The top student must be diligent.

Chapter 114 Genius Cross-Chain Transaction Protocol Design

Chapter 114 Genius Cross-Chain Transaction Protocol Design

If Tao Zhexuan hadn't suddenly noticed that there was a missing voice in their discussion and turned around to look, they might have had some casualties today.

I saw Professor Kleinlock standing on the table at some point, waving his hands and about to jump down.

Not to mention how the old professor, with his old bones, could climb up, but if he really jumped down, the three of them could not guarantee that he would not suffer any fractures or something.

Finally, after their kind persuasion, Professor Kleinlock climbed down from the table.

"I feel like I'm being bullied mathematically by you guys."

After coming down, Professor Claylock said this.

Xiao Yi and the other two couldn't help but scratch their heads. What did they do just now?

"I'm sorry, Professor. We were all watching Xiao Yi's derivation just now, so we thought you were watching it too. We may not have noticed you. What do you mean?"

Kleinlock sighed.

He felt like he was being bullied again.

It's so tiring to talk to these people who are good at math.
"Okay, okay, now I want to know, what is the use of this new polynomial you mentioned? Can our problem be solved now?"

Tao nodded and said, "Yes, the problem has basically been solved."

"And maybe... Xiao Yi not only solved the dangers that the sorting screen brought to RSA encryption, to some extent, it directly greatly improved the security of the entire RSA encryption."

"If we simply calculate the complexity, the difficulty of cracking this new RSA encryption will not be lower than that of ECC encryption. The difficulty of cracking it has also increased from the previous sub-exponential level to the true exponential level."

"in addition……"

Tao thought for a moment, then picked up a pen and did some calculations on the blackboard. When he finally got a divergent result, he said in surprise: "Even Shor's algorithm will find it difficult to crack it! The complexity of cracking it using Shor's algorithm is still exponential, but the coefficient is slightly smaller."

Kleinlock finally understood what Terence Tao said. He widened his eyes and asked, "Is the complexity of cracking Shor's algorithm so high?"

"Yes!" Tao nodded again, "Because Xiao Yi performed a Fourier transform at the end, this directly reduced the effect of Shor's algorithm in principle!"

Shor's algorithm is a representative algorithm in quantum computing.

Its principle is based on the quantum Fourier transform algorithm, which uses the parallelism of quantum computing to perform large-scale factor decomposition, and has a very significant effect when cracking the RSA encryption system.

At least, whether compared with the general number field sieve or the current classification sieve, the quantum Shor algorithm has incomparable advantages in prime factor decomposition.

Of course, since it is called quantum computing, and precisely because this algorithm requires the characteristics of a quantum computer to work, it is also limited by quantum computers. With the world's current quantum computer technology, it is still a long way to go to use this algorithm to crack RSA encryption.

After all, there are only a few institutions in the world capable of researching quantum computers. It is impossible for those hackers to develop a quantum computer. If that is the case, what are they doing as hackers?

"So that means that even if we really invent quantum computers ten or even dozens of years from now, the security of RSA encryption can still be guaranteed."

Terence Tao said.

This is the cutting-edge nature of mathematics!
Ahead of the world, a big step ahead of any other subject!

Before quantum computers were even developed, they had already found ways to constrain them from a mathematical perspective.
Kleinlock became even more excited: "In this way, RSA encryption all over the world will become more secure! Xiao Yi, you did a great job!"

However, after being excited for a while, Claylock suddenly calmed down and asked, "What about the difficulty in practical application?"

The difficulty of application is a key factor. For example, although ECC is much more secure than RSA, it is difficult to understand and has a high threshold, so it has not completely replaced RSA.

According to the difficulty levels written by Xiao Yi.

He can't even understand it. Is that difficult?
"It is true that the difficulty of actual application will increase, but..."

Tao Zhexuan took another look at the polynomial written by Xiao Yi, and then said: "But the cost of learning is lower than that of ECC. The way this polynomial is expanded is quite clear. For people who study cryptography, the difficulty of understanding it is at most an advanced level after getting started. After all, computer science departments themselves have to learn complex functions."

really?
I do not believe.

Kleinrock followed Tao's gaze and looked at the polynomial on the blackboard. After thinking for a moment, he said, "Why can't I understand it?"

"Well……"

This is an embarrassing question.

In the end, Tao gave a highly emotional answer: "After all, this is also new knowledge. It is completely normal that you cannot understand it for the time being. Of course, this is also our fault. It is our responsibility to introduce mathematical theories to scholars in other fields. If you don't understand, it is because we did not explain them well."

"Blame me, blame me." Xiao Yi beside him also said. After all, it was his idea.

"Blame me, blame me." Maynard followed. Since both Terence Tao and Xiao Yi had said it, it would seem a little different if he didn't say anything.

Kleinlock: “…”

"Okay, Professor Kleinlock, we have solved the most troublesome problem now. The next problem involves the design of the protocol. Although we are still some distance away from designing the protocol and there are still some problems, at least with Xiao Yi's method, we can be considered the leader among all project teams."

Terence Tao changed the subject in time to prevent Professor Kleinlock from suffering a greater blow.

When the topic came up, Kleinlock finally stopped dwelling on what had just happened. He nodded and said, "Yes! Now we only have the design of this protocol left!"

At this time, Xiao Yi spoke again: "In fact, I already have some ideas about the most critical multi-party security issue in this agreement."

The other three people were stunned and looked at Xiao Yi in disbelief.

You just solved the most troublesome problem, and now you say that the second most troublesome problem can also be solved?
The multi-party security issue of this cross-chain transaction protocol is indeed the second most troublesome issue besides solving the classification screening attack problem.

Moreover, compared with the classification and screening attack problem, this multi-party security issue is the core of this protocol.

The former is technically difficult, while the latter is the most challenging in terms of design ability.

How to ensure that traders are protected from hacker attacks during cross-chain transactions, as well as theft by trading platforms and other risks, are the key to this multi-party security protocol.

"How to solve it?" Kleinlock asked hurriedly.

He sought help from Xiao Yi and other three top mathematicians just for this matter. This problem can only be answered in the field of pure mathematical logic. With his mathematical ability, it is impossible to solve this problem.

“It’s still the same polynomial.”

Xiao Yi pointed at the polynomial on the blackboard and said, "According to the general formula of this polynomial, we can easily generate the terms of the digit."

"According to this principle, when a transaction occurs, the buyer and seller will each obtain a corresponding matching code, and each will generate such a polynomial based on the randomly obtained matching code."

"Then in this process, we use the algorithm to randomly extract one of the polynomials, and then use Fourier transform..."

Xiao Yi explained while demonstrating on the blackboard.

It's just like the original millionaire problem.

The agreement that Xiao Yi showed was just like the agreement in the millionaire problem. It did not require any third party to achieve the exchange of information between the two parties. After all, a transaction is also an exchange of information.

Of course, more strictly speaking, the third party should be replaced by the protocol algorithm, and this third party is completely trustworthy.
After Xiao Yi finished his explanation, the three professors were once again at a loss for words.

Until the end, Kleinrock murmured: "What a genius design!"

This time, Kleinlock finally understood. Although he still didn't understand how the polynomial was derived, it did not prevent him from understanding the principle of the protocol.

As a computer expert, they only need to know what a function does, and there is no need to study it in detail where the function came from.

Terence Tao also nodded heavily.

"According to this design, even the possibility of embezzlement is avoided! As long as the matching code is generated on the terminals of both parties to the transaction, and they only upload a random term in the random generated polynomial, it is technically impossible for the trading platform to translate this random term."

"Moreover, even if hackers attack, it is basically impossible for them to intercept the information of both parties of the transaction! Even if they intercept the information of one party, it is difficult for them to intercept the information of the other party!"

"Unless they hacked into the trading platform's server and the computers of both parties at the same time, even if they did, they would have to first figure out the digits of the two random items. As long as the digits are large enough, it would take a lot of time to crack them."

"During the period of cracking, as long as a detection system is added, the asset transaction can be terminated at any time, thus protecting the property safety of both parties to the transaction!"

Although James Maynard sounded a little confused about the whole process, he soon understood the key.

He was surprised and said: "In this way, the two biggest risks in cross-chain transactions are greatly reduced, right?"

"Yes." Kleinrock nodded solemnly, "That's it!"

“The mathematical logic of this protocol is definitely the best design I have ever seen in all my years of work!”

He exclaimed: "This is a true work of genius!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like