CN113132411A - Data hidden transmission method based on block chain - Google Patents

Data hidden transmission method based on block chain Download PDF

Info

Publication number
CN113132411A
CN113132411A CN202110478454.XA CN202110478454A CN113132411A CN 113132411 A CN113132411 A CN 113132411A CN 202110478454 A CN202110478454 A CN 202110478454A CN 113132411 A CN113132411 A CN 113132411A
Authority
CN
China
Prior art keywords
data
transmitted
receiver
sender
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110478454.XA
Other languages
Chinese (zh)
Inventor
王保春
张蛟鹏
余洋
莫恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaqiao Shenzhen Investment Co ltd
Original Assignee
Yongqi Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yongqi Beijing Technology Co Ltd filed Critical Yongqi Beijing Technology Co Ltd
Priority to CN202110478454.XA priority Critical patent/CN113132411A/en
Publication of CN113132411A publication Critical patent/CN113132411A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data hidden transmission method based on a block chain, which comprises the following steps: determining an address, a private key and a public key of a sender and an address and a public key of a receiver; a sender receives a data hidden transmission request, and addresses of the sender and a receiver and data to be transmitted are protected through a zero-knowledge proof technology; a sender divides data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after Hash operation, and reorders the summary information according to a preset disorder rule; encrypting the reordered abstract information and the disorder rule by adopting an encryption algorithm through a public key of the receiver, and transmitting the encrypted abstract information and the disorder rule to the receiver; the receiver decrypts through the private key and restores to obtain complete transmission data. The method of the invention protects the addresses of the sender and the receiver and the transmission data through the zero knowledge proof technology, further protects the data to be transmitted through the disordered data, and completes the hidden transmission of the data.

Description

Data hidden transmission method based on block chain
Technical Field
The invention relates to the technical field of block chain data secure transmission, in particular to a data hidden transmission method based on a block chain.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. The basic characteristics of the block chain are decentralization, openness, autonomy, information non-tampering, anonymity and the like.
At present, with the continuous development of society, the application and development of block chains based on the characteristics of the block chains are receiving more and more attention. In the big data era, data has very important value for individuals or enterprises, and the safety and the concealment of data transmission are concerned. However, while the data transmission is ensured to be safe, the concealment of the data transmission is not enough, and the defect is that the data transmission process is damaged.
Disclosure of Invention
The invention aims to provide a block chain-based data covert transmission method, which protects the addresses of a sender and a receiver and transmission data through a zero-knowledge proof technology, further protects the data to be transmitted through disordered data, and completes the covert transmission of the data.
In order to achieve the purpose, the invention provides the following scheme:
a block chain-based data hidden transmission method comprises the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
Optionally, the encryption algorithm in step S3) is an elliptic curve encryption algorithm or an SHA256 encryption algorithm.
Optionally, before the sender splits the data to be transmitted in step S3), the method further includes: and compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate.
Optionally, in step S4), the sender divides the data to be transmitted into a plurality of data subsets to be transmitted in an equal division manner.
Optionally, a firewall is disposed on a communication channel between the sender and the receiver, and is configured to detect a malicious node.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a data hiding transmission method of a block chain, which comprises the following steps: s1) determining the address, private key and public key of the sender and the address and public key of the receiver; s2) the sender receives the data hiding transmission request, and the addresses of the sender and the receiver and the data to be transmitted are protected through the zero knowledge proof technology; s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after hash operation, and reorders the summary information according to a preset disorder rule; s4) the reordered abstract information and the disorder rule are encrypted by the public key of the receiver through an encryption algorithm and transmitted to the receiver; s5) the receiver decrypts through the private key and restores to obtain complete transmission data; the method provided by the invention has simple steps, the addresses and the transmission data of the sender and the receiver are protected by a zero-knowledge proof technology, the data to be transmitted is further protected by scrambling the data, and the covert transmission of the data can be completed without establishing other channels.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart of a block chain-based data concealment transmission method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a block chain-based data covert transmission method, which protects the addresses of a sender and a receiver and transmission data through a zero-knowledge proof technology, further protects the data to be transmitted through disordered data, and completes the covert transmission of the data.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Regarding the data protection problem of the block chain, there are four main ways at present:
the realization idea of the coin mixing principle is to split the relationship between the input address and the output address. In a transaction, given the large number of people involved, including a large number of inputs and outputs, it is difficult to find each person's corresponding pair in the inputs and outputs, so that the connection between the inputs and outputs is effectively broken; the effect is better when coins are mixed for multiple times and a small amount of coins are used each time. Although this method is highly anonymous, its risk assessment is not in place and an anonymous third party must be trusted.
A ring signature is a simplified class group signature that is named because the signature consists of certain rules into a ring. In the ring signature scheme, one member in the ring signs with his private key and the public keys of the other members, but does not need to acquire the permission of the other members, and the verifier only knows that the signature comes from the ring, but does not know who is the true signer. The ring signature solves the problem of complete anonymity of a signer, allows a member to represent a group of people for signing without leaking the information of the signer, but the ring signature technology only solves the anonymity problem of a trader and cannot carry out privacy protection on trading contents.
Homomorphic encryption is a method which can execute calculation without decrypting encrypted data in advance, perfect balance can be achieved by storing data on a block chain by using homomorphic encryption technology, no significant change can be caused to block chain attributes, transaction finance and user balance on the block chain can be hidden by using addition homomorphic encryption technology, and the operation of balance on a public account by other users is ensured, but homomorphic encryption cannot confirm transaction consistency, and a verification link for transaction validity is lacked.
The zero knowledge proof is a kind of zero knowledge proof that proves some data operations without revealing the data itself, allowing both parties to prove that a proposal is genuine, and without revealing any information other than that it is genuine. By using the zero-knowledge proof mechanism, the addresses and transaction details of both transaction parties can be hidden.
Fig. 1 is a flowchart of a block chain-based data concealment transmission method according to an embodiment of the present invention, and as shown in fig. 1, the block chain-based data concealment transmission method according to the embodiment of the present invention includes the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
Wherein, the encryption algorithm in the step S3) adopts an elliptic curve encryption algorithm or an SHA256 encryption algorithm; before the sender splits the data to be transmitted in step S3), the method further includes: compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate; in step S4), the sender divides the data to be transmitted into a plurality of data subsets to be transmitted by adopting an equal division mode; and fire walls are arranged on communication channels of the sender and the receiver and used for detecting malicious nodes.
The invention provides a data hiding transmission method of a block chain, which comprises the following steps: s1) determining the address, private key and public key of the sender and the address and public key of the receiver; s2) the sender receives the data hiding transmission request, and the addresses of the sender and the receiver and the data to be transmitted are protected through the zero knowledge proof technology; s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, obtains summary information of the data subsets to be transmitted after hash operation, and reorders the summary information according to a preset disorder rule; s4) the reordered abstract information and the disorder rule are encrypted by the public key of the receiver through an encryption algorithm and transmitted to the receiver; s5) the receiver decrypts through the private key and restores to obtain complete transmission data; the method provided by the invention has simple steps, the addresses and the transmission data of the sender and the receiver are protected by a zero-knowledge proof technology, the data to be transmitted is further protected by scrambling the data, and the covert transmission of the data can be completed without establishing other channels.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (5)

1. A block chain-based data hidden transmission method is characterized by comprising the following steps:
s1) determining a first blockchain address, a first private key and a first public key of the sender; determining a second blockchain address and a second public key of the receiver; the receiving party stores a second private key; the receiving side sends a data hidden transmission request to the sending side;
s2) the sender receives a data hiding transmission request sent by the receiver, and the first blockchain address of the sender, the second blockchain address of the receiver and the data to be transmitted are protected through a zero knowledge proof technology;
s3) the sender divides the data to be transmitted into a plurality of data subsets to be transmitted, carries out hash operation on the data subsets to be transmitted respectively to obtain summary information of the data subsets to be transmitted, and reorders the summary information according to a preset disorder rule;
s4) the reordered abstract information and the disorder rule are encrypted by an encryption algorithm through a second public key of the receiver and transmitted to the receiver;
s5) the receiver decrypts the reordered summary information and the disorder rule through a second private key and restores the reordered summary information and the disorder rule to obtain complete transmission data.
2. The blockchain-based data covert transmission method according to claim 1, wherein the encryption algorithm in step S3) is elliptic curve encryption algorithm or SHA256 encryption algorithm.
3. The method for concealed transmission of data based on block chain according to claim 1, wherein before the sender partitions the data to be transmitted in step S3), the method further comprises: and compressing the data to be transmitted, so as to reduce the storage capacity of the data to be transmitted and improve the transmission rate.
4. The method according to claim 1, wherein in step S4), the sender divides the data to be transmitted into a plurality of subsets of data to be transmitted by using an equal division manner.
5. The blockchain-based data covert transmission method according to claim 1, wherein a firewall is disposed on a communication channel between the sender and the receiver for detecting a malicious node.
CN202110478454.XA 2021-04-30 2021-04-30 Data hidden transmission method based on block chain Pending CN113132411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110478454.XA CN113132411A (en) 2021-04-30 2021-04-30 Data hidden transmission method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110478454.XA CN113132411A (en) 2021-04-30 2021-04-30 Data hidden transmission method based on block chain

