CN116366232A - Digital asset processing method, device, equipment and medium based on quantum-resistant key - Google Patents

Digital asset processing method, device, equipment and medium based on quantum-resistant key Download PDF

Info

Publication number
CN116366232A
CN116366232A CN202310296844.4A CN202310296844A CN116366232A CN 116366232 A CN116366232 A CN 116366232A CN 202310296844 A CN202310296844 A CN 202310296844A CN 116366232 A CN116366232 A CN 116366232A
Authority
CN
China
Prior art keywords
multimedia file
digital asset
ciphertext
authenticated
quantum key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310296844.4A
Other languages
Chinese (zh)
Inventor
曾祥洪
周卓俊
韩琢
罗乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qike Quantum Technology Zhuhai Co ltd
Guokaike Quantum Technology Beijing Co Ltd
Original Assignee
Qike Quantum Technology Zhuhai Co ltd
Guokaike Quantum Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qike Quantum Technology Zhuhai Co ltd, Guokaike Quantum Technology Beijing Co Ltd filed Critical Qike Quantum Technology Zhuhai Co ltd
Priority to CN202310296844.4A priority Critical patent/CN116366232A/en
Publication of CN116366232A publication Critical patent/CN116366232A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The invention discloses a digital asset processing method, device, equipment and medium based on an anti-quantum key, wherein the processing method comprises the following steps: generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number; encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to generate a digital signature of the hidden multimedia file; and issuing the steganographic multimedia file subjected to signature processing. The method and the device have the advantages that the right-confirming information implicit in the multimedia file type processed by the method and the device not only have high non-cracking property, but also can effectively confirm the right of the legal holder of the digital asset.

