CN109257346A - Hided transmission system based on block chain - Google Patents
Hided transmission system based on block chain Download PDFInfo
- Publication number
- CN109257346A CN109257346A CN201811049009.6A CN201811049009A CN109257346A CN 109257346 A CN109257346 A CN 109257346A CN 201811049009 A CN201811049009 A CN 201811049009A CN 109257346 A CN109257346 A CN 109257346A
- Authority
- CN
- China
- Prior art keywords
- information
- block chain
- alice
- bob
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a kind of hided transmission system based on block chain, including system initialization module, message is embedded in module and message extraction module.It is embedded in module and message extraction module in message, the present invention provides narrowbands and two kinds of broadband subliminal channel, wherein narrowband subliminal channel is the subliminal channel based on Digital Signature Algorithm used in block chain, and broadband subliminal channel is then a kind of non real-time subliminal channel using the common recognition mechanism construction in block chain.The invention enables receiving-transmitting sides can complete twin-channel hided transmission by block chain, has preferable concealment and robustness.
Description
Technical field
The present invention relates to information security fields, more particularly to the hided transmission system on block chain.
Background technique
With the rapid development of internet, the information exchange of people is more and more frequent, in order to ensure information in interactive mistake
The demands such as concealment, robustness in journey, people also require to be increasingly stringenter to the information transmission system.The system of information transmission at present
There are many building methods for system, wherein can effectively be ensured in transmission process using the hided transmission system of private communication channel building
The concealment and robustness of information.
The concept of private communication channel is initially to be proposed by Lampson in 1973, the private communication channel provided is defined as: be not
It is designed or is not intended to the communication channel for transmitting information.Private communication channel has been widely used in the network information now
Data security transmission.Private communication channel has different building methods according to different applications.
Subliminal channel is a kind of private communication channel using digital signature as carrier, which is introduced by Simmons first.It can
It is embedded in secret information in general digital signature, and secret recipient, possessing the verifier of decruption key, can to restore this secret
Confidential information.The basic conception of subliminal channel can be described by " convict " problem of Simmons, entered equipped with Alice and Bob
Prison, their unique communication modes be by transmit message, but watchman Warden serve as transmitting message go-between, he monitor
The message of all transmitting, to check Alice and Bob whether in the discussion plan of escaping.Meanwhile to prevent Warden from pretending to be
Alice or Bob and counterparting communications, Alice and Bob will identify the identity of communication counterpart, therefore the available number with subliminal channel
Endorsement method can meet above all of requirement.
The features such as decentralization that block chain itself has, information can not distort, are open have block chain can also
Effect serves as the carrier of a subliminal channel, because having used Digital Signature Algorithm in block chain technology.Meanwhile the letter in block chain
Breath has opening, anyone can obtain in the chain the signing messages of Transaction Information He the transaction, but only possess
The user of decruption key could recover secret information from the digital signature.
In fact, the agreement can be used to construct private communication channel if an agreement has used random number.Block chain skill
Common recognition mechanism algorithm in art be based on or combine proof of work, therefore the mechanism can also be used to construction private communication channel,
Because the common recognition mechanism algorithm generally requires to choose a random number.Secret information recipient can obtain from disclosed block information
To the random number, then goes to decrypt the random number using key, therefrom recover secret information.Non-secret information is received
Person, they fail to decrypt correctly random number.However this method successfully the probability is relatively small because in block chain miner choose with
Machine number must satisfy certain condition, and subsequent the whole network just accepts which create a new blocks;Otherwise, the whole network will not receive the mine
The calculated result of work.
Based on background above technology, the present invention is based on block chains to devise a kind of hided transmission system, is letter with block chain
Carrier is ceased, provides two kinds of channels for system message insertion module and message extraction module, improves the robustness of hided transmission and hidden
Covering property provides feasible method to share private data on block chain.
Summary of the invention
The invention discloses a kind of hided transmission systems based on block chain, are related to information transmitter Alice, information extraction
Person Bob and block chain node three classes participant, including system initialization, message insertion and three modules of message extraction.It is special
Sign is: being embedded in module and message extraction module in message, narrowband and two kinds of broadband subliminal channel is provided, wherein described narrow
It is the subliminal channel based on Digital Signature Algorithm used in block chain with subliminal channel, the broadband subliminal channel is then to utilize block
A kind of non real-time subliminal channel of common recognition mechanism construction in chain;The information transmitter Alice and the information extraction person
Wallet address used in system initialization module confirmation subliminal channel used, block chain technology used and both sides Bob etc.
Information;
Steps are as follows for the system flow:
A) the information transmitter Alice and information extraction person Bob passes through used in system initialization module confirmation
Subliminal channel, block chain technology used, wallet address, the information transmitter Alice and the information mention used in both sides
Taker Bob selects the shared secret of required negotiation when narrowband subliminal channel or selects to need when the subliminal channel of broadband symmetrical
The information such as Encryption Algorithm and symmetric cryptographic key and sequence number value range;
If b) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described
Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and broadcasts
Give block chain node;If the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel,
" the information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block,
And it is broadcast to block chain node;
If c) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described
Information extraction person Bob is traded as secret information recipient by block chain node, is extracted using message extraction module secret
Confidential information m;Or if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel,
" the information extraction person Bob obtains block by block chain node as secret information recipient, is mentioned using message extraction module
Take secret information m.
" the information transmitter Alice and the information extraction person Bob are true by system initialization module by the step a)
Wallet address, the information transmitter Alice and institute used in subliminal channel, block chain technology used, both sides used in recognizing
It is needed when the shared secret or selection broadband subliminal channel of required negotiation when stating information extraction person Bob selection narrowband subliminal channel
The information such as symmetric encipherment algorithm, symmetric cryptographic key and the sequence number value range wanted " specifically:
A1) the information transmitter Alice and information extraction person Bob passes through used in system initialization module confirmation
Subliminal channel technology;If using narrowband subliminal channel, the information transmitter Alice and the information extraction person Bob both sides
Shared secret needed for negotiating the subliminal channel based on Digital Signature Algorithm;If using broadband subliminal channel, the information hair
The person of sending Alice and the information extraction person Bob both sides confirm that common recognition algorithm used is proof of work algorithm, and negotiate symmetrical
Encryption Algorithm, symmetric cryptographic key and sequence number value range;
A2) the information transmitter Alice and information extraction person Bob exchanges respective one new wallet address.
If " the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described
Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and broadcasts
Give block chain node " specifically:
B1) the information transmitter Alice generates a transaction, during signing digital signature to transaction, utilizes
The shared secret that step a) is consulted is embedded into secret information m in the signature;
B2) the information transmitter Alice broadcasts the transaction to block chain node;
B3) the legitimacy and validity of the transaction of information transmitter Alice described in block chain node verification;
B4) block chain node is packaged transaction, forms new block.
If " the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described
Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block, and broadcasts
Give block chain node " specifically:
B1 ') symmetric encipherment algorithm, symmetric cryptographic key that the information transmitter Alice utilizes step a) to consult, add
Close secret information m, obtains ciphertext c;
B2 ') the information transmitter Alice cascades upper integer serial number i behind ciphertext c and obtains MiThat is Mi=(c | |
I), wherein i is integer serial number, and 0≤i≤f, f are the sequence number value ranges that step a) is consulted, if i > f, selects next area
Block insertion, i are set to 0;
B3 ') the information transmitter Alice is MiRandom number N once as calculation block;
B4 ') if block calculates failure, serial number i returns to step b), otherwise continues to execute from increasing 1;
B5 ') new block is broadcast to other block chain nodes by the information transmitter Alice;
B6 ') the block chain node verification block validity;
B7 ') be proved to be successful after, which is known as a block in block chain.
If " the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described
Information extraction person Bob is traded as secret information recipient by block chain node, is extracted using message extraction module secret
Confidential information m " specifically:
C1) the information extraction person Bob obtains Alice's according to the wallet address of Alice in step a) in block chain
Transaction;
C2) the information extraction person Bob obtains the digital signature of signature transaction by the Transaction Information of Alice;
C3) the information extraction person Bob verifies the legitimacy of above-mentioned transaction;
C4) the information extraction person Bob obtains secret letter using the shared key negotiated in step a) from digital signature
Breath.
If " the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described
Information extraction person Bob obtains block by block chain node as secret information recipient, is extracted using message extraction module secret
Confidential information m " includes following sub-step:
C1 ') the information extraction person Bob obtains Alice according to the wallet address of Alice in step a) in block chain and beats
The block of packet;
C2 ') the information extraction person Bob by the block information of Alice, obtains the Nonce of Alice insertion encryption information
Value;
C3 ') the information extraction person Bob good using offered decipherment algorithm and key, decrypt ciphertext c;
C4 ') the information extraction person Bob removes sequence number value, restore secret information m.
The invention enables receiving-transmitting sides can complete twin-channel hided transmission by block chain, has preferable concealment
And robustness.
Detailed description of the invention
Hided transmission system of the Fig. 1 based on block chain.
Specific embodiment
A kind of hided transmission system based on block chain, is related to information transmitter Alice, information extraction person Bob and area
Block chain node three classes participant, including system initialization, message insertion and three modules of message extraction.Specific implementation step includes
Below: Alice and Bob passes through under system initialization module confirmation subliminal channel used, block chain technology used, narrowband threshold
Symmetric encipherment algorithm, symmetric cryptographic key and the sequence number value needed under the shared secret or broadband subliminal channel that are needed under channel
Range, the information such as wallet address used in both sides;Alice is embedded in module by message and classified information m is embedded in transaction or block
In, and it is broadcast to block chain node;Bob is traded by block chain node or block, is extracted using message extraction module secret
Confidential information.System of the invention is specifically illustrated with an example below.
Embodiment one
Assuming that Zhang San and Li Si are owned by the wallet of bit coin, and Zhang San needs to send classified information to Li Si.Zhang San and
The subliminal channel and the information respectively needed that Li Si's offered uses well, then Zhang San and Li Si are each by system initialization
Module inputs corresponding informance, initializes system;Zhang San is embedded in module by message and classified information is embedded in transaction or block, and
It is broadcast to block chain node;Li Si is traded by block chain node or block, extracts secret letter using message extraction module
Breath.The participant of this example are as follows: Zhang San (Alice), Li Si (Bob) and block chain node.
The implementation process for completing above-mentioned requirements is as follows:
1. in system initialization module:
If 1) both sides use narrowband subliminal channel, Zhang San and Li Si both sides negotiate to believe under the threshold based on Digital Signature Algorithm
Shared secret k needed for road;
If 2) both sides use broadband subliminal channel, Zhang San and Li Si both sides confirm that common recognition algorithm used is workload card
Bright algorithm, and negotiate symmetric encipherment algorithm AES, symmetric cryptographic key k and sequence number value range f;
3) Zhang San and Li Si exchange respective one new wallet address.
2. message is embedded in module:
1) if both sides use narrowband subliminal channel:
A) Zhang San drafts the secret information m for needing to inform Li Si;
B) Zhang San enables ms=m+k, msAs random number used in signature transaction digital signature;
C) Zhang San initiates a transaction j in block chain, during which signs a digital signature to transaction, steps are as follows:
A. m is calculatedsG=(x, y), r=x mod n;Wherein G is basic point, and n is the rank of G;
B. e=hash (j) is calculated;
C. it calculatesWherein dAFor signature private key;
D. (j, r, s) is used as signature result;
D) Zhang San broadcasts the transaction to block chain node;
E) legitimacy and validity of block chain node verification Zhang San transaction;
F) block chain node is packaged transaction, forms new block.
2) if both sides use broadband subliminal channel:
A) Zhang San drafts the secret information m for needing to inform Li Si;
B) Zhang San obtains c using the key k and Encryption Algorithm AES consulted, secret encryption information m;
C) Zhang San cascades upper integer serial number i behind c and obtains MiThat is Mi=(c | | i), wherein i be integer serial number 0≤
I≤f, f are the sequence number value ranges that step S1 is consulted, if i > f, next block are selected to be embedded in, i is set to 0;
D) Zhang San is MiRandom number N once as calculation block;
If e) block calculates failure, serial number i returns to step c), otherwise continues to execute from increasing 1;
F) new block is broadcast to other block chain nodes by Zhang San;
G) validity of the block chain node verification block;
H) after being proved to be successful, which is known as a block in block chain.
3. message extraction module
1) if both sides use narrowband subliminal channel:
A) Li Si obtains the transaction of Zhang San according to the wallet address of Zhang San in block chain;
B) Li Si obtains the digital signature of signature transaction by the Transaction Information of Zhang San;
C) Li Si verifies the legitimacy of above-mentioned transaction;
D) Li Si obtains secret information using the shared key k negotiated, and steps are as follows:
A. w=s is calculated-1mod n;
B. e=hash (j) is calculated;
C. t is calculated1=we mod n;
D. t is calculated2=wr mod n
E. T=(u, v)=t is calculated1G+t2PK, wherein PK is the public key of Alice;
F. R=T-kG=mG is calculated;
G. the discrete logarithm problem of mG is solved to secret information m, and wherein the bit length of m is smaller, and discrete logarithm is asked
Topic is easy to solve.
2) if both sides use broadband subliminal channel:
A) Li Si obtains the block of Zhang San's packing according to the wallet address of Zhang San in block chain;
B) Li Si obtains the Nonce value that Zhang San is embedded in encryption information by the block information of Zhang San;
C) the Li Si decipherment algorithm AES and key k good using offered, decrypts encryption information, obtains m ';
D) Li Si restores secret information using the sequence number value in f removal m '.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair
The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description
To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this
Made any modifications, equivalent replacements, and improvements etc., should be included in the claims in the present invention within the spirit and principle of invention
Protection scope within.
Claims (6)
1. a kind of hided transmission system based on block chain, including information transmitter Alice, information extraction person Bob and block
Chain node three classes participant and system initialization, message insertion and three modules of message extraction, it is characterised in that:
It is embedded in module and message extraction module in message, narrowband and two kinds of broadband subliminal channel is provided, wherein the narrowband
Subliminal channel is the subliminal channel based on Digital Signature Algorithm used in block chain, and the broadband subliminal channel is then to utilize block chain
In common recognition mechanism construction a kind of non real-time subliminal channel;The information transmitter Alice and information extraction person Bob
The letters such as the wallet address used in system initialization module confirmation subliminal channel used, block chain technology used and both sides
Breath;
Steps are as follows for the system flow:
A) the information transmitter Alice and information extraction person Bob passes through under system initialization module confirmation threshold used
Channel, block chain technology used, wallet address, the information transmitter Alice and the information extraction person used in both sides
Bob selects the shared secret of required negotiation when narrowband subliminal channel or selects the symmetric cryptography needed when the subliminal channel of broadband
The information such as algorithm and symmetric cryptographic key and sequence number value range;
If b) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, the information
Sender Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and is broadcast to area
Block chain node;If the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described
Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block, and broadcasts
Give block chain node;
If c) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, the information
Extractor Bob is traded as secret information recipient by block chain node, extracts secret letter using message extraction module
Cease m;Or if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, the letter
Extractor Bob is ceased as secret information recipient, block is obtained by block chain node, extracted using message extraction module secret
Information m.
2. a kind of hided transmission system based on block chain according to claim 1 the, wherein " information transmitter
The Alice and information extraction person Bob passes through system initialization module confirmation subliminal channel used, block chain skill used
Wallet address used in art, both sides, the information transmitter Alice and the information extraction person Bob select narrowband subliminal channel
When required negotiation shared secret or selection broadband subliminal channel when need symmetric encipherment algorithm, symmetric cryptographic key and
The information such as sequence number value range ";With following sub-step:
A1) the information transmitter Alice and information extraction person Bob passes through under system initialization module confirmation threshold used
Channel Technology;If the information transmitter Alice and the information extraction person Bob both sides negotiate using narrowband subliminal channel
Shared secret needed for subliminal channel based on Digital Signature Algorithm;If using broadband subliminal channel, the information transmitter
Alice and the information extraction person Bob both sides confirm that common recognition algorithm used is proof of work algorithm, and negotiate symmetric cryptography
Algorithm, symmetric cryptographic key and sequence number value range;
A2) the information transmitter Alice and information extraction person Bob exchanges respective one new wallet address.
3. a kind of hided transmission system based on block chain according to claim 1, wherein " if the information transmitter
Alice and the information extraction person Bob both sides use narrowband subliminal channel, and the information transmitter Alice is as secret information
Sender is embedded in module by message and classified information m is embedded in transaction, and is broadcast to block chain node ";With following sub-step
It is rapid:
B1) the information transmitter Alice generates a transaction and utilizes step during signing digital signature to transaction
A) shared secret consulted is embedded into secret information m in the signature;
B2) the information transmitter Alice broadcasts the transaction to block chain node;
B3) the legitimacy and validity of the transaction of information transmitter Alice described in block chain node verification;
B4) block chain node is packaged transaction, forms new block.
4. a kind of hided transmission system based on block chain according to claim 1, " if the information transmitter
Alice and the information extraction person Bob both sides use broadband subliminal channel, and the information transmitter Alice is as secret information
Sender is embedded in module by message and classified information m is embedded in block, and is broadcast to block chain node;" there is following sub-step
It is rapid:
B1 ') symmetric encipherment algorithm, symmetric cryptographic key that the information transmitter Alice utilizes step a) to consult, it encrypts secret
Confidential information m obtains ciphertext c;
B2 ') the information transmitter Alice cascades upper integer serial number i behind ciphertext c and obtains MiThat is Mi=(c | | i),
In, i is integer serial number, and 0≤i≤f, f are the sequence number value ranges that step a) is consulted, if i > f, selects next block embedding
Enter, i is set to 0;
B3 ') the information transmitter Alice is MiRandom number N once as calculation block;
B4 ') if block calculates failure, serial number i returns to step b), otherwise continues to execute from increasing 1;
B5 ') new block is broadcast to other block chain nodes by the information transmitter Alice;
B6 ') the block chain node verification block validity;
B7 ') be proved to be successful after, which is known as a block in block chain.
5. a kind of hided transmission system based on block chain according to claim 3, wherein " if the information transmitter
Alice and the information extraction person Bob both sides use narrowband subliminal channel, and the information extraction person Bob connects as secret information
Receptor is traded by block chain node, and extracting secret information m " using message extraction module has following sub-step:
C1) the information extraction person Bob obtains the transaction of Alice according to the wallet address of Alice in step a) in block chain;
C2) the information extraction person Bob obtains the digital signature of signature transaction by the Transaction Information of Alice;
C3) the information extraction person Bob verifies the legitimacy of above-mentioned transaction;
C4) the information extraction person Bob obtains secret information using the shared key negotiated in step a) from digital signature.
6. a kind of hided transmission system based on block chain according to claim 4, wherein " if the information transmitter
Alice and the information extraction person Bob both sides use broadband subliminal channel, and " the information extraction person Bob connects as secret information
Receptor obtains block by block chain node, and extracting secret information m " using message extraction module has following sub-step:
C1 ') the information extraction person Bob obtains Alice packing according to the wallet address of Alice in step a) in block chain
Block;
C2 ') the information extraction person Bob by the block information of Alice, obtains the Nonce value of Alice insertion encryption information;
C3 ') the information extraction person Bob good using offered decipherment algorithm and key, decrypt ciphertext c;
C4 ') the information extraction person Bob removes sequence number value, restore secret information m.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811049009.6A CN109257346B (en) | 2018-09-10 | 2018-09-10 | Concealed transmission system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811049009.6A CN109257346B (en) | 2018-09-10 | 2018-09-10 | Concealed transmission system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109257346A true CN109257346A (en) | 2019-01-22 |
CN109257346B CN109257346B (en) | 2021-04-16 |
Family
ID=65048150
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811049009.6A Active CN109257346B (en) | 2018-09-10 | 2018-09-10 | Concealed transmission system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109257346B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191111A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | The information concealing method and robot system verified based on big data and function |
CN111698222A (en) * | 2020-05-21 | 2020-09-22 | 扬州大学 | Covert communication method of special bitcoin address generated based on vanitygen |
CN112070496A (en) * | 2020-08-06 | 2020-12-11 | 中国科学院信息工程研究所 | Block chain hidden information transmission method and system based on dynamic marks |
CN112804046A (en) * | 2021-01-06 | 2021-05-14 | 中国科学院信息工程研究所 | Carrier-free steganography method and system based on block chain private key mapping |
CN113055187A (en) * | 2021-04-23 | 2021-06-29 | 山东新一代信息产业技术研究院有限公司 | Narrow-band line transmission method for block chain consensus |
CN113411301A (en) * | 2021-05-11 | 2021-09-17 | 山东浪潮科学研究院有限公司 | Block chain system based on narrow-band transmission |
CN113452735A (en) * | 2020-03-25 | 2021-09-28 | 济南浪潮高新科技投资发展有限公司 | Narrow-band transmission method and equipment based on block chain |
CN114389846A (en) * | 2021-12-15 | 2022-04-22 | 北京理工大学 | Data hidden transmission method based on block chain multi-transaction splitting |
CN114726509A (en) * | 2022-02-28 | 2022-07-08 | 北京理工大学 | Data hidden transmission method based on multi-block chain platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200563A (en) * | 2013-03-28 | 2013-07-10 | 重庆邮电大学 | Subliminal channel hiding communication method based on authentication code |
WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
CN106357410A (en) * | 2016-10-10 | 2017-01-25 | 中山大学 | Method for building subliminal channel on lattice signature without one-way trap door |
-
2018
- 2018-09-10 CN CN201811049009.6A patent/CN109257346B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200563A (en) * | 2013-03-28 | 2013-07-10 | 重庆邮电大学 | Subliminal channel hiding communication method based on authentication code |
WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
CN106357410A (en) * | 2016-10-10 | 2017-01-25 | 中山大学 | Method for building subliminal channel on lattice signature without one-way trap door |
Non-Patent Citations (2)
Title |
---|
DAVOR FRKAT等: "《ChainChannels Private Botnet Communication Over Public Blockchains》", 《2018 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA)》 * |
丁云亮: "《"观看"的语法:社会化阅读的具身认知及其意义建构》", 《出版发行研究》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191111A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | The information concealing method and robot system verified based on big data and function |
CN113452735B (en) * | 2020-03-25 | 2022-12-13 | 山东浪潮科学研究院有限公司 | Narrow-band transmission method and equipment based on block chain |
CN113452735A (en) * | 2020-03-25 | 2021-09-28 | 济南浪潮高新科技投资发展有限公司 | Narrow-band transmission method and equipment based on block chain |
CN111698222B (en) * | 2020-05-21 | 2022-06-07 | 扬州大学 | Covert communication method of special bitcoin address generated based on vanitygen |
CN111698222A (en) * | 2020-05-21 | 2020-09-22 | 扬州大学 | Covert communication method of special bitcoin address generated based on vanitygen |
CN112070496A (en) * | 2020-08-06 | 2020-12-11 | 中国科学院信息工程研究所 | Block chain hidden information transmission method and system based on dynamic marks |
CN112070496B (en) * | 2020-08-06 | 2024-03-19 | 中国科学院信息工程研究所 | Block chain hidden information transmission method and system based on dynamic marking |
CN112804046A (en) * | 2021-01-06 | 2021-05-14 | 中国科学院信息工程研究所 | Carrier-free steganography method and system based on block chain private key mapping |
CN113055187B (en) * | 2021-04-23 | 2023-02-03 | 山东新一代信息产业技术研究院有限公司 | Narrow-band line transmission method for block chain consensus |
CN113055187A (en) * | 2021-04-23 | 2021-06-29 | 山东新一代信息产业技术研究院有限公司 | Narrow-band line transmission method for block chain consensus |
CN113411301A (en) * | 2021-05-11 | 2021-09-17 | 山东浪潮科学研究院有限公司 | Block chain system based on narrow-band transmission |
CN114389846A (en) * | 2021-12-15 | 2022-04-22 | 北京理工大学 | Data hidden transmission method based on block chain multi-transaction splitting |
CN114389846B (en) * | 2021-12-15 | 2023-08-08 | 北京理工大学 | Data hidden transmission method based on block chain multi-transaction splitting |
CN114726509A (en) * | 2022-02-28 | 2022-07-08 | 北京理工大学 | Data hidden transmission method based on multi-block chain platform |
CN114726509B (en) * | 2022-02-28 | 2024-02-23 | 北京理工大学 | Data hidden transmission method based on multi-block chain platform |
Also Published As
Publication number | Publication date |
---|---|
CN109257346B (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109257346A (en) | Hided transmission system based on block chain | |
Nguyen et al. | Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey | |
CN106357396B (en) | Digital signature method and system and quantum key card | |
US6449473B1 (en) | Security method for transmissions in telecommunication networks | |
CN109743171B (en) | Key series method for solving multi-party digital signature, timestamp and encryption | |
US7907735B2 (en) | System and method of creating and sending broadcast and multicast data | |
CN110225016A (en) | A kind of data hiding transmission method based on block chain network | |
CN102724041B (en) | Steganography-based key transmission and key updating method | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
US6996724B2 (en) | Secret key generating method, common key generating method, encryption method, cryptographic communication method and cryptographic communication system | |
EP0661845B1 (en) | System and method for message authentication in a non-malleable public-key cryptosystem | |
US8688998B2 (en) | Resilent cryptographic scheme | |
CN108599925A (en) | A kind of modified AKA identity authorization systems and method based on quantum communication network | |
CN109951453A (en) | A kind of safe encryption method based on block chain | |
CN104618109B (en) | A kind of electric power terminal data safe transmission method based on digital signature | |
US20110320359A1 (en) | secure communication method and device based on application layer for mobile financial service | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN106411926A (en) | Data encryption communication method and system | |
CN110535626A (en) | The quantum communications service station secret communication method and system of identity-based | |
CN114726538B (en) | Hidden communication method based on block link signature | |
CN114493593B (en) | Multi-block chain hidden communication method | |
CN1905447B (en) | Authentication encryption method and E-mail system | |
CN110519226A (en) | Quantum communications server-side secret communication method and system based on unsymmetrical key pond and implicit certificate | |
CN101296077B (en) | Identity authentication system based on bus type topological structure | |
CN108933659A (en) | A kind of authentication system and verification method of smart grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |