Zhang et al., 2021 - Google Patents
Research on a covert communication model realized by using smart contracts in blockchain environmentZhang et al., 2021
- Document ID
- 14065690025587430362
- Author
- Zhang L
- Zhang Z
- Wang W
- Jin Z
- Su Y
- Chen H
- Publication year
- Publication venue
- IEEE Systems Journal
External Links
Snippet
The traditional covert communication channel relying on a third-party node is vulnerable to attack. The data are easily tampered with and the identity information of the communication party is fragile. Blockchain has the characteristics of decentralization and tamper resistance …
- 238000004891 communication 0 title abstract description 88
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Research on a covert communication model realized by using smart contracts in blockchain environment | |
Zhang et al. | A dual privacy preserving scheme in continuous location-based services | |
Zhao et al. | Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems | |
Bonawitz et al. | Practical secure aggregation for privacy-preserving machine learning | |
Zhang et al. | Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing | |
CN105959111B (en) | Information security big data resource access control system based on cloud computing and trust computing | |
US8661240B2 (en) | Joint encryption of data | |
Lin et al. | Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications | |
CN111191280A (en) | Block chain transaction method based on encrypted data, electronic equipment and storage medium | |
CN104468096A (en) | Method for protecting network electronic identity identifier information based on secret key scattering calculation | |
Chen et al. | CL-ME: Efficient certificateless matchmaking encryption for Internet of Things | |
Zhang et al. | An approach of covert communication based on the Ethereum whisper protocol in blockchain | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
Homoliak et al. | SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets | |
CN113111386A (en) | Privacy protection method for block chain transaction data | |
Gao et al. | Quantum election protocol based on quantum public key cryptosystem | |
Xie et al. | Verifiable federated learning with privacy-preserving data aggregation for consumer electronics | |
Wang et al. | Information privacy protection based on verifiable (t, n)-Threshold multi-secret sharing scheme | |
Gao et al. | BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment | |
Liu et al. | A novel quantum voting scheme based on BB84-state | |
CN111447058A (en) | Book resource access control method based on Chinese remainder theorem | |
Banerjee et al. | Blockchain Signatures to Ensure Information Integrity and Non-Repudiation in the Digital Era: A comprehensive study | |
CN113422681B (en) | Block chain digital signature method, device and system based on quantum cryptography | |
CN116527322A (en) | Combined credit investigation method and device based on block chain and privacy calculation | |
Li et al. | An Efficient and Provably‐Secure Certificateless Proxy‐Signcryption Scheme for Electronic Prescription System |