Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-block chain covert communication method

A covert communication and block chain technology, applied in the field of covert communication technology based on multiple block chains, can solve the problems of difficulty in ensuring the concealment of communication, low efficiency, and difficulty in ensuring the security of encrypted currency of both parties in communication, so as to increase the difficulty, The effect of low cost and enhanced concealment

Active Publication Date: 2022-05-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some problems in these schemes, such as the special transaction mode is difficult to ensure the concealment of communication, or the efficiency is too low to be applied in practice, or it is difficult to ensure the security of the encrypted currency of both parties by requiring the two parties to share the private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-block chain covert communication method
  • Multi-block chain covert communication method
  • Multi-block chain covert communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] (1) System initialization stage

[0040] 1) Determine the system parameters. E: Elliptic curve whose base point is G, the order of the base point is n; hash function hash; symmetric encryption algorithm (Gen, Enc, Dec), where Gen requires a security parameter as input and outputs a key, Enc(k, m) means to encrypt message m with key k, and Dec(k, c) means to decrypt ciphertext c with key k;

[0041] 2) The two parties negotiate the key. After negotiation, the sender and receiver share the master secret key m , key tk 0 and key tk 1 form a trapdoor key pair (tk 0 , tk 1 ) and address key key add . In addition, the receiver generates a public-private key pair (sk r , pk r ), where the public key pk r Shared with sender.

[0042] (2) Fund preparation stage

[0043] The sender sends two or more transactions in one communication process, and the signature private keys of these transactions are generated according to the method described below. In a blockchain tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-block chain covert communication method, which comprises the following steps: a system initialization stage: before a sender and a receiver carry out covert communication, determining public parameters of a system and keys used by the sender and the receiver; in the fund preparation stage, each effective transaction of the block chain represents that the amount of money is transferred from the sending address to the receiving address. A sender embedding information and broadcast transaction stage: the sender embeds a message needing to be sent into a random number of a transaction signature, and then broadcasts the transaction on a block chain network; and a receiver search transaction and information extraction stage: the receiver searches a block chain transaction address which may have communication, and extracts information from the block chain transaction address if discovering a transaction with embedded information. The covert communication method on the block chain does not need to be supported by a special mode, so that the covert communication method on the block chain has strong concealment. The method is high in operation efficiency and low in cost, and can ensure the security of cryptocurrency funds of both parties.

Description

technical field [0001] The invention relates to covert communication technology, in particular to a covert communication technology based on multi-block chains. Background technique [0002] In application scenarios with a high degree of confidentiality, the communication between the two parties not only needs to ensure the security of the communication content, but also needs to hide the communication behavior. Ordinary encryption technology can only guarantee the confidentiality of the content of the two parties in the communication, but cannot hide the communication behavior. The adversary can speculate whether the communication behavior occurs by eavesdropping on the communication data, and further calculate the communication frequency and analyze the amount of communication data. [0003] The existing covert communication schemes are generally implemented based on digital signatures, that is, to embed the messages to be sent into the random numbers of digital signature...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/30H04L9/40
CPCG06Q20/389G06Q20/30H04L63/0428Y02D30/70
Inventor 胡清华许春香
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products