Smart contract based concealed communication method under blockchain

A covert communication and smart contract technology, applied in the field of information hiding, can solve the problems of poor information transmission concealment, a large number of information transmission times, consumption of large resources and time, etc., and achieve high information embedding efficiency, security and anti-tampering ability. Strong and strong anti-interference effect

Active Publication Date: 2021-02-19
YANGZHOU UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above method has three deficiencies. One is that the concealment of information transmission using the least significant bit is not strong, and regular analysis for the least significant bit makes the communication have the risk of being detected; the second is that the time interval sequence is used as the information embedding carrier The communication effect is susceptible to network fluctuations; the third is that when transmitting a large amount of information, both methods require a large number of information transmission times, which is not suitable for the Bitcoin network based on workload proof and the average block confirmation time is as long as ten minutes. Applicable, resource-intensive and time-intensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart contract based concealed communication method under blockchain
  • Smart contract based concealed communication method under blockchain
  • Smart contract based concealed communication method under blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0026] In one embodiment, combined with figure 1 , provides a covert communication method under the blockchain implemented by using smart contracts, the overall system model and architecture are as follows figure 2 As shown, it specifically includes the following steps:

[0027] Step 1, perform preliminary encryption and encoding on the secret information T to be transmitted, and obtain the processed secret information T';

[0028] Step 2, generate a keyword key according to the processed result of step 1;

[0029] Among them, the key has different forms and attributes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart contract based concealed communication method under a blockchain. The concealed communication method comprises the following steps: preliminary encryption and coding are carried out on concealed information to be transmitted; and a keyword key is generated; a sender transmits the key and the hash value of the key to a receiver; the receiver judges whether the keyword key is tampered or not, if the keyword key is tampered, communication is terminated, and if not, the next step is executed; the receiver creates a contract according to the key so as to correspond to the real information sequence; the receiver creates an address white list called by the contract; the sender publishes the contract, and after the miner finishes mining, the contract is formally deployed in the block chain; the sender calls the contract; the receiver restores the encrypted information according to the contract calling record; and the receiver performs decoding and decryption inverse processing on the restored encrypted information to restore the original information. The invention provided by the invention is simple, high in security and tamper resistance, low in complexityof used contracts, and good in application prospect.

Description

technical field [0001] The invention belongs to the field of information hiding, and in particular relates to a concealed communication method under a block chain realized by using an intelligent contract. Background technique [0002] Traditional covert communication mainly relies on centralized channels, which are concentrated and single, and are easy to be targeted. Attackers can monitor channels and intercept data packets to detect the existence of covert communication. Due to the reliance on centralized nodes or third-party servers to ensure channel security, once the central node has a trust problem or is compromised, the traditional covert communication information will be leaked or even tampered with. In addition, attackers can obtain the identity information of both parties through traffic analysis. The blockchain technology that has emerged in recent years can effectively solve the problems of centralized channels by virtue of its decentralization characteristics....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L12/24G06Q20/06
CPCH04L63/0428H04L9/0643H04L41/30G06Q20/065
Inventor 张乐君张智杰薛霄陈慧灵
Owner YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products