Covert communication method based on block chain ring signature
A technology of covert communication and ring signature, applied in the field of network security, can solve the problems such as the lack of a good solution to the block chain-based covert communication method, the increasing difficulty of public and private key management, and the leakage of the identities of both sides of the covert communication. Reliable transmission requirements, meet covert communication requirements, and ensure the effect of timely updates
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
[0070] For ease of description, the present invention defines the characters and parameters involved in the art as follows:
[0071] Z p : The elliptic curve used is defined in the finite field Z p superior.
[0072] Z p * :Z p -{0}.
[0073] (pk s ,sk s ): the sender's long-term public-private key pair, where pk s =sk s ·G (G is the base point selected on the elliptic curve).
[0074] (pk r1 ,sk r1 ),(pk r2 ,sk r2 ): the receiver's long-term public and private key pair (2 pairs), where pk r1 =sk r1 ·G,pk r2 =sk r2 ·G (G is the base point selected on the elliptic curve).
[0075] z i : The current shared symmetric key.
[0076] UTXO Pool (Unspent Transaction Output): The pool contains unspent transaction output entries in the blockchain system.
[0077] m: The message to be signed.
[0078] like figure 1 and fi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


