WO2023088136A1 - 区块链跨链方法、设备及可读存储介质 - Google Patents

区块链跨链方法、设备及可读存储介质 Download PDF

Info

Publication number
WO2023088136A1
WO2023088136A1 PCT/CN2022/130612 CN2022130612W WO2023088136A1 WO 2023088136 A1 WO2023088136 A1 WO 2023088136A1 CN 2022130612 W CN2022130612 W CN 2022130612W WO 2023088136 A1 WO2023088136 A1 WO 2023088136A1
Authority
WO
WIPO (PCT)
Prior art keywords
chain
cross
request information
identity
resource transfer
Prior art date
Application number
PCT/CN2022/130612
Other languages
English (en)
French (fr)
Inventor
张谦
郭海生
屠要峰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023088136A1 publication Critical patent/WO2023088136A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present application relates to the technical field of blockchain, and in particular to a blockchain cross-chain method, device and readable storage medium.
  • Embodiments of the present application provide a blockchain cross-chain method, device, and readable storage medium.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the relay chain of the blockchain system, and the blockchain system includes the relay chain and at least two application chains;
  • the block chain cross-chain method includes: receiving the cross-chain request information sent by the source block chain; obtaining cross-chain identity information according to the cross-chain request information, and making a request for the cross-chain request according to the cross-chain identity information Information is verified; in the case of passing the verification, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the identity of the notary; the The target resource transfer request information is sent to the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the target chain of the blockchain system, and the blockchain system includes a relay chain and at least two application chains, wherein the The application chain includes a source block chain and the target chain; the block chain cross-chain method includes: receiving the target resource transfer request information sent by the relay chain; obtaining the notary identity according to the target resource transfer request information , and obtain the notary’s identity information according to the notary’s identity; verify the target resource transfer request information according to the notary’s identity information; The target resource transfer request message initiates a target transaction to an account on the first chain of the target chain, and the target transaction is a part of a cross-chain transaction performed on the target chain.
  • the embodiment of the present application provides a blockchain cross-chain method, which is applied to the target chain of the blockchain system, and the blockchain system includes a relay chain and at least two application chains, wherein the The application chain includes a source block chain and the target chain; the block chain cross-chain method includes: initiating a source chain transaction according to cross-chain request information, and the cross-chain request information is used to characterize the source block chain A cross-chain transaction between the second on-chain account and the first on-chain account on the destination chain, the source chain transaction is a part of the cross-chain transaction on the source block chain; complete all After the source chain transaction, the cross-chain request information is sent to the relay chain.
  • an embodiment of the present application provides a device, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the processor implements the first aspect above when executing the computer program To the blockchain cross-chain method described in any one of the embodiments of the third aspect.
  • the embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to make a computer perform the above first to third aspects.
  • Figure 1 is a schematic diagram of a blockchain system for implementing a blockchain cross-chain method provided by an embodiment of the present application
  • Fig. 2 is a schematic diagram of a credit adjustment system provided by an embodiment of the present application.
  • Fig. 3 is a flowchart of a blockchain cross-chain method provided by an embodiment of the present application.
  • Fig. 4 is the flowchart of step S200 in Fig. 3;
  • Fig. 5 is the flowchart of step S200 in Fig. 3;
  • FIG. 6 is a flowchart of step S300 in FIG. 3;
  • Fig. 7 is the flowchart of step S320 in Fig. 6;
  • Fig. 8 is the flowchart of step S321 in Fig. 7;
  • Fig. 9 is a flowchart of step S323 in Fig. 8;
  • Fig. 10 is the flowchart of step S322 in Fig. 7;
  • Fig. 11 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application.
  • Fig. 12 is a flowchart of step S700 in Fig. 11;
  • Fig. 13 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application.
  • Fig. 14 is a schematic diagram of a blockchain device provided by an embodiment of the present application.
  • the embodiment of this application provides a blockchain cross-chain method, including: receiving the cross-chain request information sent by the source blockchain; obtaining cross-chain identity information according to the cross-chain request information, and making cross-chain request information according to the Information is verified; in the case of passing the verification, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the notary identity; the target resource transfer request information is sent To the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain.
  • the embodiment of this application can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, by verifying the cross-chain request information, and passing the verification
  • the target resource transfer request information can be obtained, which can prevent the nodes of the relay chain from performing malicious behaviors and cause asset losses, thereby improving security.
  • the blockchain cross-chain method of the example can realize the identity trust and intercommunication between different blockchains so that digital assets can be directly transferred safely between different blockchains.
  • FIG. 1 is a schematic diagram of a blockchain system for implementing a blockchain cross-chain method provided by an embodiment of the present application.
  • the blockchain system includes an application chain 100 and a relay chain 110, and each application chain 100 can interact with the relay chain 110, wherein the application chain 100 that initiates a cross-chain transaction is the source block Chain, the application chain 100 pointed to by the cross-chain transaction is the destination chain, and the source blockchain can use the relay chain 110 as the medium to realize the cross-chain transaction with the destination chain.
  • cross-chain transaction initiated by the source blockchain may point to multiple destination chains, or may only point to one destination chain, which is not specifically limited in this embodiment of the present application.
  • each application chain 100 is provided with an on-chain account, and the on-chain account includes the first on-chain account on the target chain and the second on-chain account on the source blockchain, and the source blockchain and the application
  • a cross-chain transaction between chains 100 may be a transaction between an account on the first chain and an account on the second chain.
  • cross-chain identity information is stored on the relay chain 110 and the application chain 100 , and the cross-chain identity information is used to represent the application chain 100 and the on-chain account of the application chain 100 .
  • the cross-chain identity information includes chain-level identity information corresponding to the application chain 100 one-to-one.
  • the chain-level identity information is stored in the relay chain 110, so the chain-level identity information can be used as the decentralized cross-chain identity of each application chain 100.
  • the cross-chain identity information includes the account identity information corresponding to the application chain 100 one by one.
  • the account identity information is stored in the application chain 100 where the account on the chain is located.
  • the account identity information can be used as the decentralized cross-chain identity of each account on the chain.
  • the account identity information can also be stored off-chain, by generating a hash code based on the account's public key, signature algorithm and other identity information on the chain and storing the hash code on the corresponding application chain 100, that is, The location of the account identity information is determined through the hash code stored in the application chain 100 to obtain the account identity information.
  • Each account on the chain will generate its corresponding public key and private key, and generate a signature based on the above private key to the public key and the signature algorithm corresponding to the account on the chain, so as to apply for on-chain.
  • each cross-chain identity information is provided with a corresponding cross-chain identity identifier (Cross Chain Identity Identifier, CCIID), and the relay chain 110 can locate the storage location of the cross-chain identity information according to the cross-chain identity identifier to obtain Cross-chain identity information.
  • CCIID Cross Chain Identity Identifier
  • the cross-chain identity includes the chain-level identity corresponding to the chain-level identity information, and the account identity corresponding to the account identity information, and the account identity includes the chain-level identity, so that the account identity can be used to locate the account on the chain The blockchain, and finally locate the public key and signature algorithm of the blockchain and the account on the chain through the chain-level identity information corresponding to the blockchain where it is located and the account identity information of the account on the chain corresponding to it.
  • the relay chain 110 includes a plurality of relay nodes, and each relay node can independently perform corresponding output for the input from the source block chain, for example, the relay node can
  • the cross-chain request information of the chain determines the original resource transfer request information, and judges the validity of the source chain transaction through multiple relay nodes of the relay chain 110, and the relay node outputs a sub-signature when judging that the source chain transaction is valid;
  • the target resource transfer request information can be determined according to the sub-signature and the original resource transfer request information, and the target resource transfer request information can be sent to the destination chain to realize cross-chain transactions. Therefore, the embodiment of the present application can accurately verify the original resource transfer request information while avoiding the influence of malicious nodes, thus improving the security of cross-chain transactions.
  • the target resource transfer request information carries the notary identity
  • the notary identity is used for the target chain to locate the notary identity information
  • the notary identity information is used to represent the decentralized cross-chain of trusted notaries Identity, where trusted notaries consist of all relay nodes on the relay chain.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain 110, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • the application chain 100 is provided with an on-chain account hosted by a trusted notary to facilitate the direct and safe transfer of assets between different blockchains, and the relay chain is established on the source blockchain
