarized member reconstructs the secret key, calculates the reconstructed secret key through an encryption algorithm to generate a public key of the notarized member, and aggregates all public keys of the notarized member to generate an aggregated public key.
Optionally, the data exchange parties correspond to polynomials of the blockchainThe method comprises the following steps: />Wherein->A minimum threshold representing the number of members required to generate the polynomial,ithe number of the notary member is represented,jindicating the number of the other notarized member,a random number is represented by a number of bits,crepresenting the argument in the polynomial of the blockchain.
Optionally, the process of verifying whether the data index exists by using the index hash value includes:
the data provider stores the transaction data into the data exchange system, and stores the data index of the transaction data and the hash value corresponding to the data index in the data exchange system, and the hash value in the data exchange system corresponds to the index hash value, and passes verification.
Optionally, after the data exchange parties store the collateral deposit in the collateral address, the steps include:
the data exchange parties lock the collateral deposit, and inform the service provider to finish locking, the service provider generates corresponding service provider contracts on the user blockchain and the data blockchain according to the collateral deposit and the transaction signature respectively, the collateral deposit and the transaction signature in the collateral deposit address are checked through the service provider contracts, and Merkle-tree paths related to the transaction are inquired on the blockchain corresponding to the data exchange parties.
Optionally, the process of transmitting the token through the first user contract includes:
the first user contract invokes the first foreshadowing machine contract to inquire whether the service provider contract passes the check of the collateral deposit and the transaction signature and the Merkle-tree path inquiry, and if so, the first user contract continues to transmit the tokens.
Optionally, the process of transmitting the data index through the second user contract includes:
the second user contract calls a second foresight contract to inquire whether the service provider contract passes through the check of the collateral deposit and the transaction signature and the Merkle-tree path inquiry, and if the second user contract passes through the check, the second user contract continues to transmit the data index.
Optionally, after the data exchange parties generate the transaction signature, the method further includes:
the data exchange parties generate the validity period of transaction release together;
among the two parties of the data exchange, any party submits invalid transactions or does not submit transactions within the validity period of the transaction release, and the other party or the service provider serves as a challenger;
the challenger transmits challenge information to the service provider to initiate a challenge phase for verification, wherein the challenge information includes a challenger's transaction signature, and a challenger's original transaction;
the notarized member in the service provider inquires the Merkle-tree path corresponding to the longest effective chain and the original transaction on the blockchain of the challenged person, and when the Merkle-tree path is not inquired on the longest effective chain in the validity period, the service provider generates the original punishment transaction;
signing the original punishment transaction by the notarization member to generate a sub-signature, spreading the sub-signature to other notarization members, calculating an aggregate signature by all notarization members, verifying the aggregate signature, and broadcasting the aggregate signature of the original punishment transaction to a blockchain corresponding to a challenged person based on a verification result.
Optionally, aggregating signaturesThe calculation process is as follows: />
Wherein,hash function representing a blockchain, +.>Represents the Lagrangian basis function corresponding to the ith notary member,/for>Representing the original penalty transaction content,nrepresenting the number of notarized members->Represent the firstiThe keys of the individual notarized members,ithe number of the notary member is represented,xis an argument of the aggregate signature polynomial.
The invention has the following technical effects:
the invention provides a data exchange model and a protocol of the heterogeneous blockchain environment of the Internet of things, and can complete atomic data exchange on the premise of not waiting for participation in blockchain confirmation transaction during cross-chain data exchange, thereby improving the efficiency and the practicability of the data exchange of the Internet of things. Meanwhile, a safe service provider model is designed through a threshold signature algorithm, and the preset safety strength of the service provider is reduced to be superior to that of an original notary cross-chain mechanism. Finally, the invention designs a mortgage-inquiry model between the data provider and the data consumer, so that the two parties do not need to wait for the transaction confirmation of the block chain consensus mechanism, the purpose of quick transaction is achieved, and the problem of distrust among participants is solved by adopting a punishment mechanism.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the prior art, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 provides a schematic diagram of roles in a cross-chain model supporting real-time data exchange in the Internet of things;
FIG. 2 provides a schematic diagram of components in a cross-chain model supporting real-time data exchange in the Internet of things;
FIG. 3 provides a flow diagram supporting real-time data exchange, i.e., cross-chain transactions, in the Internet of things;
fig. 4 provides a schematic diagram of a cross-chain flow supporting a real-time data exchange protocol in the internet of things.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide a high-efficiency internet of things cross-chain method based on a threshold signature, which comprises the steps of (1) providing a cross-chain transaction scheme of internet of things real-time data exchange to realize rapid and autonomous exchange of data between a data consumer and a data provider, (2) designing a mortgage-inquiry model between the data provider and the data consumer, so that the two parties do not need to wait for transaction confirmation, achieving the purpose of rapid transaction, solving the problem of distrust among participants by adopting a punishment mechanism, and (3) designing a safe service provider model by using a cryptography tool, wherein the preset safety intensity of the service provider is reduced to be better than that of an original notary cross-chain mechanism.
As shown in fig. 1, the model includes the following three roles.
