CN109257346B - Concealed transmission system based on block chain - Google Patents

Concealed transmission system based on block chain Download PDF

Info

Publication number
CN109257346B
CN109257346B CN201811049009.6A CN201811049009A CN109257346B CN 109257346 B CN109257346 B CN 109257346B CN 201811049009 A CN201811049009 A CN 201811049009A CN 109257346 B CN109257346 B CN 109257346B
Authority
CN
China
Prior art keywords
information
bob
alice
secret
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811049009.6A
Other languages
Chinese (zh)
Other versions
CN109257346A (en
Inventor
张方国
刘志杰
李会格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN201811049009.6A priority Critical patent/CN109257346B/en
Publication of CN109257346A publication Critical patent/CN109257346A/en
Application granted granted Critical
Publication of CN109257346B publication Critical patent/CN109257346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a block chain-based covert transmission system, which comprises a system initialization module, a message embedding module and a message extraction module. In the message embedding module and the message extracting module, the invention provides two subthreshold channels of a narrow band and a wide band, wherein the narrow band subthreshold channel is the subthreshold channel based on a digital signature algorithm used by a block chain, and the wide band subthreshold channel is a non-real-time subthreshold channel constructed by utilizing a consensus mechanism in the block chain. The invention enables the two parties of the transceiver to complete the two-channel covert transmission through the block chain, and has better concealment and robustness.

Description

Concealed transmission system based on block chain
Technical Field
The invention relates to the field of information security, in particular to a concealed transmission system on a block chain.
Background
With the rapid development of the internet, information interaction of people is more and more frequent, and in order to ensure the requirements of concealment, robustness and the like of information in the interaction process, the requirements of people on an information transmission system are more and more strict. At present, the information transmission system has a plurality of construction methods, wherein the concealment transmission system constructed by using a concealment channel can effectively ensure the concealment and the robustness of information in the transmission process.
The concept of covert channel was originally proposed by Lampson in 1973, which gives the definition of covert channel as: is not a communication channel designed or intended to transmit information. Covert channels have now been widely used for secure transmission of network information data. The hidden channel has different construction methods according to different application occasions.
The subliminal channel is a covert channel with digital signatures as the carrier, the concept first introduced by Simmons. It can embed secret information in a general digital signature, which can be recovered by a secret receiver, a verifier possessing a decryption key. The basic concept of the subliminal channel can be described by the "criminal" problem of Simmons, with Alice and Bob having entered the prison, the only way they communicate is by passing the text, but a gatekeeper, Warden, acts as an intermediary in passing the text, monitoring all the passed text to see if Alice and Bob are in a business flight plan. Meanwhile, in order to prevent Warden from impersonating Alice or Bob to communicate with the other party, Alice and Bob need to authenticate the identity of the communication party, so that all the above requirements can be met by using a digital signature method with a subthreshold channel.
The characteristics of decentralization, information non-tampering, openness and the like of the block chain enable the block chain to effectively serve as a carrier of a subthreshold channel, because a digital signature algorithm is used in the block chain technology. Meanwhile, the information in the block chain has openness, and anyone can acquire the transaction information and the signature information of the transaction in the chain, but only a user with a decryption key can recover the secret information from the digital signature.
In fact, if a random number is used by a protocol, then the protocol can be used to construct the covert channel. The consensus algorithm in the blockchain technique is based on or combined with workload certification, so the mechanism can also be used to construct blind channels, because the consensus algorithm usually needs to choose a random number. The secret information receiver can obtain the random number from the public block information, and then decrypt the random number by using the secret key to recover the secret information. For non-secret information recipients, they cannot decrypt the random number correctly. However, the success probability of the method is relatively low, because the random number selected by miners in the block chain must meet a certain condition, and then the whole network recognizes that a new block is created; otherwise, the whole network will not receive the calculation result of the miner.
Based on the background technology, the invention designs a hidden transmission system based on the block chain, takes the block chain as an information carrier, provides two channels for a system message embedding module and a system message extracting module, improves the robustness and the concealment of hidden transmission, and provides a feasible method for sharing private data on the block chain.
Disclosure of Invention
The invention discloses a block chain-based covert transmission system, which relates to three types of participants of an information sender Alice, an information extractor Bob and a block chain node, and comprises three modules of system initialization, information embedding and information extraction. The method is characterized in that: in the message embedding module and the message extracting module, two subthreshold channels of a narrow band and a wide band are provided, wherein the narrow band subthreshold channel is a subthreshold channel based on a digital signature algorithm used by a block chain, and the wide band subthreshold channel is a non-real-time subthreshold channel constructed by utilizing a common recognition mechanism in the block chain; the information sender Alice and the information extractor Bob confirm information such as used subliminal channels, used block chain technology, used wallet addresses of the two parties and the like in a system initialization module;
the system comprises the following steps:
a) the information sender Alice and the information extractor Bob confirm information such as used subliminal channels, used block chain technology, wallet addresses used by both parties, shared secrets required to be negotiated when the information sender Alice and the information extractor Bob select narrow-band subliminal channels or symmetric encryption algorithms and symmetric encryption keys and sequence number value ranges required when the information sender Alice and the information extractor Bob select broadband subliminal channels through a system initialization module;
b) if the information sender Alice and the information extractor Bob both adopt narrow-band subthreshold channels, the information sender Alice serving as a secret information sender embeds a secret message m into a transaction through a message embedding module and broadcasts the secret message m to a block chain node; if the information sender Alice and the information extractor Bob both adopt a broadband subthreshold channel, the information sender Alice serving as a secret information sender embeds a secret message m into a block through a message embedding module and broadcasts the secret message m to a block chain node;
c) if the information sender Alice and the information extractor Bob both adopt narrow-band subthreshold channels, the information extractor Bob is used as a secret information receiver to obtain transactions through a block chain node, and a message extraction module is used for extracting secret information m; or if the information sender Alice and the information extractor Bob both adopt broadband subthreshold channels, the information extractor Bob is used as a secret information receiver to obtain blocks through a block chain node, and a message extraction module is used for extracting secret information m.
The step a) "the information sender Alice and the information extractor Bob confirm the used subliminal channel, the used blockchain technique, the wallet addresses used by both parties, the shared secret required to be negotiated when the information sender Alice and the information extractor Bob select the narrow-band subliminal channel or the information required by the selection of the wide-band subliminal channel, the symmetric encryption key, the sequence number value range, and the like through the system initialization module" specifically includes:
a1) the information sender Alice and the information extractor Bob confirm the used subliminal channel technology through a system initialization module; if a narrow-band subthreshold channel is adopted, the information sender Alice and the information extractor Bob both negotiate a shared secret required by the subthreshold channel based on a digital signature algorithm; if a broadband subthreshold channel is adopted, both the information sender Alice and the information extractor Bob confirm that the used consensus algorithm is a workload proving algorithm, and negotiate a symmetric encryption algorithm, a symmetric encryption key and a sequence number value range;
a2) the information sender Alice and the information retriever Bob exchange a new wallet address each.
If the information sender Alice and the information extractor Bob both use narrow-band subthreshold channels, the information sender Alice serving as a secret information sender embeds a secret message m into a transaction through a message embedding module and broadcasts the secret message m to a block chain node, which is specifically as follows:
b1) the information sender Alice generates a transaction, and during signing a digital signature for the transaction, embeds secret information m into the signature by using the shared secret negotiated in the step a);
b2) the message sender Alice broadcasts the transaction to the block link points;
b3) verifying the validity and validity of the Alice transaction of the information sender by the blockchain node;
b4) and (4) performing block link point packaging transaction to form a new block.
If the information sender Alice and the information extractor Bob both use the broadband subthreshold channel, the information sender Alice as the secret information sender embeds the secret message m into the block through the message embedding module and broadcasts the secret message m to the block chain node, which is specifically as follows:
b 1') the information sender Alice encrypts the secret information m by using the symmetric encryption algorithm and the symmetric encryption key negotiated in the step a) to obtain a ciphertext c;
b 2') the sender Alice concatenates the ciphertext c with an integer sequence number i to obtain MiNamely MiIf i is greater than f, selecting the next block for embedding, and setting i as 0;
b 3') the sender of information Alice sends MiA random number Nonce as a calculation block;
b 4'), if the block calculation fails, the sequence number i is increased by 1, and the step b) is returned, otherwise, the execution is continued;
b 5') the sender of information Alice broadcasts new blocks to other blockchain nodes;
b 6') the block link points verify the validity of the block;
b 7'), the block is called a block in the block chain.
If the information sender Alice and the information extractor Bob both use a narrow-band subthreshold channel, the information extractor Bob as a secret information receiver obtains the transaction through a block chain node, and extracts the secret information m by using a message extraction module specifically comprises the following steps:
c1) the information extractor Bob obtains the transaction of Alice in the blockchain according to the wallet address of Alice in the step a);
c2) the information extractor Bob obtains a digital signature for signing the transaction through the transaction information of Alice;
c3) the information extractor Bob verifies the validity of the transaction;
c4) the information extractor Bob obtains the secret information from the digital signature using the shared key negotiated in step a).
If the information sender Alice and the information extractor Bob both use the broadband subthreshold channel, the information extractor Bob is used as a secret information receiver to obtain blocks through a block chain node, and a message extraction module is used for extracting secret information m, and the method comprises the following substeps:
c 1') the information extractor Bob obtains Alice-packaged blocks in the block chain according to the wallet address of Alice in the step a);
c2 '), the information extractor Bob obtains the Nonce value of Alice embedding the encrypted information through Alice's block information;
c 3') the information extractor Bob decrypts the ciphertext c by using a previously negotiated decryption algorithm and key;
c 4') the information extractor Bob removes the sequence number value and restores the secret information m.
The invention enables the two parties of the transceiver to complete the two-channel covert transmission through the block chain, and has better concealment and robustness.
Drawings
Fig. 1 is a block chain based covert transmission system.
Detailed Description
A block chain-based covert transmission system relates to three types of participants including an information sender Alice, an information extractor Bob and a block chain node, and comprises three modules, namely a system initialization module, an information embedding module and an information extraction module. The specific implementation steps comprise the following steps: alice and Bob confirm information such as used subliminal channels, used block chain technology, shared secrets required under narrow-band subliminal channels or symmetric encryption algorithms, symmetric encryption keys and sequence number value ranges required under broadband subliminal channels, and wallet addresses used by both parties through a system initialization module; the method comprises the following steps that Alice embeds a secret message m into a transaction or a block through a message embedding module and broadcasts the secret message m to a block chain node; bob obtains the transaction or the block through the block chain node, and extracts the secret information by using the message extraction module. The system of the present invention is specifically illustrated below by way of an example.
Example one
Suppose that both zhang three and lie four have purses of bitcoins, and zhang three needs to send a secret message to lie four. Zhang III and Li IV negotiate the subthreshold channel used and the information needed by the Zhang III and Li IV in advance, and then the Zhang III and Li IV respectively input corresponding information through a system initialization module to initialize the system; the tee embeds the secret message into the transaction or the block through a message embedding module and broadcasts the secret message to a block chain node; and fourthly, obtaining the transaction or the block through the block chain node, and extracting the secret information by using the message extraction module. The participants for this example are: zhang three (Alice), lie four (Bob), and a blockchain node.
The implementation process for achieving the requirements is as follows:
1. in a system initialization module:
1) if the two parties adopt narrow-band subthreshold channels, the Zhang III and the Li IV negotiate a shared secret k required by the subthreshold channel based on a digital signature algorithm;
2) if the two parties adopt a broadband subthreshold channel, the consensus algorithm used by the confirmation of the Zhang III and the Li IV is a workload proving algorithm, and a symmetric encryption algorithm AES, a symmetric encryption key k and a sequence number value range f are negotiated;
3) zhang san and lie si exchange a new wallet address each.
2. A message embedding module:
1) if both parties use narrow-band subthreshold channels:
a) zhang III plans to determine the secret information m of the plum IV to be informed;
b) zhang three, make msM + k, msAs a random number used in signing the transaction digital signature;
c) zhang initiates a transaction j in the blockchain, during which the transaction is signed with a digital signature, the steps are as follows:
a. calculate msG ═ x, y, r ═ x mod n; wherein G is the base point and n is the order of G;
b. calculating e-hash (j);
c. computing
Figure GDA0002763479670000051
Wherein d isAIs a private signature key;
d. (j, r, s) as signature result;
d) zhang III broadcasts the transaction to the block link points;
e) verifying the validity and validity of Zhang III transaction by using the block chain node;
f) and (4) performing block link point packaging transaction to form a new block.
2) If both parties use a wideband subliminal channel:
a) zhang III plans to determine the secret information m of the plum IV to be informed;
b) zhang III encrypts the secret information m by using the negotiated key k and an encryption algorithm AES to obtain c;
c) zhang III cascades an integer number i after c to obtain MiNamely MiIf i is greater than f, selecting the next block for embedding, and setting i as 0;
d) zhang three MiA random number Nonce as a calculation block;
e) if the block calculation fails, the sequence number i is increased by 1 by itself, and the step c) is returned, otherwise, the execution is continued;
f) zhang III broadcasts the new block to other block chain nodes;
g) verifying the validity of the block by the block chain node;
h) after successful verification, the block is called a block in the block chain.
3. Message extraction module
1) If both parties use narrow-band subthreshold channels:
a) the fourth plum obtains the transaction of the third Zhang in the blockchain according to the wallet address of the third Zhang;
b) the Liquan crosses the transaction information of Zhang III to obtain the digital signature of signing transaction;
c) plum four, verifying the validity of the transaction;
d) li IV obtains the secret information by using the negotiated shared secret key k, and the steps are as follows:
a. calculating w ═ s-1mod n;
b. Calculating e-hash (j);
c. calculating t1=we mod n;
d. Calculating t2=wr mod n
e. Calculating T ═ T ═ u, v ═ T1G+t2PK, wherein PK is Alice's public key;
f. calculating R-T-kG-mG;
g. and solving the discrete logarithm problem of mG to the secret information m, wherein the bit length of m is small, and the discrete logarithm problem is easy to solve.
2) If both parties use a wideband subliminal channel:
a) the fourth lie acquires the block packed by the third zhang in the block chain according to the wallet address of the third zhang;
b) the lie four passes the block information of Zhang three, obtain Zhang three and embed the Nonce value of the encrypted information;
c) li IV, decrypting the encrypted information by using a negotiated decryption algorithm AES and a key k to obtain m';
d) li IV removes the serial number value in m' by using f, and restores the secret information.
It should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.

Claims (6)

1. The utility model provides a block chain based covert transmission system, includes information sender Alice, information extractor Bob and three kinds of parties of block chain node to and system initialization module, message embedding module and message extraction module, its characterized in that:
in the message embedding module and the message extracting module, two subthreshold channels of a narrow band and a wide band are provided, wherein the narrow band subthreshold channel is a subthreshold channel based on a digital signature algorithm used by a block chain, and the wide band subthreshold channel is a non-real-time subthreshold channel constructed by utilizing a common recognition mechanism in the block chain; the information sender Alice and the information extractor Bob confirm information in a system initialization module, which includes: the subliminal channel used, the blockchain technique used, and the wallet address used by both parties;
the system comprises the following steps:
a) the information sender Alice and the information extractor Bob confirm the used subliminal channel, the used blockchain technology, the wallet addresses used by both parties, the shared secret needed to be negotiated when the information sender Alice and the information extractor Bob select the narrow-band subliminal channel or the information needed when the broadband subliminal channel is selected through a system initialization module, and the information extractor Bob comprises the following information: a symmetric encryption algorithm, a symmetric encryption key, a sequence number value range;
b) if the information sender Alice and the information extractor Bob both adopt narrow-band subthreshold channels, the information sender Alice serving as a secret information sender embeds a secret message m into a transaction through a message embedding module and broadcasts the secret message m to a block chain node; if the information sender Alice and the information extractor Bob both adopt broadband subthreshold channels, the information sender Alice serving as a secret information sender embeds a secret message m into a block through a message embedding module and broadcasts the secret message m to a block chain node;
c) if the information sender Alice and the information extractor Bob both adopt narrow-band subthreshold channels, the information extractor Bob is used as a secret information receiver to obtain transactions through a block chain node, and a message extraction module is used for extracting secret information m; or if the information sender Alice and the information extractor Bob both adopt broadband subthreshold channels, the information extractor Bob is used as a secret information receiver to obtain blocks through a block chain node, and a message extraction module is used for extracting secret information m.
2. The blockchain-based covert transmission system of claim 1, wherein said information sender Alice and said information retriever Bob confirm the used subliminal channel, the used blockchain technique, the wallet addresses used by both parties, the shared secret to be negotiated when said information sender Alice and said information retriever Bob select the narrow-band subliminal channel, or the information required when the wide-band subliminal channel is selected through a system initialization module, comprising: symmetric encryption algorithm, symmetric encryption key, and sequence number value range "; comprising the following substeps:
a1) the information sender Alice and the information extractor Bob confirm the used subliminal channel technology through a system initialization module; if a narrow-band subthreshold channel is adopted, the information sender Alice and the information extractor Bob both negotiate a shared secret required by the subthreshold channel based on a digital signature algorithm; if a broadband subthreshold channel is adopted, both the information sender Alice and the information extractor Bob confirm that the used consensus algorithm is a workload proving algorithm, and negotiate a symmetric encryption algorithm, a symmetric encryption key and a sequence number value range;
a2) the information sender Alice and the information retriever Bob exchange a new wallet address each.
3. The blockchain-based covert transmission system of claim 1, wherein "if said information sender Alice and said information extractor Bob both use a narrow-band subthreshold channel, said information sender Alice acts as a secret information sender to embed a secret message m into a transaction through a message embedding module and broadcast it to a blockchain node point"; comprising the following substeps:
b1) the information sender Alice generates a transaction, and during signing a digital signature for the transaction, embeds secret information m into the signature by using the shared secret negotiated in the step a);
b2) the message sender Alice broadcasts the transaction to the block link points;
b3) verifying the validity and validity of the Alice transaction of the information sender by the blockchain node;
b4) and (4) performing block link point packaging transaction to form a new block.
4. The block chain-based covert transmission system of claim 1, wherein if said information sender Alice and said information extractor Bob both use a broadband subthreshold channel, said information sender Alice as a secret information sender embeds a secret message m into a block through a message embedding module and broadcasts the secret message m to a block chain node; "has the following substeps:
b 1') the information sender Alice encrypts the secret information m by using the symmetric encryption algorithm and the symmetric encryption key negotiated in the step a) to obtain a ciphertext c;
b 2') the sender Alice concatenates the ciphertext c with an integer sequence number i to obtain MiNamely MiIf i is greater than f, selecting the next block for embedding, and setting i as 0;
b 3') the sender of information Alice sends MiA random number Nonce as a calculation block;
b 4'), if the block calculation fails, the sequence number i is increased by 1, and the step b) is returned, otherwise, the execution is continued;
b 5') the sender of information Alice broadcasts new blocks to other blockchain nodes;
b 6') the block link points verify the validity of the block;
b 7'), the block is called a block in the block chain.
5. The blockchain-based covert transmission system of claim 3, wherein if said information sender Alice and said information extractor Bob both use a narrow-band subliminal channel, said information extractor Bob obtains the transaction as the secret information receiver through the blockchain node, extracting the secret information m using the message extraction module has the following sub-steps:
c1) the information extractor Bob obtains the transaction of Alice in the blockchain according to the wallet address of Alice in the step a);
c2) the information extractor Bob obtains a digital signature for signing the transaction through the transaction information of Alice;
c3) the information extractor Bob verifies the validity of the transaction;
c4) the information extractor Bob obtains the secret information from the digital signature using the shared key negotiated in step a).
6. The block chain based covert transmission system of claim 4, wherein if said information sender Alice and said information extractor Bob both use a broadband subthreshold channel, said information extractor Bob obtains blocks as the secret information receiver through a block chain node, and extracts the secret information m using the message extraction module has the following sub-steps:
c 1') the information extractor Bob obtains Alice-packaged blocks in the block chain according to the wallet address of Alice in the step a);
c2 '), the information extractor Bob obtains the Nonce value of Alice embedding the encrypted information through Alice's block information;
c 3') the information extractor Bob decrypts the ciphertext c by using a previously negotiated decryption algorithm and key;
c 4') the information extractor Bob removes the sequence number value and restores the secret information m.
CN201811049009.6A 2018-09-10 2018-09-10 Concealed transmission system based on block chain Active CN109257346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811049009.6A CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811049009.6A CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Publications (2)

Publication Number Publication Date
CN109257346A CN109257346A (en) 2019-01-22
CN109257346B true CN109257346B (en) 2021-04-16

Family

ID=65048150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811049009.6A Active CN109257346B (en) 2018-09-10 2018-09-10 Concealed transmission system based on block chain

Country Status (1)

Country Link
CN (1) CN109257346B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191111B (en) * 2019-05-29 2021-12-03 华南师范大学 Information hiding method based on big data and function verification and robot system
CN113452735B (en) * 2020-03-25 2022-12-13 山东浪潮科学研究院有限公司 Narrow-band transmission method and equipment based on block chain
CN111698222B (en) * 2020-05-21 2022-06-07 扬州大学 Covert communication method of special bitcoin address generated based on vanitygen
CN112070496B (en) * 2020-08-06 2024-03-19 中国科学院信息工程研究所 Block chain hidden information transmission method and system based on dynamic marking
CN112804046B (en) * 2021-01-06 2022-05-24 中国科学院信息工程研究所 Carrier-free steganography method and system based on block chain private key mapping
CN113055187B (en) * 2021-04-23 2023-02-03 山东新一代信息产业技术研究院有限公司 Narrow-band line transmission method for block chain consensus
CN113411301A (en) * 2021-05-11 2021-09-17 山东浪潮科学研究院有限公司 Block chain system based on narrow-band transmission
CN114389846B (en) * 2021-12-15 2023-08-08 北京理工大学 Data hidden transmission method based on block chain multi-transaction splitting
CN114726509B (en) * 2022-02-28 2024-02-23 北京理工大学 Data hidden transmission method based on multi-block chain platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200563A (en) * 2013-03-28 2013-07-10 重庆邮电大学 Subliminal channel hiding communication method based on authentication code
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN106357410A (en) * 2016-10-10 2017-01-25 中山大学 Method for building subliminal channel on lattice signature without one-way trap door

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200563A (en) * 2013-03-28 2013-07-10 重庆邮电大学 Subliminal channel hiding communication method based on authentication code
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN106357410A (en) * 2016-10-10 2017-01-25 中山大学 Method for building subliminal channel on lattice signature without one-way trap door

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《"观看"的语法:社会化阅读的具身认知及其意义建构》;丁云亮;《出版发行研究》;20180615;第2018卷(第6期);正文76-80页 *
《ChainChannels Private Botnet Communication Over Public Blockchains》;Davor Frkat等;《2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)》;20180803;正文1244-1252 *

Also Published As

Publication number Publication date
CN109257346A (en) 2019-01-22

Similar Documents

Publication Publication Date Title
CN109257346B (en) Concealed transmission system based on block chain
US10122710B2 (en) Binding a data transaction to a person's identity using biometrics
US11880831B2 (en) Encryption system, encryption key wallet and method
US7907735B2 (en) System and method of creating and sending broadcast and multicast data
CN108199835B (en) Multi-party combined private key decryption method
CN105162599B (en) A kind of data transmission system and its transmission method
CN102724041B (en) Steganography-based key transmission and key updating method
CN113079016B (en) Identity-based authentication method facing space-based network
EP0661845B1 (en) System and method for message authentication in a non-malleable public-key cryptosystem
CN107612934A (en) A kind of block chain mobile terminal computing system and method based on Secret splitting
CN110011810A (en) Block chain anonymity signature method based on linkable ring signature and multi-signature
CN102256249A (en) Identity authentication method and equipment applied to wireless network
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN111211905A (en) Identity management method for Fabric alliance chain members based on certificate-free authentication
CN104618113B (en) The method that the authentication of a kind of mobile terminal and safe lane are set up
Chen et al. An efficient nonce-based authentication scheme with key agreement
CN114493593A (en) Multi-block chain covert communication method
CN106452719B (en) Safety communicating method based on the modulation of artificial Rayleigh fading combining adaptive
CN104469750A (en) Autonomous controllable mobile internet business method and device
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
CN114567427A (en) Block chain concealed data segmented transmission method
KR100349418B1 (en) Method for preventing abuse in blind signatures
Fatima et al. Certificate based security services in adhoc sensor network
US11095452B2 (en) Out-of-band authentication in group communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant