Block chain hidden data segmentation transmission method

A technology of data segmentation and transmission method, applied in digital transmission systems, transmission systems, and key distribution, can solve the problems of poor practicability and poor concealment of data concealment transmission, and achieve high practicability, anonymity, and strong anonymity. Effect

Pending Publication Date: 2022-05-31
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to address the deficiencies of the existing technology, in order to solve the technical problems of poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain hidden data segmentation transmission method
  • Block chain hidden data segmentation transmission method
  • Block chain hidden data segmentation transmission method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0083] In order to illustrate the content and implementation method of the present invention, this specification provides the above-mentioned specific embodiments. However, the ability

[0040] Step 1: Pre-negotiated keys. The sender and receiver negotiate the screening method of special transactions in advance, which is used for encryption

[0040] Step 1: Pre-negotiated keys. The sender and receiver negotiate the screening method of special transactions in advance, which is used for encryption

[0052] Step 2.2: Segmented transaction construction. Its input includes: the number of segments n, the segmented covert information set M, M=

SKE.Enc represents the encryption algorithm;,

Decryption algorithm: m←Dec(K, c), means to receive a key K and a ciphertext c as input, and output decryption

[0045] Step 2: covert data segmentation and embedding.

[0045] Step 2: covert data segmentation and embedding.

The pre-negotiated segmentation method divides the encrypted hidden inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a block chain hidden data segment transmission method, and belongs to the technical field of data hidden transmission. According to the method, text data are segmented, and the segmented data are stored in self-defined data segments of block chain transactions. A block chain platform is used for implementing hidden information transmission, and due to a broadcast mechanism of a block chain, a sender does not need to directly establish connection with a receiver, so that addresses of two communication parties are not exposed, and anonymity of the two communication parties is realized to a certain extent. The hidden information is stored by using the custom data field in the block chain, the hidden data of the text is segmented, and the hidden information is transmitted through multiple block chain transactions, so that block chain-based text hidden data transmission is realized. The method is high in anonymity and practicability, and can be used for various block chain networks.

Description

technical field [0001] The invention relates to a data transmission method, in particular to a block chain concealed data segmentation transmission method, and belongs to the technical field of data concealed transmission. [0002] technical background [0003] With the development of computer networks, more and more people and companies use the Internet to communicate. During the communication process, information containing personal information and even commercial secrets is transmitted on network channels, which brings security and privacy issues. Therefore, more and more privacy protection technologies based on cryptographic primitives have been proposed to ensure the confidentiality and integrity of user privacy information during communication. In these confidential communication scenarios, both the transmitted content and the communication act itself should be protected. [0004] In order to hide the communication behavior on the Internet, on the basis of traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0838H04L63/0428
Inventor 祝烈煌张璨徐畅雷音
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products