[go: up one dir, main page]

CN113328859B - Information dispersion processing method - Google Patents

Information dispersion processing method Download PDF

Info

Publication number
CN113328859B
CN113328859B CN202110428242.0A CN202110428242A CN113328859B CN 113328859 B CN113328859 B CN 113328859B CN 202110428242 A CN202110428242 A CN 202110428242A CN 113328859 B CN113328859 B CN 113328859B
Authority
CN
China
Prior art keywords
information
processing
node
block
processed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110428242.0A
Other languages
Chinese (zh)
Other versions
CN113328859A (en
Inventor
张凯
郑应强
牛德标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing LSSEC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing LSSEC Technology Co Ltd filed Critical Beijing LSSEC Technology Co Ltd
Priority to CN202110428242.0A priority Critical patent/CN113328859B/en
Publication of CN113328859A publication Critical patent/CN113328859A/en
Application granted granted Critical
Publication of CN113328859B publication Critical patent/CN113328859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a processing method for information dispersion, which comprises the following steps: determining processing nodes with scattered information; the distribution node performs information blocking processing on the information to be processed; when information blocking processing is carried out, the adopted irreducible polynomial and the digits of the irreducible polynomial are determined by random selection; and respectively transmitting the obtained information blocks to corresponding processing nodes, and processing by the processing nodes. The processing method for information dispersion provides a more variable processing method for realizing information dispersion, and the scheme adopts random selection of irreducible polynomial digits and irreducible polynomial types to disperse information, so that the processing process is more complicated and variable, the analysis difficulty of an attacker is increased, and the information dispersion safety is improved.

Description

Information dispersion processing method
Technical Field
The invention relates to the technical field of information dispersion processing, in particular to a processing method for information dispersion.
Background
The existing information dispersion processing method generally adopts a Shamir encryption sharing technology to perform dispersion processing on information, and generally performs transformation processing on data through a fixed linear equation set, wherein the Shamir encryption sharing technology specifically comprises the following steps:
if for n sharing nodes { U1,U2,…,UnT as threshold value, s as encryption, p as a large prime number, X1,X2,…,XnBesides encryption s, other parameter information is disclosed for the identity information of the corresponding sharing node (processing node); when in encryption distribution, the encryption distribution node D randomly selects a t-1 degree polynomial f (x) a on GF (p)0+a1x+a2x2+…+at-1xt- 1modp,aiE.g. GF (p), meets the requirement f (0) ═ a0The distributing node D computes an encrypted share si=f(xi) I is 1, 2 …, n, and s isiDistribute to participating nodes Ui(ii) a When the encryption is recovered, assume t participating nodes { U1,U2,…,UtAnd (4) trying to recover encryption, distributing own encryption share by the participating nodes and constructing by utilizing a Lagrange interpolation polynomial algorithm:
Figure BDA0003030410340000011
the encryption is calculated to yield:
Figure BDA0003030410340000012
the encryption sharing scheme of Shamir meets basic threshold requirements:
(1) participating nodes holding t or more than t encrypted shares may recover the encryption;
(2) less than t, encryption cannot be obtained.
However, when the existing information dispersion is calculated by using a fixed linear equation set, the information processing method is single, irreducible polynomials are fixed, and binary domain bits are fixed, so that the attack is easy to occur.
Disclosure of Invention
In order to solve the above technical problem, the present invention provides an information dispersion processing method, including:
determining processing nodes with scattered information;
the distribution node performs information blocking processing on the information to be processed; when information blocking processing is carried out, the adopted irreducible polynomial and the digits of the irreducible polynomial are determined by random selection;
and respectively transmitting the obtained information blocks to corresponding processing nodes, and processing by the processing nodes.
Optionally, the information blocking process includes the following steps:
when information is processed in a blocking mode, the distribution node extracts data characteristics of information to be processed, and performs data dispersion processing on the information to be processed according to the data characteristics by using a preset segmentation rule to obtain information blocks;
selecting a corresponding random number for the information block; forming a filled prefabricated factor according to the selected random number; carrying out XOR operation on the information block and the prefabricated factor to obtain a data combination block;
selecting random factors for the processing nodes according to the preset filling rule; and after matching operation is carried out on the random factors and the prefabricated factors, the data combination blocks obtained by information block processing are transmitted to the processing nodes of the corresponding random factors according to the operation matching result.
Optionally, after receiving the encrypted information block, the processing node determines whether the received information block is valid by checking whether the equality is satisfied, and if the equality is not satisfied, the received information block is invalid and the transmission of the information block is performed again; if the checking equation is established, the information block is effective, and then the information to be processed is calculated and recovered by using a preset algorithm.
Optionally, in the process of recovering the information to be processed, each processing node can asynchronously disclose the encrypted component information.
Optionally, the following processing is performed before the information block is transmitted:
the distribution node is in a linear subspace GF (p)t) Upper random selection vector u ═ u (u)1,u2,…,ut-1) For information vector, satisfy s ═ ug0mod p, the distribution node calculates the encryption share S ═ S1,s2,…,sn) G mod p, s ═ s0The distribution nodes respectively send siI 1, 2 …, n is transmitted as an information block;
if processing node { U1,U2,…,UmRecovering the information to be processed, then
When m ═ t, the processing nodes each compute an identity vector (x)1,x2,…,xm) So that g is0=(g1,g2,…,gm)(x1,x2,…,xm)Tmod p, processing node exposed component information ci=siximod p, calculating to obtain information to be processed:
Figure BDA0003030410340000031
