WO2023088136A1 - Procédé entre chaînes de blocs, dispositif, et support de stockage lisible - Google Patents

Procédé entre chaînes de blocs, dispositif, et support de stockage lisible Download PDF

Info

Publication number
WO2023088136A1
WO2023088136A1 PCT/CN2022/130612 CN2022130612W WO2023088136A1 WO 2023088136 A1 WO2023088136 A1 WO 2023088136A1 CN 2022130612 W CN2022130612 W CN 2022130612W WO 2023088136 A1 WO2023088136 A1 WO 2023088136A1
Authority
WO
WIPO (PCT)
Prior art keywords
chain
cross
request information
identity
resource transfer
Prior art date
Application number
PCT/CN2022/130612
Other languages
English (en)
Chinese (zh)
Inventor
张谦
郭海生
屠要峰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023088136A1 publication Critical patent/WO2023088136A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present application relates to the technical field of blockchain, and in particular to a blockchain cross-chain method, device and readable storage medium.
  • Embodiments of the present application provide a blockchain cross-chain method, device, and readable storage medium.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the relay chain of the blockchain system, and the blockchain system includes the relay chain and at least two application chains;
  • the block chain cross-chain method includes: receiving the cross-chain request information sent by the source block chain; obtaining cross-chain identity information according to the cross-chain request information, and making a request for the cross-chain request according to the cross-chain identity information Information is verified; in the case of passing the verification, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the identity of the notary; the The target resource transfer request information is sent to the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the target chain of the blockchain system, and the blockchain system includes a relay chain and at least two application chains, wherein the The application chain includes a source block chain and the target chain; the block chain cross-chain method includes: receiving the target resource transfer request information sent by the relay chain; obtaining the notary identity according to the target resource transfer request information , and obtain the notary’s identity information according to the notary’s identity; verify the target resource transfer request information according to the notary’s identity information; The target resource transfer request message initiates a target transaction to an account on the first chain of the target chain, and the target transaction is a part of a cross-chain transaction performed on the target chain.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the target chain of the blockchain system, and the blockchain system includes a relay chain and at least two application chains, wherein the The application chain includes a source block chain and the target chain; the block chain cross-chain method includes: initiating a source chain transaction according to cross-chain request information, and the cross-chain request information is used to characterize the source block chain A cross-chain transaction between the second on-chain account and the first on-chain account on the destination chain, the source chain transaction is a part of the cross-chain transaction on the source block chain; complete all After the source chain transaction, the cross-chain request information is sent to the relay chain.
  • an embodiment of the present application provides a device, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor implements the first aspect above when executing the computer program To the blockchain cross-chain method described in any one of the embodiments of the third aspect.
  • the embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer perform the above first to third aspects.
  • Figure 1 is a schematic diagram of a blockchain system for implementing a blockchain cross-chain method provided by an embodiment of the present application
  • Fig. 2 is a schematic diagram of a credit adjustment system provided by an embodiment of the present application.
  • Fig. 3 is a flowchart of a blockchain cross-chain method provided by an embodiment of the present application.
  • Fig. 4 is the flowchart of step S200 in Fig. 3;
  • Fig. 5 is the flowchart of step S200 in Fig. 3;
  • FIG. 6 is a flowchart of step S300 in FIG. 3;
  • Fig. 7 is the flowchart of step S320 in Fig. 6;
  • Fig. 8 is the flowchart of step S321 in Fig. 7;
  • Fig. 9 is a flowchart of step S323 in Fig. 8;
  • Fig. 10 is the flowchart of step S322 in Fig. 7;
  • Fig. 11 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application.
  • Fig. 12 is a flowchart of step S700 in Fig. 11;
  • Fig. 13 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application.
  • Fig. 14 is a schematic diagram of a blockchain device provided by an embodiment of the present application.
  • the embodiment of this application provides a blockchain cross-chain method, including: receiving the cross-chain request information sent by the source blockchain; obtaining cross-chain identity information according to the cross-chain request information, and making cross-chain request information according to the Information is verified; in the case of passing the verification, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the notary identity; the target resource transfer request information is sent To the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain.
  • the embodiment of this application can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, by verifying the cross-chain request information, and passing the verification
