CN108540475A - A kind of electronic communication system based on DSP - Google Patents

A kind of electronic communication system based on DSP Download PDF

Info

Publication number
CN108540475A
CN108540475A CN201810322891.0A CN201810322891A CN108540475A CN 108540475 A CN108540475 A CN 108540475A CN 201810322891 A CN201810322891 A CN 201810322891A CN 108540475 A CN108540475 A CN 108540475A
Authority
CN
China
Prior art keywords
module
dsp
information
communication network
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810322891.0A
Other languages
Chinese (zh)
Other versions
CN108540475B (en
Inventor
龚伦峰
蒋冬初
朱丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan City University
Original Assignee
Hunan City University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan City University filed Critical Hunan City University
Priority to CN201810322891.0A priority Critical patent/CN108540475B/en
Publication of CN108540475A publication Critical patent/CN108540475A/en
Application granted granted Critical
Publication of CN108540475B publication Critical patent/CN108540475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/044Network management architectures or arrangements comprising hierarchical management structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to technical field of electronic communication, disclose a kind of electronic communication system based on DSP, and the electronic communication system based on DSP includes:MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm module, display module, wireless base station, server, intelligent movable end.The present invention is encrypted electronic communication by data encryption module, greatly improves the safety of communication, avoids the generation of the safety problems such as leakage sensitive information;Fault-signal can be detected by fault alarm module in time simultaneously, and staff is notified to carry out safeguard procedures.

Description

A kind of electronic communication system based on DSP
Technical field
The invention belongs to technical field of electronic communication more particularly to a kind of electronic communication systems based on DSP.
Background technology
DSP Digital Signal Processing is that research is analyzed signal with digital method, converts, filters, detects, modulates, solved A special kind of skill subject of tune and fast algorithm.But many people think that:Digital Signal Processing mainly studies related digital filtering Technology, discrete transform fast algorithm and spectral analysis method.With the development of digital circuit and systems technology and computer technology, Digital Signal Processing is also correspondingly made available development, and application field is very extensive.Digital control, answering in terms of motion control With mainly having disk drive control, engine control, laser printer control, spray drawing machine control, motor control, electric system control System, robot control, high accuracy servo system control, numerically-controlled machine tool etc..It is answered towards low-power consumption, handheld device, wireless terminal With mainly having:Mobile phone, PDA, GPS, data radio station etc..However, existing be easy based on the electronic communication system of DSP in communication process Information leakage event occurs, safety is not high;If electronic communication process cannot notify work in time if there is failure simultaneously Personnel.
In actual life, the attribute in attribute set can be divided into different levels, example according to their significance level As taught this attribute, two levels of full professor and associate professor can be separated into, therefore just have the adding based on attribute of layering Close (CP-HABE).In this encryption mechanism, each user is owned by the property set of a layering in systems.Encipherer to Possess one message of user encryption of some property set in system, wherein ciphertext contains a kind of access structure of layering, only When the layering of user property meets the layering of access structure, message could be decrypted.This CP-HABE can regard tradition as A kind of form of CP-ABE schemes, i.e. all properties are all on same level.Current this CP-HABE schemes are proved to judging It is safe under property (q-parallel) bilinear Diffie-Hellman index assumption.It is existing this based on hierarchical access knot The safety of the CP-HABE schemes of structure has only reached false in prejudgementing character (q-parallel) bilinear Diffie-Hellman index It is safe to set
In conclusion problem of the existing technology is:It is existing to be easy in communication process based on the electronic communication system of DSP Information leakage event occurs, safety is not high;If electronic communication process cannot notify work in time if there is failure simultaneously Personnel.
The present invention keeps operation times less more efficient by using the access structure of improved layering, also in encryption The correspondence row insertion of the access structure of layering is entered for each attribute of layering, to realize that layering and fine granularity access Structure is combined;Mixing rank Bilinear Groups element is added according further to dual system encryption technology;To be realized under master pattern The encrypted overall safety rank of hierarchical attribute.And the prior art fails to solve.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of electronic communication systems based on DSP.
The invention is realized in this way a kind of electronic communication system based on DSP includes:
MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm Module, display module, wireless base station, server, intelligent movable end;
MIM message input module is connect with DSP control module, for data informations such as input video, picture and text, voices;
DSP control module, with MIM message input module, wireless communication module, data memory module, alarm module, display mould Block connects, and data processing and inversion is carried out for the information to input;
Wireless communication module is connect with DSP control module, data encryption module, for translating the information into wireless signal It is sent to server and intelligent movable end by wireless base station, realizes long-range acquisition information and control operation;
Data encryption module is connect with wireless communication module, for wireless signal to be encrypted;
Data memory module is connect with data encryption module, for being deposited to the data information that DSP control module is handled Storage;
Alarm module is connect with DSP control module, if there is exception for DSP control module circuit, passes through alarm Device is alarmed;
Display module is connect with DSP control module, the data information for showing DSP control module processing.
Further, the DSP control module includes:
Operating system determination unit determines current for the correspondence according to different communication network standard operating system Communication network standard operating system corresponding to timeslice;
Memory part determination unit, for the memory quilt according to preset different communication network standard operating system and terminal The correspondence of the memory part marked off determines the communication network standard operating system pair determined with operating system determination unit The memory part answered;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network Network standard operating system, and according to the hardware driving journey for including in the system program of determining communication network standard operating system Sequence drives corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein Communication network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, at hardware driving unit driving DSP, communication network standard signal After managing module, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication for including processor Information, and control DSP and terminal authentication information progress protocol encapsulation is obtained according to communication protocol corresponding with communication network standard Communication network signal, and communication network signal is transmitted to wireless communication module.
Further, it is a kind of internetworking security control that the communication network signal, which generates the communication protocol in control unit, Agreement, information, authentication state information, signing messages including agreement is traced to the source, can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the label for sign test Name;V is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks grouping p Operation d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates that transfer is blocked to fail, 1 It indicates to block and shift successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one in table A grouping feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, institute The implementation procedure for stating mechanism is:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 hold Otherwise row terminates and blocks operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
Further, described information input module includes:Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
Further, the encryption method of data encryption module includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings; Then it is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, G is enabledpiExpression rank is pi's Subgroup, i=1,2,3;Then selection Stochastic a and α, random group elements g ∈ Gp1、X3∈Gp3, wherein a, α ∈ ZN, ZNIt indicates 1 to N-1 integer;For U property element in U, corresponding group element h is selected1,...,hU∈Gp1, then common parameter PK It is respectively with master key MSK:
PK={ N, g, gα,e(g,g)a,h1,......,hU};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, according to attribute set S, common parameter PK, message M and one A layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is carried out with an expression formula Encryption obtains ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is every One layer of number of attributes is more than this layer of thresholding, and S is made to meet the access structure of layering;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
Further, the layering thresholding access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, from change The coefficient of amount is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1
f(1+2x+3x4)=0+2+3x3
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at, Attribute set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ; It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each The threshold value of layer, then the thresholding access structure that (k, n) is layered seek to as each secret letter of participant u distribution in attribute set U A secret shadow σ (u) for ceasing s, makes it meet following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret It is close, and any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, multinomial P is then constructed (x)=s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;Inside each participant u corresponding domains in system Element representation its identity, use ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of door Limit value and enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enablesS indicates that number of elements possessed by S, setting meet:
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=S, and if only if for all 0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then, can group when participant's cooperation all in S At coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Into one Step, this access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as I={ j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that ∑j∈Iωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvGreatly It can be always found in small polynomial time, so that it may to recover main secret.
Further, the wireless communication module includes:Shell, message recipient, information data editing machine, information data turn Parallel operation, signal projector and locator;The outer surface of the shell is equipped with message recipient;The inside of the shell is equipped with Information data editing machine, is electrically connected to message recipient;Described information data editors are electrically connected with information data converter;Institute The side for stating shell is equipped with signal projector, is electrically connected to information data converter;Positioning is installed at the top of the shell Device;When data information transfer, message recipient receives the data analysis of DSP control module transmission, through information data editing machine, letter Breath data converter editor is converted to signal form, and is sent out by information transmitter;Locator can to electronic communication system into Row positioning.
Further, the display module includes:Shell, display screen, scrambler, button, signal lamp;The inside of the shell Display screen is installed;The bottom of the display screen is embedded with scrambler;The bottom key of the display screen is equipped with button;The display The top of screen is embedded with several signal lamps;When using display screen, corresponding password is inputted by scrambler and opens display screen, display Screen shows that corresponding signal lamp lights when corresponding data information, can intuitively observe display result;It can by the button of bottom Input or preserve corresponding data information.
Advantages of the present invention and good effect are:The present invention adds electronic communication by data encryption module It is close, the safety of communication is greatly improved, the generation of the safety problems such as leakage sensitive information is avoided;Pass through fault alarm module simultaneously Fault-signal can be detected in time, and staff is notified to carry out safeguard procedures.
The present invention is corresponded to attribute in the generator matrix of access structure, using the access structure of layering according to attribute Importance controls the number of f operations, and the f operation times that important attribute carries out are few, thus the secret for including is more, then will give birth to At f operation results be mapped in generator matrix, to realize relative to existing hierarchical attribute encipherment scheme, operation times It is less more efficient;
The correspondence row insertion of the access structure of layering is entered for each attribute of layering when encryption, is divided to realize Layer and fine granularity access structure are combined;
0th layer of attribute is individually listed in ciphering process and is encrypted by traditional hierarchical attribute encipherment scheme, and The attribute of all levels is encrypted with a kind of expression formula the present invention, simplifies ciphertext format;
Traditional hierarchical attribute encipherment scheme does not account for causing certain decryption unsuccessful comprehensively in decrypting process, and our Case, which fully considers this point and reconfigures, understands close algorithm, and being obtained by verification can be with successful decryption all situations.
Description of the drawings
Fig. 1 is the electronic communication system structure diagram provided in an embodiment of the present invention based on DSP;
Fig. 2 is the structure diagram of the wireless communication module of the electronic communication system provided in an embodiment of the present invention based on DSP;
Fig. 3 is the display module structure diagram of the electronic communication system provided in an embodiment of the present invention based on DSP;
In figure:1, MIM message input module;2, DSP control module;3, wireless communication module;4, data encryption module;5, number According to memory module;6, alarm module;7, display module;8, wireless base station;9, server;10, intelligent movable end;11, shell; 12, message recipient;13, information data editing machine;14, information data converter;15, signal projector;16, locator;17、 Shell;18, display screen;19, scrambler;20, button;21, signal lamp.
Specific implementation mode
In order to further understand the content, features and effects of the present invention, the following examples are hereby given, and coordinate attached drawing Detailed description are as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, the electronic communication system provided in an embodiment of the present invention based on DSP includes:MIM message input module 1, DSP control module 2, wireless communication module 3, data encryption module 4, data memory module 5, alarm module 6, display module 7, nothing Line base station 8, server 9, intelligent movable end 10.
MIM message input module 1 is connect with DSP control module 2, for data informations such as input video, picture and text, voices;
DSP control module 2, with MIM message input module 1, wireless communication module 3, data memory module 5, alarm module 6, aobvious Show that module 7 connects, data processing and inversion is carried out for the information to input;
Wireless communication module 3 is connect with DSP control module 2, data encryption module 4, for translating the information into wireless communication Number server 9 and intelligent movable end 10 are sent to by wireless base station 8, realize and long-range obtain information and control operation;
Data encryption module 4 is connect with wireless communication module 3, for wireless signal to be encrypted;
Data memory module 5 is connect with data encryption module 4, the data information for handling to DSP control module 2 into Row storage;
Alarm module 6 is connect with DSP control module 2, if there is exception for 2 circuit of DSP control module, is passed through Alarm is alarmed;
Display module 7 is connect with DSP control module 2, the data information handled for showing DSP control module 2.
The DSP control module includes:
Operating system determination unit determines current for the correspondence according to different communication network standard operating system Communication network standard operating system corresponding to timeslice;
Memory part determination unit, for the memory quilt according to preset different communication network standard operating system and terminal The correspondence of the memory part marked off determines the communication network standard operating system pair determined with operating system determination unit The memory part answered;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network Network standard operating system, and according to the hardware driving journey for including in the system program of determining communication network standard operating system Sequence drives corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein Communication network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, at hardware driving unit driving DSP, communication network standard signal After managing module, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication for including processor Information, and control DSP and terminal authentication information progress protocol encapsulation is obtained according to communication protocol corresponding with communication network standard Communication network signal, and communication network signal is transmitted to wireless communication module.
It is a kind of internetworking security control agreement, packet that the communication network signal, which generates the communication protocol in control unit, It traces to the source information, authentication state information, signing messages containing agreement, can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the label for sign test Name;V is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks grouping p Operation d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates that transfer is blocked to fail, 1 It indicates to block and shift successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one in table A grouping feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, institute The implementation procedure for stating mechanism is:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 hold Otherwise row terminates and blocks operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
As shown in Fig. 2, the wireless communication module 3 includes:Shell 11, message recipient 12, information data editing machine 13, Information data converter 14, signal projector 15 and locator 16.
As shown in figure 3, the display module 7 includes:Shell 17, display screen 18, scrambler 19, button 20, signal lamp 21.
MIM message input module 1 provided by the invention includes:Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
The outer surface of shell 11 of the present invention is equipped with message recipient 12;The inside of the shell 11 is equipped with information Data editors 13 are electrically connected to message recipient 14;Described information data editors 13 are electrically connected with information data converter 14;The side of the shell 11 is equipped with signal projector 15, is electrically connected to information data converter 14;The top of the shell 11 Portion is equipped with locator 16.
The inside of shell 17 of the present invention is equipped with display screen 18;The bottom of the display screen 18 is embedded with scrambler 19;The bottom key of the display screen 18 is equipped with button 20;The top of the display screen 18 is embedded with several signal lamps 21.
As the preferred embodiment of the present invention, the encryption method of data encryption module includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings; Then it is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, G is enabledpiExpression rank is pi's Subgroup, i=1,2,3;Then selection Stochastic a and α, random group elements g ∈ Gp1、X3∈Gp3, wherein a, α ∈ ZN, ZNIt indicates 1 to N-1 integer;For U property element in U, corresponding group element h is selected1,...,hU∈Gp1, then common parameter PK It is respectively with master key MSK:
PK={ N, g, gα,e(g,g)a,h1,......,hU};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, according to attribute set S, common parameter PK, message M and one A layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is carried out with an expression formula Encryption obtains ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is every One layer of number of attributes is more than this layer of thresholding, and S is made to meet the access structure of layering;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
As the preferred embodiment of the present invention, the layering thresholding access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, from change The coefficient of amount is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1
f(1+2x+3x4)=0+2+3x3
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at, Attribute set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ; It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each The threshold value of layer, then the thresholding access structure that (k, n) is layered seek to as each secret letter of participant u distribution in attribute set U A secret shadow σ (u) for ceasing s, makes it meet following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret It is close, and any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, multinomial P is then constructed (x)=s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;Inside each participant u corresponding domains in system Element representation its identity, use ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of door Limit value and enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enablesS indicates that number of elements possessed by S, setting meet:
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=S, and if only if for all 0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then, can group when participant's cooperation all in S At coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Into one Step, this access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as I={ j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that ∑j∈Iωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvGreatly It can be always found in small polynomial time, so that it may to recover main secret.
When the present invention works, the data informations such as video, picture and text, voice are sent to DSP control module by MIM message input module 1 2 are handled and are analyzed;DSP control module 2 is by calling wireless communication module 3 to translate the information into wireless signal, data letter When breath transmission, message recipient 12 receives the data analysis of DSP control module transmission 2, through information data editing machine 13, Information Number According to converter 14, editor is converted to signal form, and is sent out by information transmitter 15;Locator 16 can be to electronic communication system It is positioned;And wireless signal is encrypted by data encryption module 4, then 9 He of server is sent to through wireless base station 8 Long-range acquisition information and control operation are realized in intelligent movable end 10;DSP control module 2 is handled by data memory module 5 Data information is stored;If exception occurs in 2 circuit of DSP control module, alarmed by alarm module 6;Finally, lead to It crosses display module 7 and shows the data information that DSP control module 2 is handled;When display module 7 is using display screen 18, pass through scrambler The 19 corresponding passwords of input open display screen 18, and display screen 18 shows that corresponding signal lamp 21 lights when corresponding data information, Display result can intuitively be observed;Corresponding data information can be inputted or preserve by the button 20 of bottom.
The above is only the preferred embodiments of the present invention, and is not intended to limit the present invention in any form, Every any simple modification made to the above embodiment according to the technical essence of the invention, equivalent variations and modification, belong to In the range of technical solution of the present invention.

Claims (8)

1. a kind of electronic communication system based on DSP, which is characterized in that the electronic communication system based on DSP includes:
MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm module, Display module, wireless base station, server, intelligent movable end;
MIM message input module is connect with DSP control module, for data informations such as input video, picture and text, voices;
DSP control module connects with MIM message input module, wireless communication module, data memory module, alarm module, display module It connects, data processing and inversion is carried out for the information to input;
Wireless communication module is connect with DSP control module, data encryption module, is passed through for translating the information into wireless signal Wireless base station is sent to server and intelligent movable end, realizes long-range acquisition information and control operation;
Data encryption module is connect with wireless communication module, for wireless signal to be encrypted;
Data memory module is connect with data encryption module, for being stored to the data information that DSP control module is handled;
Alarm module is connect with DSP control module, if occur for DSP control module circuit it is abnormal, by alarm into Row alarm;
Display module is connect with DSP control module, the data information for showing DSP control module processing.
2. the electronic communication system based on DSP as described in claim 1, which is characterized in that the DSP control module includes:
Operating system determination unit determines current time for the correspondence according to different communication network standard operating system Communication network standard operating system corresponding to piece;
Memory part determination unit, for being divided according to the memory of preset different communication network standard operating system and terminal The correspondence of the memory part gone out, determination are corresponding with the communication network standard operating system that operating system determination unit determines Memory part;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network system Formula operating system, and according to the hardware drive program for including in the system program of determining communication network standard operating system, drive Move corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein communication network Network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, for driving DSP, communication network standard signal to handle mould in hardware driving unit After block, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication information for including processor, And it controls DSP and communication network is obtained to terminal authentication information progress protocol encapsulation according to communication protocol corresponding with communication network standard Network signal, and communication network signal is transmitted to wireless communication module.
3. the electronic communication system based on DSP as claimed in claim 2, which is characterized in that the communication network signal generates Communication protocol in control unit is a kind of internetworking security control agreement, including agreement is traced to the source information, authentication state information, Signing messages can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the signature for sign test;v It is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks the behaviour of grouping p Act on d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates to block transfer failure, 1 indicates Blocking is shifted successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one point in table Group feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, the mechanism Implementation procedure be:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 execute, it is no Then terminate blocking operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
4. the electronic communication system based on DSP as described in claim 1, which is characterized in that described information input module includes: Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
5. the electronic communication system based on DSP as described in claim 1, which is characterized in that the data encryption module adds Decryption method includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings;Then It is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, enableIndicate that rank is the son of pi Group, i=1,2,3;Then selection Stochastic a and α, random group elementsWherein, a, α ∈ ZN, ZNTable Show 1 to N-1 integer;For in U | U | a property element selects corresponding group element h1,...,h|U|∈Gp1, then public ginseng Counting PK and master key MSK is respectively:
PK={ N, g, gα,e(g,g)a,h1,......,h|U|};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, is carried according to attribute set S, common parameter PK, message M and one Previous existence at layering thresholding access structure (MV, ρ) attribute of attribute set U all levels is encrypted with an expression formula Obtain ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable each layer of attribute set S Number of attributes be more than this layer of thresholding, make S meet layering access structure;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
6. the electronic communication system based on DSP as claimed in claim 4, which is characterized in that in step 2), the layering thresholding Access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, independent variable Coefficient is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1
f(1+2x+3x4)=0+2+3x3
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at attribute Set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ;It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each layer Threshold value, then the thresholding access structure of (k, n) layering seek to as each participant u distribution secret information s in attribute set U A secret shadow σ (u), so that it is met following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret, and Any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, then construct multinomial P (x)= s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;One inside each participant u corresponding domains in system Its identity of a element representation, uses ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of threshold value And enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enables| S | indicate that number of elements possessed by S, setting meet:
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=| S |, and if only if for all 0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then when participant's cooperation all in S, can form Coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Further, this A access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as I= {j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that ∑j∈I ωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MνSize It can be always found in polynomial time, so that it may to recover main secret.
7. the electronic communication system based on DSP as described in claim 1, which is characterized in that the wireless communication module includes: Shell, message recipient, information data editing machine, information data converter, signal projector and locator;Outside the shell Surface is equipped with message recipient;The inside of the shell is equipped with information data editing machine, is electrically connected to message recipient;Institute It states information data editing machine and is electrically connected with information data converter;The side of the shell is equipped with signal projector, electrical connection To information data converter;Locator is installed at the top of the shell;When data information transfer, message recipient receives DSP The data analysis of control module transmission, is converted to signal form, and leads to through information data editing machine, information data converter editor Information transmitter is crossed to send out;Locator can position electronic communication system.
8. the electronic communication system based on DSP as described in claim 1, which is characterized in that the display module includes:Outside Shell, display screen, scrambler, button, signal lamp;The inside of the shell is equipped with display screen;The bottom of the display screen is embedded in There is scrambler;The bottom key of the display screen is equipped with button;The top of the display screen is embedded with several signal lamps;Use display When screen, corresponding password is inputted by scrambler and opens display screen, display screen shows corresponding signal when corresponding data information Lamp lights, and can intuitively observe display result;Corresponding data information can be inputted or preserve by the button of bottom.
CN201810322891.0A 2018-04-11 2018-04-11 Electronic communication system based on DSP Active CN108540475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810322891.0A CN108540475B (en) 2018-04-11 2018-04-11 Electronic communication system based on DSP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810322891.0A CN108540475B (en) 2018-04-11 2018-04-11 Electronic communication system based on DSP

Publications (2)

Publication Number Publication Date
CN108540475A true CN108540475A (en) 2018-09-14
CN108540475B CN108540475B (en) 2021-04-30

Family

ID=63480891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810322891.0A Active CN108540475B (en) 2018-04-11 2018-04-11 Electronic communication system based on DSP

Country Status (1)

Country Link
CN (1) CN108540475B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109461065A (en) * 2018-10-17 2019-03-12 浙江医药高等专科学校 A kind of cross-border e-commerce video safety monitoring system and control method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100345410B1 (en) * 2000-06-30 2002-07-24 주식회사 쎄스 System for protecting informations and and method thereof
CN105406967A (en) * 2015-12-10 2016-03-16 西安电子科技大学 Hierarchical attribute encryption method
CN205882849U (en) * 2016-07-05 2017-01-11 北京中科腾越科技发展有限公司 A power distribution terminal platform for electric power industry DTU, FTU
CN107294718A (en) * 2017-08-09 2017-10-24 长安大学 Voidable key strategy is based on encryption attribute method in a kind of master pattern
CN107682326A (en) * 2017-09-21 2018-02-09 北京邮电大学 A kind of security gateway linked protection mechanism, agreement and module

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100345410B1 (en) * 2000-06-30 2002-07-24 주식회사 쎄스 System for protecting informations and and method thereof
CN105406967A (en) * 2015-12-10 2016-03-16 西安电子科技大学 Hierarchical attribute encryption method
CN205882849U (en) * 2016-07-05 2017-01-11 北京中科腾越科技发展有限公司 A power distribution terminal platform for electric power industry DTU, FTU
CN107294718A (en) * 2017-08-09 2017-10-24 长安大学 Voidable key strategy is based on encryption attribute method in a kind of master pattern
CN107682326A (en) * 2017-09-21 2018-02-09 北京邮电大学 A kind of security gateway linked protection mechanism, agreement and module

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109461065A (en) * 2018-10-17 2019-03-12 浙江医药高等专科学校 A kind of cross-border e-commerce video safety monitoring system and control method

Also Published As

Publication number Publication date
CN108540475B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN105553951B (en) Data transmission method and device
CN110519041B (en) Attribute-based encryption method based on SM9 identification encryption
WO2019237570A1 (en) Electronic contract signing method, device and server
US7095851B1 (en) Voice and data encryption method using a cryptographic key split combiner
CN109672539A (en) SM2 algorithm collaboration signature and decryption method, apparatus and system
JP2003536299A (en) Method and apparatus for encrypting a message
JP4597784B2 (en) Data processing device
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN106059757A (en) Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN109951274B (en) Anti-quantum computing point-to-point message transmission method and system based on private key pool
CN1777097A (en) Enciphered data issuing method, enciphering device and programe, deciphering device and programe,
CN108197485A (en) terminal data encryption method and system, terminal data decryption method and system
JPH0823330A (en) Safe data communication
CN105897784B (en) Internet-of-things terminal equipment encryption communication method and device
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN104365127B (en) Method for following the trail of mobile device in remote display unit
CN110084054A (en) A kind of data privacy device, method, electronic equipment and storage medium
CN107483209A (en) A kind of safe label decryption method based on heterogeneous system
CN108090370A (en) Instant messaging encryption method and system based on index
CN106790037A (en) The instant communication method and system of a kind of User space encryption
WO2001084766A2 (en) System and method for encryption using transparent keys
CN109257176A (en) Decruption key segmentation and decryption method, device and medium based on SM2 algorithm
WO1998036520A1 (en) Cryptographic key split combiner
CN107770407B (en) The image encryption method and device of joint zero watermarking insertion
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180914

Assignee: Changzhou magneto optic New Energy Technology Co.,Ltd.

Assignor: Hunan City University

Contract record no.: X2023980033083

Denomination of invention: An Electronic Communication System Based on DSP

Granted publication date: 20210430

License type: Exclusive License

Record date: 20230302