  • the active chain escrow account, the relay chain sets a purposeful escrow account on the destination chain.
  • FIG. 2 is a schematic diagram of a credit adjustment system provided by an embodiment of the present application.
  • the credit adjustment system runs on a relay chain.
  • the credit adjustment system includes a relay node and a control module 210, wherein,
  • the relay nodes include notary nodes 200 and vacant nodes 220 , and each notary node 200 and vacant nodes 220 can interact with the control module 210 .
  • control module 210 may be a decentralized smart contract running on the relay chain, or an entity platform running off the chain, which is not specifically limited in this application.
  • the credit adjustment system is used to adjust the credit weight of the relay node according to the behavior of the relay node, wherein the credit weight is used to evaluate the credibility of the relay node, and the preset strategy includes selecting the notary node 200 according to the credit weight, And when the credit adjustment system detects that the relay node's output of the cross-chain request information is wrong, it will reduce the credit weight corresponding to the relay node with the wrong output. When the credit adjustment system detects that the relay node's output of the cross-chain request information is correct , then increase the credit weight corresponding to the output correct relay node. The higher the credit weight of the relay node, the greater the probability of the relay node being selected as the notary node 200. Therefore, by setting the credit adjustment system, the selection of the notary node 200 through the corresponding credit weight of the application chain can minimize the The influence of small relay nodes doing evil can improve the security of cross-chain transactions.
  • the credit adjustment system adjusts the credit weight corresponding to the relay node by detecting whether the sub-signature generated by the relay node is correct.
  • the embodiment of this application does not specifically limit the number of selected notary nodes 200.
  • the selected notary nodes 200 The number is greater than or equal to the preset number.
  • Figure 3 is a flowchart of a blockchain cross-chain method provided by an embodiment of the present application, which is applied to the relay chain of the blockchain system, and in the example of Figure 3, the method includes but Not limited to step S100, step S200, step S300 and step S400:
  • Step S100 receiving the cross-chain request information sent by the source blockchain
  • Step S200 obtaining cross-chain identity information according to the cross-chain request information, and verifying the cross-chain request information according to the cross-chain identity information;
  • Step S300 if the verification is passed, the target resource transfer request information is obtained according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the identity of the notary;
  • Step S400 sending the target resource transfer request information to the destination chain, so that the destination chain completes the cross-chain transaction according to the notary identity and the target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain. Therefore, through the embodiment of this application, it can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, the cross-chain transaction can be improved by verifying the cross-chain request information.
  • the blockchain cross-chain method of the embodiment of this application can realize identity trust and intercommunication between different blockchains so that digital assets can be directly stored in different blockchains. Secure cross-chain transfers between chains.
  • cross-chain transaction initiated by the source blockchain may point to multiple destination chains, or may only point to one destination chain, which is not specifically limited in this embodiment of the present application.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source block chain
  • a cross-chain transaction can be a transaction between an account on the second chain and an account on the first chain.
  • cross-chain identity information is stored on the application chain and the relay chain. There is a one-to-one correspondence between the application chains.
  • step S200 includes but not limited to step S210 and step S220:
  • Step S210 obtaining the cross-chain identity according to the cross-chain request information
  • Step S220 obtaining cross-chain identity information according to the cross-chain identity.
  • the cross-chain request information carries a cross-chain identity identifier for locating the cross-chain identity information
  • the cross-chain identity information is obtained according to the cross-chain request information sent by the source blockchain, including obtaining the cross-chain identity information according to the cross-chain identity chain identity information.
  • the cross-chain identity information includes chain-level identity information corresponding to the application chain one-to-one, and the chain-level identity information is stored in the relay chain; the cross-chain identity information also includes account identity information corresponding to the accounts on the chain , the account on the chain is used to represent the account on the source blockchain and the destination chain, the account identity information carries the signature algorithm and public key of the account on the chain, and the account identity information is stored in the application chain.
  • the cross-chain identity includes a chain-level identity corresponding to chain-level identity information, and an account identity corresponding to account identity information; obtaining cross-chain identity information according to the cross-chain identity includes Identifies the chain-level identity information, and obtains the account identity information according to the account identity.
  • Chain-level identity information is stored in the relay chain, and chain-level identity information can be used as a decentralized cross-chain identity for each application chain.
  • the account identity information carries the public key and signature algorithm of the account on the chain, and the account identity information is stored in the application chain where the account on the chain is located, so the account identity information can be used as the decentralized cross-chain identity of each account on the chain.
  • the account identity information can also be stored off-chain, by generating a hash code based on the account's public key, signature algorithm and other identity information on the chain and storing the hash code on the corresponding application chain, you can pass The hash code stored in the application chain determines the location of the account identity information to obtain the account identity information.
  • Each account on the chain will generate its corresponding public key and private key, and generate a signature based on the above private key to the public key and the signature algorithm corresponding to the account on the chain, so as to apply for on-chain.
  • step S220 also includes the following steps:
  • the chain-level identity information is obtained according to the chain-level identity
  • the account identity information is obtained according to the account identity
  • the relay chain can obtain the chain-level identity information according to the chain-level identity, so as to locate the application chain, and then locate the account on the chain of the application chain according to the account identity, so as to obtain the account identity information.
  • step S200 in Figure 3, in the example of Figure 5, step S200 also includes but not limited to step S230 and step S240:
  • Step S230 obtaining signature information according to the cross-chain request information
  • Step S240 verifying the signature information according to the cross-chain identity information.
  • the cross-chain request information carries signature information for the relay chain to verify the cross-chain request information.
  • signature information for the relay chain to verify the cross-chain request information.
  • the signature information carried in the cross-chain request information includes an account signature.
  • the cross-chain identity information it is verified whether the decentralized cross-chain identity involved in the cross-chain transaction represented by the cross-chain request information is consistent with the decentralized cross-chain identity stored on the relay chain and the application chain. unanimous.
  • step S300 includes but not limited to step S310 and step S320:
  • Step S310 determine the original resource transfer request information according to the cross-chain request information if the verification is passed;
  • Step S320 Sign the original resource transfer request information according to the preset threshold ring signature policy to obtain the target resource transfer request information.
  • the cross-chain request information carries proof of existence, and the proof of existence is generated by the source blockchain when the source chain transaction is completed. Before determining the original resource transfer request information according to the cross-chain request information, it also includes Verify the validity of the source chain transaction according to the proof of existence, and verify the existence proof and signature information carried by the cross-chain request information to ensure that the cross-chain transaction actually exists, and the cross-chain transaction needs to be completed on the source chain of the source blockchain The transaction is completed, which increases the security of cross-chain transactions.
  • step S320 includes but not limited to step S321 and step S322:
  • Step S321 judge the validity of the source chain transaction through multiple relay nodes of the relay chain, and the relay node generates a sub-signature for the original resource transfer request information when judging that the source chain transaction is valid;
  • Step S322 when the number of sub-signatures is greater than the preset number, the target resource transfer request information is obtained according to each sub-signature and the original resource transfer request information.
  • the multiple relay nodes of the relay chain determine that the source chain transaction is valid, a sub-signature is generated, and when the number of sub-signatures is greater than the preset number, the target resource transfer request information can be determined, and the cross-chain transaction can be further processed. Verification prevents the nodes of the relay chain from performing malicious actions and causing asset loss, thereby further improving security.
  • step S321 includes but not limited to step S323 and step S324:
  • Step S323 selecting a plurality of notary nodes from the relay nodes according to the preset strategy
  • Step S324 each notary node judges the validity of the source chain transaction according to the cross-chain request information, and generates a sub-signature for the original resource transfer request information when the source chain transaction is judged to be valid.
  • step S323 includes but not limited to step S325 and step S326:
  • step S326 when the credit adjustment system detects that the relay node outputs the cross-chain request information incorrectly, it lowers the credit weight corresponding to the relay node that outputs the error.
  • the relay chain runs a credit adjustment system
  • the credit adjustment system is used to adjust the credit weight of the relay node according to the behavior of the relay node, wherein the credit weight is used to evaluate the credibility of the relay node
  • the preset strategy includes selecting a notary node according to the credit weight, and when the credit adjustment system detects that the relay node outputs an error for the cross-chain request information, it will reduce the credit weight corresponding to the relay node that outputs the error, when the credit adjustment When the system detects that the output of the relay node for the cross-chain request information is correct, it will increase the credit weight corresponding to the relay node with the correct output.
  • the credit adjustment system adjusts the credit weight corresponding to the relay node by detecting whether the sub-signature generated by the relay node is correct.
  • step S322 includes but not limited to step S327 and step S328:
  • Step S327 when the number of sub-signatures is greater than the preset number, determine the ring signature according to each sub-signature
  • Step S328 determine the target resource transfer request information according to the ring signature and the original resource transfer request information.
  • the cross-chain request information can be verified, and the validity of the source chain transaction can be verified to improve the security of the cross-chain transaction;
  • a relay node judges that the source chain transaction is valid, it generates a sub-signature, and determines the target resource transfer request information when the number of sub-signatures is greater than the preset number, which can further verify the cross-chain transaction to prevent relay
  • the malicious behavior of the nodes of the chain leads to the loss of assets, which further improves the security of cross-chain transactions.
  • the embodiment of this application does not specifically limit the number of selected notary nodes.
  • the number of selected notary nodes Can be greater than or equal to the preset number.
  • the target resource transfer request information carries a notary identity
  • the notary identity is used for the destination chain to locate the notary identity information.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • both the source blockchain and the destination blockchain are provided with on-chain accounts hosted by trusted notaries, so as to facilitate the direct and safe transfer of assets between different blockchains.
  • Figure 11 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application, which is applied to the destination chain of the blockchain system.
  • the method includes but Not limited to step S500, step S600, step S700 and step S800:
  • Step S500 receiving the target resource transfer request information sent by the relay chain
  • Step S600 obtaining the identity of the notary according to the target resource transfer request information, and obtaining the identity information of the notary according to the identity of the notary;
  • Step S700 verifying the target resource transfer request information according to the identity information of the notary
  • Step S800 In the case that the target resource transfer request information passes the verification, initiate a target transaction to the account on the first chain of the target chain according to the target resource transfer request information, and the target transaction is a part of the cross-chain transaction on the target chain.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source blockchain, and the source blockchain and the application chain
  • the cross-chain transaction can be the transaction between the account on the second chain and the account on the first chain.
  • the target escrow account established on the target chain by the trusted notary initiates a target transaction to the first on-chain account according to the target resource transfer request information.
  • the target resource transfer request information carries a notary identity
  • the notary identity is used for the destination chain to locate the notary identity information.
  • Each relay node has a corresponding public key and private key, and the notary identity information includes the notary public key and the corresponding signature algorithm composed of the public keys of all relay nodes.
  • the notary's identity information is stored in the relay chain, and the private key of each relay node corresponding to the notary's public key is stored in each relay node.
  • step S700 includes but not limited to step S710 and step S720:
  • Step S710 obtaining notary signature information according to the target resource transfer request information
  • Step S720 verifying the notary's signature information according to the notary's identity information.
  • the trusted notary can sign the original resource transfer request information to obtain the notary signature information, and by using the notary identity information to verify the notary signature information, the security of cross-chain transactions can be improved.
  • the target escrow account established on the target chain by the trusted notary initiates a target transaction to the first on-chain account according to the target resource transfer request information.
  • Figure 13 is a flowchart of a blockchain cross-chain method provided by another embodiment of the present application, which is applied to the source blockchain of the blockchain system, and in the example of Figure 13, the method Including but not limited to step S900 and step S1000:
  • Step S900 initiate the source chain transaction according to the cross-chain request information
  • the cross-chain request information is used to represent the cross-chain transaction between the account on the second chain on the source blockchain and the account on the first chain on the destination chain
  • the source chain A transaction is a partial transaction of a cross-chain transaction on the source blockchain
  • Step S1000 after completing the source chain transaction, send the cross-chain request information to the relay chain.
  • each application chain is provided with an on-chain account
  • the on-chain account includes the first on-chain account on the destination chain and the second on-chain account on the source blockchain, and the source blockchain and the application chain
  • the cross-chain transaction can be the transaction between the account on the second chain and the account on the first chain.
  • the second on-chain account initiates the source chain transaction to the source chain escrow account established by the trusted notary on the source blockchain according to the cross-chain request information.
  • the cross-chain request information carries a proof of existence
  • the proof of existence is generated by the source blockchain when the source chain transaction is completed.
  • FIG. 14 is a schematic diagram of a block chain device 300 provided by an embodiment of the present application.
  • the device includes: a memory 310, a processor 320, and a A computer program running on the processor 320.
  • the processor 320 and the memory 310 may be connected through a bus or in other ways.
  • the memory 310 can be used to store non-transitory software programs and non-transitory computer-executable programs.
  • the memory 310 may include a high-speed random access memory, and may also include a non-transitory memory, such as at least one magnetic disk storage device, a flash memory device, or other non-transitory solid-state storage devices.
  • the memory 310 may include memory 310 located remotely relative to the processor 320, and these remotely located memories 310 may be connected to the processor 320 through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the non-transitory software programs and instructions required to implement the blockchain cross-chain method of the above embodiment are stored in the memory 310, and when executed by the processor 320, the blockchain cross-chain method in the above embodiment is executed, for example, Execute the blockchain cross-chain method in Figure 3 to Figure 10, or Figure 11 to Figure 12, or Figure 13 described above.
  • an embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are executed by a processor or a controller, for example, by the above-mentioned Execution by a processor in the device embodiment or the device embodiment can cause the above processor to execute the blockchain cross-chain method in the above embodiment, for example, execute the above-described Figures 3 to 10, or Figures 11 to 12 , or the blockchain cross-chain method in Figure 13.
  • the embodiment of this application includes: receiving the cross-chain request information sent by the source blockchain; obtaining cross-chain identity information according to the cross-chain request information, and verifying the cross-chain request information according to the cross-chain identity information ; In the case of passing the verification, obtain the target resource transfer request information according to the cross-chain request information and the preset threshold ring signature policy, and the target resource transfer request information carries the notary identity; transfer the target resource The request information is sent to the target chain, so that the target chain completes the cross-chain transaction according to the notary identity and target resource transfer request information.
  • the cross-chain identity information obtained from the cross-chain request information sent by the source blockchain can realize the identity trust between the source blockchain and the relay chain, and the target chain sent to the destination chain
  • the resource transfer request information carries the identity of the notary, so that the destination chain can determine the identity of the relay chain according to the identity of the notary, so as to realize the identity trust between the relay chain and the destination chain.
  • the embodiment of this application can Realize the identity trust and intercommunication between the source blockchain, the relay chain and the destination chain, that is, realize the identity trust and intercommunication between the various application chains; in addition, by verifying the cross-chain request information, and passing the verification
  • the target resource transfer request information can be obtained, which can prevent the nodes of the relay chain from performing malicious behaviors and cause asset losses, thereby improving security.
  • the blockchain cross-chain method of the example can realize the identity trust and intercommunication between different blockchains so that digital assets can be directly transferred safely between different blockchains.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请提供了一种区块链跨链方法、设备及可读存储介质,其中,该区块链跨链方法包括:接收源区块链发送的跨链请求信息(S100);根据跨链请求信息得到跨链身份信息,并根据跨链身份信息对跨链请求信息进行验证(S200);在通过验证的情况下,根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,目标资源转移请求信息携带有公证人身份标识(S300);将目标资源转移请求信息发送至目的链,以使目的链根据公证人身份标识和目标资源转移请求信息完成跨链交易(S400)。

Description

区块链跨链方法、设备及可读存储介质
相关申请的交叉引用
本申请基于申请号为202111352870.1、申请日为2021年11月16日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及区块链技术领域,尤其涉及一种区块链跨链方法、设备及可读存储介质。
背景技术
随着区块链技术的快速发展,区块链技术在各个领域受到越来越多的的关注,并被逐渐应用到各种场景中,尤其是数字资产、存证等场景。而不同的组织机构往往采用不同的区块链,且对于同一组织机构在不同的具体业务场景下也会采用不同的区块链,因此需要通过跨链技术实现不同区块链之间的交互。然而,在一些情形下的跨链技术往往仅关注如数字资产等数据在不同区块链之间的跨链交互,而忽视了跨链主体身份在跨越不同区块链时的直接信任与互通,因此阻碍了数字资产在不同区块链之间的跨链转移。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本申请实施例提供了一种区块链跨链方法、设备及可读存储介质。
第一方面,本申请实施例提供了一种区块链跨链方法,应用于区块链***的中继链,所述区块链***包括所述中继链和至少两个应用链;所述区块链跨链方法包括:接收所述源区块链发送的跨链请求信息;根据所述跨链请求信息得到跨链身份信息,并根据所述跨链身份信息对所述跨链请求信息进行验证;在通过验证的情况下,根据所述跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,所述目标资源转移请求信息携带有公证人身份标识;将所述目标资源转移请求信息发送至所述目的链,以使所述目的链根据所述公证人身份标识和目标资源转移请求信息完成跨链交易。
第二方面,本申请实施例提供了一种区块链跨链方法,应用于区块链***的目的链,所述区块链***包括中继链和至少两个应用链,其中,所述应用链包括源区块链和所述目的链;所述区块链跨链方法包括:接收所述中继链发送的目标资源转移请求信息;根据所述目标资源转移请求信息得到公证人身份标识,并根据所述公证人身份标识得到公证人身份信息;根据所述公证人身份信息对所述目标资源转移请求信息进行验证;在所述目标资源转移请求信息通过验证的情况下,根据所述目标资源转移请求信息对所述目的链的第一链上账户发起目的交易,所述目的交易是跨链交易在所述目的链上进行的部分交易。
第三方面,本申请实施例提供了一种区块链跨链方法,应用于区块链***的目的链,所述区块链***包括中继链和至少两个应用链,其中,所述应用链包括源区块链和所述目的链;所述区块链跨链方法包括:根据跨链请求信息发起源链交易,所述跨链请求信息用于表征所述源区块链上的第二链上账户和所述目的链上的第一链上账户之间的跨链交易,所述源链交 易是所述跨链交易在所述源区块链上进行的部分交易;完成所述源链交易后将所述跨链请求信息发送至所述中继链。
第四方面,本申请实施例提供了一种设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上第一方面至第三方面实施例中任意一项所述的区块链跨链方法。
第五方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如上第一方面至第三方面实施例中任意一项所述的区块链跨链方法。
本申请的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的内容来实现和获得。
附图说明
附图用来提供对本申请技术方案的进一步理解,并且构成说明书的一部分,与本申请的实施例一起用于解释本申请的技术方案,并不构成对本申请技术方案的限制。
图1是本申请一个实施例提供的用于执行区块链跨链方法的区块链***的示意图;
图2是本申请一个实施例提供的信用调节***的示意图;
图3是本申请一个实施例提供的区块链跨链方法的流程图;
图4是图3中步骤S200的流程图;
图5是图3中步骤S200的流程图;
图6是图3中步骤S300的流程图;
图7是图6中步骤S320的流程图;
图8是图7中步骤S321的流程图;
图9是图8中步骤S323的流程图;
图10是图7中步骤S322的流程图;
图11是本申请另一实施例提供的区块链跨链方法的流程图;
图12是图11中步骤S700的流程图;
图13是本申请另一实施例提供的区块链跨链方法的流程图;
图14是本申请一个实施例提供的区块链设备的示意图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
需要说明的是,虽然在装置示意图中进行了功能模块划分,在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置中的模块划分,或流程图中的顺序执行所示出或描述的步骤。说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
本申请实施例提供了一种区块链跨链方法,包括:接收源区块链发送的跨链请求信息; 根据跨链请求信息得到跨链身份信息,并根据跨链身份信息对跨链请求信息进行验证;在通过验证的情况下,根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,目标资源转移请求信息携带有公证人身份标识;将目标资源转移请求信息发送至目的链,以使目的链根据公证人身份标识和目标资源转移请求信息完成跨链交易。
根据本申请实施例提供的方案,由源区块链发送的跨链请求信息得到的跨链身份信息能够实现源区块链和中继链之间的身份信任,并且,向目的链发送的目标资源转移请求信息携带有公证人身份标识,以使得目的链能够根据公证人身份标识确定中继链的身份,从而实现中继链与与目的链之间的身份信任,因此通过本申请实施例能够实现源区块链、中继链和目的链之间的身份信任和互通,也即实现了各应用链之间的身份信任和互通;此外,通过对跨链请求信息进行验证,并在通过验证的情况下根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,能够防止中继链的节点进行恶意行为而导致资产损失,从而提高了安全性,综上,本申请实施例的区块链跨链方法能够实现不同区块链之间的身份信任与互通以使数字资产能够直接在不同区块链之间进行安全的跨链转移。
下面结合附图,对本申请实施例作进一步阐述。
如图1所示,图1是本申请一个实施例提供的用于执行区块链跨链方法的区块链***的示意图。在图1的示例中,该区块链***包括应用链100和中继链110,各个应用链100均能够与中继链110进行交互,其中,发起跨链交易的应用链100为源区块链,跨链交易所指向的应用链100为目的链,源区块链能够以中继链110作为媒介实现与目的链之间的跨链交易。
需要说明的是,由源区块链发起的跨链交易可以指向多个目的链,也可以仅指向一个目的链,本申请实施例对此不做具体限定。
在一实施例中,各个应用链100上均设置有链上账户,链上账户包括目的链上的第一链上账户和源区块链上的第二链上账户,源区块链和应用链100之间的跨链交易可以是第一链上账户和第二链上账户之间的交易。
在一实施例中,中继链110和应用链100上存储有跨链身份信息,跨链身份信息用于表征应用链100以及应用链100的链上账户。
跨链身份信息包括与应用链100一一对应的链级身份信息,链级身份信息存储于中继链110,因此链级身份信息能够作为各个应用链100的去中心化跨链身份。
跨链身份信息包括与应用链100一一对应的账户身份信息,账户身份信息存储于该链上账户所在的应用链100,账户身份信息能够作为各个链上账户的去中心化跨链身份。
需要说明的是,账户身份信息还可以存储于链下,通过根据链上账户的公钥、签名算法等身份信息生成哈希码并将该哈希码存储于对应的应用链100上,即可通过存储于应用链100的哈希码确定账户身份信息的位置以获取账户身份信息。
各个链上账户会生成与自身对应的公钥和私钥,并根据上述私钥对公钥和与链上账户对应的签名算法生成签名,从而申请上链。
在一实施例中,每个跨链身份信息均设置有对应的跨链身份标识(Cross Chain Identity Identifier,CCIID),中继链110能够根据跨链身份标识定位跨链身份信息的存储位置以得到跨链身份信息。
跨链身份标识包括对应于链级身份信息的链级身份标识,以及对应于账户身份信息的账 户身份标识,且账户身份标识包含链级身份标识,使得账户身份标识能够用来定位链上账户所在的区块链,并最终通过其所在的区块链对应的链级身份信息和与其对应的链上账户的账户身份信息定位到上述区块链和链上账户的公钥与签名算法。
在一实施例中,中继链110包括多个中继节点,各个中继节点均能够单独针对来自于源区块链的输入进行相应的输出,例如,中继节点能够根据来自于源区块链的跨链请求信息确定原始资源转移请求信息,并通过中继链110的多个中继节点分别判断源链交易的有效性,中继节点在判断源链交易有效的情况下输出子签名;当子签名的个数大于预设个数,能够根据子签名和原始资源转移请求信息确定目标资源转移请求信息并将目标资源转移请求信息发送至目的链以实现跨链交易。因此本申请实施例能够准确地对原始资源转移请求信息进行验证,同时避免了恶意节点的影响,因此提高了跨链交易的安全性。
在一实施例中,目标资源转移请求信息携带有公证人身份标识,公证人身份标识用于供目的链定位公证人身份信息,公证人身份信息用于表征可信公证人的去中心化跨链身份,其中,可信公证人由中继链上的所有中继节点组成。
各个中继节点分别具有对应的公钥和私钥,公证人身份信息包括由所有中继节点的公钥所构成的公证人公钥与对应的签名算法。
在一实施例中,公证人身份信息存储于中继链110,且公证人公钥所对应的各个中继节点的私钥均存储于各个中继节点。
在一实施例中,应用链100上设置有由可信公证人托管的链上账户,以便于实现资产在不同区块链之间直接、安全的转移,中继链在源区块链上建立有源链托管账户,中继链在目的链上设置有目的托管账户。
参照图2,图2是本申请一个实施例提供的信用调节***的示意图,信用调节***运行于中继链,在图2的示例中,信用调节***包括中继节点和控制模块210,其中,中继节点包括公证人节点200和空置节点220,且各公证人节点200和空置节点220均能够与控制模块210进行交互。
需要说明的是,控制模块210可以是中继链上运行的去中心化智能合约,也可以是运行于链下的实体平台,本申请对此不做具体限定。
信用调节***用于根据中继节点的行为调整中继节点的信用权值,其中,信用权值用于评价中继节点的可信程度,预设策略包括根据信用权值选取公证人节点200,并且当信用调节***检测到中继节点针对跨链请求信息的输出错误,则降低输出错误的中继节点对应的信用权值,当信用调节***检测到中继节点针对跨链请求信息的输出正确,则提高输出正确的中继节点对应的信用权值。中继节点的信用权值越高,则该中继节点被选取为公证人节点200的概率越大,因此通过设置信用调节***,通过应用链对应的信用权值选取公证人节点200能够尽量减小中继节点作恶的影响,从而能够提高跨链交易的安全性。
信用调节***通过检测中继节点生成的子签名是否正确来调节中继节点对应的信用权值。
需要说明的是,当子签名的个数大于预设个数,能够根据子签名得到环签名,因此本申请实施例对于选取的公证人节点200的数目不做具体限定,选取的公证人节点200的数目大于或等于预设个数即可。
本申请实施例描述的区块链***以及应用场景是为了更加清楚的说明本申请实施例的技 术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域技术人员可知,随着区块链***的演变和新应用场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本领域技术人员可以理解的是,图1中示出的区块链***并不构成对本申请实施例的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
基于上述区块链***,下面提出本申请的数据处理方法的各个实施例。
如图3所示,图3是本申请一个实施例提供的区块链跨链方法的流程图,该方法应用于区块链***的中继链,在图3的示例中,该方法包括但不限于步骤S100、步骤S200、步骤S300和步骤S400:
步骤S100,接收源区块链发送的跨链请求信息;
步骤S200,根据跨链请求信息得到跨链身份信息,并根据跨链身份信息对跨链请求信息进行验证;
步骤S300,在通过验证的情况下,根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,目标资源转移请求信息携带有公证人身份标识;
步骤S400,将目标资源转移请求信息发送至目的链,以使目的链根据公证人身份标识和目标资源转移请求信息完成跨链交易。
根据本申请实施例提供的方案,由源区块链发送的跨链请求信息得到的跨链身份信息能够实现源区块链和中继链之间的身份信任,并且,向目的链发送的目标资源转移请求信息携带有公证人身份标识,以使得目的链能够根据公证人身份标识确定中继链的身份,从而实现中继链与与目的链之间的身份信任,因此通过本申请实施例能够实现源区块链、中继链和目的链之间的身份信任和互通,也即实现了各应用链之间的身份信任和互通;此外,通过对跨链请求信息进行验证能够提高跨链交易的安全性;在通过验证的情况下根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,能够进一步地对跨链交易进行验证,以防中继链的节点进行恶意行为而导致资产损失,从而进一步地提高了安全性,综上,本申请实施例的区块链跨链方法能够实现不同区块链之间的身份信任与互通以使数字资产能够直接在不同区块链之间进行安全的跨链转移。
需要说明的是,由源区块链发起的跨链交易可以指向多个目的链,也可以仅指向一个目的链,本申请实施例对此不做具体限定。
在一实施例中,各个应用链均设置有链上账户,链上账户包括目的链上的第一链上账户和源区块链上的第二链上账户,源区块链和应用链之间的跨链交易可以是第二链上账户和第一链上账户之间的交易。
在一实施例中,应用链和中继链上存储有跨链身份信息,跨链身份信息用于表征应用链以及应用链的链上账户,且跨链身份信息与链上账户以及链上账户所在的应用链一一对应。
如图4所示,图4是图3中步骤S200的流程图,在图4的示例中,步骤S200包括但不限于步骤S210和步骤S220:
步骤S210,根据跨链请求信息得到跨链身份标识;
步骤S220,根据跨链身份标识得到跨链身份信息。
在一实施例中,跨链请求信息携带有用于定位跨链身份信息的跨链身份标识,根据由源区块链发送的跨链请求信息得到跨链身份信息,包括根据跨链身份标识得到跨链身份信息。
在一实施例中,跨链身份信息包括与应用链一一对应的链级身份信息,链级身份信息存储于中继链;跨链身份信息还包括与链上账户一一对应的账户身份信息,链上账户用于表征源区块链和目的链上的账户,账户身份信息携带有链上账户的签名算法和公钥,账户身份信息存储于应用链。
在一实施例中,跨链身份标识包括对应于链级身份信息的链级身份标识,以及对应于账户身份信息的账户身份标识;根据跨链身份标识得到跨链身份信息,包括根据链级身份标识得到链级身份信息,以及根据账户身份标识得到账户身份信息。
链级身份信息存储于中继链,链级身份信息能够作为各个应用链的去中心化跨链身份。
账户身份信息携带有链上账户的公钥和签名算法,账户身份信息存储于该链上账户所在的应用链,因此账户身份信息能够作为各个链上账户的去中心化跨链身份。
需要说明的是,账户身份信息还可以存储于链下,通过根据链上账户的公钥、签名算法等身份信息生成哈希码并将该哈希码存储于对应的应用链上,即可通过存储于应用链的哈希码确定账户身份信息的位置以获取账户身份信息。
各个链上账户会生成与自身对应的公钥和私钥,并根据上述私钥对公钥和与链上账户对应的签名算法生成签名,从而申请上链。
在一实施例中,步骤S220还包括如下步骤:
根据链级身份标识得到链级身份信息,并根据账户身份标识得到账户身份信息。
中继链能够根据链级身份标识得到链级身份信息,从而定位应用链,再根据账户身份标识定位该应用链的链上账户,从而得到账户身份信息。
如图5所示,图5是图3中步骤S200的流程图,在图5的示例中,步骤S200还包括但不限于步骤S230和步骤S240:
步骤S230,根据跨链请求信息得到签名信息;
步骤S240,根据跨链身份信息对签名信息进行验证。
在一实施例中,跨链请求信息携带有用于供中继链验证跨链请求信息的签名信息,通过对签名信息进行验证能够保证跨链请求信息的真实性,从而提高了跨链交易的安全程度。
在一实施例中,跨链请求信息携带的签名信息包括账户签名。
在一实施例中,根据跨链身份信息验证跨链请求信息所表征的跨链交易所涉及的去中心化跨链身份是否与中继链以及应用链上所存储的去中心化跨链身份相一致。
如图6所示,图6是图3中步骤S300的流程图,在图6的示例中,步骤S300包括但不限于步骤S310和步骤S320:
步骤S310,在通过验证的情况下根据跨链请求信息确定原始资源转移请求信息;
步骤S320,根据预设的阈值环签名策略对原始资源转移请求信息进行签名以得到目标资源转移请求信息。
在一实施例中,跨链请求信息携带有存在性证明,存在性证明由源区块链在完成源链交易的情况下生成,在根据跨链请求信息确定原始资源转移请求信息之前,还包括根据存在性证明验证源链交易的有效性,通过验证跨链请求信息携带的存在性证明和签名信息,能够确保跨链交易真实存在,且跨链交易需要在源区块链上完成的源链交易已完成,从而提高了跨链交易的安全性。
如图7所示,图7是图6中步骤S320的流程图,在图7的示例中,步骤S320包括但不 限于步骤S321和步骤S322:
步骤S321,通过中继链的多个中继节点分别判断源链交易的有效性,中继节点在判断源链交易有效的情况下针对原始资源转移请求信息生成子签名;
步骤S322,当子签名的个数大于预设个数,根据各个子签名和原始资源转移请求信息得到目标资源转移请求信息。
通过中继链的多个中继节点判断源链交易有效的情况下生成子签名,并在子签名的个数大于预设个数时确定目标资源转移请求信息,能够进一步地对跨链交易进行验证,以防中继链的节点进行恶意行为而导致资产损失,从而进一步地提高了安全性。
如图8所示,图8是图7中步骤S321的流程图,在图8的示例中,步骤S321包括但不限于步骤S323和步骤S324:
步骤S323,根据预设策略从中继节点中选取多个公证人节点;
步骤S324,各个公证人节点分别根据跨链请求信息判断源链交易的有效性,并在判断源链交易有效的情况下针对原始资源转移请求信息生成子签名。
如图9所示,图9是图8中步骤S323的流程图,在图9的示例中,步骤S323包括但不限于步骤S325和步骤S326:
步骤S325,根据信用权值选取公证人节点;
步骤S326,当信用调节***检测到中继节点针对跨链请求信息的输出错误,降低输出错误的中继节点对应的信用权值。
在一实施例中,中继链运行有信用调节***,信用调节***用于根据中继节点的行为调整中继节点的信用权值,其中,信用权值用于评价中继节点的可信程度,预设策略包括根据信用权值选取公证人节点,并且当信用调节***检测到中继节点针对跨链请求信息的输出错误,则降低输出错误的中继节点对应的信用权值,当信用调节***检测到中继节点针对跨链请求信息的输出正确,则提高输出正确的中继节点对应的信用权值。中继节点的信用权值越高,则该中继节点被选取为公证人节点的概率越大,因此通过设置信用调节***,通过应用链对应的信用权值选取公证人节点能够尽量减小中继节点作恶的影响,从而能够提高跨链交易的安全性。
信用调节***通过检测中继节点生成的子签名是否正确来调节中继节点对应的信用权值。
如图10所示,图10是图7中步骤S322的流程图,在图10的示例中,步骤S322包括但不限于步骤S327和步骤S328:
步骤S327,当子签名的个数大于预设个数,根据各个子签名确定环签名;
步骤S328,根据环签名和原始资源转移请求信息确定目标资源转移请求信息。
通过源区块链的跨链身份信息能够对跨链请求信息进行验证,以及对源链交易的有效性进行验证能够提高跨链交易的安全性;在通过验证的情况下通过中继链的多个中继节点判断源链交易有效的情况下生成子签名,并在子签名的个数大于预设个数时确定目标资源转移请求信息,能够进一步地对跨链交易进行验证,以防中继链的节点进行恶意行为而导致资产损失,从而进一步地提高了跨链交易的安全性。
需要说明的是,当子签名的个数大于预设个数,能够根据子签名得到环签名,因此本申请实施例对于选取的公证人节点的数目不做具体限定,选取的公证人节点的数目大于或等于 预设个数即可。
在一实施例中,目标资源转移请求信息携带有公证人身份标识,公证人身份标识用于供目的链定位公证人身份信息。
各个中继节点分别具有对应的公钥和私钥,公证人身份信息包括由所有中继节点的公钥所构成的公证人公钥与对应的签名算法。
在一实施例中,公证人身份信息存储于中继链,且公证人公钥所对应的各个中继节点的私钥均存储于各个中继节点。
在一实施例中,源区块链和目的链上均设置有由可信公证人托管的链上账户,以便于实现资产在不同区块链之间直接、安全的转移。
如图11所示,图11是本申请另一实施例提供的区块链跨链方法的流程图,该方法应用于区块链***的目的链,在图11的示例中,该方法包括但不限于步骤S500、步骤S600、步骤S700和步骤S800:
步骤S500,接收中继链发送的目标资源转移请求信息;
步骤S600,根据目标资源转移请求信息得到公证人身份标识,并根据公证人身份标识得到公证人身份信息;
步骤S700,根据公证人身份信息对目标资源转移请求信息进行验证;
步骤S800,在目标资源转移请求信息通过验证的情况下,根据目标资源转移请求信息对目的链的第一链上账户发起目的交易,目的交易是跨链交易在目的链上进行的部分交易。
在一实施例中,各个应用链上均设置有链上账户,链上账户包括目的链上的第一链上账户和源区块链上的第二链上账户,源区块链和应用链之间的跨链交易可以是第二链上账户和第一链上账户之间的交易。
在一实施例中,由可信公证人在目的链上建立的目的托管账户根据目标资源转移请求信息对第一链上账户发起目的交易。
在一实施例中,目标资源转移请求信息携带有公证人身份标识,公证人身份标识用于供目的链定位公证人身份信息。
各个中继节点分别具有对应的公钥和私钥,公证人身份信息包括由所有中继节点的公钥所构成的公证人公钥与对应的签名算法。
在一实施例中,公证人身份信息存储于中继链,且公证人公钥所对应的各个中继节点的私钥均存储于各个中继节点。
如图12所示,图12是图11中步骤S700的流程图,在图12的示例中,步骤S700包括但不限于步骤S710和步骤S720:
步骤S710,根据目标资源转移请求信息得到公证人签名信息;
步骤S720,根据公证人身份信息对公证人签名信息进行验证。
在一实施例中,可信公证人能够对原始资源转移请求信息进行签名以得到公证人签名信息,通过使用公证人身份信息对公证人签名信息进行验证,能够提高跨链交易的安全性。
在一实施例中,由可信公证人在目的链上建立的目的托管账户根据目标资源转移请求信息对第一链上账户发起目的交易。
如图13所示,图13是本申请另一实施例提供的区块链跨链方法的流程图,该方法应用于区块链***的源区块链,在图13的示例中,该方法包括但不限于步骤S900和步骤S1000:
步骤S900,根据跨链请求信息发起源链交易,跨链请求信息用于表征源区块链上的第二链上账户和目的链上的第一链上账户之间的跨链交易,源链交易是跨链交易在源区块链上进行的部分交易;
步骤S1000,完成源链交易后将跨链请求信息发送至中继链。
在一实施例中,各个应用链上均设置有链上账户,链上账户包括目的链上的第一链上账户和源区块链上的第二链上账户,源区块链和应用链之间的跨链交易可以是第二链上账户和第一链上账户之间的交易。
在一实施例中,由第二链上账户根据跨链请求信息对可信公证人在源区块链上建立的源链托管账户发起源链交易。
在一实施例中,跨链请求信息携带有存在性证明,存在性证明由源区块链在完成源链交易的情况下生成。
另外,参照图14,图14是本申请一个实施例提供的区块链设备300的示意图,在图14的示例中,该设备包括:存储器310、处理器320及存储在存储器310上并可在处理器320上运行的计算机程序。
处理器320和存储器310可以通过总线或者其他方式连接。
存储器310作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序。此外,存储器310可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施方式中,存储器310可包括相对于处理器320远程设置的存储器310,这些远程设置的存储器310可以通过网络连接至该处理器320。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
实现上述实施例的区块链跨链方法所需的非暂态软件程序以及指令存储在存储器310中,当被处理器320执行时,执行上述实施例中的区块链跨链方法,例如,执行以上描述的图3至图10,或图11至图12,或图13中的区块链跨链方法。
此外,本申请的一个实施例还提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令被一个处理器或控制器执行,例如,被上述装置实施例或设备实施例中的一个处理器执行,可使得上述处理器执行上述实施例中的区块链跨链方法,例如,执行以上描述的图3至图10,或图11至图12,或图13中的区块链跨链方法。
本申请实施例包括:接收所述源区块链发送的跨链请求信息;根据所述跨链请求信息得到跨链身份信息,并根据所述跨链身份信息对所述跨链请求信息进行验证;在通过验证的情况下,根据所述跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,所述目标资源转移请求信息携带有公证人身份标识;将所述目标资源转移请求信息发送至所述目的链,以使所述目的链根据所述公证人身份标识和目标资源转移请求信息完成跨链交易。根据本申请实施例提供的方案,由源区块链发送的跨链请求信息得到的跨链身份信息能够实现源区块链和中继链之间的身份信任,并且,向目的链发送的目标资源转移请求信息携带有公证人身份标识,以使得目的链能够根据公证人身份标识确定中继链的身份,从而实现中继链与与目的链之间的身份信任,因此通过本申请实施例能够实现源区块链、中继链和目的链之间的身份信任和互通,也即实现了各应用链之间的身份信任和互通;此外,通过对跨链请求信 息进行验证,并在通过验证的情况下根据跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,能够防止中继链的节点进行恶意行为而导致资产损失,从而提高了安全性,综上,本申请实施例的区块链跨链方法能够实现不同区块链之间的身份信任与互通以使数字资产能够直接在不同区块链之间进行安全的跨链转移。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、***可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
以上是对本申请的若干实施方式进行了具体说明,但本申请并不局限于上述实施方式,熟悉本领域的技术人员在不违背本申请精神的前提下还可做出种种的等同变形或替换,这些等同的变形或替换均包含在本申请权利要求所限定的范围内。

Claims (14)

  1. 区块链跨链方法,应用于区块链***的中继链,所述区块链***包括所述中继链和至少两个应用链,其中,所述应用链包括源区块链和目的链;
    所述区块链跨链方法包括:
    接收所述源区块链发送的跨链请求信息;
    根据所述跨链请求信息得到跨链身份信息,并根据所述跨链身份信息对所述跨链请求信息进行验证;
    在通过验证的情况下,根据所述跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,所述目标资源转移请求信息携带有公证人身份标识;
    将所述目标资源转移请求信息发送至所述目的链,以使所述目的链根据所述公证人身份标识和目标资源转移请求信息完成跨链交易。
  2. 根据权利要求1所述的区块链跨链方法,其中,所述跨链请求信息携带有用于定位所述跨链身份信息的跨链身份标识;
    所述根据所述跨链请求信息得到跨链身份信息,包括:
    根据所述跨链请求信息得到所述跨链身份标识;
    根据所述跨链身份标识得到所述跨链身份信息。
  3. 根据权利要求2所述的区块链跨链方法,其中,所述跨链身份信息包括与所述应用链一一对应的链级身份信息,所述链级身份信息存储于所述中继链;
    所述跨链身份信息还包括与链上账户一一对应的账户身份信息,所述链上账户用于表征所述源区块链和所述目的链上的账户,所述账户身份信息携带有所述链上账户的签名算法和公钥,所述账户身份信息存储于所述应用链;
    所述跨链身份标识包括对应于所述链级身份信息的链级身份标识,以及对应于所述账户身份信息的账户身份标识;
    所述根据所述跨链身份标识得到所述跨链身份信息,包括:
    根据所述链级身份标识得到所述链级身份信息,并根据所述账户身份标识得到账户身份信息。
  4. 根据权利要求1所述的区块链跨链方法,其中,所述跨链请求信息携带有用于供所述中继链验证所述跨链请求信息的签名信息;
    所述根据所述跨链身份信息对所述跨链请求信息进行验证,包括:
    根据所述跨链请求信息得到所述签名信息;
    根据所述跨链身份信息对所述签名信息进行验证。
  5. 根据权利要求1所述的区块链跨链方法,其中,所述在通过验证的情况下,根据所述跨链请求信息和预设的阈值环签名策略得到目标资源转移请求信息,包括:
    在通过验证的情况下根据所述跨链请求信息确定原始资源转移请求信息;
    根据预设的阈值环签名策略对所述原始资源转移请求信息进行签名以得到所述目标资源转移请求信息。
  6. 根据权利要求5所述的区块链跨链方法,其中,所述根据预设的阈值环签名策略对所述原始资源转移请求信息进行签名以得到所述目标资源转移请求信息,包括:
    通过所述中继链的多个中继节点分别判断源链交易的有效性,所述中继节点在判断所述源链交易有效的情况下针对所述原始资源转移请求信息生成子签名;
    当所述子签名的个数大于预设个数,根据各个所述子签名和所述原始资源转移请求信息得到所述目标资源转移请求信息。
  7. 根据权利要求6所述的区块链跨链方法,其中,所述通过所述中继链的多个中继节点分别判断源链交易的有效性,所述中继节点在判断所述源链交易有效的情况下针对所述原始资源转移请求信息生成子签名,包括:
    根据预设策略从所述中继节点中选取多个公证人节点;
    各个所述公证人节点分别根据所述跨链请求信息判断所述源链交易的有效性,并在判断所述源链交易有效的情况下针对所述原始资源转移请求信息生成子签名。
  8. 根据权利要求7所述的区块链跨链方法,其中,所述中继链运行有信用调节***,所述信用调节***用于根据所述中继节点的行为调整所述中继节点的信用权值,其中,所述信用权值用于评价所述中继节点的可信程度;
    所述根据预设策略从所述中继节点中选取多个公证人节点,包括:
    根据所述信用权值选取所述公证人节点;
    当所述信用调节***检测到所述中继节点针对所述跨链请求信息的输出错误,降低输出错误的所述中继节点对应的所述信用权值。
  9. 根据权利要求6所述的区块链跨链方法,其中,所述当所述子签名的个数大于预设个数,根据各个所述子签名和所述原始资源转移请求信息得到所述目标资源转移请求信息,包括:
    当所述子签名的个数大于所述预设个数,根据各个所述子签名确定环签名;
    根据所述环签名和所述原始资源转移请求信息确定所述目标资源转移请求信息。
  10. 区块链跨链方法,应用于区块链***的目的链,所述区块链***包括中继链和至少两个应用链,其中,所述应用链包括源区块链和所述目的链;
    所述区块链跨链方法包括:
    接收所述中继链发送的目标资源转移请求信息;
    根据所述目标资源转移请求信息得到公证人身份标识,并根据所述公证人身份标识得到公证人身份信息;
    根据所述公证人身份信息对所述目标资源转移请求信息进行验证;
    在所述目标资源转移请求信息通过验证的情况下,根据所述目标资源转移请求信息对所述目的链的第一链上账户发起目的交易,所述目的交易是跨链交易在所述目的链上进行的部分交易。
  11. 根据权利要求10所述的区块链跨链方法,其中,所述根据所述公证人身份信息对所述目标资源转移请求信息进行验证,包括:
    根据所述目标资源转移请求信息得到公证人签名信息;
    根据所述公证人身份信息对所述公证人签名信息进行验证。
  12. 区块链跨链方法,应用于区块链***的源区块链,所述区块链***包括中继链和至少两个应用链,其中,所述应用链包括所述源区块链和目的链;
    所述区块链跨链方法包括:
    根据跨链请求信息发起源链交易,所述跨链请求信息用于表征所述源区块链上的第二链上账户和所述目的链上的第一链上账户之间的跨链交易,所述源链交易是所述跨链交易在所述源区块链上进行的部分交易;
    完成所述源链交易后将所述跨链请求信息发送至所述中继链。
  13. 区块链设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求1至9或权利要求10至11或权利要求12中任意一项所述的区块链跨链方法。
  14. 计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如权利要求1至9或权利要求10至11或权利要求12中任意一项所述的区块链跨链方法。
PCT/CN2022/130612 2021-11-16 2022-11-08 区块链跨链方法、设备及可读存储介质 WO2023088136A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111352870.1 2021-11-16
CN202111352870.1A CN116137006A (zh) 2021-11-16 2021-11-16 区块链跨链方法、设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2023088136A1 true WO2023088136A1 (zh) 2023-05-25

Family

ID=86332509

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/130612 WO2023088136A1 (zh) 2021-11-16 2022-11-08 区块链跨链方法、设备及可读存储介质

Country Status (2)

Country Link
CN (1) CN116137006A (zh)
WO (1) WO2023088136A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915404A (zh) * 2023-09-13 2023-10-20 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116996521A (zh) * 2023-09-28 2023-11-03 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN117319083A (zh) * 2023-11-27 2023-12-29 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117938354A (zh) * 2024-03-18 2024-04-26 中国信息通信研究院 基于中继链的跨链交易方法和装置、电子设备和存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117614634A (zh) * 2024-01-19 2024-02-27 成都信息工程大学 基于可追踪环签名的联盟链跨链身份认证方法及***

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784518A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种区块链跨链处理方法、装置、计算机设备及存储介质
CN112116473A (zh) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 跨链公证人机制评价***和平台
CN112398853A (zh) * 2020-11-16 2021-02-23 东软集团股份有限公司 一种实现联盟链跨链通信的方法、装置及***
CN112669038A (zh) * 2020-12-28 2021-04-16 杭州趣链科技有限公司 账户查询***、跨链网关
CN113179168A (zh) * 2021-04-22 2021-07-27 山东大学 一种区块链的跨链交互方法
US20210258323A1 (en) * 2018-11-16 2021-08-19 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210258323A1 (en) * 2018-11-16 2021-08-19 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses
CN111784518A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种区块链跨链处理方法、装置、计算机设备及存储介质
CN112116473A (zh) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 跨链公证人机制评价***和平台
CN112398853A (zh) * 2020-11-16 2021-02-23 东软集团股份有限公司 一种实现联盟链跨链通信的方法、装置及***
CN112669038A (zh) * 2020-12-28 2021-04-16 杭州趣链科技有限公司 账户查询***、跨链网关
CN113179168A (zh) * 2021-04-22 2021-07-27 山东大学 一种区块链的跨链交互方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915404A (zh) * 2023-09-13 2023-10-20 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116915404B (zh) * 2023-09-13 2023-11-17 华中科技大学 基于区块链技术的工程数据跨链协同方法及其***
CN116996521A (zh) * 2023-09-28 2023-11-03 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN116996521B (zh) * 2023-09-28 2023-12-15 江西农业大学 基于信任评估模型的中继委员会跨链交互***及方法
CN117319083A (zh) * 2023-11-27 2023-12-29 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117319083B (zh) * 2023-11-27 2024-02-27 人民法院信息技术服务中心 一种异构隐私数据的跨链共享方法、装置、***及设备
CN117938354A (zh) * 2024-03-18 2024-04-26 中国信息通信研究院 基于中继链的跨链交易方法和装置、电子设备和存储介质

Also Published As

Publication number Publication date
CN116137006A (zh) 2023-05-19

Similar Documents

Publication Publication Date Title
WO2023088136A1 (zh) 区块链跨链方法、设备及可读存储介质
US11461773B2 (en) Blockchain-based node management methods and apparatuses
US11651109B2 (en) Permission management method, permission verification method, and related apparatus
US20210150521A1 (en) Blockchain-based privacy transaction and blockchain-based privacy transaction application methods and apparatuses
CN111010376B (zh) 基于主从链的物联网认证***及方法
US11429967B2 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN112311735B (zh) 可信认证方法,网络设备、***及存储介质
CN111934996B (zh) 消息传输方法及装置
US11218464B2 (en) Information registration and authentication method and device
US11989284B2 (en) Service API invoking method and related apparatus
CN111639327A (zh) 一种开放平台的认证方法及装置
US11102006B2 (en) Blockchain intelligent security implementation
CN111262860A (zh) 跨链模式下的身份认证方法及装置
CN112070501B (zh) 一种区块链交易发起、验证方法及***
CN110992035A (zh) 区块链节点管理方法、装置及***
CN114297678A (zh) 一种联盟链***运行方法、装置、设备及存储介质
CN112446050B (zh) 应用于区块链***的业务数据处理方法及装置
CN112118292A (zh) 用于跨链通信的方法、装置、网络节点和存储介质
CN115001707B (zh) 基于区块链的设备认证方法和相关设备
CN112418850A (zh) 一种基于区块链的交易方法、装置及电子设备
CN114172923B (zh) 数据传输方法、通信***及通信装置
EP4252384B1 (en) Methods, devices and system related to a distributed ledger and user identity attribute
CN112104701B (zh) 一种跨链通信的方法、装置、网络节点和存储介质
CN113408003B (zh) 一种区块链的跨链方法及装置
CN115022864B (zh) 订购业务的验证方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22894673

Country of ref document: EP

Kind code of ref document: A1