Publications (1)

Publication Number Publication Date
CN113132411A true CN113132411A (en) 2021-07-16

Family

ID=76780820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110478454.XA Pending CN113132411A (en) 2021-04-30 2021-04-30 Data hidden transmission method based on block chain

Country Status (1)

Country Link
CN (1) CN113132411A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113708936A (en) * 2021-08-26 2021-11-26 南京邮电大学 Block chain-based multiple scattered order verification method and system for personal information
CN114726538A (en) * 2022-04-02 2022-07-08 湖南天河国云科技有限公司 Covert communication method based on block link signature

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011813A (en) * 2019-04-12 2019-07-12 湘潭大学 A kind of data hiding transmission method based on block chain
CN110225016A (en) * 2019-05-31 2019-09-10 北京理工大学 A kind of data hiding transmission method based on block chain network
CN112600665A (en) * 2020-12-25 2021-04-02 江苏通付盾区块链科技有限公司 Covert communication method, device and system based on block chain and encryption technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011813A (en) * 2019-04-12 2019-07-12 湘潭大学 A kind of data hiding transmission method based on block chain
CN110225016A (en) * 2019-05-31 2019-09-10 北京理工大学 A kind of data hiding transmission method based on block chain network
CN112600665A (en) * 2020-12-25 2021-04-02 江苏通付盾区块链科技有限公司 Covert communication method, device and system based on block chain and encryption technology

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113708936A (en) * 2021-08-26 2021-11-26 南京邮电大学 Block chain-based multiple scattered order verification method and system for personal information
CN113708936B (en) * 2021-08-26 2022-08-16 南京邮电大学 Block chain-based multiple scattered order verification method and system for personal information
CN114726538A (en) * 2022-04-02 2022-07-08 湖南天河国云科技有限公司 Covert communication method based on block link signature
CN114726538B (en) * 2022-04-02 2024-03-29 湖南天河国云科技有限公司 Hidden communication method based on block link signature

Similar Documents

Publication Publication Date Title
US11381389B2 (en) Computer-implemented method of generating a threshold vault
CN109478223B (en) Method and system for realizing block chain
US11677566B2 (en) Systems and methods for signing of a message
US8437474B2 (en) Public key encryption for groups
US8654975B2 (en) Joint encryption of data
CA3048425A1 (en) System and method for an electronic identity brokerage
Rosenberg Handbook of financial cryptography and security
Hung et al. Multiparty quantum private comparison with almost dishonest third parties for strangers
CN110912897B (en) Book resource access control method based on ciphertext attribute authentication and threshold function
CN111429138A (en) Block link point data safety interaction method and first interaction node
CN113132411A (en) Data hidden transmission method based on block chain
JP6041864B2 (en) Method, computer program, and apparatus for data encryption
Yang et al. Improved outsourced private set intersection protocol based on polynomial interpolation
CN115396115B (en) Block chain data privacy protection method, device, equipment and readable storage medium
CN112734423A (en) Transaction method based on block chain and terminal equipment
Cao et al. A two-party privacy preserving set intersection protocol against malicious users in cloud computing
CN114514550A (en) Partitioning requests into blockchains
CN116561791A (en) Privacy exchange method, device and storage medium
Feng et al. Research on privacy enhancement scheme of blockchain transactions
CN116015592A (en) Homomorphic encryption system meeting zero knowledge proof
Zhao et al. Information security of new media art platform of distributed system based on blockchain technology
Islam et al. PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments
Li et al. Blockchain Encryption Algorithm Based on Aggregated Signature
Tanwar Basics of cryptographic primitives for blockchain development
Estensen A comparison of monero and zcash

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20221008

Address after: Room 305, No. 188, Zhugushi Road, Wulian, Central City, Longgang Street, Longgang District, Shenzhen, Guangdong 518100

Applicant after: Jiaqiao (Shenzhen) Investment Co.,Ltd.

Address before: D-1908, 19th floor, building 222, Wangjing Xiyuan, Chaoyang District, Beijing

Applicant before: Yongqi (Beijing) Technology Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20210716

RJ01 Rejection of invention patent application after publication