STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Research on Multi-Carrier Hybrid Encrypted Communication Technology Based on Blockchain
DOI: https://doi.org/10.62517/jbdc.202401327
Author(s)
Xinyi Chen
Affiliation(s)
School of Optoelectronics and Information Engineering, Fujian Normal University, Fuzhou, China
Abstract
As there is a third party intervention in network communication, in the context of big data era, the intervention of the third party platform may obtain the content of the private session, and also may tamper with the content, and the network communication becomes no longer secure, so this paper establishes a multi-carrier hybrid encryption system to ensure the privacy of the communication session. In this paper, an MCHE model is constructed to embed the secret information of communication on the blockchain on the basis of ring signature, using the mechanism of multi-carrier hybrid encryption, which not only improves the anonymity of the two parties of communication, but also improves the security of the content of the communication, and at the same time and proposes to complete the highly efficient encrypted communication based on the blockchain in which each leader leads multiple blocks. Compared with traditional network communication, blockchain communication takes advantage of the blockchain to effectively prevent eavesdroppers and attackers from listening to and tampering with encrypted information. The model can prevent third-party regulation and play the role of a private dialogue space for individuals; for industries, it can prevent competitors from obtaining important information through illegal bribes and other means; for countries, it can be used in the military to prevent enemy countries from intercepting and monitoring the acquisition of intelligence, and to protect their own national security interests.
Keywords
Network Communication; Encryption Technology; Blockchain; Ring Signature
References
[1] Yang, L. L. & Han, H. L.. (2006). Information security in network communication using hybrid encryption. Science and Technology Intelligence Development and Economy (16), 214-215. [2] Rivest R L, Shamir A, Tauman Y . How to Leak a Secret[C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Springer, Berlin, Heidelberg, 2001. [3] Wang, Ruijin, Yu, Suzhe, Li, Yue, Tang, Yucheng & Zhang, Fengli. (2019). Ring signature-based private data sharing model for medical blockchain. Journal of University of Electronic Science and Technology (06), 886-892. [4] Eyal, I., Gencer, A. E., Sirer, E. G., & van Renesse, R. (2016). Bitcoin-NG: A scalable blockchain protocol. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 3-18). IEEE. https://doi.org/10.1109/SP.2016.27.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved