CN114614981A - Hidden information transmission method and device based on-chain negotiation - Google Patents

Hidden information transmission method and device based on-chain negotiation Download PDF

Info

Publication number
CN114614981A
CN114614981A CN202210157109.0A CN202210157109A CN114614981A CN 114614981 A CN114614981 A CN 114614981A CN 202210157109 A CN202210157109 A CN 202210157109A CN 114614981 A CN114614981 A CN 114614981A
Authority
CN
China
Prior art keywords
address
transaction
slice
transmitted
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210157109.0A
Other languages
Chinese (zh)
Other versions
CN114614981B (en
Inventor
伍前红
裴千漫
张涛
张宇鹏
李明航
付婉婷
王堃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN202210157109.0A priority Critical patent/CN114614981B/en
Publication of CN114614981A publication Critical patent/CN114614981A/en
Application granted granted Critical
Publication of CN114614981B publication Critical patent/CN114614981B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a hidden information transmission method and a device based on-chain negotiation, wherein the method comprises the following steps: by means of sending the public keys of both parties leaked in the blockchain transaction, an uncommon communication address can be negotiated through a key negotiation algorithm under the condition that the offline negotiation is hardly carried out, and therefore privacy protection of identities of both communication parties and denial of communication behaviors are achieved. In addition, the information is split and embedded into a plurality of different blockchain transactions, so that the efficiency and the safety of covert transmission are improved. Therefore, the problems of low efficiency and low safety of single block chain hidden transmission, communication address negotiation and the like in information transmission are solved.

Description

Hidden information transmission method and device based on-chain negotiation
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for hidden information transmission based on-chain negotiation.
Background
The block chain-based data hiding transmission is mainly carried out by embedding information into a transaction, then sending and broadcasting the transaction, wherein three parts possibly need to be negotiated by two communication parties, the first part is that a transaction sending address needs to be informed to a receiving party, the second part is that a secret key of the hidden information for encryption transmission needs to be negotiated by the two parties, and the third part is the negotiation of a signature private key or a random number embedding rule. If the information is embedded into the random number used by the signature, a private key needs to be disclosed to a receiving party, so that the random number is calculated; or directly negotiate the way in which random numbers embed information, but this way is not flexible enough, and once a rule is found, information embedded subsequently through the rule is revealed.
DLchain designed by the related art leaks a private key by reusing a random number k in a signature process so as to accept a concealed message. Reusing the random number k makes the first part r of the signature equal, which makes this technique easy to find by adversaries. In addition to the covert channel being detectable, the adversary can also calculate the private key d thereby impersonating the owner of the corresponding bitcoin address.
In order to avoid the problems that the secret key leaks from a fake bit currency holder and is monitored by an adversary to a hidden channel due to the reuse of the random number, the related technology provides a method for avoiding the secret key from leaking to the adversary, and the method is to agree a random number k on a message transceiver in advanceleakAnd the receiving party is informed in advance of the transmission address a of the transactions. The method needs to agree a random number and a sending address in advance, and if an adversary monitors or performs impersonation attack in the negotiation process, the random number and the sending address may be leaked to cause the exposure of the identities of two communication parties.
In addition, a block chain concealed transmission scheme is provided by the related technology, and both message transmitting and receiving parties need to negotiate a symmetric key k through an ECDH algorithm in advancechatThe sender sends two transactions, for the first one, with kchatThe ciphertext after the hidden information is encrypted is used as a random number in the signature process; the signature process of the second transaction uses kchatAs a random number. The receiver recovers the private key of the sender through the second transaction, thereby recovering the ciphertext according to the first transaction. The scheme skillfully solves the problem of revealing the private key, and simultaneously proves the non-detectability of the channel through analysis. However, for each transaction, both parties need to generate different symmetric keys, which increases the key overhead; and the mode still carries out negotiation under the line, and cannot utilize the advantages of the block chain. The block scheme requires both parties to be informed in advance of an identifier for identifying encryption information and an encryption key, and also has the above-mentioned problems.
In the above technical solutions, the negotiation of the communication address and the key is realized in a traditional manner under the chain, but the negotiation under the chain is easily subjected to some malicious attacks, which directly affects the transmission and reception of the following messages. In addition, under special covert communication environments, both communication parties are likely not to have excessive offline communication negotiations, so that the downlink communication is reduced as much as possible. In addition, the communication address calculated by the traditional negotiation mode is obviously and directly associated with the two communication parties, identity information of the two communication parties can be mined out through the communication address by analyzing an adversary, and the two communication parties cannot deny communication behaviors.
Disclosure of Invention
The application provides a hidden information transmission method and device based on-chain negotiation, which aim to solve the problems of low efficiency and low safety of single block chain hidden transmission, communication address negotiation and the like during information transmission.
An embodiment of a first aspect of the present application provides a hidden information transmission method based on-chain negotiation, including the following steps: carrying out key agreement of a sender and a receiver by sending blockchain transaction to obtain a communication address and a symmetric encryption key; segmenting at least one block chain to obtain a plurality of slices, filling a message to be transmitted to the plurality of slices according to a preset filling rule, and encrypting by using the symmetric encryption key to generate the transmission slice to be transmitted; embedding the transmission slice to be transmitted into a preset field of the at least one block chain, serializing the preset field information according to a block chain transaction coding rule, and broadcasting the serialized preset field information; and receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be transmitted and the symmetric encryption key to obtain the message to be transmitted.
Optionally, in an embodiment of the present application, before performing key agreement between the sender and the receiver by sending the blockchain transaction, the method further includes: setting block chain address characteristic rules of the sender and the receiver so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules.
Optionally, in an embodiment of the present application, the performing key agreement between the sender and the receiver by sending a blockchain transaction to obtain a communication address and a symmetric encryption key includes: generating a block chain address of a receiving party as a sending address of the transaction according to the block chain address characteristic rule, generating a receiving address, and performing transaction sending and broadcasting on the sending address and the receiving address; scanning the transaction on the blockchain by the sender, screening out blockchain transactions of which the sending addresses have the blockchain address characteristic rule, acquiring the public key of the receiver according to a transaction list, encrypting according to the public key and an elliptic curve to generate a blockchain address, performing address private key negotiation according to a private key corresponding to the blockchain address, generating corresponding addresses as a receiving address and a transaction sending address of the transaction according to the blockchain address characteristic rule, and sending and broadcasting the transaction; the public key corresponding to the sending address of each transaction is obtained by scanning the transactions on the blockchain by the receiving party, the corresponding address is calculated, the receiving address is compared with the calculated address, if the public key is equal to the calculated address, the calculated address is proved to be the address calculated by the sending party, and the communication address and the symmetric encryption key are determined.
Optionally, in an embodiment of the present application, the segmenting at least one block chain to obtain multiple slices, filling a message to be transmitted to the multiple slices according to a preset filling rule, and encrypting the message by using the symmetric encryption key to generate the transmission slice to be transmitted includes: calling a random number generation function, and randomly selecting at least one block chain for data transmission; dividing the at least one block chain into a plurality of slices according to field structure characteristics, cutting the message to be transmitted, sequentially filling a part of the message to be transmitted into a payload of the slice according to the capacity of the slice, ending with an end symbol and a filling field, and adding a serial number of the slice at the head of the slice; splicing private keys in the symmetric encryption keys of the at least one block chain, and performing hash transformation on the spliced result to obtain a symmetric encryption key; and encrypting the payload of the slice by the symmetric encryption key, splicing the encrypted result to the back of the slice, and generating the transmission slice to be transmitted.
Optionally, in an embodiment of the present application, the receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the to-be-transmitted transmission slice sequence and the symmetric encryption key to obtain the to-be-transmitted message includes: selecting a slice corresponding to the message to be transmitted according to the communication address, and decoding the preset field information of the selected slice according to the block chain transaction coding rule and the symmetric encryption key to obtain each transaction field information; and solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
The embodiment of the second aspect of the present application provides a hidden information transmission apparatus based on-chain negotiation, including: the negotiation module is used for carrying out key negotiation between a sending party and a receiving party through sending blockchain transaction to obtain a communication address and a symmetric encryption key; the generating module is used for segmenting at least one block chain to obtain a plurality of slices, filling the message to be transmitted to the plurality of slices according to a preset filling rule, and encrypting the message by using the symmetric encryption key to generate the transmission slice to be transmitted; the broadcasting module is used for embedding the transmission slice to be transmitted into a preset field of the at least one block chain, serializing the preset field information according to a block chain transaction coding rule, and broadcasting the serialized preset field information; and the recovery module is used for receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be transmitted and the symmetric encryption key to obtain the message to be transmitted.
Optionally, in an embodiment of the present application, the method further includes: the setting module is used for setting block chain address characteristic rules of a sender and a receiver before carrying out key agreement of the sender and the receiver through sending block chain transaction so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules.
Optionally, in an embodiment of the present application, the negotiation module includes: the sending unit is used for generating a block chain address of a receiving party as a sending address of the transaction according to the block chain address characteristic rule, generating a receiving address, and sending and broadcasting the sending address and the receiving address in the transaction; the screening unit is used for screening out the blockchain transaction of which the sending address has the blockchain address characteristic rule by scanning the transaction on the blockchain by the sender, acquiring the public key of the receiver according to the transaction sheet, generating a blockchain address according to the public key and the elliptic curve encryption, performing address private key negotiation according to the private key corresponding to the blockchain address, generating the corresponding address as the receiving address and the transaction sending address of the transaction according to the blockchain address characteristic rule, and sending a transaction and broadcasting; and the comparison unit is used for scanning the transactions on the blockchain by the receiving party, acquiring the public key corresponding to the sending address of each transaction, calculating the corresponding address, comparing the receiving address with the calculated address, and if the receiving address and the calculated address are equal, proving that the calculated address is the address calculated by the sending party, and determining the communication address and the symmetric encryption key.
Optionally, in an embodiment of the present application, the generating module includes: the calling unit is used for calling a random number generation function and randomly selecting at least one block chain for data transmission; the cutting unit is used for cutting the at least one block chain into a plurality of slices according to the field structure characteristics, cutting the message to be transmitted, sequentially taking a part of the message to be transmitted according to the slice capacity, filling the part of the message to be transmitted into the payload of the slice, ending the part with an end character and a filling field, and adding a slice serial number at the head of the slice; the transformation unit is used for splicing the private keys in the symmetric encryption keys of the at least one block chain and carrying out Hash transformation on the spliced result to obtain the symmetric encryption keys; and the encryption unit is used for encrypting the payload of the slice through the symmetric encryption key, splicing the encrypted result behind the slice, and generating the transmission slice to be transmitted.
Optionally, in an embodiment of the present application, the recovery module includes: the decoding unit is used for selecting the slice corresponding to the message to be transmitted according to the communication address, decoding the preset field information of the selected slice according to the block chain transaction coding rule and the symmetric encryption key, and acquiring the transaction field information; and the solving unit is used for solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
Therefore, the application has at least the following beneficial effects:
according to the method and the device, by combining the cryptography characteristics in the elliptic curve digital signature algorithm and the Diffile-Hellman algorithm protocol, the communication address and the symmetric encryption key are asynchronously negotiated in a mode of sending transactions on the block chain, the communication under the chain is avoided as much as possible, and the information leakage and the attack probability are reduced. In addition, because the communication address and the address of the receiver are not visually associated in the application, even if the communication address is checked, the receiver can still deny the communication behavior, and further higher safety is provided for the concealed transmission of data. Therefore, the problems of low efficiency and low safety of single block chain hidden transmission, communication address negotiation and the like in information transmission are solved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of a method for hidden information transmission based on-chain negotiation according to an embodiment of the present application;
fig. 2 is a schematic diagram of a communication address negotiation process according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a flow of AES _ key generation in a multi-chain transmission scheme according to an embodiment of the present application;
fig. 4 is an exemplary diagram of a hidden information transmission apparatus based on-chain negotiation according to an embodiment of the present application.
Description of reference numerals: a negotiation module-100, a generation module-200, a broadcast module-300 and a recovery module-400.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The method and apparatus for hidden information transmission based on-chain negotiation according to the embodiments of the present application are described below with reference to the accompanying drawings. In the related art mentioned in the background art, two communication parties communicate with each other by using a common blockchain address in a mode of informing in advance under a chain, and an adversary may acquire a relationship between a transaction address and a transaction through aggregation analysis, so that identity information of the two communication parties is mined, the two communication parties cannot deny a covert communication behavior, and privacy of communication cannot be guaranteed. In addition, the covert information is transmitted over a single blockchain. The block-out rate in the bitcoin public chain is about one block out every ten minutes, and if the covert information is transmitted only by bitcoin, the receiver will wait a long time in the process of receiving the information. In the method, an extraordinary communication address can be negotiated through a key negotiation algorithm under the condition that the under-chain negotiation is hardly carried out, so that the privacy protection of the identities of two communication parties and the denial of the communication behavior are realized. In addition, the message is split and embedded into a plurality of different blockchain transactions, so that the efficiency and the safety of covert transmission are improved. Therefore, the problems of low efficiency and low safety of single block chain hidden transmission, communication address negotiation and the like in information transmission are solved.
Specifically, fig. 1 is a flowchart illustrating a hidden information transmission method based on-chain negotiation according to an embodiment of the present application.
As shown in fig. 1, the method for transmitting hidden information based on-chain negotiation includes the following steps:
in step S101, a key agreement between the sender and the receiver is performed by sending a blockchain transaction, so as to obtain a communication address and a symmetric encryption key.
It can be understood that by sending a way that the public keys of both parties are revealed in the blockchain transaction, an extraordinary communication address can be negotiated through a key negotiation algorithm under the condition that the under-chain negotiation is hardly performed, so that privacy protection of identities of both communication parties and denial of communication behaviors are realized. The specific implementation is described in detail below.
Optionally, in an embodiment of the present application, performing key agreement between the sender and the receiver by sending a blockchain transaction to obtain a communication address and a symmetric encryption key includes: generating a blockchain address of a receiving party as a sending address of the transaction according to the blockchain address characteristic rule, generating a receiving address, and carrying out transaction sending and broadcasting on the sending address and the receiving address; the method comprises the steps that a sender scans transactions on a blockchain, screens out blockchain transactions with sending addresses having blockchain address characteristic rules, obtains a public key of a receiver according to a transaction sheet, encrypts and generates a blockchain address according to the public key and an elliptic curve, negotiates an address private key according to a private key corresponding to the blockchain address, generates a corresponding address through the blockchain address characteristic rules as a receiving address and a transaction sending address of the transactions, and sends and broadcasts the transactions; the public key corresponding to the sending address of each transaction is obtained by scanning the transactions on the blockchain by the receiving party, the corresponding address is calculated, the receiving address is compared with the calculated address, if the public key is equal to the calculated address, the calculated address is proved to be the address calculated by the sending party, and the communication address and the symmetric encryption key are determined.
Specifically, in the embodiment of the present application, it is assumed that the communication sender is a and the communication receiver is B, and the communication address negotiation specifically includes the following steps:
(1) the message receiver B generates a special blockchain address as a sending address of the transaction according to the rule, then generates a receiving address, and then sends the transaction and broadcasts.
(2) The message sender A scans the transaction on the blockchain, screens out the blockchain transaction with the characteristics of the sending address, and acquires the public key pk of the receiver according to the transaction listB(the bitcoin and the Laite coin obtain the public key of the receiver according to the locking script field in the transaction, and the Ethengfang recovers the public key according to the signature field in the transaction list). pkBThe point on the corresponding elliptic curve is pkpointBThen the sender generates a common blockchain address general _ addr, and the private key corresponding to the address is skAAccording to the characteristics of ECDSA (elliptic curve digital signature algorithm), computing sk by using Diffile-Hellman key exchange protocolA·pkpointBThe obtained result is still the coordinate on an elliptic curve, the abscissa of the result is taken as the negotiated address private key (the private key can be transformed by some cryptology and then used as the password for encrypting subsequent informationKey), and then generates the corresponding address DH _ addr according to the block chain address generation rule. The sender A takes DH _ addr as the receiving address of the transaction and general _ addr as the sending address of the transaction, and sends a transaction and broadcasts the transaction.
(3) The message receiver B scans the transactions on the block chain to obtain the public key pk corresponding to the sending address of each transactionATo thereby obtain the corresponding pkpointAThe private key corresponding to the special address generated before the receiver B is skBCalculating skB·pkpointAAnd then, calculating a corresponding address DH _ addr 'according to the result, comparing the receiving address with the DH _ addr', and if the receiving address and the DH _ addr 'are equal, proving that the calculated DH _ addr' is the DH _ addr calculated by the sender, and the address is the communication address negotiated by the two communication parties through the key negotiation algorithm. Then the sender sends the transaction embedded with the hidden information through the address, and the receiver screens the blockchain transaction containing the hidden information through the address. The process of communication address negotiation is shown in fig. 2.
Optionally, in an embodiment of the present application, before performing key agreement between the sender and the receiver through sending the blockchain transaction, the method further includes: and setting block chain address characteristic rules of the sender and the receiver so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules. Specifically, before address negotiation is performed, the two communication links agree with a rule about the characteristics of the blockchain address, for example, how many bits are 0 before a result obtained after public key hash corresponding to the generated blockchain address passes through the sha256 algorithm.
It can be understood that, in the embodiment of the present application, the two communicating parties may negotiate a communication address and a symmetric encryption key by using the association between the elliptic curve digital signature and the blockchain transaction in a blockchain transaction manner on the chain, thereby avoiding a negotiation process under the chain. And it can be seen from fig. 2 that the message receiver is not directly associated with the finally negotiated communication address, so that when the message in the blockchain transaction is intercepted or the communication address DH _ addr is inadvertently leaked, the receiver can deny the covert communication action, thereby providing higher security for covert transmission of data.
In step S102, at least one block chain is segmented to obtain a plurality of slices, the message to be transmitted is filled into the plurality of slices according to a preset filling rule, and the plurality of slices are encrypted by using the symmetric encryption key to generate a transmission slice to be transmitted.
It should be noted that, in the embodiments of the present application, a single blockchain or multiple blockchains may be selected for the transmission of the concealment information. If the transmission is carried out by a plurality of block chains, communication address negotiation is required to be carried out for a plurality of times so as to negotiate out the address corresponding to the block chain, and a sender can send the transaction through a plurality of communication addresses. The sending and broadcasting of transactions includes the following processes: information splitting, information embedding and transaction coding. The specific implementation is as follows.
Optionally, in an embodiment of the present application, splitting information, that is, splitting at least one blockchain to obtain multiple slices, filling a message to be transmitted to the multiple slices according to a preset filling rule, and encrypting the message by using a symmetric encryption key to generate a transmission slice to be transmitted includes: calling a random number generation function, and randomly selecting at least one block chain for data transmission; dividing at least one block of block chain into a plurality of slices according to field structure characteristics, cutting a message to be transmitted, sequentially taking a part of the message to be transmitted according to slice capacity, filling the part of the message to be transmitted into a payload of the slice, ending with an end symbol and a filling field, and adding a slice serial number at the head of the slice; splicing private keys in the symmetric encryption keys of at least one block chain, and performing Hash transformation on the spliced result to obtain the symmetric encryption keys; and encrypting the payload of the slice by using the symmetric encryption key, splicing the encrypted result to the rear of the slice, and generating the transmission slice to be transmitted.
Specifically, in the embodiment of the present application, the information splitting may be performed according to the following steps:
if the multi-chain transmission method is adopted, a random number generation function is called, a block chain is randomly selected to embed the message, embedded fields are defined in advance according to the structural characteristics of the selected block chain, and the capacity of each transaction for containing the information is calculated according to the size of the fields. If single-chain transmission is adopted, block chains do not need to be selected randomly.
Judging the type of the message and calculating the total length of the message, embedding the two information into the slice header, then cutting the hidden information to be transmitted, taking a part of the message according to the slice capacity in sequence to fill in the slice payload, and finally ending with an end character and a filling field. The slice sequence number is then added to the slice header to identify the order of the slices.
According to the communication address negotiation step, two parties can obtain a negotiated private key, the sender splices the obtained private keys corresponding to a plurality of block chains, then uses the sha256 algorithm to carry out hash transformation on the spliced result (for example, execute the sha256 algorithm twice), takes the first 16 bytes as a symmetric encrypted key AES _ key, and directly transforms the negotiated private key to obtain the symmetric key if the single block chain is transmitted. The payload in the slice is then encrypted using the key, and the resulting concatenation is followed by the slice to form the final slice tx _ slice. The generation manner of the symmetric key in the multiple blockchain transmission message scheme is shown in fig. 3 (taking 3 blockchains as an example).
It should be noted that, in the process of generating the symmetric encryption key AES _ key, the manner of performing cipher transformation by using the result of splicing 1 private key or a plurality of negotiated private keys is not only that the cipher transformation is performed by a double hash algorithm, but also that the hash algorithm is performed only once or more times; the encryption key may also be generated by other encryption algorithms or data transformation. Specifically, the setting is performed by those skilled in the art according to actual conditions, and is not particularly limited herein.
In step S103, the transmission slice to be transmitted is embedded into a preset field of at least one block chain, the preset field information is serialized according to a block chain transaction coding rule, and the serialized preset field information is broadcasted.
Specifically, the information embedding method comprises the following specific steps: according to a block chain selected during information splitting, slice contents are respectively embedded into corresponding fields, and corresponding fields constructed by hidden information are stored by using a structural body tx _ msg, for example, fields used for hiding information in bitcoin include a transaction amount value, an output address toaddr, a signature sig of a transaction and the like.
The transaction coding comprises the following specific steps: and serializing the transaction by the constructed field information tx _ msg according to the transaction coding rule of the corresponding block chain to finally obtain the serialized transaction rawtx, and transmitting and broadcasting the message by calling the rpc interface corresponding to the block chain.
In step S104, receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be sent and the symmetric encryption key to obtain the message to be transmitted.
Optionally, in an embodiment of the present application, receiving serialized preset field information sent by a communication address, and recovering the preset field information according to a transmission slice sequence to be sent and a symmetric encryption key to obtain a message to be transmitted, where the method includes: selecting a slice corresponding to the message to be transmitted according to the communication address, and decoding preset field information of the selected slice according to a block chain transaction coding rule and a symmetric encryption key to obtain transaction field information; and solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
Specifically, in the embodiment of the present application, the receiving party continuously scans the transaction sent by the communication address on the block chain, establishes a session for receiving the message by transmitting a session _ id parameter, screens the transaction containing the hidden information by the session _ id, and then restores and integrates all slices in sequence to obtain the real hidden information. The whole process can be divided into three steps of transaction screening and analysis, slice processing and slice sequential recovery.
Transaction screening and decoding: establishing a received message session, transmitting parameters such as a session _ id and a communication address, screening out a blockchain transaction sent by three communication addresses, decoding the transaction to obtain field information of the transaction, recovering a first 4 bytes (namely a sequence) in one slice according to a field used for embedding information in the transaction, if the first byte of the sequence is the same as the session _ id, proving that the transaction belongs to one slice in the session transmission, and storing the subsequent part of the slice and the sequence as an index into a database.
And (3) slicing treatment: after the transactions belonging to a certain session are screened out, slice data are firstly obtained from a database according to an initial sequence number of session _ id left-shifted by 24 bits, 16 bytes behind the sequence number are msg _ IV used for encryption and decryption, and then an encrypted payload is obtained. And after decrypting the payload by the receiver, acquiring the payload with the end character and the padding character, and deleting the padding character and the end character at the tail to obtain the real effective part of the slice.
And (3) recovering the slices in sequence: when the real valid part msg _ slice of the first slice is recovered, the first byte of msg _ slice is msg _ type, the next two bytes are msg _ size, and the rest is the real hidden information slice. And the receiver continuously performs similar operation on the subsequent slices belonging to the session until the slices belonging to the session are processed, and finally the hidden information transmitted by the sender can be recovered.
According to the hidden information transmission method based on the on-chain negotiation, which is provided by the embodiment of the application, the communication address and the symmetric encryption key are asynchronously negotiated in a mode of sending transactions on the block chain by combining the cryptography characteristics in the elliptic curve digital signature algorithm and the Diffile-Hellman algorithm protocol, so that the off-chain communication is avoided as much as possible, and the information leakage and the attack probability are reduced. In addition, because the communication address and the address of the receiver are not visually associated in the application, even if the communication address is checked, the receiver can still deny the communication behavior, and further higher safety is provided for the concealed transmission of data.
Next, a proposed covert information transmitting apparatus based on-chain negotiation according to an embodiment of the present application is described with reference to the accompanying drawings.
Fig. 4 is a block diagram illustrating hidden information transmission based on-chain negotiation according to an embodiment of the present application.
As shown in fig. 4, the apparatus 10 for transmitting concealed information based on negotiation on chain includes: a negotiation module 100, a generation module 200, a broadcast module 300, and a recovery module 400.
The negotiation module 100 is configured to perform key negotiation between the sender and the receiver through sending blockchain transaction to obtain a communication address and a symmetric encryption key; the generating module 200 is configured to segment at least one block chain to obtain multiple slices, fill the to-be-transmitted message into the multiple slices according to a preset filling rule, and encrypt the to-be-transmitted message by using a symmetric encryption key to generate a to-be-transmitted slice; the broadcasting module 300 is configured to embed a transmission slice to be transmitted into a preset field of at least one block chain, serialize preset field information according to a block chain transaction coding rule, and broadcast the serialized preset field information; the recovery module 400 is configured to receive the serialized preset field information sent by the communication address, and recover the preset field information according to the transmission slice sequence to be sent and the symmetric encryption key to obtain a message to be transmitted.
Optionally, in an embodiment of the present application, the method further includes: and the setting module is used for setting the block chain address characteristic rules of the sender and the receiver before carrying out key agreement of the sender and the receiver through the block chain sending transaction so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules.
Optionally, in an embodiment of the present application, the negotiation module 100 includes: the sending unit is used for generating a blockchain address of a receiving party as a sending address of the transaction according to the blockchain address characteristic rule, generating a receiving address, and carrying out transaction sending and broadcasting on the sending address and the receiving address; the screening unit is used for screening the blockchain transaction of which the sending address has blockchain address characteristic rules by scanning the transaction on the blockchain by the sending party, acquiring the public key of the receiving party according to the transaction list, generating a blockchain address according to the public key and the elliptic curve encryption, performing address private key negotiation according to the private key corresponding to the blockchain address, generating the corresponding address as the receiving address and the transaction sending address of the transaction according to the blockchain address characteristic rules, and sending and broadcasting the transaction; and the comparison unit is used for scanning the transactions on the blockchain by the receiving party, acquiring the public key corresponding to the sending address of each transaction, calculating the corresponding address, comparing the receiving address with the calculated address, and if the receiving address and the calculated address are equal, proving that the calculated address is the address calculated by the sending party, and determining the communication address and the symmetric encryption key.
Optionally, in an embodiment of the present application, the generating module 200 includes: the calling unit is used for calling a random number generation function and randomly selecting at least one block chain for data transmission; the cutting unit is used for cutting at least one block of block chain into a plurality of slices according to the field structure characteristics, cutting the message to be transmitted, sequentially taking a part of the message to be transmitted according to the slice capacity, filling the part of the message to be transmitted into the payload of the slice, ending the part of the message to be transmitted by using an end character and a filling field, and adding a slice serial number at the head of the slice; the transformation unit is used for splicing the private keys in the symmetric encryption keys of at least one block chain and carrying out Hash transformation on the spliced result to obtain the symmetric encryption keys; and the encryption unit is used for encrypting the slice payload through the symmetric encryption key, splicing the encrypted result behind the slice, and generating a transmission slice to be transmitted.
Optionally, in an embodiment of the present application, the recovery module 400 includes: the decoding unit is used for selecting a slice corresponding to the message to be transmitted according to the communication address, decoding preset field information of the selected slice according to the block chain transaction coding rule and the symmetric encryption key, and acquiring transaction field information; and the solving unit is used for solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
It should be noted that the foregoing explanation on the embodiment of the method for transmitting hidden information based on-chain negotiation is also applicable to the apparatus for transmitting hidden information based on-chain negotiation in this embodiment, and is not repeated here.
According to the hidden information transmission device based on the chain negotiation, provided by the embodiment of the application, by combining the cryptography characteristics in the elliptic curve digital signature algorithm and the Diffile-Hellman algorithm protocol, the communication address and the symmetric encryption key are asynchronously negotiated in a mode of sending transactions on the block chain, the communication under the chain is avoided as much as possible, and the probability of information leakage and attack is reduced. In addition, because the communication address and the address of the receiver are not visually associated in the application, even if the communication address is checked, the receiver can still deny the communication behavior, and further higher safety is provided for the concealed transmission of data.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of implementing the embodiments of the present application.

Claims (10)

1. A hidden information transmission method based on-chain negotiation is characterized by comprising the following steps:
carrying out key agreement of a sender and a receiver by sending blockchain transaction to obtain a communication address and a symmetric encryption key;
segmenting at least one block chain to obtain a plurality of slices, filling a message to be transmitted to the plurality of slices according to a preset filling rule, and encrypting by using the symmetric encryption key to generate the transmission slice to be transmitted;
embedding the transmission slice to be transmitted into a preset field of the at least one block chain, serializing the preset field information according to a block chain transaction coding rule, and broadcasting the serialized preset field information;
and receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be transmitted and the symmetric encryption key to obtain the message to be transmitted.
2. The method of claim 1, wherein prior to performing key agreement between the sender and the receiver by sending a blockchain transaction, further comprising:
setting block chain address characteristic rules of the sender and the receiver so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules.
3. The method of claim 2, wherein the negotiating a key between the sender and the receiver by sending a blockchain transaction to obtain a communication address and a symmetric encryption key comprises:
generating a block chain address of a receiver as a sending address of the transaction according to the block chain address characteristic rule, generating a receiving address, and carrying out transaction sending and broadcasting on the sending address and the receiving address;
scanning the transaction on the blockchain by the sender, screening out blockchain transactions of which the sending addresses have the blockchain address characteristic rule, acquiring the public key of the receiver according to a transaction list, encrypting according to the public key and an elliptic curve to generate a blockchain address, performing address private key negotiation according to a private key corresponding to the blockchain address, generating corresponding addresses as a receiving address and a transaction sending address of the transaction according to the blockchain address characteristic rule, and sending and broadcasting the transaction;
the public key corresponding to the sending address of each transaction is obtained by scanning the transactions on the blockchain by the receiving party, the corresponding address is calculated, the receiving address is compared with the calculated address, if the public key is equal to the calculated address, the calculated address is proved to be the address calculated by the sending party, and the communication address and the symmetric encryption key are determined.
4. The method according to claim 2, wherein the segmenting at least one blockchain to obtain a plurality of slices, filling a message to be transmitted to the plurality of slices according to a preset filling rule, and encrypting the message by using the symmetric encryption key to generate the transmission slice to be transmitted includes:
calling a random number generation function, and randomly selecting at least one block chain for data transmission;
dividing the at least one block chain into a plurality of slices according to field structure characteristics, cutting the message to be transmitted, sequentially filling a part of the message to be transmitted into a payload of the slice according to the capacity of the slice, ending with an end symbol and a filling field, and adding a serial number of the slice at the head of the slice;
splicing private keys in the symmetric encryption keys of the at least one block chain, and performing hash transformation on the spliced result to obtain a symmetric encryption key;
and encrypting the payload of the slice by the symmetric encryption key, splicing the encrypted result to the back of the slice, and generating the transmission slice to be transmitted.
5. The method according to claim 2, wherein the receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be transmitted and the symmetric encryption key to obtain the message to be transmitted comprises:
selecting a slice corresponding to the message to be transmitted according to the communication address, and decoding the preset field information of the selected slice according to the block chain transaction coding rule and the symmetric encryption key to obtain each transaction field information;
and solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
6. A hidden information transmission apparatus based on-chain negotiation, comprising:
the negotiation module is used for carrying out key negotiation of a sender and a receiver through sending blockchain transaction to obtain a communication address and a symmetric encryption key;
the generating module is used for segmenting at least one block chain to obtain a plurality of slices, filling the message to be transmitted to the plurality of slices according to a preset filling rule, and encrypting the message by using the symmetric encryption key to generate the transmission slice to be transmitted;
the broadcasting module is used for embedding the transmission slice to be transmitted into a preset field of the at least one block chain, serializing the preset field information according to a block chain transaction coding rule, and broadcasting the serialized preset field information;
and the recovery module is used for receiving the serialized preset field information sent by the communication address, and recovering the preset field information according to the transmission slice sequence to be transmitted and the symmetric encryption key to obtain the message to be transmitted.
7. The apparatus of claim 6, further comprising:
the setting module is used for setting block chain address characteristic rules of a sender and a receiver before carrying out key agreement of the sender and the receiver through sending block chain transaction so as to identify the addresses of the sender and the receiver according to the block chain address characteristic rules.
8. The apparatus of claim 7, wherein the negotiation module comprises:
the sending unit is used for generating a block chain address of a receiving party as a sending address of the transaction according to the block chain address characteristic rule, generating a receiving address, and sending and broadcasting the sending address and the receiving address in the transaction;
the screening unit is used for screening out the blockchain transaction of which the sending address has the blockchain address characteristic rule by scanning the transaction on the blockchain by the sender, acquiring the public key of the receiver according to the transaction sheet, generating a blockchain address according to the public key and the elliptic curve encryption, performing address private key negotiation according to the private key corresponding to the blockchain address, generating the corresponding address as the receiving address and the transaction sending address of the transaction according to the blockchain address characteristic rule, and sending a transaction and broadcasting;
and the comparison unit is used for scanning the transactions on the blockchain by the receiving party, acquiring the public key corresponding to the sending address of each transaction, calculating the corresponding address, comparing the receiving address with the calculated address, and if the receiving address and the calculated address are equal, proving that the calculated address is the address calculated by the sending party, and determining the communication address and the symmetric encryption key.
9. The apparatus of claim 7, wherein the generating module comprises:
the calling unit is used for calling a random number generation function and randomly selecting at least one block chain for data transmission;
the cutting unit is used for cutting the at least one block chain into a plurality of slices according to the field structure characteristics, cutting the message to be transmitted, sequentially taking a part of the message to be transmitted according to the slice capacity, filling the part of the message to be transmitted into the payload of the slice, ending the part with an end character and a filling field, and adding a slice serial number at the head of the slice;
the transformation unit is used for splicing the private keys in the symmetric encryption keys of the at least one block chain and carrying out Hash transformation on the spliced result to obtain the symmetric encryption keys;
and the encryption unit is used for encrypting the payload of the slice through the symmetric encryption key, splicing the encrypted result to the back of the slice, and generating the transmission slice to be transmitted.
10. The apparatus of claim 7, wherein the recovery module comprises:
the decoding unit is used for selecting the slice corresponding to the message to be transmitted according to the communication address, decoding the preset field information of the selected slice according to the block chain transaction coding rule and the symmetric encryption key, and acquiring the transaction field information;
and the solving unit is used for solving the information of each transaction field according to the inverse process of the preset filling rule to obtain the message to be transmitted.
CN202210157109.0A 2022-02-21 2022-02-21 Hidden information transmission method and device based on-chain negotiation Active CN114614981B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210157109.0A CN114614981B (en) 2022-02-21 2022-02-21 Hidden information transmission method and device based on-chain negotiation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210157109.0A CN114614981B (en) 2022-02-21 2022-02-21 Hidden information transmission method and device based on-chain negotiation

Publications (2)

Publication Number Publication Date
CN114614981A true CN114614981A (en) 2022-06-10
CN114614981B CN114614981B (en) 2023-12-19

Family

ID=81859623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210157109.0A Active CN114614981B (en) 2022-02-21 2022-02-21 Hidden information transmission method and device based on-chain negotiation

Country Status (1)

Country Link
CN (1) CN114614981B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2017100426A4 (en) * 2017-04-18 2017-06-15 McAlister, Gary MR New Islamic Banking Sharia Compliant Blockchain Innovation Patent that has no riba, usury or interest component for but not limited to savings, deposit, ethical loans, finance, stock share bond, Private Placement Programs, Digitally discover new mine deposits to franchise & new monetary system using blockchains POS proof of stake/secondary mining mine discovery process of assets and commodities for entities such as but not limited to Governments, treasuries, central banks, banks, financial institutions, monetary funds, judicial entities, profit-sharing blockchain franchise investments PSBFI's.
CN107682308A (en) * 2017-08-16 2018-02-09 北京航空航天大学 The electronic evidence preservation system for Channel Technology of being dived based on block chain
CN110009499A (en) * 2019-04-17 2019-07-12 北京八分量信息科技有限公司 A kind of method of commerce and system based on block chain and hidden address
WO2019174187A1 (en) * 2018-03-12 2019-09-19 深圳壹账通智能科技有限公司 Blockchain-based method for message communication between multiple terminals, terminal and storage medium
CN112532613A (en) * 2020-11-25 2021-03-19 山东师范大学 Block chain address-based covert communication method
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN113438072A (en) * 2021-06-09 2021-09-24 北京理工大学 Block chain covert communication method based on derived chain
US20210319434A1 (en) * 2020-04-14 2021-10-14 Samsung Electronics Co., Ltd. Electronic device for sending cryptocurrency to blockchain account and method for operating the same
CN113507467A (en) * 2021-07-07 2021-10-15 浙江大学 Block chain-based hidden information transmission system and method
US20210409226A1 (en) * 2020-06-29 2021-12-30 Kirobo LTD. Reversible blockchain transaction techniques

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2017100426A4 (en) * 2017-04-18 2017-06-15 McAlister, Gary MR New Islamic Banking Sharia Compliant Blockchain Innovation Patent that has no riba, usury or interest component for but not limited to savings, deposit, ethical loans, finance, stock share bond, Private Placement Programs, Digitally discover new mine deposits to franchise & new monetary system using blockchains POS proof of stake/secondary mining mine discovery process of assets and commodities for entities such as but not limited to Governments, treasuries, central banks, banks, financial institutions, monetary funds, judicial entities, profit-sharing blockchain franchise investments PSBFI's.
CN107682308A (en) * 2017-08-16 2018-02-09 北京航空航天大学 The electronic evidence preservation system for Channel Technology of being dived based on block chain
WO2019174187A1 (en) * 2018-03-12 2019-09-19 深圳壹账通智能科技有限公司 Blockchain-based method for message communication between multiple terminals, terminal and storage medium
CN110009499A (en) * 2019-04-17 2019-07-12 北京八分量信息科技有限公司 A kind of method of commerce and system based on block chain and hidden address
US20210319434A1 (en) * 2020-04-14 2021-10-14 Samsung Electronics Co., Ltd. Electronic device for sending cryptocurrency to blockchain account and method for operating the same
US20210409226A1 (en) * 2020-06-29 2021-12-30 Kirobo LTD. Reversible blockchain transaction techniques
CN112532613A (en) * 2020-11-25 2021-03-19 山东师范大学 Block chain address-based covert communication method
CN113438072A (en) * 2021-06-09 2021-09-24 北京理工大学 Block chain covert communication method based on derived chain
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN113507467A (en) * 2021-07-07 2021-10-15 浙江大学 Block chain-based hidden information transmission system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吕婧淑等: "基于比特币系统的隐蔽通信技术", 《信息安全学报》, pages 144 - 151 *
张涛等: "基于比特币区块链的隐蔽信息传输研究", 《网络与信息安全学报》, pages 84 - 92 *

Also Published As

Publication number Publication date
CN114614981B (en) 2023-12-19

Similar Documents

Publication Publication Date Title
US5850443A (en) Key management system for mixed-trust environments
US9172529B2 (en) Hybrid encryption schemes
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
US6697488B1 (en) Practical non-malleable public-key cryptosystem
CN102065016B (en) Message method of sending and receiving and device, message processing method and system
CN111698084B (en) Block chain-based concealed communication method
CN114884716A (en) Encryption and decryption method, device and medium
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
US20200351100A1 (en) Cryptographic method for verifying data
CN111600829A (en) Secure communication method and system for Internet of things equipment
KR20200067265A (en) Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN114493593B (en) Multi-block chain hidden communication method
CN115277094A (en) Block chain-based communication method, terminal, system and storage medium
CN114422135A (en) Verifiable accidental transmission method based on elliptic curve
CN114928503B (en) Method for realizing secure channel and data transmission method
EP2571192A1 (en) Hybrid encryption schemes
CN114614981B (en) Hidden information transmission method and device based on-chain negotiation
CN114745101A (en) Hidden information transmission method and device based on multiple block chains
CN107888611B (en) Communication method and device
CN112291196B (en) End-to-end encryption method and system suitable for instant messaging
EP2047631B1 (en) Method for establishing a secret key between two nodes in a communication network
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology
CN112822015A (en) Information transmission method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant