TW202324966A - Verification concealment method and system with master-slave architecture capable of sending secret data back to the server end without interference so as to obtain verification from the server end - Google Patents

Verification concealment method and system with master-slave architecture capable of sending secret data back to the server end without interference so as to obtain verification from the server end Download PDF

Info

Publication number
TW202324966A
TW202324966A TW110145297A TW110145297A TW202324966A TW 202324966 A TW202324966 A TW 202324966A TW 110145297 A TW110145297 A TW 110145297A TW 110145297 A TW110145297 A TW 110145297A TW 202324966 A TW202324966 A TW 202324966A
Authority
TW
Taiwan
Prior art keywords
vector
matrix
information device
secret
parity check
Prior art date
Application number
TW110145297A
Other languages
Chinese (zh)
Other versions
TWI796862B (en
Inventor
林基源
王俊傑
吳書慶
張錫淵
林胤忱
Original Assignee
國立勤益科技大學
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 國立勤益科技大學 filed Critical 國立勤益科技大學
Priority to TW110145297A priority Critical patent/TWI796862B/en
Application granted granted Critical
Publication of TWI796862B publication Critical patent/TWI796862B/en
Publication of TW202324966A publication Critical patent/TW202324966A/en

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a verification concealment method and system with a master-slave architecture, which includes a network communication system, a first information device and a second information device. The first information device is built-in with a known random parity check matrix, and uses the Gaussian elimination method to generate a public key and a private key, wherein the public key is transmitted to the second information device through the network communication system. The second information device is built-in with a carrier vector and a secret vector with a known length. The public key is used to generate a conversion secret vector and secret sub-channels, and defines a sub-channel position set. By using the carrier vector, the sub-channel position set, a systematic parity check matrix and the conversion secret vector to perform a systematic STME matrix embedding algorithm, the conversion secret vector is embedded into the carrier vector for forming a hidden vector, and the information of the hidden vector is sent back to the first information device. The private key is used to take out the secret vector, and the random parity check matrix is used to take out the secret message of the secret vector, so that the systematic parity check matrix can be used to avoid the complicated problem of syndrome decoding when embedding the matrix thereby achieving the purpose of embedding data. Since each user has his/her own exclusive transmission channel, the secret data can be sent back to the server end without interfering with each other thereby obtaining verification from the server end.

Description

主從式架構之驗証隱匿方法及系統 Method and system for verification concealment of master-slave architecture

本發明係有關一種主從式架構之驗証隱匿方法及系統,尤指一種能利用系統化同位查核矩陣以於進行矩陣嵌入時可以避免徵狀解碼與複雜問題並達到嵌入資料目的的主從式架構驗証隱匿技術。 The present invention relates to a verification concealment method and system of a master-slave architecture, especially a master-slave architecture that can use a systematic parity check matrix to avoid symptom decoding and complex problems when embedding the matrix and achieve the purpose of embedding data Verify stealth techniques.

按,隨著資訊科技的蓬勃發展,連帶使得網際網路的相關應用已成為人們生活中不可或缺的一部份,故而在伺服器端與使用者端之間確實存在著資料傳輸量鉅大的網路應用需求,而且在網路駭客技術不斷翻新之下,以致網路攻擊與駭客行為也是無孔不入,致使現今網路資訊安全造成重大財務與工作效益的危害,因此,網路資訊安全儼然成為現今網路資料傳輸的重要考量與各機關企業所極度關注的焦點。 By the way, with the vigorous development of information technology, related Internet applications have become an indispensable part of people's lives, so there is indeed a huge amount of data transmission between the server end and the user end. Network application requirements, and under the continuous renovation of network hacking technology, network attacks and hacker behaviors are also pervasive, causing today's network information security to cause major financial and work benefits. Therefore, network information security is like a It has become an important consideration in today's network data transmission and the focus of extreme attention of various agencies and enterprises.

依據相關新聞報導,我國在2017年上半年網路資料傳輸的外洩事件就已經超過2016全年的總和,可見資料外洩事件已成為現今的常態,因此,如何有效降低資料外洩事件與強化網路資訊安全確實已成為現今各產學業界所必須挑戰與解決的技術課題。再者,一般在傳統資訊傳輸的加密系統中,大多會利用一些難以破解之暗門進行明文的保護。一般在編碼學中,如果使用一個隨機沒有固定結構的同位查核矩陣時,被證明是具有NP-complete的解碼會有如下所示的問題產生: According to relevant news reports, in the first half of 2017, my country's network data leakage incidents have exceeded the sum of 2016. It can be seen that data leakage incidents have become the norm today. Therefore, how to effectively reduce data leakage incidents and strengthen Network information security has indeed become a technical issue that must be challenged and solved by various industries and academia. Furthermore, generally in the encryption system of traditional information transmission, some hard-to-crack secret doors are usually used to protect the plaintext. Generally in coding, if a random parity check matrix with no fixed structure is used, the decoding that is proved to be NP-complete will have the following problems:

1.最大似然函數解碼問題。 1. Maximum likelihood function decoding problem.

2.徵狀解碼問題。 2. Symptom decoding problem.

上述兩個解碼問題在沒有特定碼結構情況下是難以用有效演算法進行求解。這兩個問題的主要求解都與同位查核矩陣H有關,而且在無法得知私鑰矩陣的情況下,是難以進行上述兩問題去暴力求解密秘隱匿資料,因而造成網路資訊傳輸的不便與困擾情事產生,因此,如何開發出一種具備主從式架構之驗証隱匿技術實已成為相關技術領域產學業者所亟欲解決與挑戰的技術課題。 The above two decoding problems are difficult to solve with effective algorithms without a specific code structure. The main solutions to these two problems are related to the parity check matrix H , and in the absence of the private key matrix, it is difficult to solve the above two problems to brute force the secret hidden data, thus causing inconvenience and difficulty in network information transmission. Troubled things happen. Therefore, how to develop a verification concealment technology with a master-slave architecture has become a technical issue that industry, academia and industry in related technical fields want to solve and challenge.

緣是,基於相關產業的迫切需求之下,本發明人等乃憑藉多年之實務經驗及相關的專業知識,經不斷的努力研發之下,終於研發出一種有別於習知技術而具備主從式架構之驗証隱匿技術的本發明。 The reason is that, based on the urgent needs of related industries, the inventors have finally developed a master-slave technology that is different from the conventional technology through continuous efforts in research and development by virtue of years of practical experience and relevant professional knowledge. The present invention of authentication concealment technology of formula architecture.

本發明主要目的,在於提供一種主從式架構之驗証隱匿方法及系統,主要是利用系統化的同位查核矩陣以於矩陣嵌入時可以避免徵狀解碼之複雜問題,並達到嵌入資料之的目的,由於使用者擁有各自專屬的傳輸通道,所以可在不互相干擾的情況下將密秘資料回傳給伺服器端,藉以獲得到伺服器端的驗証而提升網路資訊傳輸的安全性。達成本發明主要目的之技術手段,係包括網路通訊系統、第一資訊裝置及第二資訊裝置。該第一資訊裝置內建已知的隨機同位查核矩陣,並利用高斯消去法產生公鑰與私鑰,公鑰透過網路通訊系統傳輸至第二資訊裝置。第二 資訊裝置內建已知長度為的載體向量與密秘向量,使用公鑰產生轉換密秘向量及密秘子通道,並定義子通道位置集合,利用載體向量、該子通道位置集合、該系統化同位查核矩陣與該轉換密秘向量進行系統化STME矩陣嵌入演算法,以將轉換密秘向量嵌入於載體向量而形成隱匿向量,並將隱匿向量傳回第一資訊裝置資訊,利用私鑰進行密秘向量取出,並使用隨機同位查核矩陣將密秘向量的密秘訊息取出。 The main purpose of the present invention is to provide a verification concealment method and system of a master-slave structure, which mainly utilizes a systematic parity check matrix to avoid the complicated problem of symptom decoding when the matrix is embedded, and achieve the purpose of embedding data. Since users have their own exclusive transmission channels, they can send secret data back to the server without interfering with each other, so as to obtain verification from the server and improve the security of network information transmission. The technical means to achieve the main purpose of the present invention include a network communication system, a first information device and a second information device. The first information device has a built-in known random parity check matrix, and uses the Gaussian elimination method to generate a public key and a private key, and the public key is transmitted to the second information device through the network communication system. second The information device has built-in carrier vectors and secret vectors with a known length of , uses the public key to generate and convert secret vectors and secret sub-channels, and defines a set of sub-channel positions. Using the carrier vector, the set of sub-channel positions, and the systematic Perform a systematic STME matrix embedding algorithm on the parity check matrix and the conversion secret vector to embed the conversion secret vector into the carrier vector to form a hidden vector, and send the hidden vector back to the information of the first information device, and use the private key to encrypt The secret vector is taken out, and the secret information of the secret vector is taken out by using the random parity check matrix.

10:網路通訊系統 10: Network communication system

20:第一資訊裝置 20: The first information device

30:第二資訊裝置 30: The second information device

40:第一網路傳輸模組 40: The first network transmission module

50:第二網路傳輸模組 50:Second network transmission module

圖1係本發明具體實施架構的示意圖。 FIG. 1 is a schematic diagram of a specific implementation framework of the present invention.

圖2係本發明系統架構的實施示意圖。 FIG. 2 is a schematic diagram of the implementation of the system architecture of the present invention.

為讓 貴審查委員能進一步瞭解本發明整體的技術特徵與達成本發明目的之技術手段,玆以具體實施例並配合圖式加以詳細說明如下: In order to allow your review committee to further understand the overall technical characteristics of the present invention and the technical means to achieve the purpose of the present invention, specific embodiments and accompanying drawings are described in detail as follows:

請配合參看圖1~2所示,為達成本發明主要目的之具體實施例,係包括一網路通訊系統10(如網際網路或行動通訊網路)、至少一第一資訊裝置20(如電腦、智慧型手機;或具聯網功能的資訊裝置)及一第二資訊裝置30(如伺服器)等技術內容。該第一資訊裝置20係位於使用者端,於第一資訊裝置20內建一個已知的隨機同位查核矩陣H,並利用高斯消去法將隨機同位查核矩陣H進行分割後產生公鑰與私鑰,該私鑰包含隨機同位查核矩陣H及矩陣P,並由第一資訊裝置20自行保密該私鑰,該公鑰包含矩陣L與系統化同位查核矩陣H s ,並透過網路通訊系統10傳輸至第二資訊裝置30。該第二資訊裝置30位於伺服器端,該第一資訊裝置20係以網 路通訊系統10與第二資訊裝置30資訊連結,於該第二資訊裝置30內建一個已知長度為n的載體向量v與一個長度為m的密秘向量s l ,使用矩陣L產生轉換密秘向量s l ',並使用系統化同位查核矩陣H s 產生密秘子通道,並定義出一個子通道位置集合S i ,利用載體v、子通道位置集合S i 、系統化同位查核矩陣H s 與轉換密秘向量s l'進行系統化STME矩陣嵌入演算法的運算,以將轉換密秘向量s l '嵌入於載體向量v而形成隱匿向量l',並將隱匿向量l'透過網路通訊系統10傳回第一資訊裝置20資訊。於第一資訊裝置20接收隱匿向量l',並利用私鑰之該隨機同位查核矩陣H及矩陣P進行密秘向量s l 取出,並使用隨機同位查核矩陣H將密秘向量s l 的密秘訊息取出。 Please cooperate and refer to shown in Fig. 1~2, in order to reach the specific embodiment of the main purpose of the present invention, system comprises a network communication system 10 (such as Internet or mobile communication network), at least one first information device 20 (such as computer , smart phone; or an information device with networking function) and a second information device 30 (such as a server) and other technical content. The first information device 20 is located at the user end, a known random parity check matrix H is built in the first information device 20, and the random parity check matrix H is divided by the Gaussian elimination method to generate a public key and a private key , the private key includes random parity check matrix H and matrix P , and the private key is kept secret by the first information device 20 itself, the public key includes matrix L and systematic parity check matrix H s , and is transmitted through the network communication system 10 to the second information device 30 . The second information device 30 is located at the server end, the first information device 20 is connected to the second information device 30 through the network communication system 10, and a carrier with a known length n is built in the second information device 30 Vector v and a secret vector s l with a length of m , use the matrix L to generate the converted secret vector s l ', and use the systematic parity check matrix H s to generate a secret sub-channel, and define a sub-channel position set S i , use the carrier v , the sub-channel position set S i , the systematic parity check matrix H s and the conversion secret vector s l ' to carry out the operation of the systematic STME matrix embedding algorithm, so as to embed the conversion secret vector s l ' in The vector v is used to form a hidden vector l ', and the hidden vector l ' is sent back to the first information device 20 through the network communication system 10 for information. The first information device 20 receives the hidden vector l ', and uses the random parity check matrix H and matrix P of the private key to extract the secret vector s l , and uses the random parity check matrix H to secret the secret vector s l The message is fetched.

具體的,該公鑰與該私鑰的關係表示為:H=LH S P,其中,H s 是一個m×n的系統化同位查核矩陣、Lm×m的矩陣,Pn×n的矩陣。 Specifically, the relationship between the public key and the private key is expressed as: H = LH S P , where H s is an m × n systematic parity check matrix, L is an m × m matrix, and P is an n × n matrix.

具體的,該轉換密秘向量s l '定義為:

Figure 110145297-A0101-12-0004-11
。 Specifically, the conversion secret vector s l ' is defined as:
Figure 110145297-A0101-12-0004-11
.

具體的,該第二資訊裝置30係利用關係式:H s =[I,P γ ]求得該子通道,假設第i個使用者之該子通道定義為一個位置集合S i 如關係式:S i

Figure 110145297-A0101-12-0004-16
{1,2,L,n},並且該子通道長度為λ,使得|S i |=λm
Figure 110145297-A0101-12-0004-17
λ
Figure 110145297-A0101-12-0004-18
n,使得關係式為:H i =[I M i ] m×λ ,其中矩陣M i 是一個大小為m×(λ-m)的隨機矩陣,並且矩陣M i 的所有行向量為P γ 矩陣中的某些λ個行向量所組成。 Specifically, the second information device 30 uses the relational expression: H s =[ I , P γ ] to obtain the sub-channel, assuming that the sub-channel of the i- th user is defined as a position set S i such as the relational expression: Si _
Figure 110145297-A0101-12-0004-16
{1,2,L, n }, and the subchannel length is λ , such that | S i |= λ and m
Figure 110145297-A0101-12-0004-17
lambda
Figure 110145297-A0101-12-0004-18
n , so that the relation is: H i =[ IM i ] m × λ , where the matrix M i is a random matrix of size m × ( λ - m ), and all the row vectors of the matrix M i are in the P γ matrix It consists of some λ row vectors of .

具體的,密秘訊息取出關係式表示為:v'=Pl'。 Specifically, the secret message extraction relational expression is expressed as: v' = Pl '.

具體的,於進行密秘向量s l 取出時,先進行該隱匿向量l'轉換,其關係式表示為:v'=Pl'。 Specifically, when extracting the secret vector s l , the hidden vector l ' is converted first, and its relational expression is expressed as: v' = Pl '.

請參看圖1所示的實施例,該第一資訊裝置20電性連接一第一網路傳輸模組40,該第二資訊裝置30電性連接一第二網路傳輸模組50,使該至少一第一資訊裝置20經由第一網路傳輸模組40、網路通訊系統10及第二網路傳輸模組50而與第二資訊裝置30資訊連結。 Please refer to the embodiment shown in FIG. 1, the first information device 20 is electrically connected to a first network transmission module 40, and the second information device 30 is electrically connected to a second network transmission module 50, so that the At least one first information device 20 is informationally connected with the second information device 30 via the first network transmission module 40 , the network communication system 10 and the second network transmission module 50 .

簡言之,本發明主要是利用矩陣嵌入(matrix embedding)的方法結合公鑰與私鑰驗証的技術進行隱匿資料的保護與嵌入。本發明除了嵌入矩陣嵌入的技術外,伺服器端(serve)將原始同位嵌入矩陣利用高斯消去法產生公錀並將公鑰傳輸給使用者端(client)。使用者端收到公鑰可進行矩陣嵌入演算法,在使用者端利用選擇子通道當成私鑰進行嵌入形成隱匿向量(stego)並傳輸回伺服器端。在此系統中,伺服器端產生之公鑰可讓使用者端得知是由伺服器端所發送達到資訊安全之不可否認性,使用者端使用公鑰與密秘子通道進行進行嵌入資料產生隱匿向量並送回至伺服器端,密秘子通道的功能是讓嵌入資料的使用者擁有自己傳輸的通道,並可以讓伺服器端進行使用者的驗証。 In short, the present invention mainly utilizes a matrix embedding method combined with a public key and private key authentication technology to protect and embed hidden data. In addition to the technology of embedding matrix embedding in the present invention, the server end (serve) uses the Gaussian elimination method to generate a public key from the original co-location embedding matrix and transmits the public key to the user end (client). After receiving the public key, the user end can perform matrix embedding algorithm, and use the selected sub-channel as the private key for embedding at the user end to form a stealth vector (stego) and transmit it back to the server end. In this system, the public key generated by the server can let the user know that it is sent by the server to achieve non-repudiation of information security, and the user uses the public key and the secret sub-channel to generate embedded data Conceal the vector and send it back to the server. The function of the secret sub-channel is to allow the user who embeds the data to have his own transmission channel, and to allow the server to verify the user.

本發明確實是一種可以有效解決鑰匙管理問題的一種技術解決方法。當使用者端欲傳送資料給伺服器端時,本發明提供一種可以進行驗証的公、私鑰隱匿機制。在伺服器端(serve),首先會產生一個欲進行資料嵌入之同位查核矩陣,之後對此同位查核矩陣進行高斯消去法產生發送之公鑰與私錀,公鑰是欲傳送給使用者端而私鑰保留當成是回傳之隱匿向量之取出使用。伺服器端將公鑰傳輸給使用者端(client)後,使用者端利用公鑰與密秘子通道進行密秘資料的嵌入,密秘子通道主要功能可以讓不同的使用者擁有自己的傳輸通道,如此各個使用者可以在不互相干擾的情況下將密秘資料回傳給伺服器端並獲得到伺服器端的驗証。在本發明中,係以 對同位查核矩陣H進行高斯消去法產生出公鑰矩陣與私鑰矩陣,在無法得知私鑰矩陣的情況下,是難以進行上述兩問題去暴力求解密秘隱匿資料。 The present invention is indeed a technical solution that can effectively solve the key management problem. When the user end wants to send data to the server end, the invention provides a public and private key concealment mechanism that can be verified. On the server side (serve), it will first generate a parity check matrix for data embedding, and then perform Gaussian elimination on this parity check matrix to generate the public key and private key for sending. The public key is intended to be sent to the user end. The private key is reserved for retrieval of the returned hidden vector. After the server transmits the public key to the client, the client uses the public key and the secret sub-channel to embed the secret data. The main function of the secret sub-channel allows different users to have their own transmission Channels, so that each user can return the secret data to the server and obtain verification from the server without interfering with each other. In the present invention, the public key matrix and the private key matrix are generated by performing Gaussian elimination on the co-location check matrix H. When the private key matrix cannot be known, it is difficult to perform the above two problems to brute force the secret hidden information .

本發明提出系統化矩陣嵌入演算法可以利用系統化的同位查核矩陣,當在進行矩陣嵌入時可以避免徵狀解碼問題複雜問題,並達到嵌入資料的方法。其演算法的流程如下所示的步驟: The present invention proposes that the systematic matrix embedding algorithm can utilize the systematic parity checking matrix, avoid the complex problem of symptom decoding when performing matrix embedding, and achieve the method of embedding data. The flow of its algorithm is as follows:

系統化STME演算法:已知一個隨機的系統化線性碼C且具有一個系統化之同位查核矩陣H s =[I P r ],如今已知一個長度為m之密秘向量s l 欲嵌入一個長度為n Systematic STME algorithm: Given a random systematic linear code C and a systematic parity check matrix H s =[IP r ], now a secret vector s l of length m is known to be embedded into a length for n

之載體向量y中形成一個長度為n之隱匿向量l',且隱匿向量l'是靠近載體向量y並具有徵狀s l ,其中,I為m×m的單位矩陣,Pr是隨機矩陣,T為載體向量y的轉置。 A hidden vector l ' of length n is formed in the carrier vector y , and the hidden vector l ' is close to the carrier vector y and has the symptom s l , where I is an m×m identity matrix, P r is a random matrix, T is the transpose of the vector vector y.

1.計算載體向量徵狀s y 1. Calculate vector vector symptom s y :

s y =Hy T s y = Hy T

2.計算修改向量徵狀s x 2. Calculate the modified vector symptom s x :

s x =s y -s l s x = s y - s l

3.產生子通道矩陣:已知一個修改位置集合S

Figure 110145297-A0101-12-0006-34
{1,2,...,λ},|S|=λ,m
Figure 110145297-A0101-12-0006-20
λ
Figure 110145297-A0101-12-0006-21
n,並獲得一個子矩陣,其行向量為j
Figure 110145297-A0101-12-0006-22
SH sub =[h 1,h 2,...,h j ,...,h λ ],其中H sub
Figure 110145297-A0101-12-0006-24
H s ,最後之子通道矩陣為: 3. Generate a sub-channel matrix: a set of modification positions S is known
Figure 110145297-A0101-12-0006-34
{1,2,..., λ },| S |= λ , m
Figure 110145297-A0101-12-0006-20
lambda
Figure 110145297-A0101-12-0006-21
n , and obtain a submatrix with row vectors j
Figure 110145297-A0101-12-0006-22
SH sub =[ h 1 , h 2 ,..., h j ,..., h λ ], where H sub
Figure 110145297-A0101-12-0006-24
H s , the final sub-channel matrix is:

θ={h i |i=1,2,...,h k ,h i

Figure 110145297-A0101-12-0006-25
H sub },其中det(θ)≠0 θ ={ h i | i =1,2,..., h k , h i
Figure 110145297-A0101-12-0006-25
H sub }, where det( θ )≠0

4.求修改向量x:利用子通道矩陣θ進行x的求解: 4. Find the modified vector x : use the sub-channel matrix θ to solve x :

x s =θ -1 s x ,其中,x s 為長度m之向量,並將x s 每一個元素對應s位置放回一個長度為n的零向量對應位置可得最後之修改向量x x s = θ -1 s x , where x s is a vector of length m , and the position of each element of x s corresponding to s is returned to the corresponding position of a zero vector of length n to obtain the final modified vector x .

5.隱匿向量l'可以用載體向量y減掉最佳修改向量x5. The hidden vector l ' can be subtracted from the vector vector y by the best modified vector x :

l'=y-x l ' = y - x

6.密秘向量取出方法為隱匿向量l'乘上同位查核矩陣H s 6. The secret vector extraction method is to multiply the hidden vector l ' by the parity check matrix H s :

s l =H s l' T s l = H s l ' T

主從式架構驗証隱匿系統可從兩個方面進行討論,分別是(1)伺服器端與(2)使用者端。假設今使用者端欲傳輸一筆密秘向量資料給伺服器,以下將進行此過程的介紹。首先在伺服器端需產生伺服器端之公、私鑰如下: The master-slave architecture verification concealment system can be discussed from two aspects, namely (1) server side and (2) user side. Assuming that the user terminal wants to transmit a secret vector data to the server, the following will introduce the process. First, the public and private keys of the server need to be generated on the server side as follows:

1.首先伺服器端已知一個m×n隨機同位查核矩陣HH中的元素佈於F q 且有一個欲藏匿的密秘向量s l ,其長度為m1. Firstly, the server side knows an m × n random parity check matrix H , the elements in H are distributed in F q and there is a secret vector s l to be hidden, the length of which is m .

2.伺服器端利用高斯消去法將H進行分割之後形成: 2. The server uses the Gaussian elimination method to divide H to form:

H=LH S P其中H s 是一個m×n的系統化矩陣、Lm×m的矩陣以及Pn×n的矩陣。 H = LH S P where H s is an m × n systematization matrix, L is an m × m matrix, and P is an n × n matrix.

3.伺服器產生之公鑰為矩陣LH s ,而私鑰為矩陣HP。當伺服器端產生公、私鑰後,私鑰HP伺服器端自行保密,並將公鑰LH s 傳輸給使用者端。在使用者端的嵌入流程如下: 3. The public key generated by the server is matrix L and H s , and the private key is matrix H and P . After the server side generates the public and private keys, the server side keeps the private keys H and P secret, and transmits the public keys L and Hs to the user side. The embedding process on the user side is as follows:

1.使用者端接收公鑰LH s ,且已知一個長度為n之載體向量v與長度為m的密秘向量s l 1. The user end receives the public keys L and H s , and knows a vector v of length n and a secret vector s l of length m .

2.使用者端使用公鑰L產生轉換密秘向量s l '如下: 2. The client uses the public key L to generate the conversion secret vector s l ' as follows:

Figure 110145297-A0101-12-0007-12
Figure 110145297-A0101-12-0007-12

3.利用H s =[I,P γ ]產生密秘子通道如下:假設第i個使用者之子通道定義為一個位置集合S i 如下: 3. Use H s =[ I , P γ ] to generate a secret sub-channel as follows: Assume that the i -th user’s sub-channel is defined as a position set S i as follows:

S i

Figure 110145297-A0101-12-0008-26
{1,2,L,n}並且子通道長度為λ使得|S i |=λm
Figure 110145297-A0101-12-0008-28
λ
Figure 110145297-A0101-12-0008-29
n使得:H i =[I M i ] m×λ 其中矩陣M i 是一個大小為m×(λ-m)的隨機矩陣並且矩陣M i 的所有行向量為P γ 矩陣中的某些λ個行向量所組成。 Si _
Figure 110145297-A0101-12-0008-26
{1,2,L, n } and the subchannel length is λ such that | S i |= λ and m
Figure 110145297-A0101-12-0008-28
lambda
Figure 110145297-A0101-12-0008-29
n such that: H i = [ IM i ] m × λ where matrix M i is a random matrix of size m × ( λm ) and all row vectors of matrix M i are some λ rows in matrix P γ composed of vectors.

4.利用載體v、子通道位置集合s i 、系統化同位查核矩陣H s 與轉換密秘向量s l'進行上述之系統化STME矩陣嵌入演算法將轉換密秘向量s l '嵌入載體v形成隱匿向量l',並將隱匿向量l'傳回伺服器端。 4. Using the carrier v , the sub-channel position set s i , the systematic parity check matrix H s and the conversion secret vector s l ', perform the above-mentioned systematic STME matrix embedding algorithm to embed the conversion secret vector s l ' into the carrier v to form Hide the vector l ', and send the hidden vector l ' back to the server.

5.在伺服器端接收隱匿向量l'並利用密鑰HP進行密秘向量取出如下:首先進行隱匿向量轉換: 5. Receive the hidden vector l ' on the server side and use the keys H and P to extract the secret vector as follows: First, convert the hidden vector:

v'=Pl',並使用H將密秘訊息取出: v' = Pl ', and use H to retrieve the secret message:

Hv'=s l Hv '= s l

以下利用範例說明。設有一個同位查核矩陣大小為m×nH且其中元素佈於F q 我們利用以下參數之隨機矩陣進行說明。 The following uses an example to illustrate. Assuming a parity check matrix H whose size is m × n and whose elements are distributed in F q , we use a random matrix with the following parameters for illustration.

q=3,n=13,m=3,k=n-m=10 q =3, n =13, m =3, k = n - m =10

上述參數之同位查核矩陣為: The parity check matrix of the above parameters is:

Figure 110145297-A0101-12-0008-1
Figure 110145297-A0101-12-0008-1

利用高斯消去法獲得: Using Gaussian elimination method to get:

Figure 110145297-A0101-12-0009-2
Figure 110145297-A0101-12-0009-2
and

Figure 110145297-A0101-12-0009-3
Figure 110145297-A0101-12-0009-3

伺服器端將公鑰H s L傳給使用者端。使用者端使用H s 嵌入長度為m=3密秘向量s l =(1,2,0)到一個長度為n=13的載體向量u=(1,1,1,1,0,0,0,0,0,0,0,0,0),由上述可知: The server sends the public keys H s and L to the user. The user end uses H s to embed the secret vector s l =(1,2,0) of length m =3 into a vector vector u =(1,1,1,1,0,0, 0,0,0,0,0,0,0), we can see from the above:

Figure 110145297-A0101-12-0009-5
使得:
Figure 110145297-A0101-12-0009-5
makes:

Figure 110145297-A0101-12-0009-7
Figure 110145297-A0101-12-0009-7

利用H s 將轉換密秘向量

Figure 110145297-A0101-12-0009-13
嵌入載體u=(1,1,1,1,0,0,0,0,0,0,0,0,0)。利用系統化STME嵌入演算法可得隱匿向量為: Using H s will transform the secret vector
Figure 110145297-A0101-12-0009-13
Embedding vector u = (1,1,1,1,0,0,0,0,0,0,0,0,0). Using the systematic STME embedding algorithm, the hidden vector can be obtained as:

v'=u-x=(1,1,1,1,0,0,0,2,0,0,0,0,0),最後並將隱匿向量回值至伺服器端,在伺服器端接收到l'時,進行下式計算: v' = u - x = (1,1,1,1,0,0,0,2,0,0,0,0,0), and finally return the hidden vector to the server side, where the server When the terminal receives l ', it performs the following calculation:

v=P -1 v'=(0,2,0,0,0,0,0,0,1,1,0,1,1)T最後可得: v = P -1 v' = (0,2,0,0,0,0,0,0,1,1,0,1,1) T can finally get:

s l =H v s l = H v

Figure 110145297-A0101-12-0010-8
Figure 110145297-A0101-12-0010-8

經上述具體實施例的說明后,本發明確實可以利用系統化的同位查核矩陣以於矩陣嵌入時可以避免徵狀解碼之複雜問題,並達到嵌入資料之的目的,由於使用者擁有各自專屬的傳輸通道,所以可在不互相干擾的情況下將密秘資料回傳給伺服器端,藉以獲得到伺服器端的驗証而提升資訊傳輸的安全性。 After the description of the above-mentioned specific embodiments, the present invention can indeed use the systematic parity check matrix to avoid the complicated problem of symptom decoding when the matrix is embedded, and achieve the purpose of embedding data, because users have their own exclusive transmission channel, so the secret data can be returned to the server without mutual interference, so as to obtain the verification of the server and improve the security of information transmission.

以上所述,僅為本發明之可行實施例,並非用以限定本發明之專利範圍,凡舉依據下列請求項所述之內容、特徵以及其精神而為之其他變化的等效實施,皆應包含於本發明之專利範圍內。本發明所具體界定於請求項之結構特徵,未見於同類物品,且具實用性與進步性,已符合發明專利要件,爰依法具文提出申請,謹請 鈞局依法核予專利,以維護本申請人合法之權益。 The above is only a feasible embodiment of the present invention, and is not intended to limit the patent scope of the present invention. Any equivalent implementation of other changes based on the content, characteristics and spirit of the following claims should be Included in the patent scope of the present invention. The structural features of the invention specifically defined in the claims are not found in similar items, and are practical and progressive, and have met the requirements of an invention patent. I file an application in accordance with the law. I would like to ask the Jun Bureau to approve the patent in accordance with the law to maintain this invention. The legitimate rights and interests of the applicant.

10:網路通訊系統 10: Network communication system

20:第一資訊裝置 20: The first information device

30:第二資訊裝置 30: The second information device

40:第一網路傳輸模組 40: The first network transmission module

50:第二網路傳輸模組 50:Second network transmission module

Claims (10)

一種主從式架構之驗証隱匿方法,其包括: A verification concealment method of a master-slave architecture, which includes: 提供位於使用者端的至少一第一資訊裝置及位於伺服器端的一第二資訊裝置;其中,該至少一第一資訊裝置係以一網路通訊系統與該第二資訊裝置資訊連結; providing at least one first information device on the user side and a second information device on the server side; wherein, the at least one first information device is connected to the second information device through a network communication system; 於該第一資訊裝置內建一個已知的隨機同位查核矩陣H,並利用高斯消去法將隨機同位查核矩陣H進行分割後產生公鑰與私鑰,該私鑰包含該隨機同位查核矩陣H及矩陣P,並由該第一資訊裝置自行保密該私鑰;該公鑰包含矩陣L與系統化同位查核矩陣H s ,並透過該網路通訊系統傳輸至該第二資訊裝置; A known random parity check matrix H is built in the first information device, and the random parity check matrix H is divided by the Gaussian elimination method to generate a public key and a private key. The private key includes the random parity check matrix H and Matrix P , and the private key is kept secret by the first information device; the public key includes matrix L and systematic parity check matrix H s , and is transmitted to the second information device through the network communication system; 於該第二資訊裝置內建一個已知長度為n的載體向量v與一個長度為m的密秘向量s l ,使用該矩陣L產生轉換密秘向量s l ',並使用該系統化同位查核矩陣H s 產生密秘子通道,並定義出一個子通道位置集合S i ,利用該載體向量v、該子通道位置集合S i 、該系統化同位查核矩陣H s 與該轉換密秘向量s l'進行系統化STME矩陣嵌入演算法的運算,以將該轉換密秘向量s l '嵌入於該載體向量v而形成隱匿向量l',並將該隱匿向量l'透過該網路通訊系統傳回給該第一資訊裝置資訊;及 A carrier vector v of known length n and a secret vector s l of length m are built in the second information device, and the matrix L is used to generate the converted secret vector s l ', and the systematic parity check is used The matrix H s generates a secret sub-channel, and defines a sub-channel position set S i , using the carrier vector v , the sub-channel position set S i , the systematic parity check matrix H s and the conversion secret vector s l ' perform the operation of the systematic STME matrix embedding algorithm to embed the converted secret vector s l 'in the carrier vector v to form a hidden vector l ', and send the hidden vector l ' back through the network communication system give information to the first information device; and 於該第一資訊裝置接收該隱匿向量l',並利用該私鑰之該隨機同位查核矩陣H及該矩陣P進行密秘向量s l 取出,並使用該隨機同位查核矩陣H將該密秘向量s l 的密秘訊息取出。 The first information device receives the hidden vector l ', and uses the random parity check matrix H and the matrix P of the private key to extract the secret vector s l , and uses the random parity check matrix H to extract the secret vector The secret message of s l is retrieved. 如請求項1所述之主從式架構之驗証隱匿方法,其中,該公鑰與該私鑰的關係表示為:H=LH S P,其中,H s 是一個m×n的系統化同位查核矩陣、Lm×m的矩陣,Pn×n的矩陣。 The verification concealment method of the master-slave architecture as described in Claim 1, wherein the relationship between the public key and the private key is expressed as: H = LH S P , where H s is an m × n systematic parity check Matrix, L is an m × m matrix, P is an n × n matrix. 如請求項2所述之主從式架構之驗証隱匿方法,其中,該轉換密秘向量s l '的關係式定義為:
Figure 110145297-A0101-13-0002-14
The verification concealment method of the master-slave architecture as described in Claim 2, wherein the relational expression of the conversion secret vector s l ' is defined as:
Figure 110145297-A0101-13-0002-14
.
如請求項1所述之主從式架構之驗証隱匿方法,其中,該第二資訊裝置係利用關係式:H s =[I,P γ ]求得該子通道,假設第i個使用者之該子通道定義為一個位置集合S i 如關係式:S i
Figure 110145297-A0101-13-0002-30
{1,2,L,n},並且該子通道長度為λ,使得|S i |=λm
Figure 110145297-A0101-13-0002-33
λ
Figure 110145297-A0101-13-0002-32
n,並使關係式為:H i =[I M i ] m×λ ,其中矩陣M i 是一個大小為m×(λ-m)的隨機矩陣,並且矩陣M i 的所有行向量為P γ 矩陣中的某些λ個行向量所組成。
The verification concealment method of the master-slave architecture as described in Claim 1, wherein the second information device uses the relational formula: H s =[ I , P γ ] to obtain the sub-channel, assuming that the i- th user The sub-channel is defined as a set of positions S i such as the relation: S i
Figure 110145297-A0101-13-0002-30
{1,2,L, n }, and the subchannel length is λ , such that | S i |= λ and m
Figure 110145297-A0101-13-0002-33
lambda
Figure 110145297-A0101-13-0002-32
n , and let the relation be: H i =[ IM i ] m × λ , where matrix M i is a random matrix of size m × ( λ - m ), and all row vectors of matrix M i are P γ matrices It consists of some λ row vectors in .
如請求項1所述之主從式架構之驗証隱匿方法,其中,於進行密秘向量s l 取出時,先進行該隱匿向量l'轉換,其關係式表示為:v'=Pl'。 The authentication concealment method of the master-slave architecture as described in Claim 1, wherein, when extracting the secret vector s l , the concealment vector l ' is converted first, and the relational expression is expressed as: v' = Pl '. 如請求項5所述之物聯網動態主題資訊安全方法,其中,密秘訊息取出的關係式表示為:v'=Pl'。 In the Internet of Things dynamic theme information security method as described in claim item 5, the relational expression for extracting the secret information is expressed as: v' = Pl '. 一種主從式架構之驗証隱匿系統,其包括: A verification concealment system of a master-slave architecture, which includes: 一網路通訊系統; a network communication system; 至少一第一資訊裝置,其位於使用者端,該第一資訊裝置內建一個已知的隨機同位查核矩陣H,並利用高斯消去法將隨機同位查核矩陣H進行分割後產生公鑰與私鑰,該私鑰包含該隨機同位查核矩陣H及矩陣P,並由該第一資訊裝置自行保密該私鑰;該公鑰包含矩陣L與系統化同位查核矩陣H s ,並透過該網路通訊系統傳輸至該第二資訊裝置: At least one first information device, which is located at the user end, a known random parity check matrix H is built in the first information device, and the random parity check matrix H is divided by the Gaussian elimination method to generate a public key and a private key , the private key includes the random parity check matrix H and the matrix P , and the private key is kept secret by the first information device itself; the public key includes the matrix L and the systematic parity check matrix H s , and is passed through the network communication system Transmission to the second information device: 一第二資訊裝置;其位於伺服器端,該至少一第一資訊裝置係以該網路通訊系統與該第二資訊裝置資訊連結,該第二資訊裝置內建一個已知長度為n的載體向量v與一個長度為m的密秘向量s l ,使用該矩陣L產生 轉換密秘向量s l ',並使用系統化同位查核矩陣H s 產生密秘子通道,並定義出一個子通道位置集合S i ,利用載體v、該子通道位置集合S i 、該系統化同位查核矩陣H s 與該轉換密秘向量s l'進行系統化STME矩陣嵌入演算法的運算,以將該轉換密秘向量s l '嵌入於該載體v而形成隱匿向量l',並將該隱匿向量l'透過該網路通訊系統傳回該第一資訊裝置資訊;於該第一資訊裝置接收該隱匿向量l',並利用該私鑰之該隨機同位查核矩陣H及該矩陣P進行密秘向量s l 取出,並使用該隨機同位查核矩陣H將該密秘向量s l 的密秘訊息取出。 A second information device; it is located at the server end, the at least one first information device is connected to the second information device through the network communication system, and a carrier with a known length n is built in the second information device Vector v and a secret vector s l with a length of m , use the matrix L to generate the conversion secret vector s l ', and use the systematic parity check matrix H s to generate a secret sub-channel, and define a set of sub-channel positions S i , use the carrier v , the sub-channel position set S i , the systematic parity check matrix H s and the conversion secret vector s l ' to carry out the operation of the systematic STME matrix embedding algorithm, so that the conversion secret vector s l ' is embedded in the carrier v to form a hidden vector l ', and the hidden vector l ' is sent back to the first information device through the network communication system; the first information device receives the hidden vector l ', And use the random parity check matrix H and the matrix P of the private key to extract the secret vector s l , and use the random parity check matrix H to extract the secret information of the secret vector s l . 如請求項7所述之主從式架構之驗証隱匿系統,其中,該第一資訊裝置電性連接一第一網路傳輸模組,該第二資訊裝置電性連接一第二網路傳輸模組,使該至少一第一資訊裝置經由該第一網路傳輸模組、該網路通訊系統及該第二網路傳輸模組而與該第二資訊裝置資訊連結。 The verification concealment system of the master-slave structure as described in Claim 7, wherein the first information device is electrically connected to a first network transmission module, and the second information device is electrically connected to a second network transmission module A set of information linking the at least one first information device with the second information device through the first network transmission module, the network communication system and the second network transmission module. 如請求項7所述之主從式架構之驗証隱匿系統,其中,該公鑰與該私鑰的關係表示為:H=LH S P,其中,H s 是一個m×n的系統化同位查核矩陣、Lm×m的矩陣,Pn×n的矩陣。 The verification concealment system of the master-slave architecture as described in claim item 7, wherein the relationship between the public key and the private key is expressed as: H = LH S P , where H s is a systematic parity check of m × n Matrix, L is an m × m matrix, P is an n × n matrix. 如請求項9所述之主從式架構之驗証隱匿系統,其中,該轉換密秘向量s l '的關係式定義為:
Figure 110145297-A0101-13-0003-15
The authentication concealment system of the master-slave architecture as described in claim item 9, wherein the relational expression of the conversion secret vector s l ' is defined as:
Figure 110145297-A0101-13-0003-15
.
TW110145297A 2021-12-03 2021-12-03 Method and system for verification concealment of master-slave architecture TWI796862B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110145297A TWI796862B (en) 2021-12-03 2021-12-03 Method and system for verification concealment of master-slave architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110145297A TWI796862B (en) 2021-12-03 2021-12-03 Method and system for verification concealment of master-slave architecture

Publications (2)

Publication Number Publication Date
TWI796862B TWI796862B (en) 2023-03-21
TW202324966A true TW202324966A (en) 2023-06-16

Family

ID=86692455

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110145297A TWI796862B (en) 2021-12-03 2021-12-03 Method and system for verification concealment of master-slave architecture

Country Status (1)

Country Link
TW (1) TWI796862B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025489A (en) * 2009-09-11 2011-04-20 吉林大学 Public key cryptography improvement method for hidden field ergodic matrices and signature scheme
US8621227B2 (en) * 2010-12-28 2013-12-31 Authernative, Inc. System and method for cryptographic key exchange using matrices
US11218303B2 (en) * 2020-03-27 2022-01-04 Ahp-Tech Inc. Quantum attack-resistant system to facilitate and enhance processes of cryptography key exchange

Also Published As

Publication number Publication date
TWI796862B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
Abd El-Latif et al. Secure quantum steganography protocol for fog cloud internet of things
Sun et al. Improvements on “multiparty quantum key agreement with single particles”
CN111222158B (en) Block chain-based two-party security and privacy comparison method
Selva Mary et al. Secure grayscale image communication using significant visual cryptography scheme in real time applications
Yan et al. A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter
Duong-Ngoc et al. Efficient NewHope cryptography based facial security system on a GPU
Qian et al. Speech authentication and content recovery scheme for security communication and storage
Yu et al. Quantum secure direct communication with authentication using two nonorthogonal states
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
Bagga et al. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
Hussain et al. Secure password transmission for web applications over internet using cryptography and image steganography
CN108880782B (en) Minimum value secret computing method under cloud computing platform
TWI796862B (en) Method and system for verification concealment of master-slave architecture
Deng et al. A lightweight identity-based remote data auditing scheme for cloud storage
Zhao et al. Iris template protection based on randomized response technique and aggregated block information
Li et al. A novel quantum anonymous ranking protocol
Wang et al. Secure and efficient image transmission scheme for smart cities using sparse signal transformation and parallel compressive sensing
Palathingal et al. Enhanced cloud data security using combined encryption and steganography
Cao et al. Fuzzy Identity‐Based Ring Signature from Lattices
Tripathi et al. Enhancing Security of PGP with Steganography
CN113904833A (en) Dynamic multi-factor identity authentication method and communication method based on threshold
Wang et al. A Secure Face Verification Scheme Based on Fully Homomorphic Encryption with Anonymity
CN113330712A (en) Encryption system and method using permutation group-based encryption technology
Manivannan et al. Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC Based Cryptosystem
Jia et al. Auxiliary system for contract signing based on electronic signature technology