Data consumers, expressed asThe role of the data purchase participant is assumed. In order to acquire necessary data of the Internet of things, a data consumer is +.>A payment data transaction is initiated on the blockchain.
A data provider, denoted asFulfilling the role of data provider, the internet of things device transmits data to the data provider +.>Managed cloud infrastructure. In the model proposed by the present invention, the data provider +.>Takes on the role of a transaction participant and provides data provision services. Data provider->Issue about data consumer->Detailed information of the data of the internet of things is sought.
The service provider isIncluding a group of notary persons. Each notary, notary member, has a key generated by the key generation algorithm of the BLS threshold signature scheme for verifying the cross-chain registration request and punishing the transaction.
As shown in fig. 2, includes the following intermediate components:
user contracts, expressed asIs an intelligent contract deployed on a blockchain for implementing data exchange functions in cross-chain transactions. In this process, a data consumer initiates a money transfer to a data provider, who submits a data identification to the data consumer in a blockchain environment.
Prophetic machine contracts, expressed asIs a user contract->Intelligent contracts invoked by them during execution. Subsequently, foreshadowing machine contracts->Is->And performing interaction to obtain necessary identity verification data, wherein the foreseeing machine contract is deployed in the data block chain and the user block chain.
Service provider contracts, expressed asPlays a variety of roles in facilitating transaction verification and ensuring the integrity of the disputed transaction. First, it assists the notarizer by concentrating for a prescribed period of timeThe Merkle-tree path associated with the transaction is verified, and the status of the disputed transaction is verified. In addition, it enables contracts to specify legal status of transactions. In addition, the contract is used to securely deduct the deposit of the participants involved in the atomic exchange, utilizing the aggregated public key signed by the BLS threshold as a means of locking the participant deposit. In the event of malicious activity by the participants, a penalty transaction determined by the notarizer and performed by the aggregate signature will be performed within the contract to effect the deposit deduction.
In the proposed scheme, the blockchain is heterogeneous. We useAnd->To identify the user blockchains and the data blockchains respectively corresponding to the data consumers and the data providers, which blockchains are intended to ensure the atomicity, traceability and security of the internet of things data transactions.
Distributed data storage system, denoted as(e.g., the interplanetary file system) is used to record the initialization parameters of the notarized member.
Data exchange system, denoted asThe method aims at facilitating query operation on cloud data of the Internet of things. The input is made of->The data identifier submitted to the blockchain, which is the ciphertext encrypted by the user identity and the corresponding data index. The output of which is data corresponding to the data index. Data consumer->Data exchange system when submitting data identification bound with identity thereofVerifying whether the identity in the data identity is +.>And consistent. If the results are consistent, the data exchange system>Distributing data to data consumers +.>. Otherwise, the request is denied. At->During negotiation, data consumer->It has to be confirmed that data already exist in the data exchange system +.>Is a kind of medium. Data exchange system>The input value of verification is +.>The hash value of the data identifier that must be transmitted to the blockchain.
As can be seen from FIG. 4, the present invention describes the different stages of a complete cross-chain transaction, including the initialization, cross-chain transaction, and challenge and penalty stages.
The initialization phase, before starting the cross-chain transaction, must take the following actions:
data exchange party negotiates target data set, namely transaction data and time limit, and data consumer partyAnd data provider->Selecting the data of the Internet of things of the transaction and extracting the dataSupplier->Storing transaction data in a data exchange system>Is a kind of medium. Subsequently, the data provider->And carrying out one-way hash function calculation on the data index of the transaction data to generate a hash value corresponding to the data index. />Data and data exchange system for uploading data by means of hash values>Data association within and then informing the data consumer +.>Make data consumer->Verification of transaction data in a data exchange system by means of the hash value>The presence of the inner part. Furthermore, data consumers->Data provider->Negotiating to determine the validity period of the release of the transaction, denoted +.>. Subsequently, data consumption method->And data providing method->Will determine the validity period of the transaction release +.>Send to service provider->Service provider->Configuring it in a distributed data storage system +.>And (3) inner part.
Creating a mortgage account, each member of the notarynFor the total number of members, subscriptsiFor notarization membership, i.e., numbering, user blockchain ++are selected according to the following formula, respectively>And data blockchain->Is a polynomial of (2)Wherein->A minimum threshold value representing the number of members required to generate the polynomial,/->A random number is represented by a number of bits,cthe arguments in the polynomial representing the blockchain are integers,jrepresenting a difference fromiThe other notarized members of (a) are numbered. Subsequently, each notary member of the notary +.>Broadcasting the public key chosen by each member in notary +.>Wherein->Representing a random number, the other member numbers +.>,/>Represents the BLS cycle group->Is (are) of the order->Representing generator, mod is Yu Hanshu, when +.>In (a) and (b)jWhen=0, +.>,/>Andrespectively correspond to->A private key of (c) and an initial public key. Then (I)>Computing reconstructed fragmentsjRepresents the notarization member number and reconstruct the fragment +_ through the transport layer security protocol>Is transmitted to a member other than->Is->. Subsequently, notary Member->Using equationsThe verification formula described in +.>And reconstruction fragment->Is a value of (2).
After the preparation is completed, the members are shown in the initialization stage of FIG. 4Using equationsReconstructing the secret key->I.e. the reconstructed private key, then by +.>The encryption algorithm matched by the block chain is used for calling the BLS function to calculate the public key of the single member>Using the formulaAcquiring an aggregation public key->. Subsequently, the aggregation public key +.>Is disclosed to the user and data blockchain and distributed data storage system>In a distributed data storage system +.>Middle memory threshold +.>. Finally, data consumer->Data provider->Utilize the syndication public key->Generating a user mortgage address->And data mortgage Address->And mortgages are respectively carried out on the user mortgage address and the data mortgage address.
