CN109257346A - Hided transmission system based on block chain - Google Patents

Hided transmission system based on block chain Download PDF

Info

Publication number
CN109257346A
CN109257346A CN201811049009.6A CN201811049009A CN109257346A CN 109257346 A CN109257346 A CN 109257346A CN 201811049009 A CN201811049009 A CN 201811049009A CN 109257346 A CN109257346 A CN 109257346A
Authority
CN
China
Prior art keywords
information
block chain
alice
bob
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811049009.6A
Other languages
Chinese (zh)
Other versions
CN109257346B (en
Inventor
张方国
刘志杰
李会格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN201811049009.6A priority Critical patent/CN109257346B/en
Publication of CN109257346A publication Critical patent/CN109257346A/en
Application granted granted Critical
Publication of CN109257346B publication Critical patent/CN109257346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a kind of hided transmission system based on block chain, including system initialization module, message is embedded in module and message extraction module.It is embedded in module and message extraction module in message, the present invention provides narrowbands and two kinds of broadband subliminal channel, wherein narrowband subliminal channel is the subliminal channel based on Digital Signature Algorithm used in block chain, and broadband subliminal channel is then a kind of non real-time subliminal channel using the common recognition mechanism construction in block chain.The invention enables receiving-transmitting sides can complete twin-channel hided transmission by block chain, has preferable concealment and robustness.

Description

Hided transmission system based on block chain
Technical field
The present invention relates to information security fields, more particularly to the hided transmission system on block chain.
Background technique
With the rapid development of internet, the information exchange of people is more and more frequent, in order to ensure information in interactive mistake The demands such as concealment, robustness in journey, people also require to be increasingly stringenter to the information transmission system.The system of information transmission at present There are many building methods for system, wherein can effectively be ensured in transmission process using the hided transmission system of private communication channel building The concealment and robustness of information.
The concept of private communication channel is initially to be proposed by Lampson in 1973, the private communication channel provided is defined as: be not It is designed or is not intended to the communication channel for transmitting information.Private communication channel has been widely used in the network information now Data security transmission.Private communication channel has different building methods according to different applications.
Subliminal channel is a kind of private communication channel using digital signature as carrier, which is introduced by Simmons first.It can It is embedded in secret information in general digital signature, and secret recipient, possessing the verifier of decruption key, can to restore this secret Confidential information.The basic conception of subliminal channel can be described by " convict " problem of Simmons, entered equipped with Alice and Bob Prison, their unique communication modes be by transmit message, but watchman Warden serve as transmitting message go-between, he monitor The message of all transmitting, to check Alice and Bob whether in the discussion plan of escaping.Meanwhile to prevent Warden from pretending to be Alice or Bob and counterparting communications, Alice and Bob will identify the identity of communication counterpart, therefore the available number with subliminal channel Endorsement method can meet above all of requirement.
The features such as decentralization that block chain itself has, information can not distort, are open have block chain can also Effect serves as the carrier of a subliminal channel, because having used Digital Signature Algorithm in block chain technology.Meanwhile the letter in block chain Breath has opening, anyone can obtain in the chain the signing messages of Transaction Information He the transaction, but only possess The user of decruption key could recover secret information from the digital signature.
In fact, the agreement can be used to construct private communication channel if an agreement has used random number.Block chain skill Common recognition mechanism algorithm in art be based on or combine proof of work, therefore the mechanism can also be used to construction private communication channel, Because the common recognition mechanism algorithm generally requires to choose a random number.Secret information recipient can obtain from disclosed block information To the random number, then goes to decrypt the random number using key, therefrom recover secret information.Non-secret information is received Person, they fail to decrypt correctly random number.However this method successfully the probability is relatively small because in block chain miner choose with Machine number must satisfy certain condition, and subsequent the whole network just accepts which create a new blocks;Otherwise, the whole network will not receive the mine The calculated result of work.
Based on background above technology, the present invention is based on block chains to devise a kind of hided transmission system, is letter with block chain Carrier is ceased, provides two kinds of channels for system message insertion module and message extraction module, improves the robustness of hided transmission and hidden Covering property provides feasible method to share private data on block chain.
Summary of the invention
The invention discloses a kind of hided transmission systems based on block chain, are related to information transmitter Alice, information extraction Person Bob and block chain node three classes participant, including system initialization, message insertion and three modules of message extraction.It is special Sign is: being embedded in module and message extraction module in message, narrowband and two kinds of broadband subliminal channel is provided, wherein described narrow It is the subliminal channel based on Digital Signature Algorithm used in block chain with subliminal channel, the broadband subliminal channel is then to utilize block A kind of non real-time subliminal channel of common recognition mechanism construction in chain;The information transmitter Alice and the information extraction person Wallet address used in system initialization module confirmation subliminal channel used, block chain technology used and both sides Bob etc. Information;
Steps are as follows for the system flow:
A) the information transmitter Alice and information extraction person Bob passes through used in system initialization module confirmation Subliminal channel, block chain technology used, wallet address, the information transmitter Alice and the information mention used in both sides Taker Bob selects the shared secret of required negotiation when narrowband subliminal channel or selects to need when the subliminal channel of broadband symmetrical The information such as Encryption Algorithm and symmetric cryptographic key and sequence number value range;
If b) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and broadcasts Give block chain node;If the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, " the information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block, And it is broadcast to block chain node;
If c) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described Information extraction person Bob is traded as secret information recipient by block chain node, is extracted using message extraction module secret Confidential information m;Or if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, " the information extraction person Bob obtains block by block chain node as secret information recipient, is mentioned using message extraction module Take secret information m.
" the information transmitter Alice and the information extraction person Bob are true by system initialization module by the step a) Wallet address, the information transmitter Alice and institute used in subliminal channel, block chain technology used, both sides used in recognizing It is needed when the shared secret or selection broadband subliminal channel of required negotiation when stating information extraction person Bob selection narrowband subliminal channel The information such as symmetric encipherment algorithm, symmetric cryptographic key and the sequence number value range wanted " specifically:
A1) the information transmitter Alice and information extraction person Bob passes through used in system initialization module confirmation Subliminal channel technology;If using narrowband subliminal channel, the information transmitter Alice and the information extraction person Bob both sides Shared secret needed for negotiating the subliminal channel based on Digital Signature Algorithm;If using broadband subliminal channel, the information hair The person of sending Alice and the information extraction person Bob both sides confirm that common recognition algorithm used is proof of work algorithm, and negotiate symmetrical Encryption Algorithm, symmetric cryptographic key and sequence number value range;
A2) the information transmitter Alice and information extraction person Bob exchanges respective one new wallet address.
If " the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and broadcasts Give block chain node " specifically:
B1) the information transmitter Alice generates a transaction, during signing digital signature to transaction, utilizes The shared secret that step a) is consulted is embedded into secret information m in the signature;
B2) the information transmitter Alice broadcasts the transaction to block chain node;
B3) the legitimacy and validity of the transaction of information transmitter Alice described in block chain node verification;
B4) block chain node is packaged transaction, forms new block.
If " the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block, and broadcasts Give block chain node " specifically:
B1 ') symmetric encipherment algorithm, symmetric cryptographic key that the information transmitter Alice utilizes step a) to consult, add Close secret information m, obtains ciphertext c;
B2 ') the information transmitter Alice cascades upper integer serial number i behind ciphertext c and obtains MiThat is Mi=(c | | I), wherein i is integer serial number, and 0≤i≤f, f are the sequence number value ranges that step a) is consulted, if i > f, selects next area Block insertion, i are set to 0;
B3 ') the information transmitter Alice is MiRandom number N once as calculation block;
B4 ') if block calculates failure, serial number i returns to step b), otherwise continues to execute from increasing 1;
B5 ') new block is broadcast to other block chain nodes by the information transmitter Alice;
B6 ') the block chain node verification block validity;
B7 ') be proved to be successful after, which is known as a block in block chain.
If " the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, described Information extraction person Bob is traded as secret information recipient by block chain node, is extracted using message extraction module secret Confidential information m " specifically:
C1) the information extraction person Bob obtains Alice's according to the wallet address of Alice in step a) in block chain Transaction;
C2) the information extraction person Bob obtains the digital signature of signature transaction by the Transaction Information of Alice;
C3) the information extraction person Bob verifies the legitimacy of above-mentioned transaction;
C4) the information extraction person Bob obtains secret letter using the shared key negotiated in step a) from digital signature Breath.
If " the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described Information extraction person Bob obtains block by block chain node as secret information recipient, is extracted using message extraction module secret Confidential information m " includes following sub-step:
C1 ') the information extraction person Bob obtains Alice according to the wallet address of Alice in step a) in block chain and beats The block of packet;
C2 ') the information extraction person Bob by the block information of Alice, obtains the Nonce of Alice insertion encryption information Value;
C3 ') the information extraction person Bob good using offered decipherment algorithm and key, decrypt ciphertext c;
C4 ') the information extraction person Bob removes sequence number value, restore secret information m.
The invention enables receiving-transmitting sides can complete twin-channel hided transmission by block chain, has preferable concealment And robustness.
Detailed description of the invention
Hided transmission system of the Fig. 1 based on block chain.
Specific embodiment
A kind of hided transmission system based on block chain, is related to information transmitter Alice, information extraction person Bob and area Block chain node three classes participant, including system initialization, message insertion and three modules of message extraction.Specific implementation step includes Below: Alice and Bob passes through under system initialization module confirmation subliminal channel used, block chain technology used, narrowband threshold Symmetric encipherment algorithm, symmetric cryptographic key and the sequence number value needed under the shared secret or broadband subliminal channel that are needed under channel Range, the information such as wallet address used in both sides;Alice is embedded in module by message and classified information m is embedded in transaction or block In, and it is broadcast to block chain node;Bob is traded by block chain node or block, is extracted using message extraction module secret Confidential information.System of the invention is specifically illustrated with an example below.
Embodiment one
Assuming that Zhang San and Li Si are owned by the wallet of bit coin, and Zhang San needs to send classified information to Li Si.Zhang San and The subliminal channel and the information respectively needed that Li Si's offered uses well, then Zhang San and Li Si are each by system initialization Module inputs corresponding informance, initializes system;Zhang San is embedded in module by message and classified information is embedded in transaction or block, and It is broadcast to block chain node;Li Si is traded by block chain node or block, extracts secret letter using message extraction module Breath.The participant of this example are as follows: Zhang San (Alice), Li Si (Bob) and block chain node.
The implementation process for completing above-mentioned requirements is as follows:
1. in system initialization module:
If 1) both sides use narrowband subliminal channel, Zhang San and Li Si both sides negotiate to believe under the threshold based on Digital Signature Algorithm Shared secret k needed for road;
If 2) both sides use broadband subliminal channel, Zhang San and Li Si both sides confirm that common recognition algorithm used is workload card Bright algorithm, and negotiate symmetric encipherment algorithm AES, symmetric cryptographic key k and sequence number value range f;
3) Zhang San and Li Si exchange respective one new wallet address.
2. message is embedded in module:
1) if both sides use narrowband subliminal channel:
A) Zhang San drafts the secret information m for needing to inform Li Si;
B) Zhang San enables ms=m+k, msAs random number used in signature transaction digital signature;
C) Zhang San initiates a transaction j in block chain, during which signs a digital signature to transaction, steps are as follows:
A. m is calculatedsG=(x, y), r=x mod n;Wherein G is basic point, and n is the rank of G;
B. e=hash (j) is calculated;
C. it calculatesWherein dAFor signature private key;
D. (j, r, s) is used as signature result;
D) Zhang San broadcasts the transaction to block chain node;
E) legitimacy and validity of block chain node verification Zhang San transaction;
F) block chain node is packaged transaction, forms new block.
2) if both sides use broadband subliminal channel:
A) Zhang San drafts the secret information m for needing to inform Li Si;
B) Zhang San obtains c using the key k and Encryption Algorithm AES consulted, secret encryption information m;
C) Zhang San cascades upper integer serial number i behind c and obtains MiThat is Mi=(c | | i), wherein i be integer serial number 0≤ I≤f, f are the sequence number value ranges that step S1 is consulted, if i > f, next block are selected to be embedded in, i is set to 0;
D) Zhang San is MiRandom number N once as calculation block;
If e) block calculates failure, serial number i returns to step c), otherwise continues to execute from increasing 1;
F) new block is broadcast to other block chain nodes by Zhang San;
G) validity of the block chain node verification block;
H) after being proved to be successful, which is known as a block in block chain.
3. message extraction module
1) if both sides use narrowband subliminal channel:
A) Li Si obtains the transaction of Zhang San according to the wallet address of Zhang San in block chain;
B) Li Si obtains the digital signature of signature transaction by the Transaction Information of Zhang San;
C) Li Si verifies the legitimacy of above-mentioned transaction;
D) Li Si obtains secret information using the shared key k negotiated, and steps are as follows:
A. w=s is calculated-1mod n;
B. e=hash (j) is calculated;
C. t is calculated1=we mod n;
D. t is calculated2=wr mod n
E. T=(u, v)=t is calculated1G+t2PK, wherein PK is the public key of Alice;
F. R=T-kG=mG is calculated;
G. the discrete logarithm problem of mG is solved to secret information m, and wherein the bit length of m is smaller, and discrete logarithm is asked Topic is easy to solve.
2) if both sides use broadband subliminal channel:
A) Li Si obtains the block of Zhang San's packing according to the wallet address of Zhang San in block chain;
B) Li Si obtains the Nonce value that Zhang San is embedded in encryption information by the block information of Zhang San;
C) the Li Si decipherment algorithm AES and key k good using offered, decrypts encryption information, obtains m ';
D) Li Si restores secret information using the sequence number value in f removal m '.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this Made any modifications, equivalent replacements, and improvements etc., should be included in the claims in the present invention within the spirit and principle of invention Protection scope within.

Claims (6)

1. a kind of hided transmission system based on block chain, including information transmitter Alice, information extraction person Bob and block Chain node three classes participant and system initialization, message insertion and three modules of message extraction, it is characterised in that:
It is embedded in module and message extraction module in message, narrowband and two kinds of broadband subliminal channel is provided, wherein the narrowband Subliminal channel is the subliminal channel based on Digital Signature Algorithm used in block chain, and the broadband subliminal channel is then to utilize block chain In common recognition mechanism construction a kind of non real-time subliminal channel;The information transmitter Alice and information extraction person Bob The letters such as the wallet address used in system initialization module confirmation subliminal channel used, block chain technology used and both sides Breath;
Steps are as follows for the system flow:
A) the information transmitter Alice and information extraction person Bob passes through under system initialization module confirmation threshold used Channel, block chain technology used, wallet address, the information transmitter Alice and the information extraction person used in both sides Bob selects the shared secret of required negotiation when narrowband subliminal channel or selects the symmetric cryptography needed when the subliminal channel of broadband The information such as algorithm and symmetric cryptographic key and sequence number value range;
If b) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, the information Sender Alice is embedded in module by message as sender of secret information and classified information m is embedded in transaction, and is broadcast to area Block chain node;If the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, described Information transmitter Alice is embedded in module by message as sender of secret information and classified information m is embedded in block, and broadcasts Give block chain node;
If c) the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, the information Extractor Bob is traded as secret information recipient by block chain node, extracts secret letter using message extraction module Cease m;Or if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, the letter Extractor Bob is ceased as secret information recipient, block is obtained by block chain node, extracted using message extraction module secret Information m.
2. a kind of hided transmission system based on block chain according to claim 1 the, wherein " information transmitter The Alice and information extraction person Bob passes through system initialization module confirmation subliminal channel used, block chain skill used Wallet address used in art, both sides, the information transmitter Alice and the information extraction person Bob select narrowband subliminal channel When required negotiation shared secret or selection broadband subliminal channel when need symmetric encipherment algorithm, symmetric cryptographic key and The information such as sequence number value range ";With following sub-step:
A1) the information transmitter Alice and information extraction person Bob passes through under system initialization module confirmation threshold used Channel Technology;If the information transmitter Alice and the information extraction person Bob both sides negotiate using narrowband subliminal channel Shared secret needed for subliminal channel based on Digital Signature Algorithm;If using broadband subliminal channel, the information transmitter Alice and the information extraction person Bob both sides confirm that common recognition algorithm used is proof of work algorithm, and negotiate symmetric cryptography Algorithm, symmetric cryptographic key and sequence number value range;
A2) the information transmitter Alice and information extraction person Bob exchanges respective one new wallet address.
3. a kind of hided transmission system based on block chain according to claim 1, wherein " if the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, and the information transmitter Alice is as secret information Sender is embedded in module by message and classified information m is embedded in transaction, and is broadcast to block chain node ";With following sub-step It is rapid:
B1) the information transmitter Alice generates a transaction and utilizes step during signing digital signature to transaction A) shared secret consulted is embedded into secret information m in the signature;
B2) the information transmitter Alice broadcasts the transaction to block chain node;
B3) the legitimacy and validity of the transaction of information transmitter Alice described in block chain node verification;
B4) block chain node is packaged transaction, forms new block.
4. a kind of hided transmission system based on block chain according to claim 1, " if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, and the information transmitter Alice is as secret information Sender is embedded in module by message and classified information m is embedded in block, and is broadcast to block chain node;" there is following sub-step It is rapid:
B1 ') symmetric encipherment algorithm, symmetric cryptographic key that the information transmitter Alice utilizes step a) to consult, it encrypts secret Confidential information m obtains ciphertext c;
B2 ') the information transmitter Alice cascades upper integer serial number i behind ciphertext c and obtains MiThat is Mi=(c | | i), In, i is integer serial number, and 0≤i≤f, f are the sequence number value ranges that step a) is consulted, if i > f, selects next block embedding Enter, i is set to 0;
B3 ') the information transmitter Alice is MiRandom number N once as calculation block;
B4 ') if block calculates failure, serial number i returns to step b), otherwise continues to execute from increasing 1;
B5 ') new block is broadcast to other block chain nodes by the information transmitter Alice;
B6 ') the block chain node verification block validity;
B7 ') be proved to be successful after, which is known as a block in block chain.
5. a kind of hided transmission system based on block chain according to claim 3, wherein " if the information transmitter Alice and the information extraction person Bob both sides use narrowband subliminal channel, and the information extraction person Bob connects as secret information Receptor is traded by block chain node, and extracting secret information m " using message extraction module has following sub-step:
C1) the information extraction person Bob obtains the transaction of Alice according to the wallet address of Alice in step a) in block chain;
C2) the information extraction person Bob obtains the digital signature of signature transaction by the Transaction Information of Alice;
C3) the information extraction person Bob verifies the legitimacy of above-mentioned transaction;
C4) the information extraction person Bob obtains secret information using the shared key negotiated in step a) from digital signature.
6. a kind of hided transmission system based on block chain according to claim 4, wherein " if the information transmitter Alice and the information extraction person Bob both sides use broadband subliminal channel, and " the information extraction person Bob connects as secret information Receptor obtains block by block chain node, and extracting secret information m " using message extraction module has following sub-step:
C1 ') the information extraction person Bob obtains Alice packing according to the wallet address of Alice in step a) in block chain Block;
C2 ') the information extraction person Bob by the block information of Alice, obtains the Nonce value of Alice insertion encryption information;
C3 ') the information extraction person Bob good using offered decipherment algorithm and key, decrypt ciphertext c;
C4 ') the information extraction person Bob removes sequence number value, restore secret information m.
CN201811049009.6A 2018-09-10 2018-09-10 Concealed transmission system based on block chain Active CN109257346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811049009.6A CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811049009.6A CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Publications (2)

Publication Number Publication Date
CN109257346A true CN109257346A (en) 2019-01-22
CN109257346B CN109257346B (en) 2021-04-16

Family

ID=65048150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811049009.6A Active CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Country Status (1)

Country Link
CN (1) CN109257346B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191111A (en) * 2019-05-29 2019-08-30 华南师范大学 The information concealing method and robot system verified based on big data and function
CN111698222A (en) * 2020-05-21 2020-09-22 扬州大学 Covert communication method of special bitcoin address generated based on vanitygen
CN112070496A (en) * 2020-08-06 2020-12-11 中国科学院信息工程研究所 Block chain hidden information transmission method and system based on dynamic marks
CN112804046A (en) * 2021-01-06 2021-05-14 中国科学院信息工程研究所 Carrier-free steganography method and system based on block chain private key mapping
CN113055187A (en) * 2021-04-23 2021-06-29 山东新一代信息产业技术研究院有限公司 Narrow-band line transmission method for block chain consensus
CN113411301A (en) * 2021-05-11 2021-09-17 山东浪潮科学研究院有限公司 Block chain system based on narrow-band transmission
CN113452735A (en) * 2020-03-25 2021-09-28 济南浪潮高新科技投资发展有限公司 Narrow-band transmission method and equipment based on block chain
CN114389846A (en) * 2021-12-15 2022-04-22 北京理工大学 Data hidden transmission method based on block chain multi-transaction splitting
CN114726509A (en) * 2022-02-28 2022-07-08 北京理工大学 Data hidden transmission method based on multi-block chain platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200563A (en) * 2013-03-28 2013-07-10 重庆邮电大学 Subliminal channel hiding communication method based on authentication code
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN106357410A (en) * 2016-10-10 2017-01-25 中山大学 Method for building subliminal channel on lattice signature without one-way trap door

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200563A (en) * 2013-03-28 2013-07-10 重庆邮电大学 Subliminal channel hiding communication method based on authentication code
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN106357410A (en) * 2016-10-10 2017-01-25 中山大学 Method for building subliminal channel on lattice signature without one-way trap door

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DAVOR FRKAT等: "《ChainChannels Private Botnet Communication Over Public Blockchains》", 《2018 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA)》 *
丁云亮: "《"观看"的语法:社会化阅读的具身认知及其意义建构》", 《出版发行研究》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191111A (en) * 2019-05-29 2019-08-30 华南师范大学 The information concealing method and robot system verified based on big data and function
CN113452735B (en) * 2020-03-25 2022-12-13 山东浪潮科学研究院有限公司 Narrow-band transmission method and equipment based on block chain
CN113452735A (en) * 2020-03-25 2021-09-28 济南浪潮高新科技投资发展有限公司 Narrow-band transmission method and equipment based on block chain
CN111698222B (en) * 2020-05-21 2022-06-07 扬州大学 Covert communication method of special bitcoin address generated based on vanitygen
CN111698222A (en) * 2020-05-21 2020-09-22 扬州大学 Covert communication method of special bitcoin address generated based on vanitygen
CN112070496A (en) * 2020-08-06 2020-12-11 中国科学院信息工程研究所 Block chain hidden information transmission method and system based on dynamic marks
CN112070496B (en) * 2020-08-06 2024-03-19 中国科学院信息工程研究所 Block chain hidden information transmission method and system based on dynamic marking
CN112804046A (en) * 2021-01-06 2021-05-14 中国科学院信息工程研究所 Carrier-free steganography method and system based on block chain private key mapping
CN113055187B (en) * 2021-04-23 2023-02-03 山东新一代信息产业技术研究院有限公司 Narrow-band line transmission method for block chain consensus
CN113055187A (en) * 2021-04-23 2021-06-29 山东新一代信息产业技术研究院有限公司 Narrow-band line transmission method for block chain consensus
CN113411301A (en) * 2021-05-11 2021-09-17 山东浪潮科学研究院有限公司 Block chain system based on narrow-band transmission
CN114389846A (en) * 2021-12-15 2022-04-22 北京理工大学 Data hidden transmission method based on block chain multi-transaction splitting
CN114389846B (en) * 2021-12-15 2023-08-08 北京理工大学 Data hidden transmission method based on block chain multi-transaction splitting
CN114726509A (en) * 2022-02-28 2022-07-08 北京理工大学 Data hidden transmission method based on multi-block chain platform
CN114726509B (en) * 2022-02-28 2024-02-23 北京理工大学 Data hidden transmission method based on multi-block chain platform

Also Published As

Publication number Publication date
CN109257346B (en) 2021-04-16

Similar Documents

Publication Publication Date Title
CN109257346A (en) Hided transmission system based on block chain
Nguyen et al. Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
CN106357396B (en) Digital signature method and system and quantum key card
US6449473B1 (en) Security method for transmissions in telecommunication networks
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
US7907735B2 (en) System and method of creating and sending broadcast and multicast data
CN110225016A (en) A kind of data hiding transmission method based on block chain network
CN102724041B (en) Steganography-based key transmission and key updating method
CN105162599B (en) A kind of data transmission system and its transmission method
US6996724B2 (en) Secret key generating method, common key generating method, encryption method, cryptographic communication method and cryptographic communication system
EP0661845B1 (en) System and method for message authentication in a non-malleable public-key cryptosystem
US8688998B2 (en) Resilent cryptographic scheme
CN108599925A (en) A kind of modified AKA identity authorization systems and method based on quantum communication network
CN109951453A (en) A kind of safe encryption method based on block chain
CN104618109B (en) A kind of electric power terminal data safe transmission method based on digital signature
US20110320359A1 (en) secure communication method and device based on application layer for mobile financial service
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN106411926A (en) Data encryption communication method and system
CN110535626A (en) The quantum communications service station secret communication method and system of identity-based
CN114726538B (en) Hidden communication method based on block link signature
CN114493593B (en) Multi-block chain hidden communication method
CN1905447B (en) Authentication encryption method and E-mail system
CN110519226A (en) Quantum communications server-side secret communication method and system based on unsymmetrical key pond and implicit certificate
CN101296077B (en) Identity authentication system based on bus type topological structure
CN108933659A (en) A kind of authentication system and verification method of smart grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant