Block chain privacy communication method, equipment and storage medium based on disguised light node

文档序号:195817 发布日期:2021-11-02 浏览:24次 中文

阅读说明:本技术 基于伪装轻节点的区块链隐私通讯方法、设备及存储介质 (Block chain privacy communication method, equipment and storage medium based on disguised light node ) 是由 杨宁波 杨健 于 2021-07-30 设计创作,主要内容包括:本发明涉及区块链通讯,具体涉及基于伪装轻节点的区块链隐私通讯方法、设备及存储介质,将具有特殊通讯功能的伪装轻节点部署在区块链网络中,伪装轻节点之间进行特殊通讯时,将传输文件伪装成与区块链各节点之间的正常通讯流量,伪装轻节点之间进行特殊通讯时,由初始伪装轻节点根据指定传输路径对传输文件进行层层加密,中间伪装轻节点进行逐层解密,并根据转发地址进行隐私通讯,直至解密后得到传输文件;本发明提供的技术方案能够有效克服现有技术所存在的不能有效保证文件发送方和接收方的匿名性、无法在特殊通讯时进行流量伪装的缺陷。(The invention relates to block chain communication, in particular to a block chain privacy communication method, equipment and a storage medium based on camouflage light nodes, wherein the camouflage light nodes with special communication functions are deployed in a block chain network, when special communication is carried out among the camouflage light nodes, transmission files are disguised into normal communication flow between the transmission files and each node of a block chain, when special communication is carried out among the camouflage light nodes, the transmission files are encrypted layer by an initial camouflage light node according to a specified transmission path, the middle camouflage light nodes are decrypted layer by layer, and privacy communication is carried out according to a forwarding address until the transmission files are obtained after decryption; the technical scheme provided by the invention can effectively overcome the defects that the anonymity of a file sender and a file receiver cannot be effectively ensured and the flow disguise cannot be carried out during special communication in the prior art.)

1. The block chain privacy communication method based on the disguised light node is characterized by comprising the following steps: the method comprises the steps that disguised light nodes with a special communication function are deployed in a block chain network, and transmission files are disguised into normal communication flow between the disguised light nodes and each node of a block chain when special communication is carried out among the disguised light nodes;

when special communication is carried out among the camouflage light nodes, the initial camouflage light node carries out layer-by-layer encryption on a transmission file according to an appointed transmission path, the middle camouflage light node carries out layer-by-layer decryption, and carries out privacy communication according to a forwarding address until the transmission file is obtained after decryption.

2. The masquerading light node-based blockchain private communication method of claim 1, wherein: the initial camouflage light node encrypts the transmission file layer by layer according to the appointed transmission path, and the method comprises the following steps:

and the initial disguised light nodes encrypt the transmission files layer by layer according to the appointed transmission path and the public key of each intermediate disguised light node in the sequence from back to front.

3. The masquerading light node-based blockchain private communication method of claim 2, wherein: the initial disguised light nodes encrypt the transmission files layer by layer according to the appointed transmission path and the sequence from back to front by using the public keys of the intermediate disguised light nodes, and the method comprises the following steps:

the initial camouflage light node encrypts the transmission file by using the public key of the last intermediate camouflage light node, and sequentially encrypts the encrypted file by using the public keys of the intermediate camouflage light nodes and the address corresponding to the next intermediate camouflage light node layer by layer according to the sequence from back to front.

4. The masquerading light node-based blockchain private communication method of claim 3, wherein: the intermediate camouflage light node carries out layer-by-layer decryption and comprises the following steps:

and after the intermediate disguised light node receives the encrypted file sent by the previous disguised light node through special communication, decrypting the encrypted file by using a private key of the intermediate disguised light node.

5. The masquerading light node-based blockchain private communication method of claim 4, wherein: the privacy communication according to the forwarding address until the transmission file is obtained after decryption comprises the following steps:

the intermediate camouflage light node decrypts the encrypted file by using a private key of the intermediate camouflage light node to obtain a corresponding encrypted file and an address of a next intermediate camouflage light node, and sends the encrypted file to the next intermediate camouflage light node according to the forwarding address until the intermediate camouflage light node decrypts to obtain a transmission file.

6. The masquerading light node-based blockchain private communication method according to any one of claims 1 to 5, wherein: when special communication is carried out between the disguised light nodes, the flow encryption is carried out by the following method:

s1, after the upper layer protocol is delivered to the P2P communication link layer, the upper layer protocol is encoded by RLPX;

s2, encrypting the encoded data by a shared key to ensure the data security in the communication process;

and S3, converting the data stream into an RLPX FrameRW frame, so as to facilitate the encrypted transmission and analysis of the data.

7. The masquerading light node-based blockchain private communication method of claim 6, wherein: and the disguised light node and each node of the block chain carry out normal P2P communication including transaction broadcasting and data synchronization.

8. The block chain privacy communication equipment based on the disguised light node is characterized in that: comprising a processor, and a memory coupled to the processor, the memory having stored thereon a blockchain privacy communication program executable on the processor, the blockchain privacy communication program when executed by the processor implementing the steps of the camouflaged light node-based blockchain privacy communication method of claim 6.

9. A storage medium, characterized by: stored thereon, a blockchain privacy communication program that when executed by a processor implements the steps of the camouflaged light node-based blockchain privacy communication method of claim 6.

Technical Field

The invention relates to block chain communication, in particular to a block chain privacy communication method, equipment and a storage medium based on a disguised light node.

Background

In the big data era, even if the file is encrypted by using an encryption algorithm and then transmitted to a receiving party, a network attacker can obtain a transmission rule by monitoring and analyzing data traffic for a long time, which is a potential risk for communication with a high security level. Although the difficulty of deciphering the file can be effectively improved by encrypting the file through cryptography, the identity information of the file sender can be exposed due to long-term regular data traffic.

Under some special scenes, a sender needs to transmit a file to a receiver, the safety of the file content is guaranteed in the transmission process, the file content is not decoded and acquired by a third party, the anonymity of the file sender and the file receiver is guaranteed, and only the sender and the receiver know the opposite party, and other participants and network attackers cannot know the identity information of the sender and the receiver.

In the prior art, the following method is generally adopted to overcome the technical problems:

A. onion network

According to the scheme, a plurality of onion nodes are used for jumping and are finally transmitted to a designated target node. The communication data is first encrypted in multiple layers and then transmitted over communication lines consisting of several so-called onion routers, each of which removes one encryption layer to obtain the next piece of routing information, and then forwards the data to the next onion router until the data reaches the destination.

The scheme has the defects that the number of normal nodes is relatively small, normal communication flow cannot be disguised during data transmission, and large data flow fluctuation is easily caused, so that the data flow is captured by an attacker.

Showdocks scheme

The scheme performs proxy forwarding of traffic requests through network nodes. Firstly, a user and an agent server establish an encrypted channel based on ssh, the user performs agent through the established channel, and initiates a request to a real service through ssh server, and the service returns to the user through the established channel.

According to the scheme, the transmission efficiency is high through the server agent, but the data traffic characteristics are obvious, and the risk of interrupted connection exists.

Disclosure of Invention

Technical problem to be solved

Aiming at the defects in the prior art, the invention provides a block chain private communication method, equipment and a storage medium based on a disguised light node, which can effectively overcome the defects that the anonymity of a file sender and a file receiver cannot be effectively ensured and the traffic disguise cannot be carried out during special communication in the prior art.

(II) technical scheme

In order to achieve the purpose, the invention is realized by the following technical scheme:

the block chain privacy communication method based on the disguised light nodes comprises the steps that the disguised light nodes with special communication functions are deployed in a block chain network, and transmission files are disguised into normal communication flow between the transmission files and each node of a block chain when special communication is carried out among the disguised light nodes;

when special communication is carried out among the camouflage light nodes, the initial camouflage light node carries out layer-by-layer encryption on a transmission file according to an appointed transmission path, the middle camouflage light node carries out layer-by-layer decryption, and carries out privacy communication according to a forwarding address until the transmission file is obtained after decryption.

Preferably, the step of encrypting the transmission file layer by the initial masquerading light node according to the designated transmission path includes:

and the initial disguised light nodes encrypt the transmission files layer by layer according to the appointed transmission path and the public key of each intermediate disguised light node in the sequence from back to front.

Preferably, the initial disguised light nodes encrypt the transmission files layer by layer according to the specified transmission path and the sequence from back to front by using the public keys of the intermediate disguised light nodes, and the method includes:

the initial camouflage light node encrypts the transmission file by using the public key of the last intermediate camouflage light node, and sequentially encrypts the encrypted file by using the public keys of the intermediate camouflage light nodes and the address corresponding to the next intermediate camouflage light node layer by layer according to the sequence from back to front.

Preferably, the intermediate camouflage light node performs layer-by-layer decryption, and includes:

and after the intermediate disguised light node receives the encrypted file sent by the previous disguised light node through special communication, decrypting the encrypted file by using a private key of the intermediate disguised light node.

Preferably, the performing privacy communication according to the forwarding address until the transmission file is obtained after decryption includes:

the intermediate camouflage light node decrypts the encrypted file by using a private key of the intermediate camouflage light node to obtain a corresponding encrypted file and an address of a next intermediate camouflage light node, and sends the encrypted file to the next intermediate camouflage light node according to the forwarding address until the intermediate camouflage light node decrypts to obtain a transmission file.

Preferably, when special communication is performed between the disguised light nodes, traffic encryption is performed by the following method:

s1, after the upper layer protocol is delivered to the P2P communication link layer, the upper layer protocol is encoded by RLPX;

s2, encrypting the encoded data by a shared key to ensure the data security in the communication process;

and S3, converting the data stream into an RLPX FrameRW frame, so as to facilitate the encrypted transmission and analysis of the data.

Preferably, the masquerading light node and each node of the block chain carry out normal P2P communication including transaction broadcast and data synchronization.

The blockchain privacy communication equipment based on the disguised light node comprises a processor and a memory coupled with the processor, wherein a blockchain privacy communication program capable of running on the processor is stored in the memory, and when the blockchain privacy communication program is executed by the processor, the steps of the blockchain privacy communication method based on the disguised light node are realized.

A storage medium having stored thereon a blockchain privacy communication program that, when executed by a processor, implements the steps of a camouflaged light node-based blockchain privacy communication method.

(III) advantageous effects

Compared with the prior art, the block chain privacy communication method, the block chain privacy communication equipment and the block chain privacy communication storage medium based on the disguised light nodes have the following beneficial effects:

1) by deploying the disguised light nodes with the special communication function in the blockchain network, transmission files can be disguised among the disguised light nodes into normal communication flow with each node of the blockchain when special communication is carried out, so that effective flow shielding is formed, and capturing of attackers due to obvious data flow fluctuation is avoided;

2) when the intermediate disguised light node transmits the file, only the address of the next intermediate disguised light node and the encrypted file are known, so that the whole transmission path is encrypted for the intermediate disguised light node, and the anonymity of a transmitting party and a receiving party of the transmitted file can be ensured.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.

Fig. 1 is a schematic diagram of a camouflaged light node deployed in a blockchain network in the present invention;

FIG. 2 is a schematic diagram of an initial disguised light node encrypting a transmission file layer by layer in the present invention;

fig. 3 is a schematic diagram of traffic encryption when special communication is performed between the disguised light nodes in the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The block chain privacy communication method based on the disguised light nodes comprises the steps that the disguised light nodes with the special communication function are deployed in a block chain network, and transmission files are disguised into normal communication flow between the transmission files and each node of a block chain when special communication is conducted among the disguised light nodes.

The masquerading light node and each node of the block chain carry out normal P2P communication including transaction broadcast and data synchronization.

As shown in fig. 1, a node a is a normal node in a blockchain network, and nodes B to E are disguised light nodes deployed in the blockchain network according to the present invention, and these disguised light nodes have a special communication function in addition to all functions of the normal node.

For normal communication:

P2P communications are broadcast for transactions, data synchronization, etc. between blockchain nodes, while masquerading light nodes will normally communicate these P2P with blockchain nodes.

For special communications:

when special communication is needed, for example, when B needs to send a file to E, B can designate a transmission path, disguise the transmission file into normal communication flow in a block chain by simulating the characteristics of a request head and the like of block chain node communication, and forward the normal communication flow to E layer by layer. In the process, each masquerading light node only knows who the next node is, for example, C only knows that the message is forwarded to D, the last receiver cannot be determined to be D, and C cannot decrypt the transmission content.

When special communication is carried out between the camouflage light nodes, the initial camouflage light nodes carry out layer-by-layer encryption on the transmission file according to the appointed transmission path, the middle camouflage light nodes carry out layer-by-layer decryption, and carry out privacy communication according to the forwarding address until the transmission file is obtained after decryption.

The method for encrypting the transmission file layer by the initial camouflage light node according to the appointed transmission path comprises the following steps:

and the initial disguised light nodes encrypt the transmission files layer by layer according to the appointed transmission path and the public key of each intermediate disguised light node in the sequence from back to front.

As shown in fig. 2, the initial masquerading light node encrypts the transmission file by using the public key of the last intermediate masquerading light node, and sequentially encrypts the encrypted file by using the public keys of the intermediate masquerading light nodes in sequence from back to front, and performs layer-by-layer encryption on the address corresponding to the next intermediate masquerading light node.

Wherein, the middle camouflage light node carries out layer-by-layer decryption, including:

after the intermediate disguised light node receives the encrypted file sent by the previous disguised light node through special communication, the encrypted file is decrypted by using a private key of the intermediate disguised light node.

Wherein, carry out privacy communication according to the forwarding address, until obtaining the transmission file after the deciphering, include:

the intermediate camouflage light node decrypts the encrypted file by using a private key of the intermediate camouflage light node to obtain a corresponding encrypted file and the address of the next intermediate camouflage light node, and the intermediate camouflage light node transmits the encrypted file to the next intermediate camouflage light node according to the forwarding address until the intermediate camouflage light node decrypts to obtain a transmission file.

Compared with the traditional onion network, the technical scheme of the application can disguise the transmission file into normal communication flow between the nodes of the block chain when special communication is carried out between the disguised light nodes, so that effective flow shielding is formed, and capturing of an attacker due to obvious data flow fluctuation is avoided. In addition, the disguised light nodes with special communication functions, which are deployed in the blockchain network, can only be used by a deployment party, belong to the private of the deployment party, and cannot be shared with onion nodes in the onion network, so that the blockchain private communication is further realized, and the effective protection of the transmission files is formed.

In the following, a specific process of sending a transmission file to E by B is taken as an example, and a block chain private communication method based on a masquerading light node in this application is described with reference to fig. 1 and fig. 2.

B encrypts the transmission file by using the public key of E, then encrypts the address of E and the encrypted file E by using the public key of D, and then encrypts the address of D and the encrypted file D by using the public key of C. B, the encrypted file C obtained according to the process is encrypted through flow and then transmitted to C;

c analyzes the received message sent by B to obtain an encrypted file C, then C decrypts the encrypted file C by using a private key of the C to obtain an encrypted file D which cannot be decrypted and an address of the encrypted file D, and at the moment, C transmits the encrypted file D to D after encrypting the encrypted file D through flow;

d, after receiving the message sent by C, obtaining the addresses of the encrypted files E and E which can not be decrypted again in the same processing mode as C;

and E decrypts the encrypted file E by using the private key of the E after receiving the message sent by D, only the transmission file is obtained, and the address information of the next disguised light node is not available, so that the E knows that the E is a file receiver.

In the technical scheme of the application, when special communication is carried out between the disguised light nodes, the flow encryption is carried out by the following method:

s1, after the upper layer protocol is delivered to the P2P communication link layer, the upper layer protocol is encoded by RLPX;

s2, encrypting the encoded data by a shared key to ensure the data security in the communication process;

and S3, converting the data stream into an RLPX FrameRW frame, so as to facilitate the encrypted transmission and analysis of the data.

In the technical scheme, the blockchain privacy communication device based on the disguised light node comprises a processor and a memory coupled with the processor, wherein a blockchain privacy communication program capable of running on the processor is stored in the memory, and the blockchain privacy communication program is executed by the processor to realize the step of the blockchain privacy communication method based on the disguised light node.

In the technical scheme of the application, a storage medium is further disclosed, wherein a block chain privacy communication program is stored on the storage medium, and when the block chain privacy communication program is executed by a processor, the steps of the block chain privacy communication method based on the disguised light node are realized.

The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

8页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:ROS跨平台的通信方法和系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类