Cross-chain transaction phase:
as shown in FIG. 3, (1) the data exchange parties negotiate the transfer transaction amount, i.e., the transaction collateral deposit, and the data consumerData provider->The transfer transaction amount is signed together to generate a transaction signature.
(2) Service providerI.e. notary has previously calculated the aggregated public key by the above-mentioned initialization phase and blockchain and sum to the userThe public aggregation public key on the data blockchain generates a corresponding mortgage address.
(3) Data consumerData provider->The transfer transaction amount is deposited as a collateral deposit onto the user and the data blockchain at the user mortgage address and the data mortgage address generated using the aggregated public key. Once the collateral is consumed by the data consumer +.>Data provider->Locking, they notify the service provider +.>Locking is completed and in the distributed data storage system +.>The successful lock state is recorded. Subsequently, service provider->Generating service provider contracts corresponding to collateral deposit on blockchainIs responsible for determining whether its collateral deposit is sufficient, verifying the correctness of the submitted data consumer and data provider transaction signature, and querying Merkle-tree path evidence associated with the transaction on the blockchain. Before the cross-chain transaction, the two data exchange parties perform token mortgage, and the mortgage deposit submits the relevant mortgage to the mortgage address independently of the subsequent transaction amount or transaction data, so that a guarantee is provided for the subsequent cross-chain transaction.
(4) Data consumerData provider->A negotiation of transaction data and transaction amounts regarding individual transactions is performed. And go through the data provider->Storing transaction data, and generating negotiated data index and hash value corresponding to the index, wherein the stage corresponds to part of the content of the initialization stage.
(5) Data consumerAuthentication is +.>Offered and data Consumer->Accuracy of data index associated with identity information, and data exchange system>Checking whether the data index exists or not through the index hash value. After verification is successful, data consumer->Data provider->A cross-chain transaction is initiated.
(6) Data consumerBy invoking user contracts->Initiating and data provider->Is a cross-chain transaction of (a). After the preparation is completed, byThe cross-chain transaction phase in FIG. 4 shows, subsequently, user contracts->Invoking a foresight machine contract->To access service provider->For querying whether the collateral deposit is sufficient or not, service provider contracts at the service provider +.>Whether the transaction signature passes verification and path inquiry. After receiving a positive response (denoted as "true"), the user contracts +.>The transfer operation is continued to transfer tokens required for transaction data. Meanwhile, data provider->Invoking data blockchain +.>User contract on->And the same call foreshadowing machine contract is performed>Query service provider contracts->After receiving positive response, to +.>The data index is transmitted.
(7) Data consumerUse of data index from data exchange system>Corresponding transaction data is extracted.
Challenge and penalty phase:
as shown by the challenge and penalty phase in fig. 4, if either party submits an invalid transaction or is not determining the validity period of the transaction issuanceInternal submission of transactions, i.e. in determining the validity period of the release of a transaction +.>Thereafter, the other party's cross-chain transaction does not exist on the longest valid chain. Then, one of the two parties of the data exchange, which does not have the above situation, or the service provider, which has the above situation, is found as the challenger, and the other party, which has the above situation, is the challenger, by giving the service provider +.>Delivery ofTo initiate the challenge phase for verification. Wherein (1)>Transaction signature representing challenger,>transaction signature representing challenged party, +.>Original transaction content representing challenged parties, the data exchange parties collectively negotiating original punishment transaction content and providing the original punishment transaction content to a service provider, wherein the original punishment transaction content includes collateral deposit returned to the challenger upon successful challenge in the transaction, collateral deposit returned from the mortgage account to parties participating in the cross-chain transaction without violationsAlso, when the challenge is successful, some compensation is made to the challenger and the transaction content is formed to be broadcast onto the challenger's blockchain to realize a penalty to the challenger.
Member(s)Querying the longest significant chain of a blockchain and +.>Corresponding Merkle-tree path. If the validity period of the release of the determined transaction is defined +.>Is not found in the canonical chain +.>I.e. Member->Unable to inquire about->Exact evidence of validity. Thus, the challenge is successful, service provider +.>The penalty transaction continues to be generated.
Member(s)By punishing the transaction content ∈>The signature generation sub-signature is performed and the signature is propagated to each node. Then (I)>Use equation +.>Computing an aggregate signatureWherein->Hash function representing a blockchain, +.>Represents the lagrangian basis function corresponding to the i-th notary member,xthe argument representing the aggregate signature polynomial equation is a random integer value. For verifying the aggregate signature, member->Use equation +.>Verification->. Wherein (1)>Representing a bilinear mapping function, wherein +.>:G 1 />G 2 →G T ,G 1 、G 2 、G T Respectively, represent different groups of cycles,Sig all signature representing original penalty transaction content, finally, service provider +.>Will->Is designated +.>And broadcast to the blockchain network and compensate challengers and punished challengers by the original punished transactions.
The foregoing is merely a preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. The high-efficiency block chain cross-chain data exchange method based on the threshold signature is characterized by comprising the following steps of:
the method comprises the steps that a collateral deposit is selected by two data exchange parties, signature is carried out on the collateral deposit, and a transaction signature is generated, wherein the two data exchange parties comprise a data consumer and a data provider;
the service provider generates an aggregation public key through a threshold signature algorithm, and the two data exchange parties respectively generate mortgage addresses on corresponding blockchains through the aggregation public key, wherein the blockchains corresponding to the data consumers are user blockchains, and the blockchains corresponding to the data provider are data blockchains;
the data exchange parties store collateral deposit in the mortgage address, and the service provider verifies the transaction signature;
based on the verification result, the data exchange party selects transaction data and transaction amount, the data provider generates a data index based on the transaction data, and generates an index hash value based on the data index; the data consumer verifies whether the data index exists or not through the index hash value transmitted by the data provider;
when passing the verification, the data consumer transmits the token through the first user contract according to the transaction amount, and the data provider transmits the data index through the second user contract; the data consumer obtains transaction data through the data index.
2. The method according to claim 1, characterized in that:
the aggregation public key generation process comprises the following steps:
the service provider comprises a plurality of notarized members;
the notarization member selects a polynomial of a blockchain corresponding to both data exchange sides, wherein the polynomial comprises a minimum threshold value of the number of notarization members required by the generating polynomial; the public certificate member obtains an initial public key and a private key, a reconstruction fragment is obtained through polynomial calculation, and other public certificate members verify the reconstruction fragment and the initial public key;
based on the verification result and the reconstruction fragment, the notarized member reconstructs the secret key, calculates the reconstructed secret key through an encryption algorithm to generate a public key of the notarized member, and aggregates all public keys of the notarized member to generate an aggregated public key.
3. The method according to claim 2, characterized in that:
polynomial of block chain corresponding to both sides of data exchangeThe method comprises the following steps: />Wherein->A minimum threshold representing the number of members required to generate the polynomial,ithe number of the notary member is represented,jrepresenting the other notarization member numbers, +.>A random number is represented by a number of bits,crepresenting the argument in the polynomial of the blockchain.
4. The method according to claim 1, characterized in that:
the process of verifying whether the data index exists by the index hash value comprises the following steps:
the data provider stores the transaction data into the data exchange system, and stores the data index of the transaction data and the hash value corresponding to the data index in the data exchange system, and the hash value in the data exchange system corresponds to the index hash value, and passes verification.
5. The method according to claim 1, characterized in that:
after the data exchange parties store the collateral deposit in the mortgage address, the method comprises the following steps:
the data exchange parties lock the collateral deposit, and inform the service provider to finish locking, the service provider generates corresponding service provider contracts on the user blockchain and the data blockchain according to the collateral deposit and the transaction signature respectively, the collateral deposit and the transaction signature in the collateral deposit address are checked through the service provider contracts, and Merkle-tree paths related to the transaction are inquired on the blockchain corresponding to the data exchange parties.
6. The method according to claim 5, wherein:
the process of transmitting tokens through a first user contract includes:
the first user contract invokes the first foreshadowing machine contract to inquire whether the service provider contract passes the check of the collateral deposit and the transaction signature and the Merkle-tree path inquiry, and if so, the first user contract continues to transmit the tokens.
7. The method according to claim 5, wherein:
the process of transmitting the data index through the second user contract includes:
the second user contract calls a second foresight contract to inquire whether the service provider contract passes through the check of the collateral deposit and the transaction signature and the Merkle-tree path inquiry, and if the second user contract passes through the check, the second user contract continues to transmit the data index.
8. The method according to claim 1, characterized in that:
the data exchange party also comprises the following steps after generating the transaction signature:
the data exchange parties generate the validity period of transaction release together;
among the two parties of the data exchange, any party submits invalid transactions or does not submit transactions within the validity period of the transaction release, and the other party or the service provider serves as a challenger;
the challenger transmits challenge information to the service provider to initiate a challenge phase for verification, wherein the challenge information includes a challenger's transaction signature, and a challenger's original transaction;
the notarized member in the service provider inquires the Merkle-tree path corresponding to the longest effective chain and the original transaction on the blockchain of the challenged person, and when the Merkle-tree path is not inquired on the longest effective chain in the validity period, the service provider generates the original punishment transaction;
signing the original punishment transaction by the notarization member to generate a sub-signature, spreading the sub-signature to other notarization members, calculating an aggregate signature by all notarization members, verifying the aggregate signature, and broadcasting the aggregate signature of the original punishment transaction to a blockchain corresponding to a challenged person based on a verification result.
9. The method according to claim 8, wherein:
the aggregate signatureThe calculation process is as follows: />
Wherein,hash function representing a blockchain, +.>Represents the Lagrangian basis function corresponding to the ith notary member,/for>Representing the original penalty transaction content,nrepresenting the number of notarized members->Represent the firstiThe keys of the individual notarized members,ithe number of the notary member is represented,xis an argument of the aggregate signature polynomial.
CN202410070757.1A 2024-01-18 2024-01-18 Efficient blockchain cross-chain data exchange method based on threshold signature Active CN117592991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410070757.1A CN117592991B (en) 2024-01-18 2024-01-18 Efficient blockchain cross-chain data exchange method based on threshold signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410070757.1A CN117592991B (en) 2024-01-18 2024-01-18 Efficient blockchain cross-chain data exchange method based on threshold signature

Publications (2)

Publication Number Publication Date
CN117592991A true CN117592991A (en) 2024-02-23
CN117592991B CN117592991B (en) 2024-04-26

Family

ID=89911868

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410070757.1A Active CN117592991B (en) 2024-01-18 2024-01-18 Efficient blockchain cross-chain data exchange method based on threshold signature

Country Status (1)

Country Link
CN (1) CN117592991B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180191503A1 (en) * 2015-07-14 2018-07-05 Fmr Llc Asynchronous Crypto Asset Transfer and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
US20210073212A1 (en) * 2018-01-17 2021-03-11 Geeq Corporation Blockchain methods, nodes, systems and products
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113902439A (en) * 2021-08-23 2022-01-07 苏州长通互联科技有限公司 Alliance chain cross-chain transaction method and device based on threshold signature
CN114172661A (en) * 2021-12-03 2022-03-11 杭州链网科技有限公司 Bidirectional chain-crossing method, system and device for digital assets
TWI769738B (en) * 2021-03-12 2022-07-01 帳聯網路科技股份有限公司 Asset cross-chain exchanging system based on threshold signature scheme and method thereof
CN115883646A (en) * 2021-09-27 2023-03-31 杭州时戳信息科技有限公司 Cross-chaining method, system, storage medium and server
WO2023072504A1 (en) * 2021-10-26 2023-05-04 Nchain Licensing Ag Threshold signature scheme
CN116388991A (en) * 2023-02-07 2023-07-04 湖南天河国云科技有限公司 Notary group cross-chain transaction method and system based on non-threshold structure

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180191503A1 (en) * 2015-07-14 2018-07-05 Fmr Llc Asynchronous Crypto Asset Transfer and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
US20210073212A1 (en) * 2018-01-17 2021-03-11 Geeq Corporation Blockchain methods, nodes, systems and products
TWI769738B (en) * 2021-03-12 2022-07-01 帳聯網路科技股份有限公司 Asset cross-chain exchanging system based on threshold signature scheme and method thereof
CN113407977A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Cross-chain extension method and system based on aggregated signature
CN113902439A (en) * 2021-08-23 2022-01-07 苏州长通互联科技有限公司 Alliance chain cross-chain transaction method and device based on threshold signature
CN115883646A (en) * 2021-09-27 2023-03-31 杭州时戳信息科技有限公司 Cross-chaining method, system, storage medium and server
WO2023072504A1 (en) * 2021-10-26 2023-05-04 Nchain Licensing Ag Threshold signature scheme
CN114172661A (en) * 2021-12-03 2022-03-11 杭州链网科技有限公司 Bidirectional chain-crossing method, system and device for digital assets
CN116388991A (en) * 2023-02-07 2023-07-04 湖南天河国云科技有限公司 Notary group cross-chain transaction method and system based on non-threshold structure

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘峰;杨杰;李志斌;齐佳音;: "一种面向双中台双链架构的内生性数据安全交互协议研究", 华东师范大学学报(自然科学版), no. 05, 25 September 2020 (2020-09-25) *
刘桂华: "基于公证人组的区块链跨链机制", 中国优秀硕士学位论文全文数据库信息科技辑, no. 2, 15 February 2021 (2021-02-15), pages 136 - 477 *
臧文洋等: "基于门限签名的时间轮换公证人组模型研究", 《计算机科学》网络首发HTTPS://LINK.CNKI.NET/URLID/50.1075.TP.20231017.1609.002, 18 October 2023 (2023-10-18), pages 1 - 14 *

Also Published As

Publication number Publication date
CN117592991B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US11861606B2 (en) Blockchain system for confidential and anonymous smart contracts
CN109360100B (en) Transaction rapid confirmation method and device based on block chain technology
CN108418783B (en) Method and medium for protecting privacy of intelligent contracts of block chains
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
TWI820020B (en) Computer-implemented system and method for performing transaction mixing on a blockchain
CN111886830A (en) Computer-implemented system and method for data exchange
CN110993044A (en) Lightweight dynamic autonomous cross-link interaction method for medical alliance link
Wang et al. Towards airbnb-like privacy-enhanced private parking spot sharing based on blockchain
CN115801260B (en) Block chain-assisted collaborative attack and defense game method in untrusted network environment
Androulaki et al. Hiding transaction amounts and balances in bitcoin
CN111049806B (en) Joint authority control method and device, electronic equipment and storage medium
CN111738857B (en) Generation and verification method and device of concealed payment certificate applied to block chain
CN116595094A (en) Federal learning incentive method, device, equipment and storage medium based on block chain
Hatefi et al. A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
US20240179211A1 (en) Computer-implemented system and method for controlling processing steps of a distributed system
CN117375797A (en) Anonymous authentication and vehicle-mounted information sharing method based on blockchain and zero knowledge proof
CN116664298A (en) Implementation method and device of block chain-based decentralization data transaction system
CN117592991B (en) Efficient blockchain cross-chain data exchange method based on threshold signature
CN113839768A (en) Cross-link communication method based on satellite link relay
Abadi et al. Recurring contingent payment for proofs of retrievability
Moreno-Sanchez et al. ClearChart: Ensuring integrity of consumer ratings in online marketplaces
Zhang et al. TTP-free fair exchange of digital signatures with Bitcoin
CN113313490B (en) Block chain intelligent contract transaction method for separating asset from contract
Cao et al. A Hash Time Lock Mechanism Based on Threshold Algorithm
Yakubu Privacy Enabled Trading for Smart Marketplace

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant