Data hidden transmission method based on block chain multi-transaction splitting

A transmission method and data concealment technology, which is applied in the direction of digital transmission system, transmission system, data processing application, etc., can solve the problems of application failure and data concealment transmission application security threats, etc., achieve strong practicability, improve concealment, and concealment high effect

Active Publication Date: 2022-04-22
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the above process only embeds covert information into a single blockchain transaction
Once a transaction carrying concealed information is exposed, the attacker can directly extract and restore the concealed information embedded in the transaction, which will also help the attacker find other transactions embedded with concealed information, which gives blockchain-based The application of data covert transmission has caused a great security threat, making the existing methods still unable to be applied in actual data covert transmission scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data hidden transmission method based on block chain multi-transaction splitting
  • Data hidden transmission method based on block chain multi-transaction splitting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment proposes an information splitting method based on XOR. The sender splits the concealed information into n parts, and the receiver needs to aggregate all n parts of the split information to recover the hidden information.

[0033] Such as figure 1 As shown, a data covert transmission method based on blockchain multi-transaction splitting includes the following process:

[0034] Step 1: Off-chain negotiation.

[0035] Before carrying out the covert transmission of blockchain data, the sender and the receiver first negotiate the address set A used through the off-chain channel, A={A 1 ,...,A m}, where A includes m blockchain addresses, all of which are generated by the sender. At the same time, the sender and the receiver negotiate the number n of splitting the hidden information, n

Embodiment 2

[0048] Embodiment 2 proposes an information splitting method based on secret sharing. The sender splits the hidden information into n parts, and the receiver only needs to aggregate the split information of t parts to recover the hidden information. t≤n.

[0049] Such as figure 1 As shown, a data covert transmission method based on blockchain multi-transaction splitting includes the following process:

[0050] Step 1: Off-chain negotiation.

[0051] Before carrying out the covert transmission of blockchain data, the sender and the receiver need to pre-negotiate the address set A={A 1 ,...,A m}, which includes m blockchain addresses, all of which are generated by the sender. In addition, the sender and receiver negotiate the number of splits n of the concealed information, where n (wherein N is a 256-bit prime number), and an embedding / extracting method of hidden information. The concealed information embedding / extracting method here can be implemented using existing techn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data hidden transmission method based on block chain multi-transaction splitting, and belongs to the technical field of block chains and data hidden transmission. According to the method, the hidden information is split and embedded into a plurality of block chain transactions, so that even if an attacker finds a single block chain transaction, the hidden information cannot be recovered. Therefore, compared with an existing data hidden transmission scheme based on the block chain, the method effectively improves the concealment. The method is suitable for various hidden information embedding/extracting modes, including but not limited to embedding the hidden information in fields such as amount, address, custom data and the like of the transaction. Meanwhile, the hidden transmission of data can be realized in various block chain platforms, including public block chain platforms such as bitcoin, Ethereum, EOS and the like and alliance block chain platforms such as Hyperledger Fabric and the like. Therefore, the method has very high practicability.

Description

technical field [0001] The invention relates to a data concealed transmission method, in particular to a data concealed transmission method based on block chain multi-transaction splitting, and belongs to the technical field of block chain and data concealed transmission. Background technique [0002] At present, the data covert transmission mechanism represented by information hiding technology plays an important role in the fields of secret sharing and intelligence transmission. Different from the method of hiding the communication content between the sender and the receiver through data encryption, the data covert transmission mechanism aims to hide the behavior of the sender and the receiver, that is, the third party cannot perceive the communication between the sender and the receiver, Furthermore, the existence of concealed information cannot be perceived, which further protects the behavioral privacy of both communicating parties. [0003] However, the traditional da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L61/5069H04L67/1097G06Q40/04
CPCH04L63/0428H04L67/1097G06Q40/04H04L2209/16H04L2209/56
Inventor 祝烈煌张璨徐畅陈卓
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products