Concealed anonymous communication method based on peer-to-peer network

An anonymous communication and peer-to-peer network technology, applied in the field of information security, can solve the problems of peer-to-peer node monitoring, inability to hide, inability to provide user concealment, anonymous file sharing, etc., to achieve the effect of protecting user privacy and increasing security

Active Publication Date: 2013-12-25
INST OF INFORMATION ENG CAS
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In addition, as a distributed system, the P2P system has been widely used for its scalability and peer-to-peer communication characteristics. However, the existing P2P network cannot provide users with better concealed and anonymous file sharing.
On the one hand, although networks such as Emule and BitTorrent have good scalability and high performance, peer nodes are easily monitored by any other peer nodes; on the other hand, P2P anonymous networks (such as Freenet, oneswarm, etc.) provide With the feature of anonymous file sharing, it can protect the privacy of users, but it cannot hide the fact of their communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concealed anonymous communication method based on peer-to-peer network
  • Concealed anonymous communication method based on peer-to-peer network
  • Concealed anonymous communication method based on peer-to-peer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0044] Such as figure 1 As shown, a concealed and anonymous communication method based on a peer-to-peer network includes the following steps:

[0045] Step 1: Both communicating parties negotiate a shared secret K through out-of-band negotiation;

[0046] Step 2: According to the shared secret K, the communication parties conduct identity authentication through the covert handshake protocol, and secretly negotiate the contact location ID of the data channel;

[0047] Step 3: The first communication terminal derives several sub-data channel contact point IDs by using a certain algorithm according to the data channel contact point ID;

[0048]Step 4: The first communication terminal uses the threshold secret sharin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a concealed anonymous communication method based on a peer-to-peer network. The method comprises two stages including concealed handshake and data exchange, wherein the concealed handshake stage comprises the steps that a communication initiator secretly finds another communication end in a large-scale P2P (Peer-to-Peer) network, mutual authentication is secretly performed on the communication initiator and the communication end, and a data channel consulting site is acquired through negotiation; the data exchange stage comprises the step that both communication parties realize data exchange through the negotiated data channel consulting site instead of direct interaction with each other, wherein during data interaction, the communication initiator derives a plurality of sub-data channel consulting sites through the negotiated data channel consulting site and divides a to-be-sent document into a plurality of sub-piece documents which are mapped to the sub-data channel consulting sites, while the other commutation end obtains required sub-piece documents at corresponding sub-data channel consulting sites, and then the sub-piece documents can be jointed to form the original document. The method can provide an anonymous document sharing function and effectively protect privacy of users, so that secrete communication is realized.

Description

technical field [0001] The invention relates to the field of information security, including covert communication and anonymous communication, and in particular to a covert and anonymous communication method based on a peer-to-peer network. Background technique [0002] In recent years, the Internet has gradually become an important tool for people's daily life and entertainment. However, with the development of the Internet and people's pursuit of network privacy, more and more attention has been paid to the issue of network monitoring. The auditing and in-depth analysis of people's network behavior has brought a great threat to people's privacy. [0003] For a long time, anonymous communication systems have become an effective way for people to avoid network auditing and traffic analysis. However, although existing anonymous communication systems such as Tor and Freenet can hide the identity of users, they often cannot hide the fact of communication. Existing anonymous co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 谭庆丰时金桥刘培朋王啸徐钒文
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products