CN112532613B - Hidden communication method based on block chain address - Google Patents

Hidden communication method based on block chain address Download PDF

Info

Publication number
CN112532613B
CN112532613B CN202011342770.6A CN202011342770A CN112532613B CN 112532613 B CN112532613 B CN 112532613B CN 202011342770 A CN202011342770 A CN 202011342770A CN 112532613 B CN112532613 B CN 112532613B
Authority
CN
China
Prior art keywords
secret
address
information
special
secret information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011342770.6A
Other languages
Chinese (zh)
Other versions
CN112532613A (en
Inventor
黄善云
张问银
宋万水
夏子云
魏秀元
王九如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Shandong Normal University
Original Assignee
Linyi University
Shandong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University, Shandong Normal University filed Critical Linyi University
Priority to CN202011342770.6A priority Critical patent/CN112532613B/en
Publication of CN112532613A publication Critical patent/CN112532613A/en
Application granted granted Critical
Publication of CN112532613B publication Critical patent/CN112532613B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a block chain address-based covert communication method. The information released in the blockchain network cannot be inspected and changed, the security and the credibility are high, the data volume is huge, and anonymity of both transaction parties is realized, so that the hidden transmission of the information on the blockchain has congenital advantages based on the characteristics. Embedding secret information into public key hash of the generated address by changing the generation process of the block chain address, and then generating a corresponding special address by taking ciphertext as the public key hash through encrypting the secret information; the secret information sender transfers a part of money to the special address through the transaction, and issues the transaction containing the special address to the blockchain network through a blockchain consensus mechanism; and the secret information receiver inquires related transactions through the address which is negotiated in advance, obtains a special address, decodes and decrypts the special address and extracts secret information. In addition, the invention also introduces a secret sharing algorithm to realize hidden communication, utilizes the shamir secret sharing algorithm to divide secret information, disperses the secret information in a plurality of transactions, and adopts a mode of combining common networks on and off a block chain to transmit the secret information so as to improve the concealment. The invention can well realize the hidden communication of both communication parties under the blockchain network, and has stronger usability, robustness and concealment.

Description

Hidden communication method based on block chain address
Technical Field
The invention relates to a related technology of blockchain, cryptography and information security, in particular to a method for carrying out information hiding secret communication by a blockchain network and a secret sharing algorithm.
Background
With the vigorous development of the blockchain technology, the related blockchain technology also carries out the research of the ignition heat successively, such as blockchain big data analysis, blockchain privacy protection, blockchain access control, a new mode of blockchain+Internet of things and the like. The invention combines a blockchain network and hidden communication, performs information hiding on the blockchain to realize hidden communication, aims at hiding information and transmitting secret information by constructing a hidden channel on the blockchain, combines the traditional network hidden channel technology, fuses and improves to realize construction of the hidden channel on the blockchain, is a new challenge in network information security, and has extremely profound scientific research significance.
In recent years, information hiding technology has become a hot spot for research and attention in the field of information security as an important means for secret communication and intellectual property protection, and has been widely applied. The most used hidden channels are a storage type hidden channel and a time type hidden channel, the transmission efficiency of the storage type hidden channel for transmitting hidden information is higher, but the hidden information is relatively poorer and is easy to detect, and other means are needed to improve the hidden information of the hidden channel; the hidden time type hidden channel has higher hidden property and is not easy to detect, but the hidden information transmission efficiency is lower, the channel capacity is smaller, the transmission capacity and the efficiency are required to be improved, the two sides of receiving and transmitting are required to be synchronously carried out, the requirement on a network is not higher, and the limitation of the network condition is larger, so that the view is turned to a block chain network.
The traditional block chain hidden communication method is novel in that information is hidden in a signature, but the channel capacity is relatively small, and the calculation is relatively complex; the LSB scheme aiming at the block chain address also has the problem of smaller channel capacity; other approaches, such as covert communication in the amount field, the op_return field, have relatively low security and concealment. In fact, storing information in public key hashes using blockchain addresses has been long lasting, as in 2013, with the address having information embedded in the bitcoin network, the content of the information being Mandela's picture and a birth profile, the transaction hash being 8881a937a437ff6ce83be3a89d77ea88ee12315f37f7ef0dd3742c30eef dba. Although the information is embedded into the blockchain, the concept of information hiding and hidden communication and the support of related technologies are lacking, and the purposes of information hiding and secret information hidden transmission cannot be achieved. Based on the background, the invention selects a blockchain network to replace the traditional network, realizes hidden communication through a blockchain address, encrypts secret information into hexadecimal characters as false public key hash through an encryption technology, is indistinguishable in form and content from real public key hash, and experiments prove that the method has higher channel capacity, concealment, safety and transmission efficiency in actual operation.
Disclosure of Invention
The invention aims to provide a covert communication method based on a block chain address, which solves the defects of low covert communication efficiency, poor safety and insufficient covert property of the traditional network. There are two methods, one is to generate a single special address method to perform covert communication, and the other is to use a secret sharing algorithm to perform secret segmentation, and combine the blockchain network with a common network to perform covert communication. And determining that both sides of the hidden communication are S and R, wherein S is a secret information sender, R is a secret information receiver, and secret information to be sent by S is represented by m.
The method is specifically divided into three stages:
the method comprises the steps that firstly, in the information interaction stage before two parties communicate, if a method of generating a single special address is adopted, a related cryptography algorithm and a symmetric key are negotiated; if a secret sharing algorithm is adopted to carry out secret segmentation, a used secret sharing algorithm is determined. Both approaches require both communicating parties to exchange blockchain addresses.
And secondly, in the stage of secret information embedding, a self-defined public key hash is generated by using a generation method of a block chain address. If a method of generating a single special address is adopted, the ciphertext encrypted by the secret information is hidden in the public key hash to be used for generating the special address, constructing a transaction with the special address, and issuing the transaction to a blockchain network; if a secret sharing algorithm is adopted to carry out secret segmentation, secret information is segmented and embedded into a plurality of public key hashes, a plurality of special addresses are generated, a plurality of special transactions are constructed, and the special transactions are issued into a blockchain network, in particular to commonly transmit the secret information through the combination of a blockchain upper common network and a blockchain lower common network.
And thirdly, in the stage of extracting the secret information, the secret information is extracted by searching related transactions or special addresses. If a method of generating a single special address is adopted, searching an address containing secret information, and decoding and decrypting to obtain plaintext information m; if a secret sharing algorithm is adopted to carry out secret segmentation, enough secret fragments containing secret information are collected, and the secret information is reconstructed through the secret sharing algorithm.
The flow steps are as follows:
1. information interaction stage before communication:
the method of generating a single special address is adopted:
step one: both parties determine the cryptographic algorithm, the symmetric key used.
Step two: the sender S and the receiver R exchange blockchain addresses of each other.
The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: a secret sharing algorithm is determined that is used.
Step two: the sender S and the receiver R exchange blockchain addresses of each other.
2. Secret information embedding stage:
the method of generating a single special address is adopted:
step one: the sender S encrypts the secret information m with a symmetric cryptographic algorithm to generate a ciphertext c.
Step two: the sender S uses the ciphertext c as a public key hash in the process of a block chain address generation algorithm to generate a special private-key-free block chain address containing secret information.
Step three: the sender S initiates a transaction to the special address through the ordinary address, and constructs a transaction output as the special address.
Step four: the sender S sends a special transaction containing a special address to the blockchain network.
