Blockchain semantic analysis method based on authenticable data structure

A technology of authentication data and semantic analysis, applied in the blockchain field, can solve problems such as difficult compilers

Active Publication Date: 2021-06-22
HENAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantage is that researchers need to master HackOCaml and the Camlp4 syntax tree conversion technology specific to the OCaml compiler, so it is difficult to transplant to other compilers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain semantic analysis method based on authenticable data structure
  • Blockchain semantic analysis method based on authenticable data structure
  • Blockchain semantic analysis method based on authenticable data structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0189] 1. Data acquisition:

[0190] a) Abstract the certifiable data structure into a signature through the Modular mechanism:

[0191] moduletypeAUTHENTIKIT=sig

[0192] b) Describe the abstract certifiable computing unit, map, join, and bind. For details, please refer to the complete Monad interface code snippet of certifiable computing:

[0193] type'a authenticated_computation

[0194] val return: 'a->'a authenticated_computation

[0195] val(>>=):'a authenticated_computation->

[0196] ('a -> 'b authenticated_computation) ->

[0197] 'b authenticated_computation

[0198] c) Prove that the data flow to be verified is continuous, that is, the data is required to be continuous and complete. Specifically participate in the function definition code snippet of Auth and Unauth:

[0199] val auth:'aAuthenticatable.evidence->'a->'aauth

[0200] val unauth: 'a Authenticatable.evidence->'a auth->

[0201] 'a authenticated_computation

[0202] d) Generate proof stream. Si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain semantic analysis method based on an authenticated data structure. The process of converting operational semantics of the authenticated data structure into indicative semantics is completely displayed, and due to the fact that a monad concept is excessively abstract, the analysis process of auth and unauth codes is emphatically described in the invention; how non-pure functions are combined together is shown by specific instances. By adopting the monad method, a new language function can be directly realized by virtue of a source compiler language, so that a syntax tree of the compiler can be prevented from being modified, and meanwhile, the new language function can be conveniently transplanted among different program compilers.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a method for semantic analysis of block chains based on an authenticable data structure. Background technique [0002] Authenticated Data Structure is a binary tree data structure based on Merkle tree. When users obtain certain data from the tree, they also obtain path information from the root to the data, which is called proof flow. The authenticity of the obtained data can be verified by relying on proof flow. For example, the bottom layer of Bitcoin's hyperledger adopts the Merkle tree structure, that is, the blockchain is implemented based on the Merkle tree. In the blockchain, the merkle tree acts as a representative role. All the transaction information in a block is summarized by it, which greatly improves the efficiency of the blockchain. After practical tests, it can effectively prevent man-in-the-middle attacks. The Merkle tree inspired researchers to redesign ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/36G06Q20/40
CPCG06Q40/04G06Q20/3674G06Q20/401Y02D10/00
Inventor 贺新征光炎祝跃飞
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products