A Two-way Anonymous Secret Communication Method Using Bulletin Boards
A communication method and bulletin board technology, applied in the computer field, can solve the problems of selfish and anonymous abuse of nodes, and achieve the effects of improving security, concise and clear steps, and reducing delay.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0087] Example 1 Anonymity Analysis
[0088] Using the two-way anonymous secret communication method of the bulletin board, the identity privacy of the two parties in the communication can be hidden.
[0089] Theorem 1 The receiving node cannot obtain the identity information and location information of the sending node.
[0090] Proof 1:
[0091] In the present invention, a special node of the bulletin board is adopted, and the message sent by the sending node is sent to the bulletin board node, not directly to the receiving node. There is no identity information of the sending node in the sent encrypted data, and the receiving node can only receive the message identifier published in the bulletin board node, and the message identifier does not contain the identity information of the sending node. Therefore, the receiving node has no knowledge of the identity information and location information of the sending node. On the other hand, Theorem 3 proves that it is impossible...
Embodiment 2
[0110] Example 2 Confidentiality Analysis
[0111] The sending node encrypts the message with the public key of the receiving node before sending it out. Only the receiving node can decrypt it with its own private key to obtain the plaintext of the message. Any transit node does not have the private key of the receiving node, so it is impossible to decrypt the plaintext of the initial message. Likewise, any attacker does not possess the private key of the receiving node, so even if he intercepts the ciphertext of the message in transit, he cannot obtain the plaintext of the message.
[0112] When the bulletin board node replies the message to the receiving node, the data it sends is still encrypted with the public key of the receiving node. Except the receiving node, any third party including the transit node and the attacking node can Decryption is not possible.
[0113] To sum up, the method can realize secret communication between the sending node and the receiving node....
Embodiment 3
[0114] Example 3 Robustness Analysis
[0115] Compared with the Crowds and onion routing technologies used in the two methods proposed in the background art, the Crowds anonymous communication model requires network nodes to be a closed static collection, and the onion routing model requires pre-establishing virtual circuits in the communication process. Due to the increase of delay and computational complexity, it cannot adapt to the wireless network whose topology changes dynamically. The two-way anonymous secret communication method using the bulletin board proposed by the present invention does not need to establish links in advance, which avoids communication failure caused by failure of one or more link nodes after the nodes on the routing path are established. The relay nodes for forwarding messages are randomly selected, that is to say, the entire routing path does not rely on some special nodes, and it will not cause system bottlenecks because some nodes undertake a l...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com