Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Two-way Anonymous Secret Communication Method Using Bulletin Boards

A communication method and bulletin board technology, applied in the computer field, can solve the problems of selfish and anonymous abuse of nodes, and achieve the effects of improving security, concise and clear steps, and reducing delay.

Active Publication Date: 2022-07-29
ZHENGZHOU UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this scheme is prone to node selfishness and anonymity abuse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Two-way Anonymous Secret Communication Method Using Bulletin Boards
  • A Two-way Anonymous Secret Communication Method Using Bulletin Boards
  • A Two-way Anonymous Secret Communication Method Using Bulletin Boards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Example 1 Anonymity Analysis

[0088] Using the two-way anonymous secret communication method of the bulletin board, the identity privacy of the two parties in the communication can be hidden.

[0089] Theorem 1 The receiving node cannot obtain the identity information and location information of the sending node.

[0090] Proof 1:

[0091] In the present invention, a special node of the bulletin board is adopted, and the message sent by the sending node is sent to the bulletin board node, not directly to the receiving node. There is no identity information of the sending node in the sent encrypted data, and the receiving node can only receive the message identifier published in the bulletin board node, and the message identifier does not contain the identity information of the sending node. Therefore, the receiving node has no knowledge of the identity information and location information of the sending node. On the other hand, Theorem 3 proves that it is impossible...

Embodiment 2

[0110] Example 2 Confidentiality Analysis

[0111] The sending node encrypts the message with the public key of the receiving node before sending it out. Only the receiving node can decrypt it with its own private key to obtain the plaintext of the message. Any transit node does not have the private key of the receiving node, so it is impossible to decrypt the plaintext of the initial message. Likewise, any attacker does not possess the private key of the receiving node, so even if he intercepts the ciphertext of the message in transit, he cannot obtain the plaintext of the message.

[0112] When the bulletin board node replies the message to the receiving node, the data it sends is still encrypted with the public key of the receiving node. Except the receiving node, any third party including the transit node and the attacking node can Decryption is not possible.

[0113] To sum up, the method can realize secret communication between the sending node and the receiving node....

Embodiment 3

[0114] Example 3 Robustness Analysis

[0115] Compared with the Crowds and onion routing technologies used in the two methods proposed in the background art, the Crowds anonymous communication model requires network nodes to be a closed static collection, and the onion routing model requires pre-establishing virtual circuits in the communication process. Due to the increase of delay and computational complexity, it cannot adapt to the wireless network whose topology changes dynamically. The two-way anonymous secret communication method using the bulletin board proposed by the present invention does not need to establish links in advance, which avoids communication failure caused by failure of one or more link nodes after the nodes on the routing path are established. The relay nodes for forwarding messages are randomly selected, that is to say, the entire routing path does not rely on some special nodes, and it will not cause system bottlenecks because some nodes undertake a l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a two-way anonymous secret communication method using a bulletin board. By adopting the two-way anonymous secret communication method using the bulletin board, the identity privacy of both parties in the communication can be hidden. The two-way anonymous secret communication method using the bulletin board does not need to establish a link in advance, which avoids the communication failure caused by the node failure after the node on the routing path establishes the link. In the entire communication process, all nodes are peers, that is to say, the entire routing path does not rely on some special nodes, and will not cause nodes to behave selfishly. Even when a certain transit node is attacked, it is difficult for the attacker to infer the location information of the sender and receiver and the routing information of the entire communication. The invention also adopts the time stamp technology, which can effectively solve the problem of increased network overhead caused by the third party intercepting the request information and performing repeated request operations. The model can well adapt to the network with dynamic change of topology structure, and has good robustness.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a two-way anonymous secret communication method using a bulletin board. Background technique [0002] At present, the relatively mature cryptographic technology can hide the content of information in network communication by encrypting information, which can better ensure the security of information content transmitted in the network, but cannot hide the identity information and location of the sending node or receiving node during the communication process. information. In order to protect the identity of network nodes or users, it is more and more important to study anonymous communication technology in network communication and its implementation and performance in large-scale networks. Most of the research on anonymous communication is about one-way anonymity, for example, the sending node is anonymous and the receiving node is public. However, there are few studies on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/32H04L9/06
CPCH04L9/14H04L9/3297H04L9/0631
Inventor 李晓宇王小丽李晓鸣刘少慈王磊
Owner ZHENGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products