wherein t represents the number of terms of the irreducible polynomial determined in a random manner, and s represents the encrypted share of the information to be processed when m is t; m represents the number of processing nodes receiving the information block transmission; c. CiRepresenting processing node i disclosuresComponent information of (a); mod represents the remainder operation; p represents a large prime number;
when m is>t, the processing nodes each compute an identity vector (x)1′,x2′,…,xm') make g0=(g1,g2,…,gt)(x1′,x2′,…,xm′)Tmod p, each processing node transmits the identity vector to the other processing nodes, each processing node calculates:
Figure BDA0003030410340000032
in the above formula, x1,x2,…,xmAn identity vector representing the corresponding processing node when m equals t; m represents the number of processing nodes receiving the information block transmission; x is the number of1′,x2′,…,xm' means when m>t is the identity vector of the corresponding processing node;
the processing nodes disclose respective component information ci=siximod p, calculating the encrypted share of the information to be processed:
Figure BDA0003030410340000033
in the above formula, s' represents when m>t is the encrypted share of the information to be processed; m represents the number of processing nodes receiving the information block transmission; c. CjRepresenting component information disclosed by processing node j; mod represents the remainder operation; p represents a large prime number.
Optionally, the random factor is introduced into an SHA-256 hash function to obtain a corresponding hash value;
taking the obtained hash value as an encryption key K, and decomposing the K into sub-keys KiThen, there are:
K=k1,k2,k3…k32;
the random sequence output by introducing the two-dimensional chaotic system comprises:
xi=sin(πτ(yi-1+3)xi-1(1-xi-1))
yi=sin(πτ(xi+3)yi-1(1-yi-1))
wherein x isiAnd yiTwo-dimensional chaotic coordinate, x, representing ith processing nodei-1And yi-1Represents the two-dimensional chaotic coordinates of the i-1 th processing node, tau represents the system parameter, and 0<τ≤1;
Using subkey kiTo set three transition parameters V1,V2,V3Then, there are:
Figure BDA0003030410340000041
Figure BDA0003030410340000042
Figure BDA0003030410340000043
wherein,
Figure BDA0003030410340000044
represents an exclusive or operation, mod represents a remainder operation;
obtaining the transition parameter V according to calculation1,V2,V3Is calculated by presetting the parameters tau, x, y0,x0,y0Then, there are:
τ0=(τ+V3)mod1
x0=(x+V2)mod1
y0=(y+V1)mod1
according to the initial value tau obtained by calculation0,x0,y0Substituting the random sequence into a random sequence output by the two-dimensional chaotic system, and performing nonlinear operation to satisfy the following conditions:
Figure BDA0003030410340000045
Figure BDA0003030410340000046
wherein,
Figure BDA0003030410340000047
representing the encrypted data combination block,
Figure BDA0003030410340000048
denotes a decryption key, j is an encryption method, and j is 1, 2, 3.
Optionally, after receiving the encrypted information block, the processing node decrypts and restores the encrypted information block, and then processes the restored information block, where the processing includes one or more processing contents of storage, conversion, transmission, and release.
Optionally, the segmentation rule adopts a combination mode of firstly performing vertical segmentation and then performing horizontal segmentation, a plurality of segmentation blocks are formed after the vertical segmentation, segmentation adjustment is performed on each segmentation block according to a logical relationship of information to be processed, and the adjusted segmentation block is an information block.
Optionally, the check equation adopts the following equation:
Figure BDA0003030410340000051
in the above formula, the first and second carbon atoms are,
Figure BDA0003030410340000052
represents a commitment to a broadcast message of an ith item information block, and t represents the number of items of an irreducible polynomial determined in a random manner; biA broadcast message representing an ith item information block of the distribution node; mod represents the remainder operation; q represents a large prime number.
Optionally, the transmission method of the information block is as follows:
acquiring a connection channel between a first processing node and the distribution node based on the identification information of the distribution node;
acquiring each information block determined to be transmitted;
determining file type information of an information block based on parameters of the information block needing to be transmitted to a first processing node, determining to adopt a first transmission mode, and transmitting the corresponding information block to the first processing node based on the first transmission mode and the connection channel;
and forming mirror image channels for connecting other processing nodes with the distribution node by the connecting channel in a channel mirror image mode, determining to adopt a second transmission mode, wherein the second transmission mode is different from the first transmission mode, and transmitting other information blocks to the corresponding processing nodes.
The information dispersion processing method provides a more variable processing method for realizing information dispersion. According to the scheme, the irreducible polynomial digits and irreducible polynomial types are randomly selected to disperse information, so that the processing process is more complicated and changeable, the analysis difficulty of an attacker is increased, and the information dispersion safety is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of a processing method for information dispersion according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, an embodiment of the present invention provides an information dispersion processing method, including:
s100, determining processing nodes with scattered information;
s200, the distribution node performs information blocking processing on information to be processed; when information blocking processing is carried out, the adopted irreducible polynomial and the digits of the irreducible polynomial are determined by random selection;
and S300, respectively transmitting the obtained information blocks to corresponding processing nodes, and processing by the processing nodes.
The working principle and the beneficial effects of the technical scheme are as follows: when the scheme is used for processing information in a blocking mode, the number of bits of the irreducible polynomial and the irreducible polynomial are randomly selected and determined, a more variable processing method is provided for realizing information dispersion, the processing process is more complicated and changeable, the difficulty of encryption and decryption is improved, the analysis difficulty of an attacker is increased, and the safety of information dispersion transmission and processing is further improved.
In one embodiment, the information blocking process is as follows:
when information is processed in a blocking mode, the distribution node extracts data characteristics of information to be processed, and performs data dispersion processing on the information to be processed according to the data characteristics by using a preset segmentation rule to obtain information blocks;
selecting a corresponding random number for the information block; forming a filled prefabricated factor according to the selected random number; carrying out XOR operation on the information block and the prefabricated factor to obtain a data combination block;
selecting random factors for the processing nodes according to the preset filling rule; and after matching operation is carried out on the random factors and the prefabricated factors, the data combination blocks obtained by information block processing are transmitted to the processing nodes of the corresponding random factors according to the operation matching result.
The working principle and the beneficial effects of the technical scheme are as follows: when information is processed in a blocking mode, the data characteristics of the information to be processed are extracted, and the information to be processed is decomposed into a plurality of blocks, namely information blocks, by combining preset segmentation rules; selecting corresponding random numbers for each information block one by one to form filled prefabricated factors, and performing XOR operation to obtain a data combination block; selecting a random factor for a processing node, performing matching operation on the random factor and a prefabricated factor, and transmitting a data combination block obtained by information blocking processing to the processing node of the corresponding random factor according to an operation matching result; the matching of the random factor and the prefabricated factor has sporadic property, so that the decoding difficulty is improved, and the safety and the reliability of information dispersion processing are further enhanced.
In one embodiment, after receiving the encrypted information block, the processing node determines whether the received information block is valid by checking whether an equation is satisfied, where the check equation is as follows:
Figure BDA0003030410340000071
in the above formula, the first and second carbon atoms are,
Figure BDA0003030410340000072
represents a commitment to a broadcast message of an ith item information block, and t represents the number of items of an irreducible polynomial determined in a random manner; biA broadcast message representing an ith item information block of the distribution node; mod represents the remainder operation; q represents a large prime number;
if the checking equation is not satisfied, the received information block is invalid, and the transmission of the information block is carried out again; if the checking equation is established, the information block is effective, and then the information to be processed is calculated and recovered by using a preset algorithm.
The working principle and the beneficial effects of the technical scheme are as follows: the processing node of the scheme also checks the received encrypted information block, judges whether the received information block is valid or not by checking whether an equality is established or not, if the checking equality is not established, the received information block is invalid, and at the moment, the information processing cannot be carried out, and the information block needs to be transmitted again; the information block is effective only when the checking equation is established, and the processing of the information block can be carried out, so that the scheme can prevent the information block from being transmitted or other errors from causing dispersion processing errors or faults, and ensure the smooth proceeding of the information dispersion processing.
In one embodiment, each processing node can asynchronously disclose cryptographic component information during the process of recovering pending information.
The working principle and the beneficial effects of the technical scheme are as follows: the color pen asynchronous public encryption component information of each processing node realizes real-time synchronous communication of a plurality of processing nodes basically impossible due to various reasons such as networks in communication, and in order to prevent the problem caused by the fact that synchronous communication cannot be realized after selection and use, the asynchronous public mode is selected, so that the condition of asynchronous communication can be allowed, the processing fault is reduced, and the information processing efficiency is improved.
In one embodiment, the following is performed prior to transmission of the information block:
the distribution node is in a linear subspace GF (p)t) Upper random selection vector u ═ u (u)1,u2,…,ut-1) For information vector, satisfy s ═ ug0mod p, the distribution node calculates the encryption share S ═ S1,s2,…,sn) G mod p, s ═ s0The distribution nodes respectively send siI 1, 2 …, n is transmitted as an information block;
if processing node { U1,U2,…,UmRecovering the information to be processed, then
When m ═ t, the processing nodes each compute an identity vector (x)1,x2,…,xm) So that g is0=(g1,g2,…,gm)(x1,x2,…,xm)Tmod p, processing node exposed component information ci=sixi mod p,Calculating to obtain information to be processed:
Figure BDA0003030410340000081
wherein t represents the number of terms of the irreducible polynomial determined in a random manner, and s represents the encrypted share of the information to be processed when m is t; m represents the number of processing nodes receiving the information block transmission; c. CiRepresenting component information disclosed by the processing node i; mod represents the remainder operation; p represents a large prime number;
when m is>t, the processing nodes each compute an identity vector (x)1′,x2′,…,xm') make g0=(g1,g2,…,gt)(x1′,x2′,…,xm′)Tmod p, each processing node transmits the identity vector to the other processing nodes, each processing node calculates:
Figure BDA0003030410340000082
in the above formula, x1,x2,…,xmAn identity vector representing the corresponding processing node when m equals t; m represents the number of processing nodes receiving the information block transmission; x is the number of1′,x2′,…,xm' means when m>t is the identity vector of the corresponding processing node;
the processing nodes disclose respective component information ci=siximod p, calculating the encrypted share of the information to be processed:
Figure BDA0003030410340000083
in the above formula, s' represents when m>t is the encrypted share of the information to be processed; m represents the number of processing nodes receiving the information block transmission; c. CjRepresenting component information disclosed by processing node j; mod represents the remainder operation; p represents aLarge prime number.
The working principle and the beneficial effects of the technical scheme are as follows: the scheme defines a linear subspace GF (p) before the transmission of an information block by a distribution nodet) Randomly selecting vectors, calculating encryption shares and then transmitting information blocks; at processing node { U1,U2,…,UmRecovering the information to be processed, wherein the encryption share of the information to be processed calculated by the processing nodes has difference according to the comparison between the number of the processing nodes for transmitting the information receiving block and the number of terms of the irreducible polynomial, so that different algorithms are required to be adopted for processing when the information to be processed is recovered; the scheme avoids the problem of recovery of the information to be processed possibly caused by the randomness of the item number selection of the irreducible polynomial and ensures the smooth operation of information dispersion processing.
In one embodiment, the random factor incorporates a SHA-256 hash function to obtain a corresponding hash value;
taking the obtained hash value as an encryption key K, and decomposing the K into sub-keys KiThen, there are:
K=k1,k2,k3…k32;
the random sequence output by introducing the two-dimensional chaotic system comprises:
xi=sin(πτ(yi-1+3)xi-1(1-xi-1))
yi=sin(πτ(xi+3)yi-1(1-yi-1))
wherein x isiAnd yiTwo-dimensional chaotic coordinate, x, representing ith processing nodei-1And yi-1Represents the two-dimensional chaotic coordinates of the i-1 th processing node, tau represents the system parameter, and 0<τ≤1;
Using subkey kiTo set three transition parameters V1,V2,V3Then, there are:
Figure BDA0003030410340000091
Figure BDA0003030410340000092
Figure BDA0003030410340000101
wherein,
Figure BDA0003030410340000102
represents an exclusive or operation, mod represents a remainder operation;
obtaining the transition parameter V according to calculation1,V2,V3Is calculated by presetting the parameters tau, x, y0,x0,y0Then, there are:
τ0=(τ+V3)mod1
x0=(x+V2)mod1
y0=(y+V1)mod1
according to the initial value tau obtained by calculation0,x0,y0Substituting the random sequence into a random sequence output by the two-dimensional chaotic system, and performing nonlinear operation to satisfy the following conditions:
Figure BDA0003030410340000103
Figure BDA0003030410340000104
wherein,
Figure BDA0003030410340000105
representing the encrypted data combination block,
Figure BDA0003030410340000106
denotes a decryption key, j is an encryption method, and j is 1, 2, 3.
The working principle and the beneficial effects of the technical scheme are as follows: according to the scheme, an SHA-256 hash function is introduced to a random factor selected by a processing node to obtain a corresponding hash value, and the hash value is used as an encryption key; introducing a random sequence output by a two-dimensional chaotic system, setting three transition parameters by using a sub-encryption key, calculating to obtain a system parameter and a two-dimensional chaotic coordinate initial value, substituting the system parameter and the two-dimensional chaotic coordinate initial value into the random sequence output by the two-dimensional chaotic system to perform nonlinear operation, and obtaining a data combination block and a decryption key; the scheme can provide a basis for the decryption and recovery of the information to be processed by the processing node, eliminate the processing obstacle after the information is dispersed, and improve the information dispersion processing efficiency.
In one embodiment, after receiving the encrypted information block, the processing node decrypts and restores the encrypted information block, and processes the restored information block, where the processing includes one or more processing contents of storage, conversion, transmission, and distribution; the segmentation rule adopts a combination mode of firstly vertically segmenting and then horizontally segmenting to form a plurality of segmentation blocks after vertical segmentation, each segmentation block is segmented and adjusted according to the logic relation of the information to be processed, and the adjusted segmentation block is the information block.
The working principle and the beneficial effects of the technical scheme are as follows: the scheme limits the segmentation rule, adopts a combination mode of vertical segmentation and horizontal segmentation, forms a plurality of segmentation blocks after the information to be processed is vertically segmented, then segments and adjusts each segmentation block according to the logical relation of the information to be processed, and takes the adjusted segmentation block as an information block.
In one embodiment, the transmission method of the information block is as follows:
acquiring a connection channel between a first processing node and the distribution node based on the identification information of the distribution node;
acquiring each information block determined to be transmitted;
determining file type information of an information block based on parameters of the information block needing to be transmitted to a first processing node, determining to adopt a first transmission mode, and transmitting the corresponding information block to the first processing node based on the first transmission mode and the connection channel;
and forming mirror image channels for connecting other processing nodes with the distribution node by the connecting channel in a channel mirror image mode, determining to adopt a second transmission mode, wherein the second transmission mode is different from the first transmission mode, and transmitting other information blocks to the corresponding processing nodes.
The working principle and the beneficial effects of the technical scheme are as follows: according to the scheme, a connecting channel between a first processing node and a distribution node is obtained, file type information of an information block is determined according to parameters of the information block which is transmitted to the first processing node as required, and a first transmission mode is selected to transmit the information block of the first processing node; then, forming mirror image channels for connecting the other processing nodes with the distribution node by adopting a channel mirror image mode, and realizing information block transmission corresponding to the other processing nodes by adopting a second transmission mode through the mirror image channels; transmission connection can be realized rapidly through mirroring, and transmission efficiency is improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (7)

1. A method for processing information dispersion, comprising:
determining processing nodes with scattered information;
the distribution node performs information blocking processing on the information to be processed; when information blocking processing is carried out, the irreducible polynomial and the number of terms of the irreducible polynomial are determined by random selection;
respectively transmitting the obtained information blocks to corresponding processing nodes, and processing by the processing nodes;
the information blocking process comprises the following steps:
when information is processed in a blocking mode, the distribution node extracts data characteristics of information to be processed, and performs data dispersion processing on the information to be processed according to the data characteristics by using a preset segmentation rule to obtain information blocks;
selecting a corresponding random number for the information block; forming a filled prefabricated factor according to the selected random number; carrying out XOR operation on the information block and the prefabricated factor to obtain a data combination block;
selecting random factors for the processing nodes according to the preset filling rule; after matching operation is carried out on the random factors and the prefabricated factors, data combination blocks obtained by information blocking processing are transmitted to processing nodes of the corresponding random factors according to operation matching results;
before the information block is transmitted, the following processes are carried out:
the distribution node is in a linear subspace GF (p)t) Upper random selection vector u ═ u (u)1,u2,…,ut-1) For information vector, satisfy s ═ ug0mod p, the distribution node computes the encrypted shares, S ═ S1,s2,…,sn) If s is equal to s0The distribution nodes respectively send siI 1, 2 …, n is transmitted as an information block;
if processing node { U1,U2,…,UmRecovering the information to be processed, then
When m ═ t, the processing nodes each compute an identity vector (x)1,x2,…,xm) So that g is0=(g1,g2,…,gm)(x1,x2,…,xm)Tmod p, processing node exposed component information ci=siximod p, calculating the encrypted share of the information to be processed:
Figure FDA0003361106630000011
wherein t represents the number of terms of the irreducible polynomial determined in a random manner; s representsWhen m is t, the encrypted share of the information to be processed; s represents information to be processed; s0Represents an initial encrypted share; g0A linear code representing a distribution node; g1,g2,…,gmLinear codes respectively representing the processing nodes; m represents the number of processing nodes receiving the information block transmission; c. CiRepresenting component information disclosed by the processing node i; mod represents the remainder operation; p represents a large prime number;
when m is>t, the processing nodes each compute an identity vector (x)1′,x2′,…,xm') make g0=(g1,g2,…,gt)(x1′,x2′,…,xm′)Tmod p, each processing node transmits the identity vector to the other processing nodes, each processing node calculates:
Figure FDA0003361106630000021
in the above formula, x1,x2,…,xmAn identity vector representing the corresponding processing node when m equals t; m represents the number of processing nodes receiving the information block transmission; x is the number of1′,x2′,…,xm' means when m>t is the identity vector of the corresponding processing node;
the processing nodes disclose respective component information ci=siximod p, calculating the encrypted share of the information to be processed:
Figure FDA0003361106630000022
in the above formula, s' represents when m>t is the encrypted share of the information to be processed; m represents the number of processing nodes receiving the information block transmission; c. CjRepresenting component information disclosed by processing node j; mod represents the remainder operation; p represents a large prime number;
introducing the random factor into an SHA-256 hash function to obtain a corresponding hash value;
taking the obtained hash value as an encryption key K, and decomposing the K into sub-keys KiThen, there are:
K=k1,k2,k3…k32;
the random sequence output by introducing the two-dimensional chaotic system comprises:
xi=sin(πτ(yi-1+3)xi-1(1-xi-1))
yi=sin(πτ(xi+3)yi-1(1-yi-1))
wherein x isiAnd yiTwo-dimensional chaotic coordinate, x, representing ith processing nodei-1And yi-1Represents the two-dimensional chaotic coordinates of the i-1 th processing node, tau represents the system parameter, and 0<τ≤1;
Using subkey kiTo set three transition parameters V1,V2,V3Then, there are:
Figure FDA0003361106630000031
Figure FDA0003361106630000032
Figure FDA0003361106630000033
wherein,
Figure FDA0003361106630000034
represents an exclusive or operation, mod represents a remainder operation;
obtaining the transition parameter V according to calculation1,V2,V3Is calculated by presetting the parameters tau, x, y0,x0,y0Then, there are:
τ0=(τ+V3)mod1
x0=(x+V2)mod1
y0=(y+V1)mod1
according to the initial value tau obtained by calculation0,x0,y0Substituting the random sequence into a random sequence output by the two-dimensional chaotic system, and performing nonlinear operation to satisfy the following conditions:
Figure FDA0003361106630000035
Figure FDA0003361106630000036
wherein,
Figure FDA0003361106630000037
representing the encrypted data combination block,
Figure FDA0003361106630000038
which represents a decryption key, is presented,
Figure FDA0003361106630000039
which represents the block of information after encryption,
Figure FDA00033611066300000310
a decryption subkey representing the encrypted block of information, j being the encryption method, and j being 1, 2, 3.
2. The information distribution processing method according to claim 1, wherein the processing node determines whether the received information block is valid by checking whether the equality is established after receiving the encrypted information block, and if the equality is not established, the received information block is invalid and the transmission of the information block is resumed; if the checking equation is established, the information block is effective, and then the information to be processed is calculated and recovered by using a preset algorithm.
3. The information-decentralized processing method according to claim 1, characterized in that each processing node is capable of asynchronously disclosing the cryptographic component information during the recovery of the information to be processed.
4. The information distribution processing method according to claim 1, wherein the processing node receives the encrypted information block, decrypts and restores the information block, and processes the restored information block, wherein the processing includes one or more of storing, converting, transmitting and publishing.
5. The information dispersion processing method according to claim 1, wherein the segmentation rule is a combination of vertical segmentation and horizontal segmentation, a plurality of segmentation blocks are formed after vertical segmentation, segmentation adjustment is performed on each segmentation block according to a logical relationship of information to be processed, and the adjusted segmentation blocks are information blocks.
6. The information dispersion processing method according to claim 2, wherein the check equation adopts the following equation:
Figure FDA0003361106630000041
in the above formula, the first and second carbon atoms are,
Figure FDA0003361106630000042
represents a commitment to a broadcast message of an ith item information block, and t represents the number of items of an irreducible polynomial determined in a random manner; biA broadcast message representing an ith item information block of the distribution node; mod represents the remainder operation; q represents a large prime number.
7. The method of claim 1, wherein the information blocks are transmitted as follows:
acquiring a connection channel between a first processing node and the distribution node based on the identification information of the distribution node;
acquiring each information block determined to be transmitted;
determining file type information of an information block based on parameters of the information block needing to be transmitted to a first processing node, determining to adopt a first transmission mode, and transmitting the corresponding information block to the first processing node based on the first transmission mode and the connection channel;
and forming mirror image channels for connecting other processing nodes with the distribution node by the connecting channel in a channel mirror image mode, determining to adopt a second transmission mode, wherein the second transmission mode is different from the first transmission mode, and transmitting other information blocks to the corresponding processing nodes.
CN202110428242.0A 2021-04-21 2021-04-21 Information dispersion processing method Active CN113328859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110428242.0A CN113328859B (en) 2021-04-21 2021-04-21 Information dispersion processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110428242.0A CN113328859B (en) 2021-04-21 2021-04-21 Information dispersion processing method

Publications (2)

Publication Number Publication Date
CN113328859A CN113328859A (en) 2021-08-31
CN113328859B true CN113328859B (en) 2022-02-22

Family

ID=77415030

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110428242.0A Active CN113328859B (en) 2021-04-21 2021-04-21 Information dispersion processing method

Country Status (1)

Country Link
CN (1) CN113328859B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114386076B (en) * 2022-01-17 2025-01-07 福建中电合创电力科技有限公司 A method and terminal for encrypting and transmitting electric power data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106688204A (en) * 2014-08-19 2017-05-17 瑞典爱立信有限公司 Generating cryptographic checksums

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185692B (en) * 2011-04-25 2012-07-04 北京航空航天大学 Multimode reconfigurable encryption method based on advanced encryption standard (AES) encryption algorithm
JP5957120B1 (en) * 2015-05-12 2016-07-27 日本電信電話株式会社 Secret sharing method, secret sharing system, distribution apparatus, and program
CN106911384B (en) * 2017-01-23 2019-05-07 西安电子科技大学 Construction method of two-dimensional optical address code suitable for visible light OCDMA communication

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106688204A (en) * 2014-08-19 2017-05-17 瑞典爱立信有限公司 Generating cryptographic checksums

Also Published As

Publication number Publication date
CN113328859A (en) 2021-08-31

Similar Documents

Publication Publication Date Title
Laiphrakpam et al. A robust image encryption scheme based on chaotic system and elliptic curve over finite field
CN108388808B (en) Image Encryption Method Based on Hill Encryption and Dynamic DNA Coding
CN1773905B (en) Method, equipment and system for generating anonymous common key in safety communication system
US8200974B1 (en) Method and system for securely exchanging encryption key determination information
US7254232B2 (en) Method and system for selecting encryption keys from a plurality of encryption keys
Rahim et al. Study of three pass protocol on data security
CN111416706B (en) Quantum secret communication system based on secret sharing and communication method thereof
US12101397B2 (en) Data communication method, apparatus, and system
US7783045B2 (en) Secure approach to send data from one system to another
CN109905229B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool
CN113328859B (en) Information dispersion processing method
Ranasinghe et al. A generalization of the ElGamal public-key cryptosystem
Slimane et al. Hash key-based image cryptosystem using chaotic maps and cellular automata
CN103493428A (en) Data encryption
US7424114B2 (en) Method for enhancing security of public key encryption schemas
CN101882996B (en) Information encryption and decryption method in distributed system based on identity
CN112995215B (en) Decryption system, method, device, electronic equipment and storage medium
CN114900283A (en) Deep learning user gradient aggregation method based on multi-party security calculation
CN113407928A (en) Multi-owner RFID authentication method based on block chain
US20190215148A1 (en) Method of establishing anti-attack public key cryptogram
US6683953B1 (en) Encoding method, encoding-decoding apparatus, and code communications system
CN110740034B (en) Method and system for generating QKD network authentication key based on alliance chain
CN111526131A (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
Yang et al. Quantum public-key cryptosystems based on induced trapdoor one-way transformations
CN108200108B (en) Asymmetric encryption algorithm and application thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant