CN112118267A - Anonymous communication method and related device - Google Patents

Anonymous communication method and related device Download PDF

Info

Publication number
CN112118267A
CN112118267A CN202011022452.1A CN202011022452A CN112118267A CN 112118267 A CN112118267 A CN 112118267A CN 202011022452 A CN202011022452 A CN 202011022452A CN 112118267 A CN112118267 A CN 112118267A
Authority
CN
China
Prior art keywords
communication
group
target
symmetric key
temporary symmetric
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011022452.1A
Other languages
Chinese (zh)
Other versions
CN112118267B (en
Inventor
洪超
匡晓云
杨祎巍
陈晓
陈霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Original Assignee
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Power Grid International Co ltd, China Southern Power Grid Co Ltd filed Critical China South Power Grid International Co ltd
Priority to CN202011022452.1A priority Critical patent/CN112118267B/en
Publication of CN112118267A publication Critical patent/CN112118267A/en
Application granted granted Critical
Publication of CN112118267B publication Critical patent/CN112118267B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses an anonymous communication method and a related device, wherein the method comprises the following steps: encrypting the randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key; decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set; encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to the user; selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by a user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter; and carrying out anonymous communication by the user according to the target parameters. The technical problem that privacy requirements of users in groups and communication servers cannot be met in existing group communication is solved.

Description

Anonymous communication method and related device
Technical Field
The present application relates to the field of communications technologies, and in particular, to an anonymous communication method and a related apparatus.
Background
With the development of various network supervision technologies, all the behaviors of an individual on a network are constantly monitored and audited, and the behaviors are also the same in group communication, and before a user enters a certain group, the user needs to acquire necessary information, such as a channel frequency band, a multicast address, a key and the like, for entering the corresponding group from a group communication server. In the process of obtaining, the user and the group information are associated, the server knows which group the user is to join, and can also know which users are in each group, and the user can be tracked and audited. However, in some cases, such as anonymous voting, anonymous discussions, etc., the user does not want his published speech to be audit-traced due to the privacy requirements of the user.
Disclosure of Invention
The application provides an anonymous communication method and a related device, which are used for solving the technical problem that privacy requirements of users in groups and communication servers cannot be met in the existing group communication.
In view of the above, a first aspect of the present application provides an anonymous communication method, including:
encrypting a randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key, and sending the encrypted temporary symmetric key to a communication server;
decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, wherein the decrypted temporary symmetric key set comprises a decrypted temporary symmetric key;
encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to a user;
selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by a user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter;
and carrying out anonymous communication by the user according to the target parameters.
Optionally, the encrypting the temporary symmetric key generated randomly through the target protection public key corresponding to the target communication group selected by the user in the communication group to obtain the encrypted temporary symmetric key further includes:
distributing corresponding group parameters and protection keys for each communication group through a communication server, wherein the group parameters comprise group communication keys, channel frequency bands and multicast addresses, and the protection keys comprise protection public keys and protection private keys.
Optionally, the encrypting the temporary symmetric key generated randomly through the target protection public key corresponding to the target communication group selected by the user in the communication group to obtain the encrypted temporary symmetric key further includes:
and sending a request to the communication server by the user to acquire the protection public keys corresponding to all the communication groups.
Optionally, the anonymous communication performed by the user according to the target parameter includes:
and adding the user into the target communication group according to the target parameters, and carrying out anonymous communication with other users according to the group communication key in the target communication group.
A second aspect of the present application provides an anonymous communication device, comprising:
the first encryption module is used for encrypting the randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key and sending the encrypted temporary symmetric key to the communication server;
the first decryption module is used for decrypting the encrypted temporary symmetric key through the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, and the decrypted temporary symmetric key set comprises a decrypted temporary symmetric key;
the second encryption module is used for encrypting the group parameters corresponding to the communication group through the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group and sending the encryption parameter group to a user;
the second decryption module is used for selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group through a user and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter;
and the anonymous communication module is used for carrying out anonymous communication through the user according to the target parameters.
Optionally, the method further includes:
the distribution module is used for distributing corresponding group parameters and protection keys for each communication group through a communication server, wherein the group parameters comprise group communication keys, channel frequency bands and multicast addresses, and the protection keys comprise protection public keys and protection private keys.
Optionally, the method further includes:
and the request module is used for sending a request to the communication server through the user to acquire the protection public keys corresponding to all the communication groups.
Optionally, the anonymous communication module is specifically configured to:
and adding the user into the target communication group according to the target parameters, and carrying out anonymous communication with other users according to the group communication key in the target communication group.
A third aspect of the application provides an anonymous communication device, the device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the anonymous communication method of any of the first aspect according to instructions in the program code.
A fourth aspect of the present application provides a computer-readable storage medium for storing program code for performing the anonymous communication method of any of the first aspects.
According to the technical scheme, the embodiment of the application has the following advantages:
in the present application, an anonymous communication method is provided, including: encrypting the randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key, and sending the encrypted temporary symmetric key to a communication server; decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, wherein the decrypted temporary symmetric key set comprises a decrypted temporary symmetric key; encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to the user; selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by a user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter; and carrying out anonymous communication by the user according to the target parameters.
The anonymous communication method provided by the application selects a target communication group from a plurality of groups, encrypts a temporary symmetric key of the target communication group by using a target protection public key corresponding to the target communication group, then sends the encrypted temporary symmetric key obtained after encryption to a communication server, but does not inform the communication server of the selected target communication group and the adopted protection public key, at the moment, the communication server can only decrypt the encrypted temporary symmetric key by using all protection private keys to obtain a group of decrypted temporary symmetric keys, then each group encrypts respective group parameters according to the corresponding decrypted temporary symmetric key, sends the obtained encrypted parameter group back to a user, and the user only needs to pick out the target encryption parameter corresponding to the target communication group for decryption to obtain the group parameters, so that the communication server and the group can find out that the requirements of the group selection, the data acquisition and the like of the user in the encryption and decryption processes cannot be known, and finally, the obtained target parameters are adopted for communication, so that the anonymity of the user in the group and the communication server is realized. Therefore, the technical problem that privacy requirements of users in the group and the communication server cannot be met in the existing group communication is solved.
Drawings
Fig. 1 is a schematic flow chart of an anonymous communication method according to an embodiment of the present application;
fig. 2 is another schematic flow chart of an anonymous communication method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an anonymous communication device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For easy understanding, referring to fig. 1, a first embodiment of an anonymous communication method provided in the present application includes:
step 101, encrypting the randomly generated temporary symmetric key by the target protection public key corresponding to the target communication group selected by the user in the communication group to obtain an encrypted temporary symmetric key, and sending the encrypted temporary symmetric key to the communication server.
It should be noted that there is generally more than one communication group, a user may request the communication server to obtain all communication groups in the server in advance, each communication group has a corresponding protection public key, the user may select a target communication group according to the own requirement, after the target communication group is determined, the target protection public key corresponding to the target communication group may be used for encryption operation, the temporary symmetric key is randomly generated by the user according to the requirement, and the user sends the encrypted temporary symmetric key to the communication server, but does not inform the communication server of which group the protection public key is used.
And 102, decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, wherein the decrypted temporary symmetric key set comprises the decrypted temporary symmetric key.
It should be noted that, when it is unclear which group of protection public keys the user adopts for the encryption operation, the communication server can only decrypt the encrypted temporary symmetric keys one by using the protection private keys of all groups to obtain a decrypted temporary symmetric key set including a plurality of decrypted temporary symmetric keys, and although the decryption operation is completed, at this time, the communication server still does not know the group and data requirement information of the user. Because each group corresponds to a pair of public and private keys, after the public keys are used for encryption, the decryption can be carried out through the corresponding private keys, and therefore, one decrypted temporary symmetric key corresponds to one communication group.
And 103, encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to the user.
It should be noted that, according to the correspondence between the group and the decryption temporary symmetric key, the decryption temporary symmetric key is used to encrypt the group parameters owned by each of the group parameters, so as to obtain an encryption parameter group, and the encryption parameter group is composed of a plurality of encryption parameters. The encryption parameters are in one-to-one correspondence with the groups, and the specific number is consistent with the group number.
And 104, selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by the user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain the target parameter.
It should be noted that, only the target encryption parameter in the encryption parameter group is the one that the user wants to obtain, so, under the condition of making clear the corresponding relationship between the encryption parameter and the group and the target communication group selected by the user, the target encryption parameter corresponding to the target communication group is directly selected, and symmetric decryption of the target encryption parameter is completed by using the randomly generated temporary symmetric key, and only the user explicitly knows the group selected by itself and the obtained data.
And 105, carrying out anonymous communication by the user according to the target parameters.
The target parameters are data such as channels and keys required by group joining, the target communication group is joined under the condition that the user acquires the related data of the target communication group, the target communication group cannot track and audit the data language issued by the user at the moment, and therefore anonymity of the user in the communication server is achieved, and anonymity of the group means that other users cannot know the information of the user.
The anonymous communication method provided in the embodiment of the application selects a target communication group from a plurality of groups, encrypts a temporary symmetric key of the target communication group by using a target protection public key corresponding to the target communication group, sends the encrypted temporary symmetric key to the communication server, but does not inform the communication server of the selected target communication group and the adopted protection public key, at this time, the communication server can only decrypt the encrypted temporary symmetric key by using all protection private keys to obtain a group of decrypted temporary symmetric keys, then each group encrypts respective group parameters according to the corresponding decrypted temporary symmetric key, sends the obtained encryption parameter group back to the user, and the user can obtain the group parameters by picking out the target encryption parameters corresponding to the target communication group for decryption, so that the user can find out that the requirements of the communication server and the group on the group selection, data acquisition and the like of the user in the encryption and decryption processes cannot be known In the prior art, uniform encryption and decryption operations are adopted, results are provided for users for selection, and finally the obtained target parameters are adopted for communication, so that anonymity of the users in groups and communication servers is realized. Therefore, the technical problem that privacy requirements of users in the group and the communication server cannot be met in the existing group communication is solved.
For easy understanding, referring to fig. 2, the present application provides a second embodiment of an anonymous communication method, including:
step 201, distributing corresponding group parameters and protection keys for each communication group through a communication server, wherein the group parameters comprise a group communication key, a channel frequency band and a multicast address, and the protection keys comprise a protection public key and a protection private key.
In addition, the group is denoted as GiThe communication server being for each communication group GiAssigning a group parameter GPiThe group parameters include necessary information for joining the group and using the group key; in addition, a pair of public and private keys { AK ] needs to be allocated to each grouppri,i,AKpub,iAnd forming a protection key, namely a protection public key and a protection private key. The communication server sends protection public keys { AK corresponding to all communication groupspub,1,AKpub,2,...,AKpub,nAnd the information is used as public information for user query and acquisition.
Step 202, a user sends a request to a communication server to obtain protection public keys corresponding to all communication groups.
It should be noted that what the user requests to obtain is the public information of the communication server, that is, the protection public key, and the communication server may make sure that the user obtains the protection public keys corresponding to all communication groups, but does not know which group's public key is specifically needed.
And 203, encrypting the randomly generated temporary symmetric key through the target protection public key corresponding to the target communication group selected by the user in the communication group to obtain an encrypted temporary symmetric key, and sending the encrypted temporary symmetric key to the communication server.
It should be noted that, first, the user needs to randomly generate a temporary symmetric key TK, and then select a target communication group G from the protection public keys corresponding to all communication groupsaAnd a target protection public key AKpub,aWherein a is more than or equal to 1 and less than or equal to n. Target protection public key AKpub,aAs a key, the temporary symmetric key TK is asymmetrically encrypted, that is:
TK*=asym_encrypt(TK,AKpub,a);
wherein, TK*And sending the encrypted temporary symmetric key obtained after encryption to the communication server.
And 204, decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, wherein the decrypted temporary symmetric key set comprises the decrypted temporary symmetric key.
It should be noted that, since the communication server only receives the encrypted temporary symmetric key, but is not informed of which protected public key to use for the encryption operation, the communication server uses the protected private key { AK ] of each grouppri,1,AKpri,2,...,AKpri,nRespectively asymmetrically decrypting the encrypted temporary symmetric keys:
TK'i=asym_decrypt(TK*,AKpri,i);
get a set of decrypted temporary symmetric keys { TK'1,TK'2,...,TK'n}. It can be known that the protection public key and the protection private key are in one-to-one correspondence with the group, and a certain group provides an encryption key through the protection public key and performs corresponding decryption by using the protection private key.
And step 205, encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to the user.
It should be noted that only one of the obtained decrypted temporary symmetric key sets is the target decryption element of the temporary symmetric key, but the communication server is still unknown, so all the decrypted temporary symmetric keys are required to encrypt the group parameter { GP ] in all the corresponding communication groups1,GP2,...,GPnCarrying out symmetric encryption:
GP'i=sym_encrypt(GPi,TK'i);
the encryption parameter set GP 'can be obtained'1,GP'2,...,GP'n}。
And step 206, selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by the user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain the target parameter.
It should be noted that the user has selected the target communication group GaTherefore, only the target communication group G needs to be selected from the encryption parameter setaCorresponding target encryption parameter GP'aAnd symmetric decryption is carried out on the target parameter GPa
GPa=sym_decrypt(GP'a,TK);
All other encryption parameters are discarded. The communication server does not know which group communication key the user specifically obtained, and thus cannot track and audit the user's behavior.
And step 207, adding the user into the target communication group according to the target parameters, and performing anonymous communication with other users according to the group communication key in the target communication group.
Note that the target parameter GPaIncludes performing a target communication group GaThe users can join the group according to the necessary information such as channel frequency band, multicast address and the like, and send the information to other group members by using the communication key in the target communication group, at the moment, the communication server cannot clearly determine the real identity of the group members in the group, and the group members do not know the identity information of each other, so that anonymous communication is realized.
To facilitate understanding, referring to fig. 3, the present application further provides an embodiment of an anonymous communication device, comprising:
the first encryption module 301 is configured to encrypt a randomly generated temporary symmetric key by using a target protection public key corresponding to a target communication group selected by a user from the communication group to obtain an encrypted temporary symmetric key, and send the encrypted temporary symmetric key to the communication server;
the first decryption module 302 is configured to decrypt, by the communications server, the encrypted temporary symmetric key according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, where the decrypted temporary symmetric key set includes a decrypted temporary symmetric key;
the second encryption module 303 is configured to encrypt, by the communication server, the group parameter corresponding to the communication group according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and send the encryption parameter group to the user;
the second decryption module 304 is configured to select, by the user, a target encryption parameter corresponding to the target communication group from the encryption parameter groups, and perform symmetric decryption on the target encryption parameter according to the temporary symmetric key to obtain a target parameter;
and an anonymous communication module 305 for anonymous communication by the user according to the target parameter.
Further, still include:
the allocating module 306 is configured to allocate, by the communication server, a corresponding group parameter and a protection key to each communication group, where the group parameter includes a group communication key, a channel band, and a multicast address, and the protection key includes a protection public key and a protection private key.
Further, still include:
the request module 307 is configured to obtain the protection public keys corresponding to all communication groups by sending a request to the communication server by the user.
Further, the anonymous communication module 305 is specifically configured to:
and the user is added into the target communication group according to the target parameters and carries out anonymous communication with other users according to the group communication key in the target communication group.
The application also provides an anonymous communication device, the device comprising a processor and a memory:
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is configured to execute the anonymous communication method in the above-described method embodiment according to instructions in the program code.
The present application also provides a computer-readable storage medium for storing program code for performing the anonymous communication method in the above-described method embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. An anonymous communication method, comprising:
encrypting a randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key, and sending the encrypted temporary symmetric key to a communication server;
decrypting the encrypted temporary symmetric key by the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, wherein the decrypted temporary symmetric key set comprises a decrypted temporary symmetric key;
encrypting the group parameters corresponding to the communication group by the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group, and sending the encryption parameter group to a user;
selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group by a user, and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter;
and carrying out anonymous communication by the user according to the target parameters.
2. The anonymous communication method according to claim 1, wherein the encrypted temporary symmetric key is obtained by encrypting the randomly generated temporary symmetric key with the target protection public key corresponding to the target communication group selected by the user from the communication group, and before the step, further comprising:
distributing corresponding group parameters and protection keys for each communication group through a communication server, wherein the group parameters comprise group communication keys, channel frequency bands and multicast addresses, and the protection keys comprise protection public keys and protection private keys.
3. The anonymous communication method according to claim 1, wherein the encrypted temporary symmetric key is obtained by encrypting the randomly generated temporary symmetric key with the target protection public key corresponding to the target communication group selected by the user from the communication group, and before the step, further comprising:
and sending a request to the communication server by the user to acquire the protection public keys corresponding to all the communication groups.
4. The anonymous communication method of claim 1, wherein said anonymous communication by the user based on the target parameter comprises:
and adding the user into the target communication group according to the target parameters, and carrying out anonymous communication with other users according to the group communication key in the target communication group.
5. An anonymous communication device, comprising:
the first encryption module is used for encrypting the randomly generated temporary symmetric key through a target protection public key corresponding to a target communication group selected by a user in the communication group to obtain an encrypted temporary symmetric key and sending the encrypted temporary symmetric key to the communication server;
the first decryption module is used for decrypting the encrypted temporary symmetric key through the communication server according to the protection private keys corresponding to all the communication groups to obtain a decrypted temporary symmetric key set, and the decrypted temporary symmetric key set comprises a decrypted temporary symmetric key;
the second encryption module is used for encrypting the group parameters corresponding to the communication group through the communication server according to the decrypted temporary symmetric key set to obtain an encryption parameter group and sending the encryption parameter group to a user;
the second decryption module is used for selecting a target encryption parameter corresponding to the target communication group from the encryption parameter group through a user and symmetrically decrypting the target encryption parameter according to the temporary symmetric key to obtain a target parameter;
and the anonymous communication module is used for carrying out anonymous communication through the user according to the target parameters.
6. The anonymous communication device of claim 5, further comprising:
the distribution module is used for distributing corresponding group parameters and protection keys for each communication group through a communication server, wherein the group parameters comprise group communication keys, channel frequency bands and multicast addresses, and the protection keys comprise protection public keys and protection private keys.
7. The anonymous communication device of claim 5, further comprising:
and the request module is used for sending a request to the communication server through the user to acquire the protection public keys corresponding to all the communication groups.
8. The anonymous communication device of claim 5, wherein the anonymous communication module is specifically configured to:
and adding the user into the target communication group according to the target parameters, and carrying out anonymous communication with other users according to the group communication key in the target communication group.
9. An anonymous communication device, the device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the anonymous communication method of any of claims 1-4 according to instructions in the program code.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is configured to store program code for performing the anonymous communication method of any of claims 1-4.
CN202011022452.1A 2020-09-25 2020-09-25 Anonymous communication method and related device Active CN112118267B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011022452.1A CN112118267B (en) 2020-09-25 2020-09-25 Anonymous communication method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011022452.1A CN112118267B (en) 2020-09-25 2020-09-25 Anonymous communication method and related device

Publications (2)

Publication Number Publication Date
CN112118267A true CN112118267A (en) 2020-12-22
CN112118267B CN112118267B (en) 2022-10-18

Family

ID=73798027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011022452.1A Active CN112118267B (en) 2020-09-25 2020-09-25 Anonymous communication method and related device

Country Status (1)

Country Link
CN (1) CN112118267B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726511A (en) * 2021-08-31 2021-11-30 南方电网科学研究院有限责任公司 Demand communication key distribution method and system based on Chinese remainder theorem

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN106358159A (en) * 2015-07-17 2017-01-25 中兴通讯股份有限公司 Shared channel management method and system of broadband cluster system, terminals and base station
CN106850195A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 Group key agreement and communication means in a kind of instant messaging
CN106936833A (en) * 2017-03-15 2017-07-07 广东工业大学 A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group
CN107465681A (en) * 2017-08-07 2017-12-12 成都汇智远景科技有限公司 Cloud computing big data method for secret protection
CN109088810A (en) * 2017-06-14 2018-12-25 北京信威通信技术股份有限公司 Communication means, device, relevant device, system and the storage medium of group message
WO2019174403A1 (en) * 2018-03-14 2019-09-19 西安西电捷通无线网络通信股份有限公司 Control method and device for group digital signature

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN106358159A (en) * 2015-07-17 2017-01-25 中兴通讯股份有限公司 Shared channel management method and system of broadband cluster system, terminals and base station
CN106850195A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 Group key agreement and communication means in a kind of instant messaging
CN106936833A (en) * 2017-03-15 2017-07-07 广东工业大学 A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group
CN109088810A (en) * 2017-06-14 2018-12-25 北京信威通信技术股份有限公司 Communication means, device, relevant device, system and the storage medium of group message
CN107465681A (en) * 2017-08-07 2017-12-12 成都汇智远景科技有限公司 Cloud computing big data method for secret protection
WO2019174403A1 (en) * 2018-03-14 2019-09-19 西安西电捷通无线网络通信股份有限公司 Control method and device for group digital signature

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726511A (en) * 2021-08-31 2021-11-30 南方电网科学研究院有限责任公司 Demand communication key distribution method and system based on Chinese remainder theorem
CN113726511B (en) * 2021-08-31 2024-02-06 南方电网科学研究院有限责任公司 On-demand communication key distribution method and system based on China remainder theorem

Also Published As

Publication number Publication date
CN112118267B (en) 2022-10-18

Similar Documents

Publication Publication Date Title
US20220006627A1 (en) Quantum key distribution node apparatus and method for quantum key distribution thereof
US10581599B2 (en) Cloud storage method and system
CN111193703B (en) Communication apparatus and communication method used in distributed network
WO2018076564A1 (en) Privacy protection method and privacy protection device in vehicle communication
CN110351276B (en) Data processing method, device and computer readable storage medium
KR102391952B1 (en) System, device or method for encryption distributed processing
CN110958253A (en) Electronic voting method, device and storage medium based on block chain
CN112800479B (en) Multi-party combined data processing method and device by using trusted third party
CN112534790B (en) Encryption device, communication system and method for exchanging encrypted data in a communication network
JPWO2003094422A1 (en) Cryptographic communication system, key distribution server, terminal device, and key sharing method
GB2587438A (en) Key generation for use in secured communication
CN110635912A (en) Data processing method and device
US9906953B2 (en) Method and user equipment for discovering device user
CN116166749A (en) Data sharing method and device, electronic equipment and storage medium
CN112118267B (en) Anonymous communication method and related device
CN112152796B (en) Multicast method based on key dynamic negotiation and related device
CN112860790B (en) Data management method, system and device
CN110598427B (en) Data processing method, system and storage medium
CN112134831B (en) Method and device for sending and processing access request
CN107483197B (en) VPN network terminal key distribution method and device
KR20200082916A (en) Survey response data security method and system
KR20210020699A (en) Method for performing backup and recovery private key in consortium blockchain network, and device using them
CN113452513B (en) Key distribution method, device and system
CN114547642A (en) Data sharing method and device, storage medium and computer equipment
CN108156112A (en) Data ciphering method, electronic equipment and network side equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant