Unlock instant, AI-driven research and patent intelligence for your innovation.

Covert communication method based on block chain ring signature

A technology of covert communication and ring signature, applied in the field of network security, can solve the problems such as the lack of a good solution to the block chain-based covert communication method, the increasing difficulty of public and private key management, and the leakage of the identities of both sides of the covert communication. Reliable transmission requirements, meet covert communication requirements, and ensure the effect of timely updates

Pending Publication Date: 2022-07-08
HUNAN TIAN HE GUO YUN TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The risk of identity disclosure of both parties in concealed communication caused by the incomplete anonymity of the blockchain address;
[0007] (2) The risk of statistical cryptanalysis caused by the fixed shared key used for encryption
[0013] In the above technical scheme, the solution to problem (1) is to generate a new random sender address before each transmission, but this will cause a large number of token balances to be 0; the address that initiates a single transaction is different from the normal address There are still discrepancies in the logic; at the same time, the difficulty of public and private key management has increased
[0014] It can be seen from the above that the traditional technology does not solve the problems of the covert communication method based on the blockchain, and a new technology is urgently needed to form a better solution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication method based on block chain ring signature
  • Covert communication method based on block chain ring signature
  • Covert communication method based on block chain ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0070] For ease of description, the present invention defines the characters and parameters involved in the art as follows:

[0071] Z p : The elliptic curve used is defined in the finite field Z p superior.

[0072] Z p * :Z p -{0}.

[0073] (pk s ,sk s ): the sender's long-term public-private key pair, where pk s =sk s ·G (G is the base point selected on the elliptic curve).

[0074] (pk r1 ,sk r1 ),(pk r2 ,sk r2 ): the receiver's long-term public and private key pair (2 pairs), where pk r1 =sk r1 ·G,pk r2 =sk r2 ·G (G is the base point selected on the elliptic curve).

[0075] z i : The current shared symmetric key.

[0076] UTXO Pool (Unspent Transaction Output): The pool contains unspent transaction output entries in the blockchain system.

[0077] m: The message to be signed.

[0078] like figure 1 and fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a covert communication method based on a block chain ring signature. The method comprises the following steps: S1, obtaining long-term public keys and initial symmetric keys of a sender and a receiver; s2, constructing a ring signature transaction as a confidential message carrier; s3, the sender broadcasts the constructed ring signature transaction; and S4, the receiver checks the transaction pool and analyzes the confidential message. The method has the advantages of being simple in principle, easy and convenient to operate, wider in application range, higher in processing speed, higher in safety and the like.

Description

technical field [0001] The invention mainly relates to the technical field of network security, in particular to a covert communication method based on a blockchain ring signature. Background technique [0002] With the development of network technology, more and more attention has been paid to the security and privacy of data transmission, which also provides the premise and foundation for the study of covert communication. Compared with single encrypted communication, "covert communication" also conceals the fact that both parties communicate data. [0003] Existing traditional covert communication methods often use redundant fields of data packets as carriers, embed encrypted confidential information into these carriers, and then use traditional network channels for transmission. However, these traditional methods still have risks such as malicious tampering of data packets. Therefore, considering the immutability of the blockchain, people's focus is gradually turning t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40H04L9/08H04L9/06
CPCH04L9/3255H04L63/0435H04L9/0637H04L9/0631H04L9/0816H04L9/085H04L9/0891H04L9/0869
Inventor 谭林陈宇田姚昱旻尹海波杨征
Owner HUNAN TIAN HE GUO YUN TECH CO LTD