Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Two-dimensional code secret sharing and restoring method and device based on (3, 1) Hamming code

A secret sharing, two-dimensional code technology, applied in computer security devices, record carriers used by machines, instruments, etc., can solve problems such as failure, anti-fraud function defects, and meaningless barcodes of secret sharing two-dimensional codes. safety effect

Active Publication Date: 2021-06-04
绍兴聚量数据技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there have been some achievements in the research of secret information transmission using two-dimensional code combined with secret sharing technology. However, these methods have the following problems: ① The generated two-dimensional code for secret sharing is a meaningless barcode; ② The existence of secret sharing methods Take the structure as (n, n); ③ There are defects in the anti-fraud function, and in some cases, the function will fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code secret sharing and restoring method and device based on (3, 1) Hamming code
  • Two-dimensional code secret sharing and restoring method and device based on (3, 1) Hamming code
  • Two-dimensional code secret sharing and restoring method and device based on (3, 1) Hamming code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0123] Step 1: According to the secret information S, use to generate n shares of secret information sharing (x i ,f(x i )).

[0124] In this embodiment, set k=3, n=3, 3 carrier QR codes refer to figure 2 . Among them, the versions of the three carrier QR codes are all 5-M, which contain meaningful content information, respectively: "www.bing.com", "www.google.com" and "www.yahoo.com" ;The secret information is: 1234567890.

[0125] The specific process is as follows:

[0126] Step 1.1: Split the secret information S into three non-repetitive secret information blocks; s 0 =12345,s 1 =678 and s 2 =90.

[0127] Step 1.2: According to the constraints, set the prime number p to 18251.

[0128] Step 1.3: Based on prime number p and n copies of secret information block s i , construct a polynomial equation f(x);

[0129] f(x)=12345+678*x+90*x 2 (mod18251)

[0130] Step 1.4: Generate 3 random numbers x 1 ,x 2 ,...,x n , into the polynomial equation f(x). Three secr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a two-dimensional code secret sharing and restoring method and device based on a (3, 1) Hamming code. The method comprises the following steps: splitting secret information S into n secret information sharing parts (xi, f(xi)); then, in combination with content information mi of the carrier two-dimensional code cQRi, generating corresponding verification information vi; then, based on the (3, 1) Hamming code, designing an embedding rule of the information in the two-dimensional code; and finally, embedding the secret sharing copy (xi, f(xi)) and the verification information vi into the carrier two-dimensional code cQRi by using the rule, thereby realizing sharing of the secret information. According to the method, the secret information is shared in n carrier two-dimensional codes, and the sharing of the secret information is realized on the premise of ensuring that the generated secret sharing part two-dimensional code can be decoded. The method not only has the advantages of low coding and decoding calculation complexity and more flexible access structure, but also is superior to other existing methods in the aspect of robustness, and the secret information has better security.

Description

technical field [0001] The invention belongs to the field of secret information sharing, and in particular relates to a two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming codes. Background technique [0002] In recent years, with the rapid development of Internet of Things technology and mobile communication technology, electronic label technology has gradually been widely used in various industries. Compared with one-dimensional barcodes, two-dimensional codes have the advantages of large information capacity, high density, strong error correction ability, wide range of stored information, high decoding reliability, and high information transmission efficiency. They have been widely used in item identification, advertising, and storage. Logistics, product traceability, e-commerce, mobile payment and many other aspects. However, due to the openness of patents, criminals can use standard decoding software and hardware to easily steal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06G06K7/14G06F21/60
CPCG06K19/06037G06K19/06075G06K7/1408G06F21/602
Inventor 黄鹏程张真诚栗永徽张善卿
Owner 绍兴聚量数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products