  • the target resource transfer request information can be obtained, which can prevent the nodes of the relay chain from performing malicious behaviors and cause asset losses, thereby improving security.
  • the blockchain cross-chain method of the example can realize the identity trust and intercommunication between different blockchains so that digital assets can be directly transferred safely between different blockchains.
  • FIG. 1 is a schematic diagram of a blockchain system for implementing a blockchain cross-chain method provided by an embodiment of the present application.
  • the blockchain system includes an application chain 100 and a relay chain 110, and each application chain 100 can interact with the relay chain 110, wherein the application chain 100 that initiates a cross-chain transaction is the source block Chain, the application chain 100 pointed to by the cross-chain transaction is the destination chain, and the source blockchain can use the relay chain 110 as the medium to realize the cross-chain transaction with the destination chain.
  • cross-chain transaction initiated by the source blockchain may point to multiple destination chains, or may only point to one destination chain, which is not specifically limited in this embodiment of the present application.
  • each application chain 100 is provided with an on-chain account, and the on-chain account includes the first on-chain account on the target chain and the second on-chain account on the source blockchain, and the source blockchain and the application
  • a cross-chain transaction between chains 100 may be a transaction between an account on the first chain and an account on the second chain.
  • cross-chain identity information is stored on the relay chain 110 and the application chain 100 , and the cross-chain identity information is used to represent the application chain 100 and the on-chain account of the application chain 100 .
  • the cross-chain identity information includes chain-level identity information corresponding to the application chain 100 one-to-one.
  • the chain-level identity information is stored in the relay chain 110, so the chain-level identity information can be used as the decentralized cross-chain identity of each application chain 100.
  • the cross-chain identity information includes the account identity information corresponding to the application chain 100 one by one.
  • the account identity information is stored in the application chain 100 where the account on the chain is located.
  • the account identity information can be used as the decentralized cross-chain identity of each account on the chain.
  • the account identity information can also be stored off-chain, by generating a hash code based on the account's public key, signature algorithm and other identity information on the chain and storing the hash code on the corresponding application chain 100, that is, The location of the account identity information is determined through the hash code stored in the application chain 100 to obtain the account identity information.
  • Each account on the chain will generate its corresponding public key and private key, and generate a signature based on the above private key to the public key and the signature algorithm corresponding to the account on the chain, so as to apply for on-chain.
  • each cross-chain identity information is provided with a corresponding cross-chain identity identifier (Cross Chain Identity Identifier, CCIID), and the relay chain 110 can locate the storage location of the cross-chain identity information according to the cross-chain identity identifier to obtain Cross-chain identity information.
  • CCIID Cross Chain Identity Identifier
  • the cross-chain identity includes the chain-level identity corresponding to the chain-level identity information, and the account identity corresponding to the account identity information, and the account identity includes the chain-level identity, so that the account identity can be used to locate the account on the chain The blockchain, and finally locate the public key and signature algorithm of the blockchain and the account on the chain through the chain-level identity information corresponding to the blockchain where it is located and the account identity information of the account on the chain corresponding to it.
  • the relay chain 110 includes a plurality of relay nodes, and each relay node can independently perform corresponding output for the input from the source block chain, for example, the relay node can
  • the cross-chain request information of the chain determines the original resource transfer request information, and judges the validity of the source chain transaction through multiple relay nodes of the relay chain 110, and the relay node outputs a sub-signature when judging that the source chain transaction is valid;
  • the target resource transfer request information can be determined according to the sub-signature and the original resource transfer request information, and the target resource transfer request information can be sent to the destination chain to realize cross-chain transactions. Therefore, the embodiment of the present application can accurately verify the original resource transfer request information while avoiding the influence of malicious nodes, thus improving the security of cross-chain transactions.
  • the target resource transfer request information carries the notary identity
  • the notary identity is used for the target chain to locate the notary identity information
  • the notary identity information is used to represent the decentralized cross-chain of trusted notaries Identity, where trusted notaries consist of all relay nodes on the relay chain.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain 110, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • the application chain 100 is provided with an on-chain account hosted by a trusted notary to facilitate the direct and safe transfer of assets between different blockchains, and the relay chain is established on the source blockchain
  • the active chain escrow account, the relay chain sets a purposeful escrow account on the destination chain.
  • FIG. 2 is a schematic diagram of a credit adjustment system provided by an embodiment of the present application.
  • the credit adjustment system runs on a relay chain.
  • the credit adjustment system includes a relay node and a control module 210, wherein,
  • the relay nodes include notary nodes 200 and vacant nodes 220 , and each notary node 200 and vacant nodes 220 can interact with the control module 210 .
  • control module 210 may be a decentralized smart contract running on the relay chain, or an entity platform running off the chain, which is not specifically limited in this application.
  • the credit adjustment system is used to adjust the credit weight of the relay node according to the behavior of the relay node, wherein the credit weight is used to evaluate the credibility of the relay node, and the preset strategy includes selecting the notary node 200 according to the credit weight, And when the credit adjustment system detects that the relay node's output of the cross-chain request information is wrong, it will reduce the credit weight corresponding to the relay node with the wrong output. When the credit adjustment system detects that the relay node's output of the cross-chain request information is correct , then increase the credit weight corresponding to the output correct relay node. The higher the credit weight of the relay node, the greater the probability of the relay node being selected as the notary node 200. Therefore, by setting the credit adjustment system, the selection of the notary node 200 through the corresponding credit weight of the application chain can minimize the The influence of small relay nodes doing evil can improve the security of cross-chain transactions.
  • the credit adjustment system adjusts the credit weight corresponding to the relay node by detecting whether the sub-signature generated by the relay node is correct.
  • the embodiment of this application does not specifically limit the number of selected notary nodes 200.
  • the selected notary nodes 200 The number is greater than or equal to the preset number.
  • Figure 3 is a flowchart of a blockchain cross-chain method provided by an embodiment of the present application, which is applied to the relay chain of the blockchain system, and in the example of Figure 3, the method includes but Not limited to step S100, step S200, step S300 and step S400:
  • Step S100 receiving the cross-chain request information sent by the source blockchain
  • Step S200 obtaining cross-chain identity information according to the cross-chain request information, and verifying the cross-chain request information according to the cross-chain identity information;
  • Step S300 if the verification is passed, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the identity of the notary;
  • Step S400 sending the target resource transfer request information to the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain. Therefore, through the embodiment of this application, it can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, the cross-chain transaction can be improved by verifying the cross-chain request information.
  • the blockchain cross-chain method of the embodiment of this application can realize identity trust and intercommunication between different blockchains so that digital assets can be directly stored in different blockchains. Secure cross-chain transfers between chains.
  • cross-chain transaction initiated by the source blockchain may point to multiple destination chains, or may only point to one destination chain, which is not specifically limited in this embodiment of the present application.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source block chain
  • a cross-chain transaction can be a transaction between an account on the second chain and an account on the first chain.
  • cross-chain identity information is stored on the application chain and the relay chain. There is a one-to-one correspondence between the application chains.
  • step S200 includes but not limited to step S210 and step S220:
  • Step S210 obtaining the cross-chain identity according to the cross-chain request information
  • Step S220 obtaining cross-chain identity information according to the cross-chain identity.
  • the cross-chain request information carries a cross-chain identity identifier for locating the cross-chain identity information
  • the cross-chain identity information is obtained according to the cross-chain request information sent by the source blockchain, including obtaining the cross-chain identity information according to the cross-chain identity chain identity information.
  • the cross-chain identity information includes chain-level identity information corresponding to the application chain one-to-one, and the chain-level identity information is stored in the relay chain; the cross-chain identity information also includes account identity information corresponding to the accounts on the chain , the account on the chain is used to represent the account on the source blockchain and the destination chain, the account identity information carries the signature algorithm and public key of the account on the chain, and the account identity information is stored in the application chain.
  • the cross-chain identity includes a chain-level identity corresponding to chain-level identity information, and an account identity corresponding to account identity information; obtaining cross-chain identity information according to the cross-chain identity includes Identifies the chain-level identity information, and obtains the account identity information according to the account identity.
  • Chain-level identity information is stored in the relay chain, and chain-level identity information can be used as a decentralized cross-chain identity for each application chain.
  • the account identity information carries the public key and signature algorithm of the account on the chain, and the account identity information is stored in the application chain where the account on the chain is located, so the account identity information can be used as the decentralized cross-chain identity of each account on the chain.
  • the account identity information can also be stored off-chain, by generating a hash code based on the account's public key, signature algorithm and other identity information on the chain and storing the hash code on the corresponding application chain, you can pass The hash code stored in the application chain determines the location of the account identity information to obtain the account identity information.
  • Each account on the chain will generate its corresponding public key and private key, and generate a signature based on the above private key to the public key and the signature algorithm corresponding to the account on the chain, so as to apply for on-chain.
  • step S220 also includes the following steps:
  • the chain-level identity information is obtained according to the chain-level identity
  • the account identity information is obtained according to the account identity
  • the relay chain can obtain the chain-level identity information according to the chain-level identity, so as to locate the application chain, and then locate the account on the chain of the application chain according to the account identity, so as to obtain the account identity information.
  • step S200 in Figure 3, in the example of Figure 5, step S200 also includes but not limited to step S230 and step S240:
  • Step S230 obtaining signature information according to the cross-chain request information
  • Step S240 verifying the signature information according to the cross-chain identity information.
  • the cross-chain request information carries signature information for the relay chain to verify the cross-chain request information.
  • signature information for the relay chain to verify the cross-chain request information.
  • the signature information carried in the cross-chain request information includes an account signature.
  • the cross-chain identity information it is verified whether the decentralized cross-chain identity involved in the cross-chain transaction represented by the cross-chain request information is consistent with the decentralized cross-chain identity stored on the relay chain and the application chain. unanimous.
  • step S300 includes but not limited to step S310 and step S320:
  • Step S310 determine the original resource transfer request information according to the cross-chain request information if the verification is passed;
  • Step S320 Sign the original resource transfer request information according to the preset threshold ring signature policy to obtain the target resource transfer request information.
  • the cross-chain request information carries proof of existence, and the proof of existence is generated by the source blockchain when the source chain transaction is completed. Before determining the original resource transfer request information according to the cross-chain request information, it also includes Verify the validity of the source chain transaction according to the proof of existence, and verify the existence proof and signature information carried by the cross-chain request information to ensure that the cross-chain transaction actually exists, and the cross-chain transaction needs to be completed on the source chain of the source blockchain The transaction is completed, which increases the security of cross-chain transactions.
  • step S320 includes but not limited to step S321 and step S322:
  • Step S321 judge the validity of the source chain transaction through multiple relay nodes of the relay chain, and the relay node generates a sub-signature for the original resource transfer request information when judging that the source chain transaction is valid;
  • Step S322 when the number of sub-signatures is greater than the preset number, the target resource transfer request information is obtained according to each sub-signature and the original resource transfer request information.
  • the multiple relay nodes of the relay chain determine that the source chain transaction is valid, a sub-signature is generated, and when the number of sub-signatures is greater than the preset number, the target resource transfer request information can be determined, and the cross-chain transaction can be further processed. Verification prevents the nodes of the relay chain from performing malicious actions and causing asset loss, thereby further improving security.
  • step S321 includes but not limited to step S323 and step S324:
  • Step S323 selecting a plurality of notary nodes from the relay nodes according to the preset strategy
  • Step S324 each notary node judges the validity of the source chain transaction according to the cross-chain request information, and generates a sub-signature for the original resource transfer request information when the source chain transaction is judged to be valid.
  • step S323 includes but not limited to step S325 and step S326:
  • step S326 when the credit adjustment system detects that the relay node outputs the cross-chain request information incorrectly, it lowers the credit weight corresponding to the relay node that outputs the error.
  • the relay chain runs a credit adjustment system
  • the credit adjustment system is used to adjust the credit weight of the relay node according to the behavior of the relay node, wherein the credit weight is used to evaluate the credibility of the relay node
  • the preset strategy includes selecting a notary node according to the credit weight, and when the credit adjustment system detects that the relay node outputs an error for the cross-chain request information, it will reduce the credit weight corresponding to the relay node that outputs the error, when the credit adjustment When the system detects that the output of the relay node for the cross-chain request information is correct, it will increase the credit weight corresponding to the relay node with the correct output.
  • the credit adjustment system adjusts the credit weight corresponding to the relay node by detecting whether the sub-signature generated by the relay node is correct.
  • step S322 includes but not limited to step S327 and step S328:
  • Step S327 when the number of sub-signatures is greater than the preset number, determine the ring signature according to each sub-signature
  • Step S328 determine the target resource transfer request information according to the ring signature and the original resource transfer request information.
  • the cross-chain request information can be verified, and the validity of the source chain transaction can be verified to improve the security of the cross-chain transaction;
  • a relay node judges that the source chain transaction is valid, it generates a sub-signature, and determines the target resource transfer request information when the number of sub-signatures is greater than the preset number, which can further verify the cross-chain transaction to prevent relay
  • the malicious behavior of the nodes of the chain leads to the loss of assets, which further improves the security of cross-chain transactions.
  • the embodiment of this application does not specifically limit the number of selected notary nodes.
  • the number of selected notary nodes Can be greater than or equal to the preset number.
  • the target resource transfer request information carries a notary identity
  • the notary identity is used for the destination chain to locate the notary identity information.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • both the source blockchain and the destination blockchain are provided with on-chain accounts hosted by trusted notaries, so as to facilitate the direct and safe transfer of assets between different blockchains.
  • Figure 11 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application, which is applied to the destination chain of the blockchain system.
  • the method includes but Not limited to step S500, step S600, step S700 and step S800:
  • Step S500 receiving the target resource transfer request information sent by the relay chain
  • Step S600 obtaining the identity of the notary according to the target resource transfer request information, and obtaining the identity information of the notary according to the identity of the notary;
  • Step S700 verifying the target resource transfer request information according to the identity information of the notary
  • Step S800 In the case that the target resource transfer request information passes the verification, initiate a target transaction to the account on the first chain of the target chain according to the target resource transfer request information, and the target transaction is a part of the cross-chain transaction on the target chain.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source blockchain, and the source blockchain and the application chain
  • the cross-chain transaction can be the transaction between the account on the second chain and the account on the first chain.
  • the target escrow account established on the target chain by the trusted notary initiates a target transaction to the first on-chain account according to the target resource transfer request information.
  • the target resource transfer request information carries a notary identity
  • the notary identity is used for the destination chain to locate the notary identity information.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • step S700 includes but not limited to step S710 and step S720:
  • Step S710 obtaining notary signature information according to the target resource transfer request information
  • Step S720 verifying the notary's signature information according to the notary's identity information.
  • the trusted notary can sign the original resource transfer request information to obtain the notary signature information, and by using the notary identity information to verify the notary signature information, the security of cross-chain transactions can be improved.
  • the target escrow account established on the target chain by the trusted notary initiates a target transaction to the first on-chain account according to the target resource transfer request information.
  • Figure 13 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application, which is applied to the source blockchain of the blockchain system, and in the example of Figure 13, the method Including but not limited to step S900 and step S1000:
  • Step S900 initiate the source chain transaction according to the cross-chain request information
  • the cross-chain request information is used to represent the cross-chain transaction between the account on the second chain on the source blockchain and the account on the first chain on the destination chain
  • the source chain A transaction is a partial transaction of a cross-chain transaction on the source blockchain
  • Step S1000 after completing the source chain transaction, send the cross-chain request information to the relay chain.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source blockchain, and the source blockchain and the application chain
  • the cross-chain transaction can be the transaction between the account on the second chain and the account on the first chain.
  • the second on-chain account initiates the source chain transaction to the source chain escrow account established by the trusted notary on the source blockchain according to the cross-chain request information.
  • the cross-chain request information carries a proof of existence
  • the proof of existence is generated by the source blockchain when the source chain transaction is completed.
  • FIG. 14 is a schematic diagram of a block chain device 300 provided by an embodiment of the present application.
  • the device includes: a memory 310, a processor 320, and a A computer program running on the processor 320.
  • the processor 320 and the memory 310 may be connected through a bus or in other ways.
  • the memory 310 can be used to store non-transitory software programs and non-transitory computer-executable programs.
  • the memory 310 may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices.
  • the memory 310 may include memory 310 located remotely relative to the processor 320, and these remotely located memories 310 may be connected to the processor 320 through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the non-transitory software programs and instructions required to implement the blockchain cross-chain method of the above embodiment are stored in the memory 310, and when executed by the processor 320, the blockchain cross-chain method in the above embodiment is executed, for example, Execute the blockchain cross-chain method in Figure 3 to Figure 10, or Figure 11 to Figure 12, or Figure 13 described above.
  • an embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are executed by a processor or a controller, for example, by the above-mentioned Execution by a processor in the device embodiment or the device embodiment can cause the above processor to execute the blockchain cross-chain method in the above embodiment, for example, execute the above-described Figures 3 to 10, or Figures 11 to 12 , or the blockchain cross-chain method in Figure 13.
  • the embodiment of this application includes: receiving the cross-chain request information sent by the source blockchain; obtaining cross-chain identity information according to the cross-chain request information, and verifying the cross-chain request information according to the cross-chain identity information ; In the case of passing the verification, obtain the target resource transfer request information according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the notary identity; transfer the target resource The request information is sent to the target chain, so that the target chain completes the cross-chain transaction according to the notary identity and target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain.
  • the embodiment of this application can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, by verifying the cross-chain request information, and passing the verification
  • the target resource transfer request information can be obtained, which can prevent the nodes of the relay chain from performing malicious behaviors and cause asset losses, thereby improving security.
  • the blockchain cross-chain method of the example can realize the identity trust and intercommunication between different blockchains so that digital assets can be directly transferred safely between different blockchains.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente demande concerne un procédé entre chaînes de blocs, un dispositif, et un support de stockage lisible. Le procédé entre chaînes de blocs consiste : à recevoir des informations de demande entre chaînes de blocs envoyées par une chaîne de blocs source (S100) ; à obtenir des informations d'identité entre chaînes selon les informations de demande entre chaînes, et à vérifier les informations de demande entre chaînes selon les informations d'identité entre chaînes (S200) ; dans le cas d'une vérification réussie, à obtenir des informations de demande de transfert de ressource cible selon les informations de demande entre chaînes et une stratégie de signature de cercle à seuil prédéfini, les informations de demande de transfert de ressource cible portant une identité de notaire (S300) ; à envoyer les informations de demande de transfert de ressource cible à une chaîne de destination de telle sorte que la chaîne de destination réalise une transaction entre chaînes selon l'identité de notaire et les informations de demande de transfert de ressource cible (S400).
PCT/CN2022/130612 2021-11-16 2022-11-08 Procédé entre chaînes de blocs, dispositif, et support de stockage lisible WO2023088136A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111352870.1A CN116137006A (zh) 2021-11-16 2021-11-16 区块链跨链方法、设备及可读存储介质
CN202111352870.1 2021-11-16

Publications (1)

Publication Number Publication Date
WO2023088136A1 true WO2023088136A1 (fr) 2023-05-25

Family

ID=86332509

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/130612 WO2023088136A1 (fr) 2021-11-16 2022-11-08 Procédé entre chaînes de blocs, dispositif, et support de stockage lisible

Country Status (2)

Country Link
CN (1) CN116137006A (fr)
WO (1) WO2023088136A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915404A (zh) * 2023-09-13 2023-10-20 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116996521A (zh) * 2023-09-28 2023-11-03 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN117319083A (zh) * 2023-11-27 2023-12-29 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117938354A (zh) * 2024-03-18 2024-04-26 中国信息通信研究院 基于中继链的跨链交易方法和装置、电子设备和存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117614634A (zh) * 2024-01-19 2024-02-27 成都信息工程大学 基于可追踪环签名的联盟链跨链身份认证方法及***

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784518A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种区块链跨链处理方法、装置、计算机设备及存储介质
CN112116473A (zh) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 跨链公证人机制评价***和平台
CN112398853A (zh) * 2020-11-16 2021-02-23 东软集团股份有限公司 一种实现联盟链跨链通信的方法、装置及***
CN112669038A (zh) * 2020-12-28 2021-04-16 杭州趣链科技有限公司 账户查询***、跨链网关
CN113179168A (zh) * 2021-04-22 2021-07-27 山东大学 一种区块链的跨链交互方法
US20210258323A1 (en) * 2018-11-16 2021-08-19 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210258323A1 (en) * 2018-11-16 2021-08-19 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses
CN111784518A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种区块链跨链处理方法、装置、计算机设备及存储介质
CN112116473A (zh) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 跨链公证人机制评价***和平台
CN112398853A (zh) * 2020-11-16 2021-02-23 东软集团股份有限公司 一种实现联盟链跨链通信的方法、装置及***
CN112669038A (zh) * 2020-12-28 2021-04-16 杭州趣链科技有限公司 账户查询***、跨链网关
CN113179168A (zh) * 2021-04-22 2021-07-27 山东大学 一种区块链的跨链交互方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915404A (zh) * 2023-09-13 2023-10-20 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116915404B (zh) * 2023-09-13 2023-11-17 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116996521A (zh) * 2023-09-28 2023-11-03 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN116996521B (zh) * 2023-09-28 2023-12-15 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN117319083A (zh) * 2023-11-27 2023-12-29 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117319083B (zh) * 2023-11-27 2024-02-27 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117938354A (zh) * 2024-03-18 2024-04-26 中国信息通信研究院 基于中继链的跨链交易方法和装置、电子设备和存储介质

Also Published As

Publication number Publication date
CN116137006A (zh) 2023-05-19

Similar Documents

Publication Publication Date Title
WO2023088136A1 (fr) Procédé entre chaînes de blocs, dispositif, et support de stockage lisible
US11461773B2 (en) Blockchain-based node management methods and apparatuses
US20210133359A1 (en) Permission management method, permission verification method, and related apparatus
US20210160082A1 (en) Blockchain transaction method and apparatus
US11429967B2 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN112311735B (zh) 可信认证方法,网络设备、***及存储介质
CN111010376A (zh) 基于主从链的物联网认证***及方法
CN111934996B (zh) 消息传输方法及装置
CN111340494B (zh) 资产类型一致性证据生成、交易、交易验证方法及***
US11218464B2 (en) Information registration and authentication method and device
CN111639327A (zh) 一种开放平台的认证方法及装置
US11102006B2 (en) Blockchain intelligent security implementation
CN111262860A (zh) 跨链模式下的身份认证方法及装置
CN112070501B (zh) 一种区块链交易发起、验证方法及***
CN110992035A (zh) 区块链节点管理方法、装置及***
CN113132363B (zh) 一种前后端安全验证方法及设备
JP2018503901A (ja) サービス要求認証の方法及び装置
CN114297678A (zh) 一种联盟链***运行方法、装置、设备及存储介质
CN112446050B (zh) 应用于区块链***的业务数据处理方法及装置
CN113328854A (zh) 基于区块链的业务处理方法及***
CN112118292A (zh) 用于跨链通信的方法、装置、网络节点和存储介质
CN115001707B (zh) 基于区块链的设备认证方法和相关设备
CN112418850A (zh) 一种基于区块链的交易方法、装置及电子设备
CN114172923B (zh) 数据传输方法、通信***及通信装置
EP4252384B1 (fr) Procédés, dispositifs et système liés à un registre distribué et à un attribut d'identité d'utilisateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22894673

Country of ref document: EP

Kind code of ref document: A1