TW202324966A - Verification concealment method and system with master-slave architecture capable of sending secret data back to the server end without interference so as to obtain verification from the server end - Google Patents
Verification concealment method and system with master-slave architecture capable of sending secret data back to the server end without interference so as to obtain verification from the server end Download PDFInfo
- Publication number
- TW202324966A TW202324966A TW110145297A TW110145297A TW202324966A TW 202324966 A TW202324966 A TW 202324966A TW 110145297 A TW110145297 A TW 110145297A TW 110145297 A TW110145297 A TW 110145297A TW 202324966 A TW202324966 A TW 202324966A
- Authority
- TW
- Taiwan
- Prior art keywords
- vector
- matrix
- information device
- secret
- parity check
- Prior art date
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本發明係有關一種主從式架構之驗証隱匿方法及系統,尤指一種能利用系統化同位查核矩陣以於進行矩陣嵌入時可以避免徵狀解碼與複雜問題並達到嵌入資料目的的主從式架構驗証隱匿技術。 The present invention relates to a verification concealment method and system of a master-slave architecture, especially a master-slave architecture that can use a systematic parity check matrix to avoid symptom decoding and complex problems when embedding the matrix and achieve the purpose of embedding data Verify stealth techniques.
按,隨著資訊科技的蓬勃發展,連帶使得網際網路的相關應用已成為人們生活中不可或缺的一部份,故而在伺服器端與使用者端之間確實存在著資料傳輸量鉅大的網路應用需求,而且在網路駭客技術不斷翻新之下,以致網路攻擊與駭客行為也是無孔不入,致使現今網路資訊安全造成重大財務與工作效益的危害,因此,網路資訊安全儼然成為現今網路資料傳輸的重要考量與各機關企業所極度關注的焦點。 By the way, with the vigorous development of information technology, related Internet applications have become an indispensable part of people's lives, so there is indeed a huge amount of data transmission between the server end and the user end. Network application requirements, and under the continuous renovation of network hacking technology, network attacks and hacker behaviors are also pervasive, causing today's network information security to cause major financial and work benefits. Therefore, network information security is like a It has become an important consideration in today's network data transmission and the focus of extreme attention of various agencies and enterprises.
依據相關新聞報導,我國在2017年上半年網路資料傳輸的外洩事件就已經超過2016全年的總和,可見資料外洩事件已成為現今的常態,因此,如何有效降低資料外洩事件與強化網路資訊安全確實已成為現今各產學業界所必須挑戰與解決的技術課題。再者,一般在傳統資訊傳輸的加密系統中,大多會利用一些難以破解之暗門進行明文的保護。一般在編碼學中,如果使用一個隨機沒有固定結構的同位查核矩陣時,被證明是具有NP-complete的解碼會有如下所示的問題產生: According to relevant news reports, in the first half of 2017, my country's network data leakage incidents have exceeded the sum of 2016. It can be seen that data leakage incidents have become the norm today. Therefore, how to effectively reduce data leakage incidents and strengthen Network information security has indeed become a technical issue that must be challenged and solved by various industries and academia. Furthermore, generally in the encryption system of traditional information transmission, some hard-to-crack secret doors are usually used to protect the plaintext. Generally in coding, if a random parity check matrix with no fixed structure is used, the decoding that is proved to be NP-complete will have the following problems:
1.最大似然函數解碼問題。 1. Maximum likelihood function decoding problem.
2.徵狀解碼問題。 2. Symptom decoding problem.
上述兩個解碼問題在沒有特定碼結構情況下是難以用有效演算法進行求解。這兩個問題的主要求解都與同位查核矩陣H有關,而且在無法得知私鑰矩陣的情況下,是難以進行上述兩問題去暴力求解密秘隱匿資料,因而造成網路資訊傳輸的不便與困擾情事產生,因此,如何開發出一種具備主從式架構之驗証隱匿技術實已成為相關技術領域產學業者所亟欲解決與挑戰的技術課題。 The above two decoding problems are difficult to solve with effective algorithms without a specific code structure. The main solutions to these two problems are related to the parity check matrix H , and in the absence of the private key matrix, it is difficult to solve the above two problems to brute force the secret hidden data, thus causing inconvenience and difficulty in network information transmission. Troubled things happen. Therefore, how to develop a verification concealment technology with a master-slave architecture has become a technical issue that industry, academia and industry in related technical fields want to solve and challenge.
緣是,基於相關產業的迫切需求之下,本發明人等乃憑藉多年之實務經驗及相關的專業知識,經不斷的努力研發之下,終於研發出一種有別於習知技術而具備主從式架構之驗証隱匿技術的本發明。 The reason is that, based on the urgent needs of related industries, the inventors have finally developed a master-slave technology that is different from the conventional technology through continuous efforts in research and development by virtue of years of practical experience and relevant professional knowledge. The present invention of authentication concealment technology of formula architecture.
本發明主要目的,在於提供一種主從式架構之驗証隱匿方法及系統,主要是利用系統化的同位查核矩陣以於矩陣嵌入時可以避免徵狀解碼之複雜問題,並達到嵌入資料之的目的,由於使用者擁有各自專屬的傳輸通道,所以可在不互相干擾的情況下將密秘資料回傳給伺服器端,藉以獲得到伺服器端的驗証而提升網路資訊傳輸的安全性。達成本發明主要目的之技術手段,係包括網路通訊系統、第一資訊裝置及第二資訊裝置。該第一資訊裝置內建已知的隨機同位查核矩陣,並利用高斯消去法產生公鑰與私鑰,公鑰透過網路通訊系統傳輸至第二資訊裝置。第二 資訊裝置內建已知長度為的載體向量與密秘向量,使用公鑰產生轉換密秘向量及密秘子通道,並定義子通道位置集合,利用載體向量、該子通道位置集合、該系統化同位查核矩陣與該轉換密秘向量進行系統化STME矩陣嵌入演算法,以將轉換密秘向量嵌入於載體向量而形成隱匿向量,並將隱匿向量傳回第一資訊裝置資訊,利用私鑰進行密秘向量取出,並使用隨機同位查核矩陣將密秘向量的密秘訊息取出。 The main purpose of the present invention is to provide a verification concealment method and system of a master-slave structure, which mainly utilizes a systematic parity check matrix to avoid the complicated problem of symptom decoding when the matrix is embedded, and achieve the purpose of embedding data. Since users have their own exclusive transmission channels, they can send secret data back to the server without interfering with each other, so as to obtain verification from the server and improve the security of network information transmission. The technical means to achieve the main purpose of the present invention include a network communication system, a first information device and a second information device. The first information device has a built-in known random parity check matrix, and uses the Gaussian elimination method to generate a public key and a private key, and the public key is transmitted to the second information device through the network communication system. second The information device has built-in carrier vectors and secret vectors with a known length of , uses the public key to generate and convert secret vectors and secret sub-channels, and defines a set of sub-channel positions. Using the carrier vector, the set of sub-channel positions, and the systematic Perform a systematic STME matrix embedding algorithm on the parity check matrix and the conversion secret vector to embed the conversion secret vector into the carrier vector to form a hidden vector, and send the hidden vector back to the information of the first information device, and use the private key to encrypt The secret vector is taken out, and the secret information of the secret vector is taken out by using the random parity check matrix.
10:網路通訊系統 10: Network communication system
20:第一資訊裝置 20: The first information device
30:第二資訊裝置 30: The second information device
40:第一網路傳輸模組 40: The first network transmission module
50:第二網路傳輸模組 50:Second network transmission module
圖1係本發明具體實施架構的示意圖。 FIG. 1 is a schematic diagram of a specific implementation framework of the present invention.
圖2係本發明系統架構的實施示意圖。 FIG. 2 is a schematic diagram of the implementation of the system architecture of the present invention.
為讓 貴審查委員能進一步瞭解本發明整體的技術特徵與達成本發明目的之技術手段,玆以具體實施例並配合圖式加以詳細說明如下: In order to allow your review committee to further understand the overall technical characteristics of the present invention and the technical means to achieve the purpose of the present invention, specific embodiments and accompanying drawings are described in detail as follows:
請配合參看圖1~2所示,為達成本發明主要目的之具體實施例,係包括一網路通訊系統10(如網際網路或行動通訊網路)、至少一第一資訊裝置20(如電腦、智慧型手機;或具聯網功能的資訊裝置)及一第二資訊裝置30(如伺服器)等技術內容。該第一資訊裝置20係位於使用者端,於第一資訊裝置20內建一個已知的隨機同位查核矩陣H,並利用高斯消去法將隨機同位查核矩陣H進行分割後產生公鑰與私鑰,該私鑰包含隨機同位查核矩陣H及矩陣P,並由第一資訊裝置20自行保密該私鑰,該公鑰包含矩陣L與系統化同位查核矩陣H s ,並透過網路通訊系統10傳輸至第二資訊裝置30。該第二資訊裝置30位於伺服器端,該第一資訊裝置20係以網
路通訊系統10與第二資訊裝置30資訊連結,於該第二資訊裝置30內建一個已知長度為n的載體向量v與一個長度為m的密秘向量s l ,使用矩陣L產生轉換密秘向量s l ',並使用系統化同位查核矩陣H s 產生密秘子通道,並定義出一個子通道位置集合S i ,利用載體v、子通道位置集合S i 、系統化同位查核矩陣H s 與轉換密秘向量s l'進行系統化STME矩陣嵌入演算法的運算,以將轉換密秘向量s l '嵌入於載體向量v而形成隱匿向量l',並將隱匿向量l'透過網路通訊系統10傳回第一資訊裝置20資訊。於第一資訊裝置20接收隱匿向量l',並利用私鑰之該隨機同位查核矩陣H及矩陣P進行密秘向量s l 取出,並使用隨機同位查核矩陣H將密秘向量s l 的密秘訊息取出。
Please cooperate and refer to shown in Fig. 1~2, in order to reach the specific embodiment of the main purpose of the present invention, system comprises a network communication system 10 (such as Internet or mobile communication network), at least one first information device 20 (such as computer , smart phone; or an information device with networking function) and a second information device 30 (such as a server) and other technical content. The
具體的,該公鑰與該私鑰的關係表示為:H=LH S P,其中,H s 是一個m×n的系統化同位查核矩陣、L為m×m的矩陣,P是n×n的矩陣。 Specifically, the relationship between the public key and the private key is expressed as: H = LH S P , where H s is an m × n systematic parity check matrix, L is an m × m matrix, and P is an n × n matrix.
具體的,該轉換密秘向量s l '定義為:。 Specifically, the conversion secret vector s l ' is defined as: .
具體的,該第二資訊裝置30係利用關係式:H s =[I,P γ ]求得該子通道,假設第i個使用者之該子通道定義為一個位置集合S i 如關係式:S i {1,2,L,n},並且該子通道長度為λ,使得|S i |=λ且m λ n,使得關係式為:H i =[I M i ] m×λ ,其中矩陣M i 是一個大小為m×(λ-m)的隨機矩陣,並且矩陣M i 的所有行向量為P γ 矩陣中的某些λ個行向量所組成。
Specifically, the
具體的,密秘訊息取出關係式表示為:v'=Pl'。 Specifically, the secret message extraction relational expression is expressed as: v' = Pl '.
具體的,於進行密秘向量s l 取出時,先進行該隱匿向量l'轉換,其關係式表示為:v'=Pl'。 Specifically, when extracting the secret vector s l , the hidden vector l ' is converted first, and its relational expression is expressed as: v' = Pl '.
請參看圖1所示的實施例,該第一資訊裝置20電性連接一第一網路傳輸模組40,該第二資訊裝置30電性連接一第二網路傳輸模組50,使該至少一第一資訊裝置20經由第一網路傳輸模組40、網路通訊系統10及第二網路傳輸模組50而與第二資訊裝置30資訊連結。
Please refer to the embodiment shown in FIG. 1, the
簡言之,本發明主要是利用矩陣嵌入(matrix embedding)的方法結合公鑰與私鑰驗証的技術進行隱匿資料的保護與嵌入。本發明除了嵌入矩陣嵌入的技術外,伺服器端(serve)將原始同位嵌入矩陣利用高斯消去法產生公錀並將公鑰傳輸給使用者端(client)。使用者端收到公鑰可進行矩陣嵌入演算法,在使用者端利用選擇子通道當成私鑰進行嵌入形成隱匿向量(stego)並傳輸回伺服器端。在此系統中,伺服器端產生之公鑰可讓使用者端得知是由伺服器端所發送達到資訊安全之不可否認性,使用者端使用公鑰與密秘子通道進行進行嵌入資料產生隱匿向量並送回至伺服器端,密秘子通道的功能是讓嵌入資料的使用者擁有自己傳輸的通道,並可以讓伺服器端進行使用者的驗証。 In short, the present invention mainly utilizes a matrix embedding method combined with a public key and private key authentication technology to protect and embed hidden data. In addition to the technology of embedding matrix embedding in the present invention, the server end (serve) uses the Gaussian elimination method to generate a public key from the original co-location embedding matrix and transmits the public key to the user end (client). After receiving the public key, the user end can perform matrix embedding algorithm, and use the selected sub-channel as the private key for embedding at the user end to form a stealth vector (stego) and transmit it back to the server end. In this system, the public key generated by the server can let the user know that it is sent by the server to achieve non-repudiation of information security, and the user uses the public key and the secret sub-channel to generate embedded data Conceal the vector and send it back to the server. The function of the secret sub-channel is to allow the user who embeds the data to have his own transmission channel, and to allow the server to verify the user.
