Unlock instant, AI-driven research and patent intelligence for your innovation.

An anonymous submission system that does not require a trusted third party

A trusted, key exchange technology, applied in transmission systems, electrical components, etc., can solve problems that do not rely on the participation of trusted third parties

Active Publication Date: 2018-07-06
HEFEI HIGH DIMENSIONAL DATA TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The second category is technical anonymity, which does not rely on the participation of a trusted third party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A specific embodiment of the present invention implemented by Perl programming is deployed in a small network of a server and several clients, and exists in each client and server in the form of a background process. The process is mainly divided into two parts, the initialization process and the working process. The initialization is used to wake up the process to execute and negotiate the execution parameters. After the initialization, the work process starts to execute periodically in the background. In terms of overall communication support, using Perl's powerful library AnyEvent for event-driven programming has very excellent performance, making the present invention reliable and easy to maintain.

[0019] (1), client initialization:

[0020] a. Several clients initiate TCP connections to the server respectively, by using the IO::Socket module;

[0021] b. The Diffie-Hellman key exchange is performed between the clients, and the obtained secret number is used as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an anonymous submission system with no need for trusted third part, comprising a server for receiving messages and several clients for sending anonymous messages. The several clients make a logical circle, in which two adjacent clients share a secret random sequence. When any client needs to send an anonymous message, the client selects one segment from each of the two secret random sequences thereof to perform XOR operation with the anonymous message to be sent and sends a result of the XOR operation to the server at last. The other clients with no need to send any anonymous messages also select segments from the two secret random sequences thereof for XOR operation and send the results of XOR operation to the server. The server obtains an anonymous message to be sent after performing XOR operation on the messages sent from several clients. The system in the present invention is still safe in case that all incoming and outgoing traffics of the clients are monitored.

Description

technical field [0001] The invention relates to the technical fields of anonymous communication and data anonymity, in particular to an anonymous submission system that does not require a trusted third party. Background technique [0002] Anonymous submission or anonymous publishing is a demand that people have always had. In the real world, people express and transmit information anonymously by passing small notes and dropping letters into mailboxes (such as department whistleblower boxes). Anonymity is much harder to achieve in the digital world, where digital communication is always traceable. With the rise of the Internet, various commercial companies and defense agencies are also exploring this field. Due to the different requirements for anonymity strength, different anonymity schemes are produced in different application scenarios. [0003] The existing technical solutions are generally divided into two categories. One is through the participation of a trusted thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421
Inventor 田辉郭玉刚刘文钊
Owner HEFEI HIGH DIMENSIONAL DATA TECH CO LTD