网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (1): 84-92.doi: 10.11959/j.issn.2096-109x.2021009
所属专题: 区块链
张涛, 伍前红, 唐宗勋
修回日期:
2020-07-02
出版日期:
2021-02-15
发布日期:
2021-02-01
作者简介:
张涛(1991- ),男,甘肃平凉人,北京航空航天大学博士生,主要研究方向为区块链、网络信息安全。基金资助:
Tao ZHANG, Qianhong WU, Zongxun TANG
Revised:
2020-07-02
Online:
2021-02-15
Published:
2021-02-01
Supported by:
摘要:
为满足机密信息高效、安全、隐蔽、稳定传输的需求,分析了比特币的交易数据结构及潜在隐蔽信道的位置和容量,提出了一种基于比特币区块链的存储隐蔽信道数据传输模型,可以在不破坏原有交易格式、不增加交易内容特殊性,克服现有网络环境下的隐蔽信道特性缺陷等弊端,保证数据不被检测,同时保护数据隐蔽传输的发送方和接收方。基于区块链的数据传输将成为数据隐蔽传输新的发展方向,对于推动特种应用安全传输技术的发展具有非常重要的意义。
中图分类号:
张涛, 伍前红, 唐宗勋. 基于比特币区块链的隐蔽信息传输研究[J]. 网络与信息安全学报, 2021, 7(1): 84-92.
Tao ZHANG, Qianhong WU, Zongxun TANG. Bitcoin blockchain based information convert transmission[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 84-92.
表1
比特币交易数据格式Table 1 Data structure of Bitcoin transaction format"
字段名 | 字段名(英文) | 大小 | 描述 |
版本 | Version | 4 byte | 交易数据结构的版本号 |
交易输入 | tx_in | 大于41 byte | 输入交易的数组,每个输入大于等于41 byte |
交易输入数量 | tx_in count | 1~9 byte | 输入交易的数量 |
输出 | tx_out | 大于9 byte | 输出地址的数组,每个输入大于等于9 byte |
交易输出数量 | tx_out count | 大于1 byte | 交易输出地址的数量 |
锁定时间 | lock_time | 4 byte | 一个unix时间戳或区块高度 |
表3
公钥脚本格式Table 3 Pubkey script format"
公钥脚本 | 公钥脚本格式 | 签名脚本格式 |
P2PKH | OP_DUP OP_HASH160 <PubKeyHash> OP_EQUALVERIFY OP_CHECKSIG | <sig> <pubkey> |
P2SH | OP_HASH160 <Hash160(redeemScript)> OP_EQUAL | <sig>[sig][sig...]<redeemScript> |
Multisig | <m> <A pubkey>[B pubkey][C pubkey...]<n> OP_CHECKMULTISIG | OP_0 <A sig>[B sig][C sig...] |
Null Data | OP_RETURN <0 to 40 bytes of data> | — |
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. |
[2] | MAXEMCHUK , NICHOLAS F . Electronic document distribution[J]. AT&T Technical Journal, 1994,73(5): 73-80. |
[3] | LOW S H , MAXEMCHUK N F , BRASSIL J T ,et al. Document marking and identification using both line and word shifting[C]// Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM '95). 1995. |
[4] | BRASSIL J , LOW S , MAXEMCHUK N ,et al. Electronic marking and identification techniques to discourage document copying[C]// 13th Proceedings IEEE Networking for Global Communications INFOCOM '94. 1994. |
[5] | ALATTAR A M , ALATTAR O M . Watermarking electronic text documents containing justified paragraphs and irregular line spacing[J]. Proceedings of SPIE - The International Society for Optical Engineering, 2004,5306: 685-695. |
[6] | TAKIZAWA O , MATSUMOTO T , NAKAGAWA H ,et al. 3-8 information hiding on digital docu-ments by adjustment of new-line positions[J]. Journal of the National Institute of Information and Communications Technology , 2005,52(1/2). |
[7] | WAYNER P . Mimic functions[J]. Cryptologia, 1992,16(3): 193-214. |
[8] | TOPKARA M , TOPKARA U , ATALLAH M J . Information hiding through errors:a confusing approach[C]// Security,Steganography,and Watermarking of Multimedia Contents IX. International Society for Optics and Photonics, 2007,6505:65050V. |
[9] | MUHAMMAD H Z , RAHMAN S M S A A , SHAKIL A . Synonym based malay linguistic text steganography[C]// 2009 Innovative Technologies in Intelligent Systems and Industrial Applications. 2009: 423-427. |
[10] | BENDER W , GRUHL D , MORIMOTO N ,et al. Techniques for data hiding[J]. IBM Systems Journal, 1996,35(3.4): 313-336. |
[11] | MANSOUR M F , TEWFIK A H . Audio watermarking by time-scale modification[C]// 2001 IEEE International Conference on Acoustics,Speech,and Signal Processing. 2001: 1353-1356. |
[12] | BONEY L , TEWFIK A H , HAMDY K N . Digital watermarks for audio signals[C]// Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems. IEEE, 1996: 473-480. |
[13] | WU C P , SU P C , KUO C C J . Robust and efficient digital audio watermarking using audio content analysis[C]// Security and Watermarking of Multimedia Contents II.International Society for Optics and Photonics. 2000: 382-392. |
[14] | 陆佰林, 朱艳琴 . 基于小波变换的双水印算法[J]. 微电子学与计算机, 2007(8): 37-40. |
LU B L , ZHU Y Q . An Algorithm of dual watermarking based on wavelet transform[J]. Microelectronics & Computer, 2007(8): 37-40. | |
[15] | 刘红翼, 王继军, 韦月琼 ,等. 一种基于LSB的数字图像信息隐藏算法[J]. 计算机科学, 2008,35(1): 100-102. |
LIU H Y , WANG J J , WEI Y Q ,et al. Department of computer science[J]. Computer Science, 2008,35(1): 100-102. | |
[16] | LUO W , HUANG F , HUANG J . Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 201-214. |
[17] | THODI D M , RODRíGUEZ J J . Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007,16(3): 721-730. |
[18] | 钮心忻, 杨义先, 吴志军 . 信息隐藏理论与关键技术研究[J]. 电信科学, 2004,20(12): 28-30. |
NIU X X , YANG Y X , WU Z J . Study on the basic theory and technology of information hiding[J]. Telecommunications Science, 2004,20(12): 28-30. | |
[19] | 花广路, 李芝棠, 冯兵 . 基于H.264/AVC 视频的低频隐写算法[J]. 通信学报, 2013,34(Z2): 47-50. |
HUA G L , LI Z T , FENG B . Low frequency steganography algorithm for H.264/AVC[J]. Journal on Communications, 2013,34(Z2): 47-50. | |
[20] | SIMMONS G J , . The prisones' problem and the subliminal channel[C]// Advances in Cryptology Proc Crypto, 1984. |
[21] | SIMMONS G J , . The subliminal channel and digital signatures[C]// Proc of the EUROCRYPT 84 Workshop on Advances in Cryptology:Theory and Application of Cryptographic Techniques. 2007. |
[22] | SIMMONS G J , . The subliminal channels of the US digital signature algorithm (DSA)[C]// Proceedings of the 3rd Symposium on:State and Progress of Research in Cryptography. 1993: 35-54. |
[23] | YOUNG A , YUNG M . Kleptography:using cryptography against cryptography[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 1997: 62-74. |
[24] | YOUNG A , YUNG M . The prevalence of kleptographic attacks on discrete-log based cryptosystems[C]// Annual International Cryptology Conference. 1997: 264-276. |
[25] | BELLARE M , PATERSON K G , ROGAWAY P . Security of symmetric encryption against mass surveillance[C]// Annual Cryptology Conference. 2014: 1-19. |
[26] | 项世军, 罗欣荣 . 同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报, 2016,27(6): 1592-1601. |
XIANG S J , LUO X R . Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016,27(6): 1592-1601. | |
[27] | 李佩丽, 徐海霞, 马添军 ,等. 可更改区块链技术研究[J]. 密码学报, 2018,5(5): 501-509. |
LI P L , XU H X , MA T J ,et al. Research on fault-correcting blockchain technology[J]. Journal of Cryptologic Research, 2018,5(5): 501-509. | |
[28] | 秦波, 陈李昌豪, 伍前红 ,等. 比特币与法定数字货币[J]. 密码学报, 2017,4(2): 176-186. |
QIN B , CHEN L C H , WU Q H ,et al. Bitcoin and digital fiat currency[J]. Journal of Cryptologic Research, 2017,4(2): 176-186. | |
[29] | YAGA D , MELL P , ROBY N ,et al. Blockchain technology overview[J]. arXiv preprint arXiv:1906.11078, 2019. |
[30] | PARTALA J . Provably secure covert communication on blockchain[J]. Cryptography, 2018,2(3): 18. |
[31] | 宋上 . 基于区块链的隐蔽通信系统BLOCCE改进研究[D]. 兰州:兰州大学, 2019. |
SONG S . Research on the improvement of block chain based covert communication system BLOCCE[D]. Lanzhou:Lanzhou University, 2019. | |
[32] | 李彦峰, 丁丽萍, 吴敬征 ,等. 区块链环境下的新型网络隐蔽信道模型研究[J]. 通信学报, 2019,40(5): 67-78. |
LI Y F , DING L P , WU J Z ,et al. Research on a new network covert channel model in blockchain environment[J]. Journal on Communications, 2019,40(5): 67-78. | |
[33] | Bitcoin (BTC) price stats and information[EB]. |
[34] | Bitcoin developer guide[EB]. |
[35] | RIJMEN V , DAEMEN J . Advanced encryption standard[C]// Proceedings of Federal Information Processing Standards Publications,National Institute of Standards and Technology. 2001: 19-22. |
[1] | 蔡召, 荆涛, 任爽. 以太坊钓鱼诈骗检测技术综述[J]. 网络与信息安全学报, 2023, 9(2): 21-32. |
[2] | 王贺立, 闫巧. 基于交易记录特征的自私挖矿检测方案[J]. 网络与信息安全学报, 2023, 9(2): 104-114. |
[3] | 余北缘, 任珊瑶, 刘建伟. 区块链资产窃取攻击与防御技术综述[J]. 网络与信息安全学报, 2023, 9(1): 1-17. |
[4] | 唐飞, 甘宁, 阳祥贵, 王金洋. 基于区块链与国密SM9的抗恶意KGC无证书签名方案[J]. 网络与信息安全学报, 2022, 8(6): 9-19. |
[5] | 林丹, 林凯欣, 吴嘉婧, 郑子彬. 基于字节码的以太坊智能合约分类方法[J]. 网络与信息安全学报, 2022, 8(5): 111-120. |
[6] | 陈立全, 李潇, 杨哲懿, 钱思杰. 基于区块链的高透明度PKI认证协议[J]. 网络与信息安全学报, 2022, 8(4): 1-11. |
[7] | 张文博, 陈思敏, 魏立斐, 宋巍, 黄冬梅. 基于形式化方法的智能合约验证研究综述[J]. 网络与信息安全学报, 2022, 8(4): 12-28. |
[8] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[9] | 宋晓玲, 刘勇, 董景楠, 黄勇飞. 元宇宙中区块链的应用与展望[J]. 网络与信息安全学报, 2022, 8(4): 45-65. |
[10] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
[11] | 姜鹏坤, 张问银, 王九如, 黄善云, 宋万水. 基于正常交易掩盖下的区块链隐蔽通信方案[J]. 网络与信息安全学报, 2022, 8(4): 77-86. |
[12] | 王婧晗, 朱辉, 李鹤麟, 李晖, 杨晓鹏. 增强图像平滑度的可逆信息隐藏方案[J]. 网络与信息安全学报, 2022, 8(3): 66-75. |
[13] | 翟宝琴, 王健, 韩磊, 刘吉强, 何嘉豪, 刘天皓. 基于信任值的车联网分层共识优化协议[J]. 网络与信息安全学报, 2022, 8(3): 142-153. |
[14] | 李锦伟, 张晓雅, 姚远志, 俞能海. 基于细粒度嵌入空间预留的密文域图像可逆信息隐藏方法[J]. 网络与信息安全学报, 2022, 8(1): 106-117. |
[15] | 余佳仁, 田有亮, 林晖. 基于信誉管理模型的矿工类型鉴别机制设计[J]. 网络与信息安全学报, 2022, 8(1): 128-138. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|