Viewpoint | The realization of blockchain system supervision must return to the architectural level

Author: Kao Cheng real

Blockchain is expected to become the underlying technical architecture of the future digital economy with its series of characteristics such as decentralization, detrust to third parties, collective system maintenance, data cannot be tampered with and forged, and data traceable to sources and traceability. Therefore, how to realize the supervision of the blockchain information system has become the top priority of the current blockchain system design and application.

Blockchain is a special form of distributed system. It is a new system architecture composed of several technologies. Blockchain is a system architecture originally derived from a point-to-point payment system such as Bitcoin. At the beginning of its design, it did not consider regulatory issues, and even its original design intention was to regulate. Therefore, this architecture is applicable to a decentralized payment system such as Bitcoin, but it is extremely problematic to extend it to other systems.

Adam Smith pointed out in The Wealth of Nations that the increase in labor productivity brought about by division of labor and specialization is an important reason for the development of human society. Different divisions of labor and specialization determine the position and role of different people in the social organization structure. The original design of the blockchain system is that all people realize complete equality before the possession of information, but achieving complete equality before the possession of information does not mean that everyone has the same ability to understand and process information. From the perspective of the development of human society, there is neither a complete decentralized development stage nor a completely centralized development stage in human society. The implementation of necessary supervision of key businesses related to the development of human society is the basic principle to ensure the stable and orderly development of human society, and it is also a summary of the experience and lessons left by human society for thousands of years of recorded history.

From the perspective of the current blockchain system architecture, due to its openness, public chains are easy to monitor, but difficult to manage. For the alliance chain and private chain, if the supervisor is one of the members of the alliance chain and private chain, or even one of the initiators of the alliance chain and private chain, monitoring and management are relatively easy to implement. However, if the regulator is excluded from the alliance chain and the private chain and does not have system access, monitoring and management will be quite difficult.

The Regulations on the Management of Blockchain Information Services promulgated and implemented by the State Cyberspace Office requires that the blockchain system operating in China must be reported. This provides a legal basis for the supervision of the blockchain system. The channel for supervision and management was opened.

However, the current design of blockchain systems lacks regulatory considerations. Academician Shen Changxiang, the founder of trusted computing in China, pointed out that the initial computer system was only used as a tool without considering its own security issues. The lack of computing science issues, architecture issues, and computing models led to a series of reliable and secure information systems Sexual issues. Similarly, in order for the blockchain system to be integrated with more business scenarios, a regulated blockchain information system structure must be constructed from the architectural level. This regulated blockchain information system is, in essence, an important part of a trusted information system.

Reconstructing the blockchain system architecture is not only difficult in design, but also unrealistic from the perspective of ecological construction. Optimize the structure of the blockchain information system, and on the basis of fully retaining the advantages of the existing architecture, use the embedded method to enrich and expand the functions of passwords and security components in the existing architecture. Chain technology realizes monitoring and access to data on different chains, and implements distributed key management based on secure multi-party computing based on the current single key of all parties to construct a flexible organization of different people, organizations, roles and functions. It can not only achieve the purpose of supervision, but also meet the needs of different business scenarios.