Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bidirectional anonymous secret communication protocol using bulletin board

A communication protocol and bulletin board technology, applied in the computer field, can solve the problems of selfish and anonymous abuse of nodes

Active Publication Date: 2019-09-27
ZHENGZHOU UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme is prone to node selfishness and anonymity abuse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional anonymous secret communication protocol using bulletin board
  • Bidirectional anonymous secret communication protocol using bulletin board
  • Bidirectional anonymous secret communication protocol using bulletin board

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Example 1 Anonymity Analysis

[0088] Using the two-way anonymous secret communication protocol of the bulletin board, the identity privacy of both communication parties can be hidden.

[0089] Theorem 1. The receiving node cannot obtain the identity information and location information of the sending node.

[0090] Proof 1:

[0091] In the present invention, the bulletin board is used as a special node, and the message sent by the sending node is sent to the bulletin board node, not directly to the receiving node. There is no identity information of the sending node in the encrypted data sent, and the receiving node can only receive the message ID published by the bulletin board node, and the message ID does not contain the identity information of the sending node. Therefore, the receiving node has no knowledge of the identity information and location information of the sending node. On the other hand, Theorem 3 proves that it is impossible for bulletin board nodes ...

Embodiment 2

[0110] Embodiment 2 confidentiality analysis

[0111] Before sending the message, the sending node encrypts the message with the public key of the receiving node and then sends it out. Only when the receiving node can decrypt with its own private key can the plaintext of the message be decrypted. Any transit node does not have the private key of the receiving node, so it is impossible to decrypt the plaintext of the initial message. Similarly, any attacker does not have the private key of the receiving node, so even if it intercepts the ciphertext of the message in transmission, it cannot obtain the plaintext of the message.

[0112] In the process of the bulletin board node replying the message to the receiving node, the data it sends is still encrypted using the public key of the receiving node. In addition to the receiving node, any third party including the transit node and the attacking node can Impossible to decrypt.

[0113] In summary, this protocol can realize secr...

Embodiment 3

[0114] Embodiment 3 robustness analysis

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bidirectional anonymous secret communication protocol using a bulletin board. The bidirectional anonymous secret communication protocol using the bulletin board is adopted, so that the identity privacy of two communication parties can be hidden. The bidirectional anonymous secret communication protocol using the bulletin board does not need to establish a link in advance, so that the communication failure caused by the node fault after the node on the routing path establishes the link is avoided. All nodes are peer-to-peer in the whole communication process, that is, the whole routing path does not depend on some special nodes, and the selfish behavior of the nodes is not caused. Even if a certain transit node is attacked, the attacker is difficult to infer the position information of the sender and the receiver and the routing information of the whole communication. In addition, a timestamp technology is adopted, and the problem that the network overhead is increased due to the fact that a third party uses intercepted request information to perform repeated request operation can be effectively solved. The model can well adapt to a network with a dynamically changed topological structure, and has good robustness.

Description

technical field [0001] The invention belongs to the technical field of computers and relates to a two-way anonymous secret communication protocol using bulletin boards. Background technique [0002] At present, relatively mature cryptography technology can hide the content of information in network communication by encrypting information, which can better ensure the security of information transmission in the network, but cannot hide the identity information and location of the sending node or receiving node in the communication process. information. In order to protect the identity of network nodes or users, it is more and more important to study anonymous communication technology in network communication and its implementation and performance in large-scale networks. Most of the research on anonymous communication is about one-way anonymity, such as the sending node is anonymous and the receiving node is open. However, there are relatively few studies on the use of two-w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/32H04L9/06
CPCH04L9/14H04L9/3297H04L9/0631
Inventor 李晓宇王小丽李晓鸣刘少慈王磊
Owner ZHENGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products