CN113132411A - Data hidden transmission method based on block chain - Google Patents
Data hidden transmission method based on block chain Download PDFInfo
- Publication number
- CN113132411A CN113132411A CN202110478454.XA CN202110478454A CN113132411A CN 113132411 A CN113132411 A CN 113132411A CN 202110478454 A CN202110478454 A CN 202110478454A CN 113132411 A CN113132411 A CN 113132411A
- Authority
- CN
- China
- Prior art keywords
- data
- transmitted
- receiver
- sender
- transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000005516 engineering process Methods 0.000 claims abstract description 15
- 238000004891 communication Methods 0.000 claims description 3
- 238000005192 partition Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a data hidden transmission method based on a block chain, which comprises the following steps: determining an address, a private key and a public key of a sender and an address and a public key of a receiver; a sender receives a data hidden transmission request, and addresses of the sender and a receiver and data to be transmitted are protected through a zero-knowledge proof technology; a sender divides data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after Hash operation, and reorders the summary information according to a preset disorder rule; encrypting the reordered abstract information and the disorder rule by adopting an encryption algorithm through a public key of the receiver, and transmitting the encrypted abstract information and the disorder rule to the receiver; the receiver decrypts through the private key and restores to obtain complete transmission data. The method of the invention protects the addresses of the sender and the receiver and the transmission data through the zero knowledge proof technology, further protects the data to be transmitted through the disordered data, and completes the hidden transmission of the data.
Description
Technical Field
The invention relates to the technical field of block chain data secure transmission, in particular to a data hidden transmission method based on a block chain.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. The basic characteristics of the block chain are decentralization, openness, autonomy, information non-tampering, anonymity and the like.
At present, with the continuous development of society, the application and development of block chains based on the characteristics of the block chains are receiving more and more attention. In the big data era, data has very important value for individuals or enterprises, and the safety and the concealment of data transmission are concerned. However, while the data transmission is ensured to be safe, the concealment of the data transmission is not enough, and the defect is that the data transmission process is damaged.
Disclosure of Invention
The invention aims to provide a block chain-based data covert transmission method, which protects the addresses of a sender and a receiver and transmission data through a zero-knowledge proof technology, further protects the data to be transmitted through disordered data, and completes the covert transmission of the data.
In order to achieve the purpose, the invention provides the following scheme:
a block chain-based data hidden transmission method comprises the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
Optionally, the encryption algorithm in step S3) is an elliptic curve encryption algorithm or an SHA256 encryption algorithm.
Optionally, before the sender splits the data to be transmitted in step S3), the method further includes: and compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate.
Optionally, in step S4), the sender divides the data to be transmitted into a plurality of data subsets to be transmitted in an equal division manner.
Optionally, a firewall is disposed on a communication channel between the sender and the receiver, and is configured to detect a malicious node.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a data hiding transmission method of a block chain, which comprises the following steps: s1) determining the address, private key and public key of the sender and the address and public key of the receiver; s2) the sender receives the data hiding transmission request, and the addresses of the sender and the receiver and the data to be transmitted are protected through the zero knowledge proof technology; s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after hash operation, and reorders the summary information according to a preset disorder rule; s4) the reordered abstract information and the disorder rule are encrypted by the public key of the receiver through an encryption algorithm and transmitted to the receiver; s5) the receiver decrypts through the private key and restores to obtain complete transmission data; the method provided by the invention has simple steps, the addresses and the transmission data of the sender and the receiver are protected by a zero-knowledge proof technology, the data to be transmitted is further protected by scrambling the data, and the covert transmission of the data can be completed without establishing other channels.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart of a block chain-based data concealment transmission method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a block chain-based data covert transmission method, which protects the addresses of a sender and a receiver and transmission data through a zero-knowledge proof technology, further protects the data to be transmitted through disordered data, and completes the covert transmission of the data.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Regarding the data protection problem of the block chain, there are four main ways at present:
the realization idea of the coin mixing principle is to split the relationship between the input address and the output address. In a transaction, given the large number of people involved, including a large number of inputs and outputs, it is difficult to find each person's corresponding pair in the inputs and outputs, so that the connection between the inputs and outputs is effectively broken; the effect is better when coins are mixed for multiple times and a small amount of coins are used each time. Although this method is highly anonymous, its risk assessment is not in place and an anonymous third party must be trusted.
A ring signature is a simplified class group signature that is named because the signature consists of certain rules into a ring. In the ring signature scheme, one member in the ring signs with his private key and the public keys of the other members, but does not need to acquire the permission of the other members, and the verifier only knows that the signature comes from the ring, but does not know who is the true signer. The ring signature solves the problem of complete anonymity of a signer, allows a member to represent a group of people for signing without leaking the information of the signer, but the ring signature technology only solves the anonymity problem of a trader and cannot carry out privacy protection on trading contents.
Homomorphic encryption is a method which can execute calculation without decrypting encrypted data in advance, perfect balance can be achieved by storing data on a block chain by using homomorphic encryption technology, no significant change can be caused to block chain attributes, transaction finance and user balance on the block chain can be hidden by using addition homomorphic encryption technology, and the operation of balance on a public account by other users is ensured, but homomorphic encryption cannot confirm transaction consistency, and a verification link for transaction validity is lacked.
The zero knowledge proof is a kind of zero knowledge proof that proves some data operations without revealing the data itself, allowing both parties to prove that a proposal is genuine, and without revealing any information other than that it is genuine. By using the zero-knowledge proof mechanism, the addresses and transaction details of both transaction parties can be hidden.
Fig. 1 is a flowchart of a block chain-based data concealment transmission method according to an embodiment of the present invention, and as shown in fig. 1, the block chain-based data concealment transmission method according to the embodiment of the present invention includes the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
Wherein, the encryption algorithm in the step S3) adopts an elliptic curve encryption algorithm or an SHA256 encryption algorithm; before the sender splits the data to be transmitted in step S3), the method further includes: compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate; in step S4), the sender divides the data to be transmitted into a plurality of data subsets to be transmitted by adopting an equal division mode; and fire walls are arranged on communication channels of the sender and the receiver and used for detecting malicious nodes.
The invention provides a data hiding transmission method of a block chain, which comprises the following steps: s1) determining the address, private key and public key of the sender and the address and public key of the receiver; s2) the sender receives the data hiding transmission request, and the addresses of the sender and the receiver and the data to be transmitted are protected through the zero knowledge proof technology; s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after hash operation, and reorders the summary information according to a preset disorder rule; s4) the reordered abstract information and the disorder rule are encrypted by the public key of the receiver through an encryption algorithm and transmitted to the receiver; s5) the receiver decrypts through the private key and restores to obtain complete transmission data; the method provided by the invention has simple steps, the addresses and the transmission data of the sender and the receiver are protected by a zero-knowledge proof technology, the data to be transmitted is further protected by scrambling the data, and the covert transmission of the data can be completed without establishing other channels.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.
Claims (5)
1. A block chain-based data hidden transmission method is characterized by comprising the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
2. The blockchain-based data covert transmission method according to claim 1, wherein the encryption algorithm in step S3) is elliptic curve encryption algorithm or SHA256 encryption algorithm.
3. The method for concealed transmission of data based on block chain according to claim 1, wherein before the sender partitions the data to be transmitted in step S3), the method further comprises: and compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate.
4. The method according to claim 1, wherein in step S4), the sender divides the data to be transmitted into a plurality of subsets of data to be transmitted by using an equal division manner.
5. The blockchain-based data covert transmission method according to claim 1, wherein a firewall is disposed on a communication channel between the sender and the receiver for detecting a malicious node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110478454.XA CN113132411A (en) | 2021-04-30 | 2021-04-30 | Data hidden transmission method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110478454.XA CN113132411A (en) | 2021-04-30 | 2021-04-30 | Data hidden transmission method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113132411A true CN113132411A (en) | 2021-07-16 |
Family
ID=76780820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110478454.XA Pending CN113132411A (en) | 2021-04-30 | 2021-04-30 | Data hidden transmission method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113132411A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113708936A (en) * | 2021-08-26 | 2021-11-26 | 南京邮电大学 | Block chain-based multiple scattered order verification method and system for personal information |
CN114726538A (en) * | 2022-04-02 | 2022-07-08 | 湖南天河国云科技有限公司 | Covert communication method based on block link signature |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011813A (en) * | 2019-04-12 | 2019-07-12 | 湘潭大学 | A kind of data hiding transmission method based on block chain |
CN110225016A (en) * | 2019-05-31 | 2019-09-10 | 北京理工大学 | A kind of data hiding transmission method based on block chain network |
CN112600665A (en) * | 2020-12-25 | 2021-04-02 | 江苏通付盾区块链科技有限公司 | Covert communication method, device and system based on block chain and encryption technology |
-
2021
- 2021-04-30 CN CN202110478454.XA patent/CN113132411A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011813A (en) * | 2019-04-12 | 2019-07-12 | 湘潭大学 | A kind of data hiding transmission method based on block chain |
CN110225016A (en) * | 2019-05-31 | 2019-09-10 | 北京理工大学 | A kind of data hiding transmission method based on block chain network |
CN112600665A (en) * | 2020-12-25 | 2021-04-02 | 江苏通付盾区块链科技有限公司 | Covert communication method, device and system based on block chain and encryption technology |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113708936A (en) * | 2021-08-26 | 2021-11-26 | 南京邮电大学 | Block chain-based multiple scattered order verification method and system for personal information |
CN113708936B (en) * | 2021-08-26 | 2022-08-16 | 南京邮电大学 | Block chain-based multiple scattered order verification method and system for personal information |
CN114726538A (en) * | 2022-04-02 | 2022-07-08 | 湖南天河国云科技有限公司 | Covert communication method based on block link signature |
CN114726538B (en) * | 2022-04-02 | 2024-03-29 | 湖南天河国云科技有限公司 | Hidden communication method based on block link signature |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11381389B2 (en) | Computer-implemented method of generating a threshold vault | |
CN109478223B (en) | Method and system for realizing block chain | |
US11677566B2 (en) | Systems and methods for signing of a message | |
US8437474B2 (en) | Public key encryption for groups | |
US8654975B2 (en) | Joint encryption of data | |
CA3048425A1 (en) | System and method for an electronic identity brokerage | |
Rosenberg | Handbook of financial cryptography and security | |
Hung et al. | Multiparty quantum private comparison with almost dishonest third parties for strangers | |
CN110912897B (en) | Book resource access control method based on ciphertext attribute authentication and threshold function | |
CN111429138A (en) | Block link point data safety interaction method and first interaction node | |
CN113132411A (en) | Data hidden transmission method based on block chain | |
JP6041864B2 (en) | Method, computer program, and apparatus for data encryption | |
Yang et al. | Improved outsourced private set intersection protocol based on polynomial interpolation | |
CN115396115B (en) | Block chain data privacy protection method, device, equipment and readable storage medium | |
CN112734423A (en) | Transaction method based on block chain and terminal equipment | |
Cao et al. | A two-party privacy preserving set intersection protocol against malicious users in cloud computing | |
CN114514550A (en) | Partitioning requests into blockchains | |
CN116561791A (en) | Privacy exchange method, device and storage medium | |
Feng et al. | Research on privacy enhancement scheme of blockchain transactions | |
CN116015592A (en) | Homomorphic encryption system meeting zero knowledge proof | |
Zhao et al. | Information security of new media art platform of distributed system based on blockchain technology | |
Islam et al. | PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments | |
Li et al. | Blockchain Encryption Algorithm Based on Aggregated Signature | |
Tanwar | Basics of cryptographic primitives for blockchain development | |
Estensen | A comparison of monero and zcash |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20221008 Address after: Room 305, No. 188, Zhugushi Road, Wulian, Central City, Longgang Street, Longgang District, Shenzhen, Guangdong 518100 Applicant after: Jiaqiao (Shenzhen) Investment Co.,Ltd. Address before: D-1908, 19th floor, building 222, Wangjing Xiyuan, Chaoyang District, Beijing Applicant before: Yongqi (Beijing) Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210716 |
|
RJ01 | Rejection of invention patent application after publication |