The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: the sender S splits the secret information m by a secret sharing algorithm.
Step two: the appropriate number of fragmented secret fragments are converted to a satisfactory format, the fragments transmitted by the in-chain normal network are removed, and each remaining secret fragment acts as a public key hash to generate a plurality of special addresses.
Step three: the sender S constructs a plurality of transactions output as special addresses by initiating transactions to a plurality of special addresses using a plurality of normal addresses.
Step four: the sender S sends a plurality of special transactions containing special addresses to the blockchain network.
3. Secret information extraction stage:
the method of generating a single special address is adopted:
step one: the receiver R obtains the relevant transaction information by querying the blockchain address information of the sender S and extracts the special address therefrom.
Step two: the receiver R decodes the special address and then decrypts the information decoded by the negotiated key to obtain the secret information m.
The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: the receiver R obtains the related transaction information by querying the blockchain address information of the sender S, and extracts a plurality of special addresses therefrom.
Step two: and decoding the plurality of special addresses to obtain partial secret fragments, and reconstructing the fragments by a secret sharing algorithm by combining the secret fragments received by the common network to obtain secret information m.
Drawings
FIG. 1 is a block chain network covert communication flow chart based on address
FIG. 2 is a flow chart of generating a bit coin P2PKH address
Detailed Description
The invention aims to provide a hidden communication method based on a block chain address, and the scheme of the invention is further described and illustrated by an example.
Referring to fig. 1, a flow chart of implementation of the scheme of the present invention is implemented by taking a bitcoin network as an example, and fig. 2 is a flow chart of generation of a bitcoin P2PKH address.
The method comprises the following specific implementation processes:
implementation background: the sender S and the receiver R need to perform secret communication, the secret information to be sent is m, and the communication channel is supported by a bitcoin network and a common network.
1. Information interaction stage before communication
1) By adopting a method of generating a single special address, the two parties negotiate to determine that the generation mode of the bitcoin address is P2PKH (Payto public hash), and the symmetrical encryption algorithm used is AES encryption algorithm and symmetrical key K, and the two parties exchange respective bitcoin addresses.
2) The secret sharing algorithm is adopted to carry out secret segmentation, the generation mode of the bit coin address is determined to be P2PKH (Pay topublic hash) by negotiation between the two parties, the secret sharing algorithm is determined to be shamir (k, n) threshold secret sharing algorithm, and the two parties exchange the respective bit coin addresses.
2. Secret information embedding stage
1) A method of generating a single special address is adopted.
a) The sender S encrypts the secret information by the symmetric key k to obtain ciphertext information c, namely Gen AES (m,k)=c。
b) The sender S uses the ciphertext c as a public key hash in the bitcoin generation method to generate the special address a using Base58Check encoding s I.e. Base58Check (c) →A s
c) Sender S uses common address A to special address A s A partial amount is transferred to successfully initiate and construct a transaction, which is then broadcast to the bitcoin network where a special transaction with a special address exists.
2) And a secret sharing algorithm is adopted to carry out secret segmentation.
a) The sender S uses a shamir (k, n) threshold secret sharing algorithm to divide the secret information m into n different pieces of secret information, first constructs a polynomial F (x) = (m+a) 1 *x 1 +a 2 *x 2 +...+a (k-1) *x (k-1) ) modp. Wherein m is the secret information which the sender S needs to send, p is a large prime number, and a is arbitrarily unequal 1 ,a 2 ,a 3 ...a (k-1) ∈Z p
b) The sender S takes any n unequal x into F (x) to obtain (x) 1 ,y 1 ),(x 1 ,y 2 )...(x n ,y n ) From which k key-value pairs (k.ltoreq.n) are randomly selected.
c) The sender S selects here h (h<k) The key value pairs are sent to the receiver R safely on the common network, the rest k-h key value pairs are transcoded into proper format and used as public key hash, and a plurality of special addresses A are generated by Base58Check coding s1 ,A s2 ...A s(k-h)
d) Sender S uses k-h common addresses A 1 ,A 2 ...A (k-h) To k-h special addresses A s1 ,A s2 ...A s(k-h) And respectively transferring to a part of the money so as to successfully initiate and construct k-h transactions, and broadcasting the k-h transactions to a bitcoin network, wherein the k-h special transactions containing special addresses exist in the bitcoin network.
3. Secret information extraction stage
1) A method of generating a single special address is adopted.
a) The receiver R obtains a single special transaction by inquiring the transaction record of the sender S and obtains a single special address A s
b) Receiver R encodes A by Base58Check code pair s Decoding to obtain a public key hash containing secret information.
c) The receiver R decrypts the public key hash using the key k to obtain the secret information m, enc AES (c,k)=m。
2) And a secret sharing algorithm is adopted to carry out secret segmentation.
a) The receiver R obtains a plurality of special transactions by inquiring the transaction records of the sender S and obtains a plurality of special addresses A s1 ,A s2 ...A s(k-h)
b) The receiver R receives the special address A s1 ,A s2 ...A s(k-h) Decoding is carried out through Base58Check coding, and a corresponding public key hash set is obtained.
c) The receiver R respectively converts the public key hash sets into key value pairs which can be calculated, and the key value pairs are formed as (x, y), so that k-h key value pairs are obtained.
d) The receiver R has k-h key-value pairs, and, in addition to the h key-value pairs sent over the normal network, has k key-value pairs in total, and can reconstruct the secret information. The secret information m is reconstructed using a lagrangian interpolation formula. Lagrange interpolation formula:
substituting the key value pairs into the calculated secret information m.
The invention provides a hidden communication method based on a block chain address, which is characterized in that secret information is embedded by changing the block chain address, the hidden property and the safety are ensured by adopting a cryptography algorithm, the secret information is further divided by adopting a secret sharing algorithm, and the secret information is transmitted by adopting the combination of common networks on and under the block chain, so that the hidden property of communication is further improved. The present invention aims to realize reliable and concealed secret communication without damaging the smooth running of related facilities. The invention is not limited to P2PKH, but can be applied to other embeddable fields, such as P2PK, P2SH and MS, and can implement some methods applied in the scheme of the invention to realize hidden communication. The scope of the invention is defined by the appended claims.

Claims (4)

1. A hidden communication method based on a block chain address is characterized by comprising three stages, namely an information interaction stage before two parties communicate, a secret information embedding stage and a secret information extraction stage; two methods exist, one is to generate a single special address method for hidden communication, and the other is to adopt a secret sharing algorithm for secret segmentation, and combine a network on a blockchain chain with a common network for common hidden communication; determining that both sides of the hidden communication are S and R, wherein S is a secret information sender, R is a secret information receiver, and secret information to be sent by S is represented by m;
the method comprises the following steps:
the method comprises the steps that firstly, in the information interaction stage before two parties communicate, if a method of generating a single special address is adopted, a related cryptography algorithm and a symmetric key are negotiated; if a secret sharing algorithm is adopted to carry out secret segmentation, determining a secret sharing algorithm which is used; both approaches require both parties to exchange blockchain addresses;
secondly, in the stage of secret information embedding, a self-defined public key hash is generated by utilizing a generation method of a block chain address; if a method of generating a single special address is adopted, the ciphertext encrypted by the secret information is hidden in the public key hash to be used for generating the special address, constructing a transaction with the special address, and issuing the transaction to a blockchain network; if a secret sharing algorithm is adopted to carry out secret segmentation, secret information is segmented and embedded into a plurality of public key hashes to generate a plurality of special addresses, a plurality of special transactions are constructed and issued into a blockchain network, and the secret information is commonly transmitted through the combination of a blockchain upper common network and a blockchain lower common network;
thirdly, in the stage of extracting the secret information, the secret information is extracted by searching related transactions or special addresses; if a method of generating a single special address is adopted, searching an address containing secret information, and decoding and decrypting to obtain plaintext information m; if a secret sharing algorithm is adopted to carry out secret segmentation, enough secret fragments containing secret information are collected, and the secret information is reconstructed through the secret sharing algorithm.
2. The method for covert communication based on blockchain address according to claim 1, wherein the method in flow one is characterized by the following specific steps:
a) The method of generating a single special address is adopted:
step one: both sides determine the cryptographic algorithm and the symmetric key used;
step two: the sender S and the receiver R exchange blockchain addresses of each other;
b) The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: determining a secret sharing algorithm for use;
step two: the sender S and the receiver R exchange blockchain addresses of each other.
3. The method for covert communication based on blockchain address according to claim 1, wherein the method in the second flow is characterized by the following specific steps:
secret information embedding stage:
a) The method of generating a single special address is adopted:
step one: the sender S encrypts the secret information m by using a symmetric cryptographic algorithm to generate a ciphertext c;
step two: the sender S uses the ciphertext c as a public key hash in the process of a block chain address generation algorithm to generate a special private-key-free block chain address containing secret information;
step three: the sender S initiates a transaction to a special address through a common address to construct a transaction which is output as the special address;
step four: the sender S sends the special transaction containing the special address to the blockchain network;
b) The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: the sender S divides the secret information m through a secret sharing algorithm;
step two: converting a proper number of the divided secret fragments into a format meeting requirements, removing fragments transmitted by the common network under the chain, and generating a plurality of special addresses by using each rest secret fragment as a public key hash;
step three: the sender S initiates a transaction to a plurality of special addresses by using a plurality of common addresses to construct a plurality of transactions which are output as the special addresses;
step four: the sender S sends a plurality of special transactions containing special addresses to the blockchain network.
4. The method for covert communication based on blockchain address according to claim 1, wherein the method in the third process is characterized by the following steps:
secret information extraction stage:
a) The method of generating a single special address is adopted:
step one: the receiver R obtains related transaction information by inquiring the blockchain address information of the sender S and extracts a special address from the transaction information;
step two: the receiver R decodes the special address, and then decrypts the information decoded by the negotiated key to obtain secret information m;
b) The method for carrying out secret segmentation by adopting a secret sharing algorithm comprises the following steps:
step one: the receiver R obtains related transaction information by inquiring the blockchain address information of the sender S and extracts a plurality of special addresses from the transaction information;
step two: and decoding the plurality of special addresses to obtain partial secret fragments, and reconstructing the fragments by a secret sharing algorithm by combining the secret fragments received by the common network to obtain secret information m.
CN202011342770.6A 2020-11-25 2020-11-25 Hidden communication method based on block chain address Active CN112532613B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011342770.6A CN112532613B (en) 2020-11-25 2020-11-25 Hidden communication method based on block chain address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011342770.6A CN112532613B (en) 2020-11-25 2020-11-25 Hidden communication method based on block chain address

Publications (2)

Publication Number Publication Date
CN112532613A CN112532613A (en) 2021-03-19
CN112532613B true CN112532613B (en) 2024-02-02

Family

ID=74993515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011342770.6A Active CN112532613B (en) 2020-11-25 2020-11-25 Hidden communication method based on block chain address

Country Status (1)

Country Link
CN (1) CN112532613B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113095826B (en) * 2021-04-01 2024-04-23 中国科学院信息工程研究所 Hidden communication method and system based on block chain multi-signature
CN113328854B (en) * 2021-05-24 2022-09-16 杭州溪塔科技有限公司 Service processing method and system based on block chain
CN113364769B (en) * 2021-06-03 2022-04-15 浙江大学 Method for constructing hidden channel in block chain network
CN113660088A (en) * 2021-07-12 2021-11-16 北京理工大学 Block chain transaction screening method based on dynamic address
CN114389846B (en) * 2021-12-15 2023-08-08 北京理工大学 Data hidden transmission method based on block chain multi-transaction splitting
CN114493593B (en) * 2022-01-26 2023-05-30 电子科技大学 Multi-block chain hidden communication method
CN114614981B (en) * 2022-02-21 2023-12-19 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114745101A (en) * 2022-02-21 2022-07-12 北京航空航天大学 Hidden information transmission method and device based on multiple block chains
CN114826730B (en) * 2022-04-22 2023-06-27 郑州大学 Blockchain covert communication model capable of hiding sensitive document and sender identity
CN114978756B (en) * 2022-06-22 2024-04-26 郑州大学 Markov chain-based generation type block chain hidden communication method
CN115225337B (en) * 2022-06-24 2023-11-28 北京天融信网络安全技术有限公司 Block chain-based covert communication method, terminal, system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110520881A (en) * 2017-04-07 2019-11-29 区块链控股有限公司 Method and system for secure data record distribution using blockchains
CN111245569A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on node uniqueness identifier arrangement

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110520881A (en) * 2017-04-07 2019-11-29 区块链控股有限公司 Method and system for secure data record distribution using blockchains
CN111245569A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on node uniqueness identifier arrangement

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Exploring Covert Channels in Bitcoin Transactions";Andrey Fionov;《2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)》;第0059-0064页 *
"动态隐蔽通信机制";曹旭 费金龙;《信息工程大学学报》;第201-205页 *

Also Published As

Publication number Publication date
CN112532613A (en) 2021-03-19

Similar Documents

Publication Publication Date Title
CN112532613B (en) Hidden communication method based on block chain address
US20070028088A1 (en) Polymorphic encryption method and system
US10237248B2 (en) Encoder, decoder and method
US8457304B2 (en) Efficient encoding processes and apparatus
WO2007071140A1 (en) A method for transmitting data securely
CN109067517B (en) Encryption and decryption device, encryption and decryption method and communication method of hidden key
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN112383397A (en) Heterogeneous signcryption communication method based on biological characteristics
CN114567427B (en) Block chain hidden data segmented transmission method
CN113159745B (en) Block chain transaction privacy protection method based on full homomorphism
CN115225320B (en) Encryption and decryption method for data transmission
Sultana et al. Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications
CN116566618A (en) Biometric authentication method based on online offline Paillier homomorphic encryption
CN114726522B (en) Careless searchable encryption method for protecting privacy of two parties
CN105959106A (en) Low-complexity digital encryption method
US20230049768A1 (en) A method for symmetric asynchronous generative encryption
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
Ramtri et al. Secure banking transactions using RSA and two fish algorithms
CN109905241B (en) Short Chinese character encoding and decoding method of elliptic curve public key
CN103746793A (en) Number form text encryption and decryption methods
CN110581759A (en) UOEC-HEX symmetric encryption algorithm
Singh et al. Evolution of encryption techniques and data security mechanisms
Muhammed et al. Advanced Encryption Standard (AES) combined with Bit-Level Embedding for Securing Cloud Data
Anand et al. Cryptography based on DNA Analysis
Al-Doori et al. Securing IoT Networks with NTRU Cryptosystem: A Practical Approach on ARM-based Devices for Edge and Fog Layer Integration.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant