CN111654376A - Block chain anonymous data transmission method and device based on ring signature - Google Patents

Block chain anonymous data transmission method and device based on ring signature Download PDF

Info

Publication number
CN111654376A
CN111654376A CN202010398656.9A CN202010398656A CN111654376A CN 111654376 A CN111654376 A CN 111654376A CN 202010398656 A CN202010398656 A CN 202010398656A CN 111654376 A CN111654376 A CN 111654376A
Authority
CN
China
Prior art keywords
module
data
encryption algorithm
transmission request
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010398656.9A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Network Technology Co ltd
Original Assignee
Guangdong Hongxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Network Technology Co ltd filed Critical Guangdong Hongxin Network Technology Co ltd
Priority to CN202010398656.9A priority Critical patent/CN111654376A/en
Publication of CN111654376A publication Critical patent/CN111654376A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a block chain anonymous data transmission method and device based on a ring signature, wherein the method comprises the following steps: a data sending party anonymously broadcasts a transmission request; signing communication information of the transmission request, anonymously authenticating the information source identity credibility of a data sender, obtaining a credibility mechanism and parameters of the transmission request, and issuing the transmission request; according to the negotiation credibility mechanism and parameters, data are encrypted and then broadcast through the wireless communication module to be sent; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; and after the receiver anonymously receives the data, verifying and decrypting the content of the restored data. The invention has various data transmission modes and can meet the requirements of users on the diversified data transmission modes.

Description

Block chain anonymous data transmission method and device based on ring signature
Technical Field
The invention relates to the field of data communication, in particular to a block chain anonymous data transmission method and device based on a ring signature.
Background
At present, because the processing capacity of data on a block chain is limited, and on the other hand, because data under the chain cannot be effectively synchronized with data on the chain, the communication aspect of a data transmission protocol on the block chain has the problems of poor transmission efficiency and low reliability and transmission safety; and as the block chain environment allows any user node to have fair access to the network, some nodes may have malicious behaviors, so that the information sources of the transmitting and receiving parties on the block chain have low credibility and data security. In the prior art, some anonymous multiparty data transmission mechanisms sign communication information of a transmission request through a ring signature self-certification algorithm and a concurrent signature algorithm, so that the security of communication transmission is improved; and then, the information source identity credibility of the data sender is anonymously authenticated through a ring signature verification algorithm, the information source credibility and the data security of both the sender and the receiver on the block chain are increased, finally, the credible mechanism and parameters of the transmission request are calculated, and the transmission request is issued, so that the communication transmission efficiency is improved, and the safe, credible and efficient communication transmission on the block chain is realized. However, the data transmission method is single, and the user's demand for diversified data transmission methods cannot be satisfied.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a block chain anonymous data transmission method based on ring signatures, which has multiple data transmission modes and can meet the user's requirements for diversified data transmission modes, in view of the above-mentioned drawbacks of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a block chain anonymous data transmission method based on ring signatures is constructed, and the method comprises the following steps:
A) a data sending party anonymously broadcasts a transmission request;
B) signing communication information of the transmission request, anonymously authenticating the information source identity credibility of the data sender to obtain a credibility mechanism and parameters of the transmission request, and issuing the transmission request;
C) the data sender encrypts data by using an encryption algorithm according to the negotiated credible mechanism and parameters and then broadcasts and sends the data through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
D) and after anonymously receiving the data sent by the data sender, the receiver verifies and decrypts the content of the restored data.
In the method for block chain anonymous data transmission based on ring signature, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm or an ECC encryption algorithm.
In the method for anonymous data transmission based on a block chain with a ring signature, the step B) further includes:
B1) signing the communication information of the transmission request through a ring signature self-certification algorithm and a parallel signature algorithm;
B2) anonymously authenticating the information source identity credibility of the data sender through a ring signature verification algorithm;
B3) judging whether a traitor node appears in the transmission process, if so, executing the step B4); otherwise, performing step B5);
B4) tracing and revoking the identity of the traitor node through a conditional identity revocation algorithm;
B5) and calculating a trusted mechanism and parameters of the transmission request, and issuing the transmission request.
The invention also relates to a device for realizing the block chain anonymous data transmission method based on the ring signature, which comprises the following steps:
transmission request broadcast unit: the method is used for anonymously broadcasting a transmission request by a data sender;
a transmission request issuing unit: the system comprises a data transmitting party, a data receiving party and a data receiving party, wherein the data transmitting party is used for sending a transmission request to a data receiving party;
an encryption broadcasting unit: the data sender encrypts data by using an encryption algorithm according to the negotiated credible mechanism and parameters and then broadcasts and sends the data through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
a verification decryption unit: and the data receiving part is used for verifying and decrypting the content of the restored data after anonymously receiving the data sent by the data sending part.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm, or an ECC encryption algorithm.
In the apparatus of the present invention, the transmission request issuing unit further includes:
the communication information signing module: a communication for signing the transmission request by a ring signature self-certifying algorithm and a parallelizable signature algorithm;
the information source identity credibility authentication module: the information source identity credibility used for anonymously authenticating the data sender through a ring signature verification algorithm;
traitor node judgment module: for determining whether a traitor node is present during transmission;
a tracing cancellation module: for tracing and revoking the identity of the traitor node by a conditional identity revocation algorithm;
a transmission request issuing module: and the system is used for calculating a trusted mechanism and parameters of the transmission request and issuing the transmission request.
The block chain anonymous data transmission method based on the ring signature has the following beneficial effects: because the data sender is provided with the anonymous broadcast transmission request; signing communication information of the transmission request, anonymously authenticating the information source identity credibility of a data sender, obtaining a credibility mechanism and parameters of the transmission request, and issuing the transmission request; the data sender encrypts data by using an encryption algorithm according to the negotiation credibility mechanism and the parameters and broadcasts and sends the data through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides various data transmission modes, has various data transmission modes and can meet the requirements of users on the diversified data transmission modes.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method for anonymous data transfer based on a ring signature in an embodiment of the method for anonymous data transfer of a block chain according to the present invention;
fig. 2 is a detailed flowchart of signing communication information of a transmission request, anonymously authenticating the reliability of the source identity of a data sender, obtaining the reliability mechanism and parameters of the transmission request, and issuing the transmission request in the embodiment;
fig. 3 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the method and the device for block chain anonymous data transfer based on ring signature, a flowchart of the method for block chain anonymous data transfer based on ring signature is shown in fig. 1. In fig. 1, the method for anonymous data transmission of a block chain based on a ring signature includes the following steps:
step S01 data sender anonymously broadcasts transmission request: in this step, the data sender anonymously broadcasts the transmission request.
Step S02, communication information of the transmission request is signed, the information source identity credibility of the data sender is anonymously authenticated, the credibility mechanism and parameters of the transmission request are obtained, and the transmission request is issued: in the step, the communication information of the transmission request is signed, the information source identity credibility of the data sender is anonymously authenticated, the credibility mechanism and the parameters of the transmission request are obtained, and the transmission request is issued.
Step S03, the data sender encrypts the data by using the encryption algorithm according to the negotiation credibility mechanism and the parameters, and broadcasts and sends the data through the wireless communication module: in this step, the data sender encrypts the data to be sent by using an encryption algorithm according to the negotiated trusted mechanism and parameters, and broadcasts and sends the data through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm. By encryption, the security of data transmission can be increased.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states, which is used to replace the original DES encryption algorithm, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. RSA is the first algorithm that can be used for both encryption and parity signing, which is resistant to all cryptographic attacks known so far, and has been recommended by ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: MD5 processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The SHA1 encryption algorithm is a message digest algorithm that is as popular as the MD5 encryption algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. The SHA encryption algorithm 1 is designed to be used with a Digital Signature Algorithm (DSA). The SHA1 encryption algorithm is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2 "64 bits in length, the SHA1 encryption algorithm would generate a 160-bit message digest. This message digest may be used to verify the integrity of the data when the message is received. During the transmission, the data is likely to change, and then different message digests are generated at this time. The SHA1 encryption algorithm may not recover information from a message digest, and two different messages may not produce the same message digest. Thus, the SHA1 encryption algorithm can verify the integrity of the data, so the SHA1 encryption algorithm is said to be a technique for ensuring the integrity of the file.
The SHA1 encryption algorithm may take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into blocks of 512 bits and processed separately. A 160-bit buffer is used to hold the intermediate and final results of the hash function. The buffer may be represented by 5 32-bit registers (A, B, C, D and E). The SHA1 encryption algorithm is an algorithm with stronger security than the MD5 encryption algorithm, and theoretically, all digital authentication algorithms adopting a message digest mode have collision, namely, message digests calculated by two different things are the same, so that the intercommunication cheating graph is the same. However, the algorithm with high security is difficult to find the 'collision' of the specified data, and the 'collision' is more difficult to calculate by using the formula, so far, only the MD5 in the general security algorithm is broken.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The keys of the sender and the receiver of the HMAC encryption algorithm are calculated, and a third party without the keys cannot calculate the correct hash value, so that data can be prevented from being tampered.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (which are more CPU-intensive than the RSA algorithm).
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The block chain anonymous data transmission method based on the ring signature has multiple data transmission modes and can meet the requirements of users on diversified data transmission modes.
Step S04, after the receiving side anonymously receives the data sent by the data sending side, verifying and decrypting the content of the restored data: in this step, after the receiver anonymously receives the data sent by the data sender, the receiver verifies and decrypts the content of the restored data.
For the present embodiment, the step S02 can be further refined, and the detailed flowchart is shown in fig. 2. In fig. 2, the step S02 further includes the following steps:
step S21 signs the communication information of the transmission request by the ring signature self-certification algorithm and the parallelizable signature algorithm: in this step, the communication information of the transmission request is signed by a ring signature self-certification algorithm and a parallel signature algorithm.
Step S22 anonymously authenticates the source identity trust of the data sender through a ring signature verification algorithm: in the step, the information source identity credibility of the data sender is authenticated anonymously through a ring signature verification algorithm.
Step S23 determines whether a traitor node appears during transmission: in this step, it is determined whether a traitor node occurs during the transmission process, and if yes, step S24 is executed; otherwise, step S25 is executed.
Step S24 traces and revokes the identity of the traitor node by a conditional identity revocation algorithm: if the judgment result of the above step S23 is yes, the present step is executed. In this step, the identities of the traitor nodes are traced and revoked by a conditional identity revocation algorithm.
Step S25 calculates the trusted mechanism and parameters of the transmission request, and issues the transmission request: if the judgment result of the above step S23 is no, the present step is executed. In this step, the trusted mechanism and parameters of the transmission request are calculated, and the transmission request is issued.
The embodiment also relates to a device for implementing the above method for block chain anonymous data transmission based on ring signature, and a schematic structural diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a transmission request broadcasting unit 1, a transmission request issuing unit 2, an encryption broadcasting unit 3, and a verification decrypting unit 4; wherein, the transmission request broadcasting unit 1 is used for anonymously broadcasting a transmission request by a data sender; the transmission request issuing unit 2 is used for signing the communication information of the transmission request, anonymously authenticating the information source identity credibility of the data sender, obtaining the credibility mechanism and parameters of the transmission request, and issuing the transmission request.
The data sending party of the encryption broadcasting unit 3 encrypts the data by using an encryption algorithm according to the negotiation credibility mechanism and parameters and then broadcasts and sends the data through the wireless communication module; the encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm. By encryption, the security of data transmission can be increased.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states, which is used to replace the original DES encryption algorithm, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. RSA is the first algorithm that can be used for both encryption and parity signing, which is resistant to all cryptographic attacks known so far, and has been recommended by ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: MD5 processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The SHA1 encryption algorithm is a message digest algorithm that is as popular as the MD5 encryption algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. The SHA encryption algorithm 1 is designed to be used with a Digital Signature Algorithm (DSA). The SHA1 encryption algorithm is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2 "64 bits in length, the SHA1 encryption algorithm would generate a 160-bit message digest. This message digest may be used to verify the integrity of the data when the message is received. During the transmission, the data is likely to change, and then different message digests are generated at this time. The SHA1 encryption algorithm may not recover information from a message digest, and two different messages may not produce the same message digest. Thus, the SHA1 encryption algorithm can verify the integrity of the data, so the SHA1 encryption algorithm is said to be a technique for ensuring the integrity of the file.
The SHA1 encryption algorithm may take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into blocks of 512 bits and processed separately. A 160-bit buffer is used to hold the intermediate and final results of the hash function. The buffer may be represented by 5 32-bit registers (A, B, C, D and E). The SHA1 encryption algorithm is an algorithm with stronger security than the MD5 encryption algorithm, and theoretically, all digital authentication algorithms adopting a message digest mode have collision, namely, message digests calculated by two different things are the same, so that the intercommunication cheating graph is the same. However, the algorithm with high security is difficult to find the 'collision' of the specified data, and the 'collision' is more difficult to calculate by using the formula, so far, only the MD5 in the general security algorithm is broken.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The keys of the sender and the receiver of the HMAC encryption algorithm are calculated, and a third party without the keys cannot calculate the correct hash value, so that data can be prevented from being tampered.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (which are more CPU-intensive than the RSA algorithm).
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The device of the invention has various data transmission modes and can meet the requirements of users on diversified data transmission modes.
The verification decryption unit 4 is used for verifying and decrypting the content of the restored data after the receiving party anonymously receives the data sent by the data sending party.
In this embodiment, the transmission request issuing unit 2 further includes a communication information signing module 21, a source identity trust level authentication module 22, a traitor node judging module 23, a trace back revocation module 24, and a transmission request issuing module 25; the communication information signing module 21 is configured to sign the communication information of the transmission request through a ring signature self-certification algorithm and a parallel signature algorithm; the information source identity credibility authentication module 22 is used for anonymously authenticating the information source identity credibility of the data sender through a ring signature verification algorithm; the traitor node judging module 23 is used for judging whether a traitor node appears during transmission; the tracing revocation module 24 is used for tracing and revoking the identity of the traitor node through a conditional identity revocation algorithm; the transmission request issuing module 25 is configured to calculate a trusted mechanism and parameters of the transmission request, and issue the transmission request.
In summary, in this embodiment, the data sender is configured to broadcast the transmission request anonymously; signing communication information of the transmission request, anonymously authenticating the information source identity credibility of a data sender, obtaining a credibility mechanism and parameters of the transmission request, and issuing the transmission request; the data sender encrypts data by using an encryption algorithm according to the negotiation credibility mechanism and the parameters and broadcasts and sends the data through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides various data transmission modes, has various data transmission modes and can meet the requirements of users on the diversified data transmission modes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A block chain anonymous data transmission method based on ring signatures is characterized by comprising the following steps:
A) a data sending party anonymously broadcasts a transmission request;
B) signing communication information of the transmission request, anonymously authenticating the information source identity credibility of the data sender to obtain a credibility mechanism and parameters of the transmission request, and issuing the transmission request;
C) the data sender encrypts data by using an encryption algorithm according to the negotiated credible mechanism and parameters and then broadcasts and sends the data through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
D) and after anonymously receiving the data sent by the data sender, the receiver verifies and decrypts the content of the restored data.
2. The method for block chain anonymous data transfer based on ring signatures of claim 1, wherein the encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, or ECC encryption algorithm.
3. The method for anonymous data transfer based on block chain with ring signature as set forth in claim 2, wherein the step B) further comprises:
B1) signing the communication information of the transmission request through a ring signature self-certification algorithm and a parallel signature algorithm;
B2) anonymously authenticating the information source identity credibility of the data sender through a ring signature verification algorithm;
B3) judging whether a traitor node appears in the transmission process, if so, executing the step B4); otherwise, performing step B5);
B4) tracing and revoking the identity of the traitor node through a conditional identity revocation algorithm;
B5) and calculating a trusted mechanism and parameters of the transmission request, and issuing the transmission request.
4. An apparatus for implementing the method for anonymous data transfer based on a ring signature for a block chain according to claim 1, comprising:
transmission request broadcast unit: the method is used for anonymously broadcasting a transmission request by a data sender;
a transmission request issuing unit: the system comprises a data transmitting party, a data receiving party and a data receiving party, wherein the data transmitting party is used for sending a transmission request to a data receiving party;
an encryption broadcasting unit: the data sender encrypts data by using an encryption algorithm according to the negotiated credible mechanism and parameters and then broadcasts and sends the data through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
a verification decryption unit: and the data receiving part is used for verifying and decrypting the content of the restored data after anonymously receiving the data sent by the data sending part.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, or an ECC encryption algorithm.
6. The apparatus of claim 5, wherein the transmission request issuing unit further comprises:
the communication information signing module: a communication for signing the transmission request by a ring signature self-certifying algorithm and a parallelizable signature algorithm;
the information source identity credibility authentication module: the information source identity credibility used for anonymously authenticating the data sender through a ring signature verification algorithm;
traitor node judgment module: for determining whether a traitor node is present during transmission;
a tracing cancellation module: for tracing and revoking the identity of the traitor node by a conditional identity revocation algorithm;
a transmission request issuing module: and the system is used for calculating a trusted mechanism and parameters of the transmission request and issuing the transmission request.
CN202010398656.9A 2020-05-12 2020-05-12 Block chain anonymous data transmission method and device based on ring signature Withdrawn CN111654376A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010398656.9A CN111654376A (en) 2020-05-12 2020-05-12 Block chain anonymous data transmission method and device based on ring signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010398656.9A CN111654376A (en) 2020-05-12 2020-05-12 Block chain anonymous data transmission method and device based on ring signature

Publications (1)

Publication Number Publication Date
CN111654376A true CN111654376A (en) 2020-09-11

Family

ID=72348231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010398656.9A Withdrawn CN111654376A (en) 2020-05-12 2020-05-12 Block chain anonymous data transmission method and device based on ring signature

Country Status (1)

Country Link
CN (1) CN111654376A (en)

Similar Documents

Publication Publication Date Title
CN109559122B (en) Block chain data transmission method and block chain data transmission system
CN109274502B (en) Method and device for creating public key encryption and key signature and readable storage medium
US20210165914A1 (en) Cryptographic method for verifying data
US20200351100A1 (en) Cryptographic method for verifying data
CN112422276B (en) Method and system for realizing multi-party key agreement
CN114726546B (en) Digital identity authentication method, device, equipment and storage medium
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN111432403A (en) Data auditing method and device based on block chain
JP2003022007A (en) Method, system, program for electronic signature in stream transfer, and recording medium with the program recorded thereon
CN114422135A (en) Verifiable accidental transmission method based on elliptic curve
CN114065247A (en) Quantum digital mixed signcryption method
CN111683061A (en) Block chain-based Internet of things equipment access control method and device
CN111800784A (en) Block chain cloud service system based on cloud computing
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN108494554B (en) Data symmetric encryption method based on double plaintexts
CN112423295B (en) Lightweight security authentication method and system based on block chain technology
Bansal et al. Analysis of digital signature based algorithm for authentication and privacy in digital data
CN111654376A (en) Block chain anonymous data transmission method and device based on ring signature
CN111800384A (en) Financial service application management method and device based on block chain
CN111654859A (en) Mobile block chain resource allocation method and device
CN111654854A (en) Remote data optimized transmission method and system based on cloud computing system
CN111641494A (en) Method and device for realizing global block chain
Wong et al. E–mail protocols with perfect forward secrecy
CN110868298A (en) Power grid communication encryption method
Surya et al. Single sign on mechanism using attribute based encryption in distributed computer networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200911

WW01 Invention patent application withdrawn after publication