Two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming code

A technology of secret sharing and two-dimensional codes, which is applied in computer security devices, record carriers used by machines, instruments, etc., can solve problems such as failure, anti-fraud function defects, and meaningless barcodes of two-dimensional codes for secret sharing, and achieve good results. safety effect

Active Publication Date: 2022-05-13
绍兴聚量数据技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there have been some achievements in the research of secret information transmission using two-dimensional code combined with secret sharing technology. However, these methods have the following problems: ① The generated two-dimensional code for secret sharing is a meaningless barcode; ② The existence of secret sharing methods Take the structure as (n, n); ③ There are defects in the anti-fraud function, and in some cases, the function will fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming code
  • Two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming code
  • Two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0123] Step 1: According to the secret information S, use to generate n shares of secret information sharing (x i ,f(x i )).

[0124] In this embodiment, set k=3, n=3, 3 carrier QR codes refer to figure 2 . Among them, the versions of the three carrier QR codes are all 5-M, which contain meaningful content information, respectively: "www.bing.com", "www.google.com" and "www.yahoo.com" ;The secret information is: 1234567890.

[0125] The specific process is as follows:

[0126] Step 1.1: Split the secret information S into three non-repetitive secret information blocks; s 0 =12345,s 1 =678 and s 2 =90.

[0127] Step 1.2: According to the constraints, set the prime number p to 18251.

[0128] Step 1.3: Based on prime number p and n copies of secret information block s i , construct a polynomial equation f(x);

[0129] f(x)=12345+678*x+90*x 2 (mod18251)

[0130] Step 1.4: Generate 3 random numbers x 1 ,x 2 ,...,x n , into the polynomial equation f(x). Three secr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming code. First, split the secret information S into n shared shares of secret information (x i ,f(x i )); Then, combined with the carrier two-dimensional code cQR i content information m i , to generate the corresponding verification information v i ; Then, based on the (3,1) Hamming code, design the embedding rules of the information in the two-dimensional code; finally, using this rule, the secret share (x i ,f(x i )) and verification information v i Embedded into the carrier QR code cQR i In order to realize the sharing of secret information. In this method, secret information is shared among n carrier two-dimensional codes, and the sharing of secret information is realized on the premise of ensuring that the generated two-dimensional codes of secret sharing shares are decodable. The invention not only has the advantages of low encoding and decoding calculation complexity and more flexible access structure, but also is superior to other existing methods in terms of robustness, and the secret information has better security.

Description

technical field [0001] The invention belongs to the field of secret information sharing, and in particular relates to a two-dimensional code secret sharing and restoration method and device based on (3,1) Hamming codes. Background technique [0002] In recent years, with the rapid development of Internet of Things technology and mobile communication technology, electronic label technology has gradually been widely used in various industries. Compared with one-dimensional barcodes, two-dimensional codes have the advantages of large information capacity, high density, strong error correction ability, wide range of stored information, high decoding reliability, and high information transmission efficiency. They have been widely used in item identification, advertising, and storage. Logistics, product traceability, e-commerce, mobile payment and many other aspects. However, due to the openness of patents, criminals can use standard decoding software and hardware to easily steal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/06G06K7/14G06F21/60
CPCG06K19/06037G06K19/06075G06K7/1408G06F21/602
Inventor 黄鹏程张真诚栗永徽张善卿
Owner 绍兴聚量数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products