本發明確實是一種可以有效解決鑰匙管理問題的一種技術解決方法。當使用者端欲傳送資料給伺服器端時,本發明提供一種可以進行驗証的公、私鑰隱匿機制。在伺服器端(serve),首先會產生一個欲進行資料嵌入之同位查核矩陣,之後對此同位查核矩陣進行高斯消去法產生發送之公鑰與私錀,公鑰是欲傳送給使用者端而私鑰保留當成是回傳之隱匿向量之取出使用。伺服器端將公鑰傳輸給使用者端(client)後,使用者端利用公鑰與密秘子通道進行密秘資料的嵌入,密秘子通道主要功能可以讓不同的使用者擁有自己的傳輸通道,如此各個使用者可以在不互相干擾的情況下將密秘資料回傳給伺服器端並獲得到伺服器端的驗証。在本發明中,係以 對同位查核矩陣H進行高斯消去法產生出公鑰矩陣與私鑰矩陣,在無法得知私鑰矩陣的情況下,是難以進行上述兩問題去暴力求解密秘隱匿資料。 The present invention is indeed a technical solution that can effectively solve the key management problem. When the user end wants to send data to the server end, the invention provides a public and private key concealment mechanism that can be verified. On the server side (serve), it will first generate a parity check matrix for data embedding, and then perform Gaussian elimination on this parity check matrix to generate the public key and private key for sending. The public key is intended to be sent to the user end. The private key is reserved for retrieval of the returned hidden vector. After the server transmits the public key to the client, the client uses the public key and the secret sub-channel to embed the secret data. The main function of the secret sub-channel allows different users to have their own transmission Channels, so that each user can return the secret data to the server and obtain verification from the server without interfering with each other. In the present invention, the public key matrix and the private key matrix are generated by performing Gaussian elimination on the co-location check matrix H. When the private key matrix cannot be known, it is difficult to perform the above two problems to brute force the secret hidden information .
本發明提出系統化矩陣嵌入演算法可以利用系統化的同位查核矩陣,當在進行矩陣嵌入時可以避免徵狀解碼問題複雜問題,並達到嵌入資料的方法。其演算法的流程如下所示的步驟: The present invention proposes that the systematic matrix embedding algorithm can utilize the systematic parity checking matrix, avoid the complex problem of symptom decoding when performing matrix embedding, and achieve the method of embedding data. The flow of its algorithm is as follows:
系統化STME演算法:已知一個隨機的系統化線性碼C且具有一個系統化之同位查核矩陣H s =[I P r ],如今已知一個長度為m之密秘向量s l 欲嵌入一個長度為n Systematic STME algorithm: Given a random systematic linear code C and a systematic parity check matrix H s =[IP r ], now a secret vector s l of length m is known to be embedded into a length for n
之載體向量y中形成一個長度為n之隱匿向量l',且隱匿向量l'是靠近載體向量y並具有徵狀s l ,其中,I為m×m的單位矩陣,Pr是隨機矩陣,T為載體向量y的轉置。 A hidden vector l ' of length n is formed in the carrier vector y , and the hidden vector l ' is close to the carrier vector y and has the symptom s l , where I is an m×m identity matrix, P r is a random matrix, T is the transpose of the vector vector y.
1.計算載體向量徵狀s y : 1. Calculate vector vector symptom s y :
s y =Hy T s y = Hy T
2.計算修改向量徵狀s x : 2. Calculate the modified vector symptom s x :
s x =s y -s l s x = s y - s l
3.產生子通道矩陣:已知一個修改位置集合S {1,2,...,λ},|S|=λ,m λ n,並獲得一個子矩陣,其行向量為j S:H sub =[h 1,h 2,...,h j ,...,h λ ],其中H sub H s ,最後之子通道矩陣為: 3. Generate a sub-channel matrix: a set of modification positions S is known {1,2,..., λ },| S |= λ , m lambda n , and obtain a submatrix with row vectors j S : H sub =[ h 1 , h 2 ,..., h j ,..., h λ ], where H sub H s , the final sub-channel matrix is:
θ={h i |i=1,2,...,h k ,h i H sub },其中det(θ)≠0 θ ={ h i | i =1,2,..., h k , h i H sub }, where det( θ )≠0
4.求修改向量x:利用子通道矩陣θ進行x的求解: 4. Find the modified vector x : use the sub-channel matrix θ to solve x :
x s =θ -1 s x ,其中,x s 為長度m之向量,並將x s 每一個元素對應s位置放回一個長度為n的零向量對應位置可得最後之修改向量x。 x s = θ -1 s x , where x s is a vector of length m , and the position of each element of x s corresponding to s is returned to the corresponding position of a zero vector of length n to obtain the final modified vector x .
5.隱匿向量l'可以用載體向量y減掉最佳修改向量x: 5. The hidden vector l ' can be subtracted from the vector vector y by the best modified vector x :
l'=y-x l ' = y - x
6.密秘向量取出方法為隱匿向量l'乘上同位查核矩陣H s : 6. The secret vector extraction method is to multiply the hidden vector l ' by the parity check matrix H s :
s l =H s l' T s l = H s l ' T
主從式架構驗証隱匿系統可從兩個方面進行討論,分別是(1)伺服器端與(2)使用者端。假設今使用者端欲傳輸一筆密秘向量資料給伺服器,以下將進行此過程的介紹。首先在伺服器端需產生伺服器端之公、私鑰如下: The master-slave architecture verification concealment system can be discussed from two aspects, namely (1) server side and (2) user side. Assuming that the user terminal wants to transmit a secret vector data to the server, the following will introduce the process. First, the public and private keys of the server need to be generated on the server side as follows:
1.首先伺服器端已知一個m×n隨機同位查核矩陣H,H中的元素佈於F q 且有一個欲藏匿的密秘向量s l ,其長度為m。 1. Firstly, the server side knows an m × n random parity check matrix H , the elements in H are distributed in F q and there is a secret vector s l to be hidden, the length of which is m .
2.伺服器端利用高斯消去法將H進行分割之後形成: 2. The server uses the Gaussian elimination method to divide H to form:
H=LH S P其中H s 是一個m×n的系統化矩陣、L為m×m的矩陣以及P是n×n的矩陣。 H = LH S P where H s is an m × n systematization matrix, L is an m × m matrix, and P is an n × n matrix.
3.伺服器產生之公鑰為矩陣L與H s ,而私鑰為矩陣H與P。當伺服器端產生公、私鑰後,私鑰H與P伺服器端自行保密,並將公鑰L與H s 傳輸給使用者端。在使用者端的嵌入流程如下: 3. The public key generated by the server is matrix L and H s , and the private key is matrix H and P . After the server side generates the public and private keys, the server side keeps the private keys H and P secret, and transmits the public keys L and Hs to the user side. The embedding process on the user side is as follows:
1.使用者端接收公鑰L與H s ,且已知一個長度為n之載體向量v與長度為m的密秘向量s l 。 1. The user end receives the public keys L and H s , and knows a vector v of length n and a secret vector s l of length m .
2.使用者端使用公鑰L產生轉換密秘向量s l '如下: 2. The client uses the public key L to generate the conversion secret vector s l ' as follows:
3.利用H s =[I,P γ ]產生密秘子通道如下:假設第i個使用者之子通道定義為一個位置集合S i 如下: 3. Use H s =[ I , P γ ] to generate a secret sub-channel as follows: Assume that the i -th user’s sub-channel is defined as a position set S i as follows:
S i {1,2,L,n}並且子通道長度為λ使得|S i |=λ且m λ n使得:H i =[I M i ] m×λ 其中矩陣M i 是一個大小為m×(λ-m)的隨機矩陣並且矩陣M i 的所有行向量為P γ 矩陣中的某些λ個行向量所組成。 Si _ {1,2,L, n } and the subchannel length is λ such that | S i |= λ and m lambda n such that: H i = [ IM i ] m × λ where matrix M i is a random matrix of size m × ( λ − m ) and all row vectors of matrix M i are some λ rows in matrix P γ composed of vectors.
4.利用載體v、子通道位置集合s i 、系統化同位查核矩陣H s 與轉換密秘向量s l'進行上述之系統化STME矩陣嵌入演算法將轉換密秘向量s l '嵌入載體v形成隱匿向量l',並將隱匿向量l'傳回伺服器端。 4. Using the carrier v , the sub-channel position set s i , the systematic parity check matrix H s and the conversion secret vector s l ', perform the above-mentioned systematic STME matrix embedding algorithm to embed the conversion secret vector s l ' into the carrier v to form Hide the vector l ', and send the hidden vector l ' back to the server.
5.在伺服器端接收隱匿向量l'並利用密鑰H與P進行密秘向量取出如下:首先進行隱匿向量轉換: 5. Receive the hidden vector l ' on the server side and use the keys H and P to extract the secret vector as follows: First, convert the hidden vector:
v'=Pl',並使用H將密秘訊息取出: v' = Pl ', and use H to retrieve the secret message:
Hv'=s l Hv '= s l
以下利用範例說明。設有一個同位查核矩陣大小為m×n的H且其中元素佈於F q 我們利用以下參數之隨機矩陣進行說明。 The following uses an example to illustrate. Assuming a parity check matrix H whose size is m × n and whose elements are distributed in F q , we use a random matrix with the following parameters for illustration.
q=3,n=13,m=3,k=n-m=10 q =3, n =13, m =3, k = n - m =10
上述參數之同位查核矩陣為: The parity check matrix of the above parameters is:
利用高斯消去法獲得: Using Gaussian elimination method to get:
與 and
伺服器端將公鑰H s 與L傳給使用者端。使用者端使用H s 嵌入長度為m=3密秘向量s l =(1,2,0)到一個長度為n=13的載體向量u=(1,1,1,1,0,0,0,0,0,0,0,0,0),由上述可知: The server sends the public keys H s and L to the user. The user end uses H s to embed the secret vector s l =(1,2,0) of length m =3 into a vector vector u =(1,1,1,1,0,0, 0,0,0,0,0,0,0), we can see from the above:
使得: makes:
利用H s 將轉換密秘向量嵌入載體u=(1,1,1,1,0,0,0,0,0,0,0,0,0)。利用系統化STME嵌入演算法可得隱匿向量為: Using H s will transform the secret vector Embedding vector u = (1,1,1,1,0,0,0,0,0,0,0,0,0). Using the systematic STME embedding algorithm, the hidden vector can be obtained as:
v'=u-x=(1,1,1,1,0,0,0,2,0,0,0,0,0),最後並將隱匿向量回值至伺服器端,在伺服器端接收到l'時,進行下式計算: v' = u - x = (1,1,1,1,0,0,0,2,0,0,0,0,0), and finally return the hidden vector to the server side, where the server When the terminal receives l ', it performs the following calculation:
v=P -1 v'=(0,2,0,0,0,0,0,0,1,1,0,1,1)T最後可得: v = P -1 v' = (0,2,0,0,0,0,0,0,1,1,0,1,1) T can finally get:
s l =H v s l = H v
經上述具體實施例的說明后,本發明確實可以利用系統化的同位查核矩陣以於矩陣嵌入時可以避免徵狀解碼之複雜問題,並達到嵌入資料之的目的,由於使用者擁有各自專屬的傳輸通道,所以可在不互相干擾的情況下將密秘資料回傳給伺服器端,藉以獲得到伺服器端的驗証而提升資訊傳輸的安全性。 After the description of the above-mentioned specific embodiments, the present invention can indeed use the systematic parity check matrix to avoid the complicated problem of symptom decoding when the matrix is embedded, and achieve the purpose of embedding data, because users have their own exclusive transmission channel, so the secret data can be returned to the server without mutual interference, so as to obtain the verification of the server and improve the security of information transmission.
以上所述,僅為本發明之可行實施例,並非用以限定本發明之專利範圍,凡舉依據下列請求項所述之內容、特徵以及其精神而為之其他變化的等效實施,皆應包含於本發明之專利範圍內。本發明所具體界定於請求項之結構特徵,未見於同類物品,且具實用性與進步性,已符合發明專利要件,爰依法具文提出申請,謹請 鈞局依法核予專利,以維護本申請人合法之權益。 The above is only a feasible embodiment of the present invention, and is not intended to limit the patent scope of the present invention. Any equivalent implementation of other changes based on the content, characteristics and spirit of the following claims should be Included in the patent scope of the present invention. The structural features of the invention specifically defined in the claims are not found in similar items, and are practical and progressive, and have met the requirements of an invention patent. I file an application in accordance with the law. I would like to ask the Jun Bureau to approve the patent in accordance with the law to maintain this invention. The legitimate rights and interests of the applicant.
10:網路通訊系統 10: Network communication system
20:第一資訊裝置 20: The first information device
30:第二資訊裝置 30: The second information device
40:第一網路傳輸模組 40: The first network transmission module
50:第二網路傳輸模組 50:Second network transmission module
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110145297A TWI796862B (en) | 2021-12-03 | 2021-12-03 | Method and system for verification concealment of master-slave architecture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110145297A TWI796862B (en) | 2021-12-03 | 2021-12-03 | Method and system for verification concealment of master-slave architecture |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI796862B TWI796862B (en) | 2023-03-21 |
TW202324966A true TW202324966A (en) | 2023-06-16 |
Family
ID=86692455
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW110145297A TWI796862B (en) | 2021-12-03 | 2021-12-03 | Method and system for verification concealment of master-slave architecture |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI796862B (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025489A (en) * | 2009-09-11 | 2011-04-20 | 吉林大学 | Public key cryptography improvement method for hidden field ergodic matrices and signature scheme |
US8621227B2 (en) * | 2010-12-28 | 2013-12-31 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
US11218303B2 (en) * | 2020-03-27 | 2022-01-04 | Ahp-Tech Inc. | Quantum attack-resistant system to facilitate and enhance processes of cryptography key exchange |
-
2021
- 2021-12-03 TW TW110145297A patent/TWI796862B/en active
Also Published As
Publication number | Publication date |
---|---|
TWI796862B (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abd El-Latif et al. | Secure quantum steganography protocol for fog cloud internet of things | |
Sun et al. | Improvements on “multiparty quantum key agreement with single particles” | |
CN111222158B (en) | Block chain-based two-party security and privacy comparison method | |
Selva Mary et al. | Secure grayscale image communication using significant visual cryptography scheme in real time applications | |
Yan et al. | A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter | |
Duong-Ngoc et al. | Efficient NewHope cryptography based facial security system on a GPU | |
Qian et al. | Speech authentication and content recovery scheme for security communication and storage | |
Yu et al. | Quantum secure direct communication with authentication using two nonorthogonal states | |
CN110569672A (en) | efficient credible electronic signature system and method based on mobile equipment | |
Bagga et al. | Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system | |
Hussain et al. | Secure password transmission for web applications over internet using cryptography and image steganography | |
CN108880782B (en) | Minimum value secret computing method under cloud computing platform | |
TWI796862B (en) | Method and system for verification concealment of master-slave architecture | |
Deng et al. | A lightweight identity-based remote data auditing scheme for cloud storage | |
Zhao et al. | Iris template protection based on randomized response technique and aggregated block information | |
Li et al. | A novel quantum anonymous ranking protocol | |
Wang et al. | Secure and efficient image transmission scheme for smart cities using sparse signal transformation and parallel compressive sensing | |
Palathingal et al. | Enhanced cloud data security using combined encryption and steganography | |
Cao et al. | Fuzzy Identity‐Based Ring Signature from Lattices | |
Tripathi et al. | Enhancing Security of PGP with Steganography | |
CN113904833A (en) | Dynamic multi-factor identity authentication method and communication method based on threshold | |
Wang et al. | A Secure Face Verification Scheme Based on Fully Homomorphic Encryption with Anonymity | |
CN113330712A (en) | Encryption system and method using permutation group-based encryption technology | |
Manivannan et al. | Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC Based Cryptosystem | |
Jia et al. | Auxiliary system for contract signing based on electronic signature technology |