Description

Digital asset processing method, device, equipment and medium based on quantum-resistant key
Technical Field
The invention relates to the technical field of anti-quantum computing, in particular to a digital asset processing method, device, equipment and medium based on an anti-quantum key.
Background
A digital asset is an asset that is presented and circulated in digital form, containing a full amount of information, such as Non-homogeneous Token (NFT) and digital collections. The NFT is a public-chain-based non-interchangeable certificate which accords with related specifications and can be associated with a certain virtual digital object to form a unique reference relationship, so that single issued NFTs can not be mutually exchanged, have global uniqueness and can be transacted through virtual currency. Similar to NFT, digital collection generally refers to a unique digital identification of a specified work, artwork, merchandise, based on a alliance chain, that cannot be transacted by virtual currency. The expression forms of NFT and digital collection on blockchain include, but are not limited to, digital drawings, pictures, music, video, 3D models (simply referred to as multimedia files), etc., and for convenience of explanation, these expression forms are collectively referred to as multimedia files.
As multimedia files that are publicly circulated on a network, digital contents thereof are extremely easily illegally copied and distributed, and thus, it is often easy to occur that digital contents of digital assets issued from one platform are used for another platform, and the creator of digital contents proves that it is difficult and costly to be the creator of digital contents.
Disclosure of Invention
In view of the above, the embodiments of the present invention provide a digital asset processing method, apparatus, device and medium based on an anti-quantum key, which are at least used for solving the problem of large difficulty in determining the right of the digital asset attribution right.
According to one aspect of the present invention, there is provided a digital asset processing method based on an anti-quantum key, comprising the steps of: generating a random number with preset digits, and generating a pair of first private keys and first public keys by adopting an anti-quantum key algorithm based on the random number; encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; signing the steganographically-written multimedia file by adopting a first private key generated by an anti-quantum key algorithm to generate a digital signature of the steganographically-written multimedia file; issuing a steganographic multimedia file subjected to signature processing; wherein a first public key corresponding to the first private key generated using an anti-quantum key algorithm is configured to verify a digital signature of the published multimedia file when the published multimedia file is authenticated.
According to another aspect of the present invention, the present invention also provides a digital asset processing method based on an anti-quantum key, including the steps of: verifying the digital signature of the multimedia file to be authenticated by adopting a first public key generated by an anti-quantum key algorithm; responding to the digital signature of the multimedia file to be authenticated to pass the verification, and performing anti-steganography processing on the multimedia file to be authenticated; responding to the multimedia file to be validated and carrying out anti-steganography processing to obtain intermediate information, and splitting the intermediate information; responding to the intermediate information to obtain a ciphertext through splitting treatment, and decrypting the ciphertext; responding to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and comparing the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; determining that the multimedia file to be authenticated is authenticated through the attribution right in response to the fact that the decrypted authentication information is consistent with the digital asset attribution right corresponding to the multimedia file to be authenticated; the first private key corresponding to the first public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
According to another aspect of the present invention, there is provided a digital asset processing apparatus based on an anti-quantum key, including a key unit, an encryption unit, a concatenation unit, a steganography unit, a signature unit, and a distribution unit, wherein the key unit is configured to generate a random number of a preset number of bits, and to generate a pair of a private key and a public key using an anti-quantum key algorithm based on the random number; the encryption unit is configured to encrypt the right information recorded with the digital asset attribution right into a ciphertext; the splicing unit is configured to mix and splice the ciphertext and the random number together to obtain intermediate information; the steganography unit is configured to steganographically embed the intermediate information in a multimedia file that is a digital asset; the signature unit is configured to carry out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm so as to generate a digital signature of the hidden multimedia file; the issuing unit is configured to issue the steganographically-processed multimedia file; wherein the public key corresponding to the private key generated using the anti-quantum key algorithm is configured to verify the digital signature of the published multimedia file when the published multimedia file is authenticated.
According to another aspect of the present invention, there is provided a digital asset processing apparatus based on an anti-quantum key, including a signature verification unit, an anti-steganography unit, a splitting unit, a decryption unit, a comparison unit, and a validation unit, where the signature verification unit is configured to verify a digital signature of a multimedia file to be validated using a public key generated by an anti-quantum key algorithm; the anti-steganography unit is configured to respond to the digital signature of the multimedia file to be authenticated by verification, and perform anti-steganography processing on the multimedia file to be authenticated; the splitting unit is configured to respond to the multimedia file to be validated and perform anti-steganography processing to obtain intermediate information, and split the intermediate information; the decryption unit is configured to respond to splitting processing of the intermediate information to obtain ciphertext and decrypt the ciphertext; the comparison unit is configured to respond to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and compare the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; the right confirming unit is configured to respond to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, and confirm that the to-be-confirmed multimedia file passes through the attribution right; the private key corresponding to the public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
According to another aspect of the present invention, there is also provided an electronic device including a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the aforementioned digital asset processing method based on anti-quantum keys.
According to another aspect of the present invention, there is also provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the aforementioned digital asset processing method based on quantum key.
The method, the device, the equipment and the medium provided by the invention can process the digital asset before the digital asset is uplink, so that the normal publishing and transaction of the digital asset are not affected, and the quick right confirmation can be performed when the right confirmation is required, and the processing speed is high and accurate. The invention processes the digital asset, which includes the steps of signing by adopting the anti-quantum key and a plurality of further processing steps such as splicing, steganography and the like, so that the digital asset processed by the invention has indestructibility, and the possibility that other people forge the same processing mode to imitate the digital asset is prevented. When generating a rights dispute for a digital asset, valid rights can be validated for the legitimate holder of the digital asset.
Drawings
In order to more clearly describe the technical solution of the embodiments of the present invention, the following description briefly describes the drawings in the embodiments of the present invention.
FIG. 1 is a flow chart of a digital asset processing according to one embodiment of the invention.
FIG. 2 is a flow chart of a method of digital asset processing based on anti-quantum keys prior to digital asset uplinking, according to one embodiment of the invention.
Fig. 3 is a flow chart of a method of digital asset processing based on anti-quantum keys prior to digital asset uplinking in accordance with another embodiment of the present invention.
FIG. 4 is a flow chart of a digital asset processing method based on anti-quantum keys when digital asset validation according to one embodiment of the invention.
Fig. 5 is a functional block diagram of a first digital asset processing device based on an anti-quantum key according to one embodiment of the invention.
Fig. 6 is a functional block diagram of a second digital asset processing device based on an anti-quantum key according to one embodiment of the invention.
Fig. 7 is a system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
Fig. 8 is another system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described below with reference to several exemplary embodiments. It will be appreciated that such embodiments are provided to make the principles and spirit of the invention clear and thorough, and enabling those skilled in the art to better understand and practice the principles and spirit of the invention. The exemplary embodiments provided herein are merely some, but not all embodiments of the invention. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the embodiments herein, are within the scope of the present invention.
The invention provides a digital asset copyright protection processing method, a device, electronic equipment, a storage medium and a computer program product, which are used for protecting digital asset copyright and solving the problem of high digital asset copyright determination difficulty.
FIG. 1 is a flow chart of a digital asset processing according to one embodiment of the invention. In this embodiment, the digital asset is first signed after or during the generation process, and the digital signature and the data required for the validation generated during the signing process (hereinafter referred to as the validation base data) are stored in the public database, and then the digital asset after the signature is issued to the blockchain to form a consensus. The blockchain is either a subscription blockchain, such as Opensea; blockchain or ethernet public chain, such as meta mirror MetaMirror; the blockchain is also or alternatively a coalition chain, such as NFT china; of course, other blockchains are also possible, such as whale probes, etc. The digital assets after being up-linked are displayed on the chain as other digital assets are in existence, and free transaction is carried out according to a specified transaction processing mode. In the transaction process, besides performing the transaction according to the existing digital asset transaction mode, the digital asset is subjected to specific processing such as signature and the like before being uplink, and has digital signature, public key and other data which need to be used in the process of determining the right, so that the original holder of the digital asset also needs to transfer the right-determining basic data together with the digital asset to a transaction party, thereby enabling the transaction party to be a new original holder of the digital asset and simultaneously holding corresponding right-determining basic data.
When piracy occurs during the display process or after the transaction of the digital asset, the rights dispute problem occurs, and whether the holder of the current digital asset is a real holder can be determined by carrying out related processing on the digital asset through the method provided by the invention.
Fig. 2 is a flowchart of a digital asset processing method based on an anti-quantum key before a digital asset is booted, according to an embodiment of the present invention, and the digital asset encryption processing method of the present embodiment specifically includes the following steps.
Step S11, generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number.
Step S12, encrypting the right information recorded with the digital asset attribution right into ciphertext.
And S13, mixing and splicing the ciphertext and the random number together to obtain intermediate information.
Step S14, embedding the intermediate information in a steganographic manner in a multimedia file as a digital asset.
And S15, carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to generate a digital signature of the hidden multimedia file.
And step S16, issuing the steganographic multimedia file subjected to signature processing.
In step S11, a random number having a specified number of bits, such as a 128-bit or 256-bit random number, is generated by a random number function. In order to prevent the key used in the present invention from being broken in a quantum-hacking manner, the present invention generates a pair of a private key and a public key based on the random number using an anti-quantum key algorithm. As an example, at least one of a multi-variable-based algorithm, a Lattice-based algorithm, a Code-based algorithm, or a Hash-based algorithm may be employed, but is not limited to.
Taking a Multivariate-based algorithm as an example, the principle and process of generating public and private keys are briefly described as follows.
First construct a finite field k containing q elements and a set of (m) d-th order n-th order polynomials over the finite field k
Figure SMS_1
In this embodiment, a quadratic n-gram is taken as an example, and the quadratic n-gram is shown as follows.
Figure SMS_2
In the above
Figure SMS_3
N variables.
Figure SMS_4
And->
Figure SMS_5
Is polynomial coefficient +.>
Figure SMS_6
Is a polynomial constant whose value is a random number generated by a random number function.
Then polynomial mapping F:
Figure SMS_7
i.e.
Figure SMS_8
Each of which is provided with
Figure SMS_9
Is a quadratic polynomial.
Here, F has to satisfy the condition that the primary image of F can be found and reversible computationally.
And then respectively for the two polynomials
Figure SMS_10
And->
Figure SMS_11
A random reversible linear mapping is performed, which can be represented as follows.
S:
Figure SMS_12
And T:>
Figure SMS_13
in this embodiment, the public key is p=s×f×t, and represents the transformed complex.
Wherein P may be represented as follows.
Figure SMS_14
(1-1)
The private key is calculated for three mappings: s, T and F.
The other three processes of generating the key by the quantum key resistant algorithm can be implemented by referring to respective algorithm guidelines, and will not be described herein.
In step S12, the authorization information is, for example, a specific content set by the current digital asset holder, and the expression form of the authorization information may be text, picture, audio or video, or may be a digital digest obtained by performing hash calculation on the text, picture, audio or video recorded with the specific content. The specific content represents the ownership rights of the digital asset. For example, the current digital asset holder may write a text with any length, may record an audio with any sound, may be any photograph, or may be a video. Further, the text, picture, audio or video may be processed according to a summarization algorithm (e.g., MD5, SHA-1 or SHA-256) to obtain a digital summary. And then, encrypting the current text file, the picture file, the audio file, the video file or the digital abstract by adopting any encryption algorithm to obtain ciphertext. The encryption algorithm needs to be a reversible algorithm, and the original information can be obtained through decryption. Such as symmetric encryption algorithms, e.g., DES, 3DES, or AES series algorithms, or some asymmetric encryption algorithms, e.g., RSA, ECC elliptic curve encryption correlation algorithms, etc., are not described in detail herein.
In order to improve the difficulty of cracking the ciphertext, the original right-determining information can be encrypted by adopting an anti-quantum encryption algorithm. Another pair of public key and private key is generated as in the previous step S11, e.g. the public key is P 1 =S 1 *F 1 *T 1 Representing the composite of the transformations, the private key computes S for three mappings 1 、T 1 And F 1
Using public key P 1 Encrypting the right-determining information recorded with the digital asset attribution right, namely calculating P according to a formula (1-1) 1 (r) =w, where r is a file to be encrypted, i.e., the right information; w is the encrypted ciphertext.
In order to increase the difficulty of obtaining the specific content set by the digital asset holder, after encrypting the specific content set by the digital asset holder, the invention mixes and splices the ciphertext and the generated random number with preset digits together to obtain an intermediate information in step S13, and then embeds the intermediate information in a steganographic manner in a multimedia file serving as a digital asset expression in step S14.
In order to further increase the difficulty of obtaining ciphertext from intermediate information, the invention provides a plurality of mixed splicing processing modes, and the selection of the mixed splicing processing modes can be determined by the value of the splicing parameter k. In one embodiment, the value of the splice parameter k corresponds to the serial number of the hybrid splice processing mode. When the mixed splicing processing modes are n, the value range of the splicing parameter k is [1, … …, n ], and in theory, n can be infinity.
The invention randomly extracts a mixed splicing processing mode to splice ciphertext when the ciphertext is mixed and spliced, and the total extraction method comprises the following steps of
Figure SMS_15
The complexity of obtaining ciphertext by cracking intermediate information is +>
Figure SMS_16
Belongs to the NP-hard problem, and is difficult to crack. Because the mixed splicing processing mode used when the ciphertext and the random number are spliced is different when the authorization information of one digital asset is encrypted each time, even if the intermediate information is cracked from one digital asset, the intermediate information is difficult to crack from other digital assets.
In one embodiment of the hybrid concatenation process, each character of the ciphertext is first converted to 16-ary, and then a random character is inserted after each 16-ary ciphertext character. In another embodiment regarding the hybrid concatenation process, random characters are inserted in reverse order after the positive 16-ary ciphertext characters. In still another embodiment related to the hybrid concatenation process, each character of the random number is also converted into a 16-ary number, and after inserting the 16-ary random character into the ciphertext, calculation is performed, for example, each adjacent 16-ary ciphertext character and 16-ary random character are subjected to operations such as addition, subtraction, multiplication, division, and the like, and then the operation result is inserted into the current position, and the adjacent 16-ary ciphertext character and 16-ary random character can also be replaced by the operation result.
The foregoing several mixed splicing processing manners are merely illustrative, and those skilled in the art can know that when inserting random characters into ciphertext, n mixed splicing processing manners can be obtained by setting different insertion positions, the number of random characters inserted each time, the calculation processing manner, the processing manner of calculation results, and the like, which are not described herein.
In step S14, when the intermediate information is to be steganographically displayed in the multimedia file, which is a digital asset representation, there are a plurality of steganographically displayed modes, and the selection method is the same as the selection method of the hybrid splicing mode, that is, the value of the steganographically displayed parameter j corresponding to the current steganographically displayed mode is randomly designated, and the corresponding steganographically displayed mode is determined based on the value of the steganographically displayed parameter j. In this embodiment, the digital asset representation may be a picture, audio or video. Taking a picture as an example, when intermediate information is steganographically displayed in the picture, steganographically processing is performed as follows.
First, the intermediate information is converted into binary.
And then, reading RGB three channel values of each pixel in the picture, and respectively converting the RGB channel values into binary values to obtain R channel binary values, G channel binary values and B channel binary values of each pixel.
Finally, the last bit in the three channel binary values of each pixel is changed according to the binary intermediate information. In one embodiment, the last bit of the RGB three channels of each pixel may be sequentially added/subtracted by 0 or 1 in the order of the binary numbers in the intermediate information. In another embodiment, the last bit of the original channel may be replaced by the result of adding the binary number in the intermediate information to the last bit of the RGB three channels for each pixel. Various steganographic processing schemes may be derived by changing the algorithm used in the computation, changing the number of binary numbers in the intermediate information used in the computation, changing any one or more of the three alternate RGB channels in the selected pixel values, changing the selected pixels, and so forth. In order to determine the steganography processing mode used in each steganography, the steganography processing method is provided with steganography parameters j, wherein the value of each steganography parameter j corresponds to one steganography processing mode, and the value of the steganography parameter j can be randomly determined.
When the digital asset is represented by an audio file, the same method as the steganography processing method of the picture can be adopted to steganographically, and the difference is that the 16-bit sampling point value of the time domain waveform of the audio file is obtained first, then the last bit of the 16-bit sampling point value is changed, and the value changing method can be the steganography processing method used when steganographically performed by the method. In addition, there are many audio steganography methods, such as echo hiding method, phase encoding method, spread spectrum method, etc., which are not described in detail herein.
When the digital asset is in the form of video, the digital asset can be regarded as a combination of the picture and the audio, so that the video can be hidden by adopting the method for hiding the picture, the method for hiding the audio or the method obtained by combining the picture and the audio, and the corresponding hidden processing mode is more than that of the single method for hiding the picture or the audio, so that the cracking difficulty is higher.
After the steganography is completed, in step S15, the private key generated by the anti-quantum key algorithm in step S11 is used to sign the steganographically-written multimedia file, so as to obtain a digital signature of the steganographically-written multimedia file. The specific process is as follows.
First, a digital digest of the steganographically composed multimedia file is calculated using an algorithm such as MD5, SHA-1, or SHA-256.
And then performing three mapping calculations on the digital abstract according to S, T good F in sequence according to the following formula.
Figure SMS_17
Wherein m is the digital digest of the steganographically multimedia file, and x is the digital signature of the steganographically multimedia file.
The digital signature of the hidden multimedia file and the corresponding public key P may be added to the hidden multimedia file, for example, added at the tail of a picture, an audio file, or a video file, or may store a Yu Gong information database. Meanwhile, establishing the association relation between a public key for digital signature verification, the right-confirming information, a private key for decrypting the encrypted right-confirming information, a mixed splicing processing mode and a steganography processing mode and a new multimedia file in the uplink, and storing the public key for signature verification, the right-confirming information, the private key for decrypting the encrypted original right-confirming information, the mixed splicing processing mode and the steganography processing mode as right-confirming basic data in a public database so as to be used in right-confirming.
In this embodiment, in the process of signing a digital asset, content capable of proving the ownership of the digital asset is embedded in the digital asset, and in order to protect the content from being obtained by a person other than the holder, the embodiment firstly encrypts the content capable of proving the ownership of the digital asset to obtain ciphertext, then splices a random number, embeds the encrypted ciphertext into the digital asset in a steganographic manner, and signs the steganographically-signed digital asset. If the signature is to be forged, firstly, the anti-quantum key algorithm is to be cracked, then a private key of the signature is obtained according to the cracked anti-quantum key algorithm, then correct anti-steganography is needed to obtain steganography intermediate information, ciphertext is needed to be correctly split from the intermediate information, and finally, the ciphertext is needed to be cracked. In the embodiment, an NP-hard problem is constructed in each process of splicing intermediate information, steganography and the like, and the anti-quantum key algorithm is not broken by the Shor algorithm at present, so that the complexity of breaking the digital asset obtained by signature processing in the embodiment is extremely high, and the digital asset has non-breaking property under the current limited condition and after future quantum computers are mature.
Fig. 3 is a flowchart of a digital asset processing method based on an anti-quantum key before a digital asset is booted according to another embodiment of the present invention, and the digital asset processing method based on an anti-quantum key of the present embodiment specifically includes the following steps.
Step S21, generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number.
Step S22, encrypting the right information recorded with the digital asset attribution right into ciphertext.
And S23, mixing and splicing the ciphertext and the generated random number with the preset digits to obtain intermediate information.
Step S24, embedding the intermediate information in a steganographic manner in a multimedia file as a digital asset.
And S25, carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to obtain a digital signature of the hidden multimedia file.
And step S26, splicing the steganographic multimedia file subjected to the signature processing to the multimedia file data serving as the digital asset.
Step S27, disturbing the data block at the splice, where the data block includes a partial data block at the tail of the multimedia file as the digital asset and a partial data block at the head of the steganographically signed multimedia file.
And step S28, publishing the steganographically-processed multimedia file which is spliced after the multimedia file data serving as the digital asset and has the data blocks at the spliced position disturbed, namely publishing the spliced file.
The processing procedure in steps S21 to S25 is the same as the processing procedure in steps S11 to S15 in fig. 2, and will not be described here again. The digital signature generated in step S25 may be added to the steganographically-written multimedia file or stored in a public database; the public key used to verify the digital signature may also store Yu Gong a trust database.
The signature-processed steganographic multimedia file is spliced in step S26 to the multimedia file (or called the original multimedia file) as the digital asset to obtain a new file, and then in step S27, a certain data amount of data blocks is obtained at the splicing position, where the data blocks include a certain byte amount of data, such as 16 bytes, at the tail of the original multimedia file, and the data blocks also include a certain byte amount of data, such as 16 bytes, in the head of the signature-processed steganographic multimedia file, and of course, 8, 12, 24, etc. are also possible. That is, the acquired data block is composed of partial data of the tail of the original multimedia file and partial data of the head of the steganographically-written multimedia file. In another embodiment, the 16 bytes of data at the tail of the original multimedia file in the data block may be continuous data or interval data, and the data at the head of the multimedia file after steganography in the data block may be continuous data or interval data.
The header identifiers of the files of different types are fixed and different, for example, the header identifier of the PNG format is 89504E47, the header identifier of the GIF format is 47494638, the header identifier of the AVI format is 41564920, and the header identifier of the wave (wav) format is 57415645, so, in order to obtain the data block at the splice of the two files, in one embodiment, the data is traversed from the spliced header to find the hidden multimedia header identifier, when the hidden multimedia header identifier is found, the tail of the original multimedia file is also obtained, that is, the splice position is accurately located, and then the data block including the two file data is obtained in the foregoing manner.
In step S27, the data blocks at the splice of the two files are scrambled, so as to further enhance the difficulty of obtaining the ciphertext. In one embodiment, the tail data of the original multimedia file and the data of the head of the hidden multimedia file can be interchanged, and various methods for determining the interchange position can be used. If the two-to-two interchange is started from the connecting place, or the two-to-one interchange is performed in a front-to-back sequence, or the position of the tail data is an independent variable a, the position of the head data is a variable b, a function of the independent variable a and the variable b is constructed, the position interchange is performed according to the function, and the function is, for example, a primary function, such as: b=a+1, b=a+2, and so on. In another embodiment, splice marks of the spliced file are disturbed in a manner that other data is added to the current data block. In one embodiment, a random number is generated, inserted into the current data block, and there are various ways to change the number of bits of the random number, the insertion position, and the number of characters that can be inserted at one insertion position. In summary, each method of scrambling the data blocks at the spliced portion of the spliced file in the foregoing embodiment is one of scrambling processing manners, and the value of the scrambling parameter p corresponds to one of the scrambling processing manners, where the value range of the value of the scrambling parameter p is [1, … …, n ], and n is the sequence number of the nth scrambling processing manner. The scrambling processing pattern is determined by the value of the scrambling parameter p in step S27, which may be randomly specified in 1-n. Similarly, when the scrambling method is used, the currently used scrambling method is also used as a kind of right basic data to be stored in the public information database.
In this embodiment, after the steganography is completed on the multimedia file in the digital asset representation, in order to prevent the steganographically identified multimedia file from being processed, the original multimedia file data is spliced before the steganographically identified multimedia file data, so that the original multimedia file is still displayed when being displayed on the chain, and the situation that other people identify the displayed file as the steganographically identified multimedia file through a machine learning method and the like is avoided.
In another embodiment, after the steganographically obtained multimedia file is obtained according to steps S21 to S24 in the foregoing embodiment, the original multimedia file is spliced to the steganographically new multimedia file, and then the spliced file is digitally signed, so that the difficulty of forging the digital signature is further improved.
In another embodiment, the intermediate information obtained in step S23 is subjected to signature processing. Then, the steganography processing is carried out, and the original multimedia file can be spliced after the new steganography. The related process may refer to the foregoing embodiments, and will not be described herein.
Multimedia files are easily imitated to pirate due to the presentation of digital assets in the form of pictures, audio, video, etc. during and after the uplink presentation. Rights authentication and authentication of disputed digital assets can be performed by a validation process when necessary. Since the multimedia file, which is a digital asset in the prior art, is not specifically processed at the time of creation, the right cannot be confirmed from the multimedia file itself, and thus the right can be very difficult. When the processing method provided by the invention is adopted to process the multimedia file before the multimedia file is linked, rights identification and authentication can be carried out on the disputed digital asset through the processing of the multimedia file during rights confirmation.
FIG. 4 is a flow chart of a digital asset processing method based on anti-quantum keys when digital asset validation according to one embodiment of the invention. The digital asset processing method of the present embodiment specifically includes the following steps.
Step S31, the digital signature of the multimedia file to be authenticated is obtained, and the public key generated by the anti-quantum key algorithm is adopted to verify the digital signature of the multimedia file to be authenticated.
Step S32, judging whether the verification of the digital signature is passed or not, if the verification is passed, performing anti-steganography processing on the multimedia file to be authenticated in step S33. If the verification is not passed, it is determined in step S42 that the multimedia file to be authenticated is not authenticated by the attribution, i.e. the multimedia file to be authenticated is not a legal digital asset purported by the bearer.
Step S34, judging whether intermediate information is obtained after the anti-steganography processing, if the intermediate information is not obtained, determining that the multimedia file to be authorized is not authorized by the attribution right in step S42. If intermediate information is obtained after the anti-steganography process, the intermediate information is subjected to a splitting process in step S35.
Step S36, judging whether the ciphertext is split from the intermediate information, if the ciphertext is not split from the intermediate information, determining that the multimedia file to be authenticated is not authenticated by the attribution right in step S42. If the ciphertext is split from the intermediate information, the ciphertext is decrypted at step 37.
Step S38, judging whether the information for the right is decrypted or not, if the information for the right is not decrypted, determining that the multimedia file to be determined to be right is not determined to be right through the attribution right in step S42. If the information for the right is decrypted, the decrypted information for the right is compared with the digital asset attribution right (i.e., the real right information) corresponding to the multimedia file to be validated at step S39.
Step S40, judging whether the two are consistent, if so, determining that the multimedia file to be authenticated passes through the attribution right in step S41, and if not, determining that the multimedia file to be authenticated does not pass through the attribution right in step S42.
Wherein a private key generated by an anti-quantum key algorithm corresponding to a public key used in signature verification is configured to generate a digital signature of a multimedia file to be authenticated when the multimedia file to be authenticated is issued.
For a digital asset of legal origin, the new holder at the time of the transaction includes the validation base data of the multimedia file in addition to the multimedia file obtained from the original holder. Therefore, when the rights are confirmed, according to the to-be-confirmed multimedia file provided by the new holder, corresponding right confirming basic data can be obtained from the public information base, wherein the right confirming basic data comprises right confirming information for recording the digital asset attribution rights and a private key for decryption, a mixed splicing processing mode (such as a value of a splicing parameter k) used when a ciphertext and a random number are mixed, a steganography processing mode (such as a value of a steganography parameter j), a public key for digital signature and digital signature verification and the like. When the original multimedia file is adopted to splice the hidden multimedia file, a scrambling processing mode (for example, the value of the scrambling parameter p) used when scrambling the data at the file data splice is also included. Thus, when a multimedia file to be authenticated is known, it necessarily includes the aforementioned authentication base data for a legitimate multimedia file, and in the authentication process, the required data is read from the authentication base data according to the processing requirement for processing.
When verifying the digital signature by using the corresponding public key for digital signature verification in step S31, the digital signature x is calculated by using the public key for verifying the digital signature in the verification base data to obtain a digital digest m 1 Then another digital digest m of the multimedia file to be authenticated is calculated 2 Comparing whether the two word digests are consistent; and when the two parts of the word digests are consistent, determining that the digital signature passes the verification, and when the two parts of the word digests are inconsistent, determining that the digital signature does not pass the verification. Wherein, when calculating the digital signature xCalculating a digital signature according to a public key P obtained by an anti-quantum key algorithm, namely calculating P (x), wherein x is the digital signature, and obtaining a digital abstract m after P (x) calculation 1 . When the file subjected to signature processing is intermediate information, during the right confirmation processing, when intermediate information is obtained through anti-steganography processing, calculating a digital abstract of the intermediate information, and obtaining a digital abstract m after P (x) calculation 1 Comparison was performed. When the multimedia file to be authenticated is a spliced file, during authentication processing, when the steganographic multimedia file is extracted from the multimedia file to be authenticated, calculating a digital digest of the steganographic multimedia file for obtaining a digital digest m after P (x) calculation 1 Comparison was performed.
When the anti-steganography process is performed on the multimedia file to be validated in step 33, the value of the steganography parameter j is read from the validation base data, the steganography processing mode corresponding to the steganography parameter j is determined according to the value of the steganography parameter j, and the anti-steganography is performed according to the step opposite to the steganography processing mode.
When the intermediate information is split in step S35, the value of the splicing parameter k of the hybrid splicing processing mode is first read from the basic data of the right determination, the hybrid splicing processing mode corresponding to the splicing parameter k is determined according to the value of the splicing parameter k, and then the ciphertext and the random number are split from the intermediate information one by one according to the hybrid splicing processing mode.
When the secret key is used to decrypt the ciphertext in step 37, the corresponding secret key is used to decrypt when the encryption is performed by using DES, 3DES or AES series algorithms or some asymmetric encryption algorithms (such as RSA, ECC elliptic curve encryption correlation algorithm). If the public key used in encryption is generated by a Multivariate-based algorithm, the private key used in decryption is calculated S, T and F for the three mappings. The decryption process is thus three mapping calculations S, T and F, respectively.
If the basis number of the right contains a disturbing parameter p value, firstly recovering the data at the splicing position in the multimedia file to be right according to a disturbing processing mode corresponding to the disturbing parameter p value; then extracting the hidden multimedia file from the head data in the spliced data backwards; then, the extracted hidden multimedia file is subjected to anti-hidden writing, splitting, decryption, signature verification and other treatments.
If any step in the processing procedures of digital signature verification, restoration of data at the splice, anti-steganography, splitting, decryption and comparison of the right-confirming information is problematic, the fact that the current multimedia file to be confirmed is inconsistent with the uplink multimedia file can be determined, so that the current holder of the multimedia file to be confirmed cannot be proved to be the legal holder of the multimedia file.
In another aspect, the invention also provides a digital asset processing device based on the anti-quantum key.
Fig. 5 is a functional block diagram of a first digital asset processing device based on an anti-quantum key according to one embodiment of the invention. As shown in fig. 5, the first digital asset processing device 10 in the present embodiment includes a key unit 11, an encryption unit 12, a concatenation unit 13, a steganography unit 14, a signature unit 15, and a distribution unit 16.
The key unit 11 is configured to generate a random number with a preset bit number, and generate a pair of a first private key and a first public key for signing by adopting an anti-quantum key algorithm based on the random number, wherein the first private key and the first public key are respectively configured to perform digital signature processing and verify digital signatures when validating the issued multimedia file. The key unit 11 generates a pair of a second private key and a second public key for encryption based on any one of encryption algorithms. The encryption algorithm may be a symmetric encryption algorithm of DES, 3DES or AES series, an asymmetric encryption algorithm such as RSA or ECC elliptic curve, an algorithm based on Lattice (Lattice-based), an algorithm based on Code-based, an algorithm based on Multivariate (Multivariate-based), or an anti-quantum key algorithm such as Hash-based. For example, another random number, for example, 256 bits, is generated based on which a second private key and a second public key for encryption are generated using a Multivariate-based algorithm. The second public key and the second private key are respectively configured to encrypt the rights information recorded with the digital asset attribution rights and decrypt ciphertext split from intermediate information obtained by anti-steganography when the rights are confirmed for the issued multimedia file.
The encryption unit 12 encrypts the right-determining information recorded with the digital asset ownership right into ciphertext using a second public key for encryption. The right determining information can be a specific content set by the current digital asset holder, the specific content represents the attribution right of the digital asset, and the expression form of the right determining information can be text, picture, audio or video, or a digital digest obtained by carrying out hash calculation on the text, picture, audio or video recorded with the specific content.
The concatenation unit 13 mixes and concatenates the ciphertext and the random number together to obtain intermediate information. As an example, the concatenation unit 13 may determine a hybrid concatenation processing manner by randomly specifying the value of the concatenation parameter k, and mix-concatenate the ciphertext generated by the encryption unit 12 and the random number generated by the key unit 11 to obtain the intermediate information.
The steganographic unit 14 steganographically embeds the intermediate information in a multimedia file that is a digital asset. As an example, the steganography unit 14 may determine the steganography process by randomly specifying a value of the steganography parameter j to steganographically embed the intermediate information in the multimedia file as a digital asset.
The signature unit 15 performs signature processing on the steganographically-written multimedia file by adopting a first private key to obtain a digital signature of the steganographically-written multimedia file; alternatively, the signature unit 15 performs signature processing on the intermediate information using the first private key to obtain a digital signature. The generated digital signature may be added to the steganographically-written multimedia file or stored in a public database.
The distribution unit 16 distributes the steganographically processed multimedia file.
In another embodiment, the first digital asset processing device 10 may further comprise a file splicing unit 17, as indicated by a dotted line in the figure, for splicing the steganographically written multimedia file data to the multimedia file (or called original multimedia file) data as a digital asset and then disturbing the data blocks at the two file splices in a disturbing manner. In this embodiment, the publishing unit 16 publishes the steganographically-written multimedia file spliced after the multimedia file data as a digital asset and where the data blocks at the splice are scrambled. Alternatively, the signature unit 15 performs signature processing on the steganographic multimedia file spliced after the multimedia file data as the digital asset and in which the data block at the splice is scrambled, and the publishing unit 16 publishes the steganographic multimedia file which is subjected to signature processing and in which the data block at the splice is scrambled.
Fig. 6 is a functional block diagram of a second digital asset processing device based on an anti-quantum key according to one embodiment of the invention. As shown in fig. 6, the second digital asset processing device 20 in the present embodiment includes a signature verification unit 21, an anti-steganography unit 22, a splitting unit 23, a decryption unit 24, and a comparison unit 25 and an authentication unit 26.
The signature verification unit 21 is configured to verify the digital signature of the multimedia file to be authenticated using the public key generated by the anti-quantum key algorithm. Wherein, in the process of processing the multimedia file to be authenticated before release during digital signature verification, if the process of processing the multimedia file to be authenticated before release is to sign the steganographically-written multimedia file, the signature verification unit 21 first calculates the digital signature x by using the public key for verifying the digital signature in the authentication base data to obtain a digital digest m 1 Then calculating the multimedia file to be authorized to obtain another digital abstract m 2 Comparing whether the two word digests are consistent; and when the two parts of the word digests are consistent, determining that the digital signature passes the verification, and when the two parts of the word digests are inconsistent, determining that the digital signature does not pass the verification. When the digital signature x is calculated, the digital signature is calculated according to a public key P obtained by an anti-quantum key algorithm, namely P (x) is calculated, wherein x is the digital signature, and a digital digest m is obtained after P (x) calculation 1
If the intermediate information formed by the mixed splicing of the ciphertext and the random number is encrypted when the multimedia file to be authenticated is processed before being released, the anti-steganography unit 22 firstly presses Performing anti-steganography processing according to a steganography processing mode, and calculating intermediate information to obtain a digital abstract m when the intermediate information is obtained 3 Comparing the digital digest m obtained by calculating the digital signature x 1 And calculating the intermediate information to obtain a digital abstract m 3 If the two digital digests are consistent, determining that the digital signature passes the verification, and if the two digital digests are inconsistent, determining that the digital signature does not pass the verification.
The anti-steganography unit 22 performs anti-steganography processing on the multimedia file to be authenticated. The splitting unit 23 performs splitting processing on the intermediate information in response to performing anti-steganography processing on the multimedia file to be authenticated to obtain the intermediate information. Decryption unit 24 decrypts the ciphertext using the private key in response to splitting the intermediate information to obtain the ciphertext. The comparing unit 25 obtains the right-confirming information in response to decrypting the ciphertext, and compares the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed. The right confirming unit 26 responds to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, the right confirming unit 26 confirms the right through attribution right, the right confirming unit 26 responds to the fact that the digital signature of the to-be-confirmed multimedia file is not verified, or intermediate information is not obtained through anti-steganography processing of the to-be-confirmed multimedia file, or ciphertext is not obtained through splitting processing of the intermediate information, or the ciphertext is decrypted, or when the decrypted right confirming information is inconsistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, the to-be-confirmed multimedia file is not confirmed through attribution right.
In another embodiment, the second digital asset processing device 20 further comprises a file extraction unit 27, as indicated by the dashed line in fig. 6. When the rights basic number contains a scrambling parameter p value, the file extracting unit 27 firstly restores the data at the splicing position of the multimedia file serving as the digital asset and the steganographically-written multimedia file in the multimedia file to be rights according to a scrambling processing mode corresponding to the scrambling parameter p value; and then extracting the hidden multimedia file backwards based on the file header data in the spliced data, and sending the extracted hidden multimedia file to the anti-steganography unit 22, wherein the anti-steganography unit 22 carries out anti-steganography processing on the extracted hidden multimedia file. When the file extraction unit 27 fails to extract a file, a notification is sent to the validation unit 26, and the validation unit 26 may determine that the multimedia file to be validated is not validated by the attribution. If the multimedia file to be authenticated signs the steganographically-written multimedia file before distribution, the file extraction unit 27 sends the extracted steganographically-written multimedia file to the signature verification unit 21 when the steganographically-written multimedia file data is spliced after the multimedia file data as a digital asset. The signature verification unit 21 performs signature verification with the extracted steganographically multimedia file as a processing object.
The first digital asset processing device 10 and the second digital asset processing device 20 may be provided in the same system or may be provided separately in different systems.
Fig. 7 is a system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
As shown in fig. 7, the first digital asset creation system 101 includes a first digital asset processing device 10 and a digital asset content creation device 100, the digital asset content creation device 100 creates a multimedia file as a digital asset, and the first digital asset processing device 10 processes the created multimedia file, such as setting and encrypting right information in which right of ownership of the digital asset is recorded; generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; the digital signature is obtained by signing the hidden multimedia file by adopting the private key, the validation basic data in the processing process is stored in the public database 300, and then the processed multimedia file is issued to the blockchain 400. The second digital asset processing device 20 for authenticating digital assets is located in the first platform 201, and when the multimedia files as digital assets need to be authenticated, the second digital asset processing device 20 in the first platform 201 performs authentication processing on the multimedia files to be authenticated. The specific confirmation process is referred to in the foregoing description and will not be described in detail herein. In addition, the validation base data required in the validation process may also be provided by the holder of the multimedia file to be validated.
Fig. 8 is another system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
As shown in fig. 8, both the first digital asset processing device 10 and the second digital asset processing device 20 are located in a second platform 202. The second digital asset creation system 102 includes the digital asset content creation apparatus 100, the digital asset content creation apparatus 100 creates a multimedia file as a digital asset, and when it is required to issue onto the blockchain 400, the second digital asset creation system 102 transmits the multimedia file as a digital asset created by the digital asset content creation apparatus 100 to the second platform 202, performs processing such as encryption, splicing, steganography, signing, and the like by the first digital asset processing apparatus 10, issues to the blockchain 400 after the processing is completed, and stores the validation base data generated in the processing in the public database 300. When the rights are required, the second digital asset processing device 20 in the second party platform 202 performs the rights-determining process on the multimedia file to be determined, and the rights-determining basic data required in the rights-determining process is provided by the public database 300 or the holder of the multimedia file to be determined.
In another aspect, the invention also provides an electronic device comprising a processor and a memory storing computer program instructions; the electronic device implements the digital asset processing method based on the quantum key when executing the computer program instructions.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention. As shown in fig. 9, the electronic device may include a processor 601 and a memory 602 storing computer program instructions.
In particular, the processor 601 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present invention.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the above. The memory 602 may include removable or non-removable (or fixed) media, where appropriate. Memory 602 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 602 is a non-volatile solid state memory.
In one example, the electronic device may also include a communication interface 603 and a bus 610. As shown in fig. 9, the processor 601, the memory 602, and the communication interface 603 are connected to each other through a bus 610 and perform communication with each other. The communication interface 603 is mainly used to implement communications between modules, apparatuses, units, and/or devices in the embodiments of the present invention. Bus 610 includes hardware, software, or both, coupling components of the online data flow billing device to each other. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 610 may include one or more buses, where appropriate. Although embodiments of the invention have been described and illustrated with respect to a particular bus, the invention contemplates any suitable bus or interconnect.
The processor 601 implements the above-described anti-quantum key based digital asset processing method by reading and executing computer program instructions stored in the memory 602.
The electronic device in embodiments of the invention may be a server, a personal computer, or other form of computing device.
On the other hand, the embodiment of the invention also provides a computer readable storage medium, and the computer storage medium is stored with computer program instructions which when executed by a processor realize the digital asset processing method based on the quantum-resistant key.
In another aspect, embodiments of the present invention provide a computer program product comprising computer program instructions which, when executed by a processor, implement the above-described anti-quantum key based digital asset processing method. The computer program product is for example an application installation package, a plug-in or the like.
In the foregoing, only the specific embodiments of the present invention are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present invention is not limited thereto, and any equivalent modifications or substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and they should be included in the scope of the present invention.

Claims (14)

1. A digital asset processing method based on an anti-quantum key, comprising:
generating a random number with preset digits, and generating a pair of first private keys and first public keys by adopting an anti-quantum key algorithm based on the random number;
encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext;
mixing and splicing the ciphertext and the random number together to obtain intermediate information;
embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset;
signing the steganographically-written multimedia file by adopting a first private key generated by an anti-quantum key algorithm to generate a digital signature of the steganographically-written multimedia file; and
issuing a steganographic multimedia file subjected to signature processing;
wherein a first public key corresponding to the first private key generated using an anti-quantum key algorithm is configured to verify a digital signature of the published multimedia file when the published multimedia file is authenticated.
2. The anti-quantum key based digital asset processing method of claim 1, wherein the representation of the validation information comprises at least one of text, picture, audio, video and digital digest.
3. The quantum key-based digital asset processing method of claim 1, wherein the step of publishing the signed steganographic multimedia file comprises:
splicing the hidden multimedia file data to the multimedia file data as the digital asset;
disturbing the data blocks at the splice, wherein the data blocks comprise partial data blocks serving as the tail part of the multimedia file of the digital asset and partial data blocks of the head part of the multimedia file after steganography; and
a steganographically-written multimedia file spliced after the multimedia file data as a digital asset and with data blocks at the splice being scrambled is published.
4. The quantum key-based digital asset processing method of claim 1, wherein the step of encrypting the right information recorded with the right of ownership of the digital asset into ciphertext comprises:
generating another random number of the preset bit number, and generating a pair of second private key and second public key by adopting an anti-quantum key algorithm based on the other random number; and
encrypting the right-determining information recorded with the digital asset attribution right by adopting a second public key generated by an anti-quantum key algorithm;
the second private key corresponding to the second public key generated by adopting the anti-quantum key algorithm is configured to decrypt ciphertext mixed and spliced in intermediate information embedded in the released multimedia file in a steganographic manner when the released multimedia file is authorized.
5. The anti-quantum key based digital asset processing method of claim 1, wherein the anti-quantum key algorithm comprises at least one of a lattice-based algorithm, an encoding-based algorithm, a multivariate-based algorithm, and a hash-based algorithm.
6. A digital asset processing method based on an anti-quantum key, comprising:
verifying the digital signature of the multimedia file to be authenticated by adopting a first public key generated by an anti-quantum key algorithm;
responding to the digital signature of the multimedia file to be authenticated to pass the verification, and performing anti-steganography processing on the multimedia file to be authenticated;
responding to the multimedia file to be validated and carrying out anti-steganography processing to obtain intermediate information, and splitting the intermediate information;
responding to the intermediate information to obtain a ciphertext through splitting treatment, and decrypting the ciphertext;
responding to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and comparing the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; and
determining that the multimedia file to be authenticated is authenticated through the attribution right in response to the fact that the decrypted and obtained authentication information is consistent with the digital asset attribution right corresponding to the multimedia file to be authenticated;
The first private key corresponding to the first public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
7. The quantum key-based digital asset processing method of claim 6, further comprising:
determining that the multimedia file to be authenticated does not pass the attribution right in response to the digital signature of the multimedia file to be authenticated not passing the verification; or alternatively
Responding to the fact that the multimedia file to be determined is subjected to anti-steganography processing and does not obtain intermediate information, and determining that the multimedia file to be determined does not pass through attribution right determination; or alternatively
Responding to the fact that the intermediate information is split and does not obtain ciphertext, and determining that the multimedia file to be determined is not determined by attribution right; or alternatively
Responding to the decryption of the ciphertext without obtaining the right-confirming information, and confirming that the multimedia file to be confirmed does not pass the attribution right; or alternatively
And determining that the multimedia file to be authenticated does not pass the attribution right in response to the fact that the decrypted right determining information is inconsistent with the digital asset attribution right corresponding to the multimedia file to be authenticated.
8. The method of claim 6, wherein decrypting the ciphertext comprises:
decrypting the ciphertext by adopting a second private key generated by adopting an anti-quantum key algorithm, wherein the second public key corresponding to the second private key generated by adopting the anti-quantum key algorithm is configured to encrypt the right-determining information into the ciphertext which is mixed and spliced in the intermediate information embedded in the right-determining multimedia file in a steganographic manner when the right-determining multimedia file is issued.
9. The quantum key-based digital asset processing method of claim 6, wherein the step of performing the anti-steganographic process on the multimedia file to be authenticated comprises:
restoring the data at the splicing position in the multimedia file to be authorized; and
extracting the steganographically-written multimedia file backwards based on header data in the spliced data;
and carrying out anti-steganography processing on the extracted steganography multimedia file.
10. A digital asset processing device based on an anti-quantum key, comprising:
a key unit configured to generate a random number of a preset number of bits, and to generate a pair of private key and public key by an anti-quantum key algorithm based on the random number;
An encryption unit configured to encrypt the right information recorded with the digital asset attribution right into a ciphertext;
the splicing unit is configured to mix and splice the ciphertext and the random number together to obtain intermediate information;
a steganography unit configured to steganographically embed the intermediate information in a multimedia file that is a digital asset;
the signature unit is configured to carry out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm so as to generate a digital signature of the hidden multimedia file; and
a publishing unit configured to publish the steganographically-processed multimedia file;
wherein the public key corresponding to the private key generated using the anti-quantum key algorithm is configured to verify the digital signature of the published multimedia file when the published multimedia file is authenticated.
11. A digital asset processing device based on an anti-quantum key, comprising:
the signature verification unit is configured to verify the digital signature of the multimedia file to be authenticated by adopting a public key generated by an anti-quantum key algorithm;
the anti-steganography unit is configured to respond to the verification of the digital signature of the multimedia file to be authenticated, and perform anti-steganography processing on the multimedia file to be authenticated;
The splitting unit is configured to respond to the multimedia file to be validated and perform anti-steganography processing to obtain intermediate information, and split the intermediate information;
the decryption unit is configured to respond to the intermediate information to obtain ciphertext through splitting processing, and decrypt the ciphertext;
the comparison unit is configured to respond to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and compare the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; and
the right confirming unit is configured to respond to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, and confirm that the to-be-confirmed multimedia file passes through the attribution right;
the private key corresponding to the public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
12. The anti-quantum key based digital asset processing device of claim 11, wherein the validation unit is further configured to:
determining that the multimedia file to be authenticated does not pass the attribution right in response to the digital signature of the multimedia file to be authenticated not passing the verification; or alternatively
Responding to the fact that the multimedia file to be determined is subjected to anti-steganography processing and does not obtain intermediate information, and determining that the multimedia file to be determined does not pass through attribution right determination; or alternatively
Responding to the fact that the intermediate information is split and does not obtain ciphertext, and determining that the multimedia file to be determined is not determined by attribution right; or alternatively
Responding to the decryption of the ciphertext without obtaining the right-confirming information, and confirming that the multimedia file to be confirmed does not pass the attribution right; or alternatively
And determining that the multimedia file to be authenticated does not pass the attribution right in response to the fact that the decrypted right determining information is inconsistent with the digital asset attribution right corresponding to the multimedia file to be authenticated.
13. An electronic device comprising a processor and a memory storing computer program instructions; a processor, when executing computer program instructions, implements the anti-quantum key based digital asset processing method as claimed in any one of claims 1 to 9.
14. A computer readable storage medium, having stored thereon computer program instructions which, when executed by a processor, implement the anti-quantum key based digital asset processing method of any one of claims 1 to 9.
CN202310296844.4A 2023-03-24 2023-03-24 Digital asset processing method, device, equipment and medium based on quantum-resistant key Pending CN116366232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310296844.4A CN116366232A (en) 2023-03-24 2023-03-24 Digital asset processing method, device, equipment and medium based on quantum-resistant key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310296844.4A CN116366232A (en) 2023-03-24 2023-03-24 Digital asset processing method, device, equipment and medium based on quantum-resistant key

Publications (1)

Publication Number Publication Date
CN116366232A true CN116366232A (en) 2023-06-30

Family

ID=86918418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310296844.4A Pending CN116366232A (en) 2023-03-24 2023-03-24 Digital asset processing method, device, equipment and medium based on quantum-resistant key

Country Status (1)

Country Link
CN (1) CN116366232A (en)

Similar Documents

Publication Publication Date Title
US7831831B2 (en) Authentication communication system, authentication communication apparatus, and authentication communication method
CN101377837A (en) Method for generating and checking electronic check two-dimension code credence
JP2002510943A (en) Using and applying multiple transforms for secure digital watermarking
WO2009031082A1 (en) Apparatus and methods for transferring digital content
JP4734324B2 (en) Access authorization across multiple devices
CN111177666A (en) Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark
WO2021258907A1 (en) Transaction method based on blockchain network, node, and medium
CN115955308B (en) Digital asset processing method, device, equipment and medium based on quantum-resistant key
JP3596604B2 (en) Output device controller
Chang et al. An enhanced buyer seller watermarking protocol
Katzenbeisser On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
KR101967855B1 (en) Method and system for verifying electronic document security using 2D barcode block division
Cheung et al. Rights protection for digital contents redistribution over the Internet
CN114841701B (en) Digital artwork anti-theft credible transaction method and device based on NFT
CN116366232A (en) Digital asset processing method, device, equipment and medium based on quantum-resistant key
CN114119332A (en) Block chain-based digital watermark writing and reading method and device
JP2000184173A (en) Method and device for picture processing, method and system for picture delivery, and computer readable storage medium
Tang et al. Fragile watermarking based proofs of retrievability for archival cloud data
Williams et al. On the importance of one-time key pairs in buyer-seller watermarking protocols
Das Buyer-seller watermarking protocol for an anonymous network transaction
US20230410072A1 (en) Systems and methods for enhanced non-fungible tokens
JPH11212462A (en) Electronic watermark system, electronic information delivery system, picture filing device, and storage medium
KR20080019863A (en) Method for embedding codes to contents and apparatus therefor
Laxmi et al. Buyer seller watermarking protocol for digital rights management
JP2005175652A (en) Content distribution system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination