CN116366232B - Digital asset processing method, device, equipment and medium based on quantum-resistant key - Google Patents
Digital asset processing method, device, equipment and medium based on quantum-resistant key Download PDFInfo
- Publication number
- CN116366232B CN116366232B CN202310296844.4A CN202310296844A CN116366232B CN 116366232 B CN116366232 B CN 116366232B CN 202310296844 A CN202310296844 A CN 202310296844A CN 116366232 B CN116366232 B CN 116366232B
- Authority
- CN
- China
- Prior art keywords
- multimedia file
- digital asset
- ciphertext
- authenticated
- quantum key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 36
- 238000012545 processing Methods 0.000 claims abstract description 131
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 81
- 238000000034 method Methods 0.000 claims abstract description 58
- 230000008569 process Effects 0.000 claims description 31
- 238000012795 verification Methods 0.000 claims description 30
- 238000010200 validation analysis Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 6
- 238000011282 treatment Methods 0.000 claims description 3
- 238000005336 cracking Methods 0.000 abstract description 4
- 238000004364 calculation method Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000013507 mapping Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 4
- 238000000605 extraction Methods 0.000 description 4
- 230000002441 reversible effect Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 238000005070 sampling Methods 0.000 description 2
- 238000010187 selection method Methods 0.000 description 2
- 241000283153 Cetacea Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a digital asset processing method, device, equipment and medium based on an anti-quantum key, wherein the processing method comprises the following steps: generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number; encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to generate a digital signature of the hidden multimedia file; and issuing the steganographic multimedia file subjected to signature processing. The method and the device have the advantages that the right-confirming information implicit in the multimedia file type processed by the method and the device not only have high non-cracking property, but also can effectively confirm the right of the legal holder of the digital asset.
Description
Technical Field
The invention relates to the technical field of anti-quantum computing, in particular to a digital asset processing method, device, equipment and medium based on an anti-quantum key.
Background
A digital asset is an asset that is presented and circulated in digital form, containing a full amount of information, such as Non-homogeneous letters (Non-Fungible Token, NFT for short), and digital collections. The NFT is a public-chain-based non-interchangeable certificate which accords with related specifications and can be associated with a certain virtual digital object to form a unique reference relationship, so that single issued NFTs can not be mutually exchanged, have global uniqueness and can be transacted through virtual currency. Similar to NFT, digital collection generally refers to a unique digital identification of a specified work, artwork, merchandise, based on a alliance chain, that cannot be transacted by virtual currency. The expression forms of NFT and digital collection on blockchain include, but are not limited to, digital drawings, pictures, music, video, 3D models (simply referred to as multimedia files), etc., and for convenience of explanation, these expression forms are collectively referred to as multimedia files.
As multimedia files that are publicly circulated on a network, digital contents thereof are extremely easily illegally copied and distributed, and thus, it is often easy to occur that digital contents of digital assets issued from one platform are used for another platform, and the creator of digital contents proves that it is difficult and costly to be the creator of digital contents.
Disclosure of Invention
In view of the above, the embodiments of the present invention provide a digital asset processing method, apparatus, device and medium based on an anti-quantum key, which are at least used for solving the problem of large difficulty in determining the right of the digital asset attribution right.
According to one aspect of the present invention, there is provided a digital asset processing method based on an anti-quantum key, comprising the steps of: generating a random number with preset digits, and generating a pair of first private keys and first public keys by adopting an anti-quantum key algorithm based on the random number; encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; signing the steganographically-written multimedia file by adopting a first private key generated by an anti-quantum key algorithm to generate a digital signature of the steganographically-written multimedia file; issuing a steganographic multimedia file subjected to signature processing; wherein a first public key corresponding to the first private key generated using an anti-quantum key algorithm is configured to verify a digital signature of the published multimedia file when the published multimedia file is authenticated.
According to another aspect of the present invention, the present invention also provides a digital asset processing method based on an anti-quantum key, including the steps of: verifying the digital signature of the multimedia file to be authenticated by adopting a first public key generated by an anti-quantum key algorithm; responding to the digital signature of the multimedia file to be authenticated to pass the verification, and performing anti-steganography processing on the multimedia file to be authenticated; responding to the multimedia file to be validated and carrying out anti-steganography processing to obtain intermediate information, and splitting the intermediate information; responding to the intermediate information to obtain a ciphertext through splitting treatment, and decrypting the ciphertext; responding to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and comparing the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; determining that the multimedia file to be authenticated is authenticated through the attribution right in response to the fact that the decrypted authentication information is consistent with the digital asset attribution right corresponding to the multimedia file to be authenticated; the first private key corresponding to the first public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
According to another aspect of the present invention, there is provided a digital asset processing apparatus based on an anti-quantum key, including a key unit, an encryption unit, a concatenation unit, a steganography unit, a signature unit, and a distribution unit, wherein the key unit is configured to generate a random number of a preset number of bits, and to generate a pair of a private key and a public key using an anti-quantum key algorithm based on the random number; the encryption unit is configured to encrypt the right information recorded with the digital asset attribution right into a ciphertext; the splicing unit is configured to mix and splice the ciphertext and the random number together to obtain intermediate information; the steganography unit is configured to steganographically embed the intermediate information in a multimedia file that is a digital asset; the signature unit is configured to carry out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm so as to generate a digital signature of the hidden multimedia file; the issuing unit is configured to issue the steganographically-processed multimedia file; wherein the public key corresponding to the private key generated using the anti-quantum key algorithm is configured to verify the digital signature of the published multimedia file when the published multimedia file is authenticated.
According to another aspect of the present invention, there is provided a digital asset processing apparatus based on an anti-quantum key, including a signature verification unit, an anti-steganography unit, a splitting unit, a decryption unit, a comparison unit, and a validation unit, where the signature verification unit is configured to verify a digital signature of a multimedia file to be validated using a public key generated by an anti-quantum key algorithm; the anti-steganography unit is configured to respond to the digital signature of the multimedia file to be authenticated by verification, and perform anti-steganography processing on the multimedia file to be authenticated; the splitting unit is configured to respond to the multimedia file to be validated and perform anti-steganography processing to obtain intermediate information, and split the intermediate information; the decryption unit is configured to respond to splitting processing of the intermediate information to obtain ciphertext and decrypt the ciphertext; the comparison unit is configured to respond to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and compare the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; the right confirming unit is configured to respond to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, and confirm that the to-be-confirmed multimedia file passes through the attribution right; the private key corresponding to the public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
According to another aspect of the present invention, there is also provided an electronic device including a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the aforementioned digital asset processing method based on anti-quantum keys.
According to another aspect of the present invention, there is also provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the aforementioned digital asset processing method based on quantum key.
The method, the device, the equipment and the medium provided by the invention can process the digital asset before the digital asset is uplink, so that the normal publishing and transaction of the digital asset are not affected, and the quick right confirmation can be performed when the right confirmation is required, and the processing speed is high and accurate. The invention processes the digital asset, which includes the steps of signing by adopting the anti-quantum key and a plurality of further processing steps such as splicing, steganography and the like, so that the digital asset processed by the invention has indestructibility, and the possibility that other people forge the same processing mode to imitate the digital asset is prevented. When generating a rights dispute for a digital asset, valid rights can be validated for the legitimate holder of the digital asset.
Drawings
In order to more clearly describe the technical solution of the embodiments of the present invention, the following description briefly describes the drawings in the embodiments of the present invention.
FIG. 1 is a flow chart of a digital asset processing according to one embodiment of the invention.
FIG. 2 is a flow chart of a method of digital asset processing based on anti-quantum keys prior to digital asset uplinking, according to one embodiment of the invention.
Fig. 3 is a flow chart of a method of digital asset processing based on anti-quantum keys prior to digital asset uplinking in accordance with another embodiment of the present invention.
FIG. 4 is a flow chart of a digital asset processing method based on anti-quantum keys when digital asset validation according to one embodiment of the invention.
Fig. 5 is a functional block diagram of a first digital asset processing device based on an anti-quantum key according to one embodiment of the invention.
Fig. 6 is a functional block diagram of a second digital asset processing device based on an anti-quantum key according to one embodiment of the invention.
Fig. 7 is a system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
Fig. 8 is another system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described below with reference to several exemplary embodiments. It will be appreciated that such embodiments are provided to make the principles and spirit of the invention clear and thorough, and enabling those skilled in the art to better understand and practice the principles and spirit of the invention. The exemplary embodiments provided herein are merely some, but not all embodiments of the invention. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the embodiments herein, are within the scope of the present invention.
The invention provides a digital asset copyright protection processing method, a device, electronic equipment, a storage medium and a computer program product, which are used for protecting digital asset copyright and solving the problem of high digital asset copyright determination difficulty.
FIG. 1 is a flow chart of a digital asset processing according to one embodiment of the invention. In this embodiment, the digital asset is first signed after or during the generation process, and the digital signature and the data required for the validation generated during the signing process (hereinafter referred to as the validation base data) are stored in the public database, and then the digital asset after the signature is issued to the blockchain to form a consensus. The blockchain is either a subscription blockchain, such as Opensea; the blockchain is either an ethernet public chain, such as meta mirror MetaMirror; the blockchain is also or alternatively a coalition chain, such as NFT china; of course, other blockchains are also possible, such as whale probes, etc. The digital assets after being up-linked are displayed on the chain as other digital assets are in existence, and free transaction is carried out according to a specified transaction processing mode. In the transaction process, besides performing the transaction according to the existing digital asset transaction mode, the digital asset is subjected to specific processing such as signature and the like before being uplink, and has digital signature, public key and other data which need to be used in the process of determining the right, so that the original holder of the digital asset also needs to transfer the right-determining basic data together with the digital asset to a transaction party, thereby enabling the transaction party to be a new original holder of the digital asset and simultaneously holding corresponding right-determining basic data.
When piracy occurs during the display process or after the transaction of the digital asset, the rights dispute problem occurs, and whether the holder of the current digital asset is a real holder can be determined by carrying out related processing on the digital asset through the method provided by the invention.
Fig. 2 is a flowchart of a digital asset processing method based on an anti-quantum key before a digital asset is booted, according to an embodiment of the present invention, and the digital asset encryption processing method of the present embodiment specifically includes the following steps.
Step S11, generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number.
Step S12, encrypting the right information recorded with the digital asset attribution right into ciphertext.
And S13, mixing and splicing the ciphertext and the random number together to obtain intermediate information.
Step S14, embedding the intermediate information in a steganographic manner in a multimedia file as a digital asset.
And S15, carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to generate a digital signature of the hidden multimedia file.
And step S16, issuing the steganographic multimedia file subjected to signature processing.
In step S11, a random number having a specified number of bits, such as a 128-bit or 256-bit random number, is generated by a random number function. In order to prevent the key used in the present invention from being broken in a quantum-hacking manner, the present invention generates a pair of a private key and a public key based on the random number using an anti-quantum key algorithm. As an example, at least one of a multivariate (Multivariate-based) based algorithm, a Lattice-based algorithm, a Code-based algorithm, or a Hash-based algorithm may be employed, but is not limited to.
Taking a multivariate (Multivariate-based) based algorithm as an example, the principle and process of generating public and private keys are briefly described as follows.
First construct a finite field k containing q elements and a set of (m) d-th order n-th order polynomials over the finite field kIn this embodiment, a quadratic n-gram is taken as an example, and the quadratic n-gram is shown as follows.
In the aboveN variables.
AndIs the coefficient of the polynomial,Is a polynomial constant whose value is a random number generated by a random number function.
Then polynomial mapping F:。
I.e. 。
Each of which is provided withIs a quadratic polynomial.
Here, F has to satisfy the condition that the primary image of F can be found and reversible computationally.
And then respectively for the two polynomialsAndA random reversible linear mapping is performed, which can be represented as follows.
S: And T:
In this embodiment, the public key is p=s×f×t, and represents the transformed complex.
Wherein P may be represented as follows.
(1-1)
The private key is calculated for three mappings: s, T and F.
The other three processes of generating the key by the quantum key resistant algorithm can be implemented by referring to respective algorithm guidelines, and will not be described herein.
In step S12, the authorization information is, for example, a specific content set by the current digital asset holder, and the expression form of the authorization information may be text, picture, audio or video, or may be a digital digest obtained by performing hash calculation on the text, picture, audio or video recorded with the specific content. The specific content represents the ownership rights of the digital asset. For example, the current digital asset holder may write a text with any length, may record an audio with any sound, may be any photograph, or may be a video. Further, the text, picture, audio or video may be processed according to a summarization algorithm (e.g., MD5, SHA-1 or SHA-256) to obtain a digital summary. And then, encrypting the current text file, the picture file, the audio file, the video file or the digital abstract by adopting any encryption algorithm to obtain ciphertext. The encryption algorithm needs to be a reversible algorithm, and the original information can be obtained through decryption. Such as symmetric encryption algorithms, e.g., DES, 3DES, or AES series algorithms, or some asymmetric encryption algorithms, e.g., RSA, ECC elliptic curve encryption correlation algorithms, etc., are not described in detail herein.
In order to improve the difficulty of cracking the ciphertext, the original right-determining information can be encrypted by adopting an anti-quantum encryption algorithm. Another pair of public and private keys is generated as in the previous step S11, e.g. the public key is P 1=S1*F1*T1, representing the transformed complex, and the private key is S 1、T1 and F 1 for the three mappings calculation.
Encrypting the right-determining information recorded with the digital asset attribution right by adopting a public key P 1, namely calculating P 1 (r) =w according to a formula (1-1), wherein r is a file to be encrypted, namely the right-determining information; w is the encrypted ciphertext.
In order to increase the difficulty of obtaining the specific content set by the digital asset holder, after encrypting the specific content set by the digital asset holder, the invention mixes and splices the ciphertext and the generated random number with preset digits together to obtain an intermediate information in step S13, and then embeds the intermediate information in a steganographic manner in a multimedia file serving as a digital asset expression in step S14.
In order to further increase the difficulty of obtaining ciphertext from intermediate information, the invention provides a plurality of mixed splicing processing modes, and the selection of the mixed splicing processing modes can be determined by the value of the splicing parameter k. In one embodiment, the value of the splice parameter k corresponds to the serial number of the hybrid splice processing mode. When the mixed splicing processing modes are n, the value range of the splicing parameter k is [1, … …, n ], and in theory, n can be infinity.
The invention randomly extracts a mixed splicing processing mode to splice ciphertext when the ciphertext is mixed and spliced, and the total extraction method comprises the following steps ofThe complexity of obtaining ciphertext by cracking intermediate information isBelongs to the NP-hard problem, and is difficult to crack. Because the mixed splicing processing mode used when the ciphertext and the random number are spliced is different when the authorization information of one digital asset is encrypted each time, even if the intermediate information is cracked from one digital asset, the intermediate information is difficult to crack from other digital assets.
In one embodiment of the hybrid concatenation process, each character of the ciphertext is first converted to 16-ary, and then a random character is inserted after each 16-ary ciphertext character. In another embodiment regarding the hybrid concatenation process, random characters are inserted in reverse order after the positive 16-ary ciphertext characters. In still another embodiment related to the hybrid concatenation process, each character of the random number is also converted into a 16-ary number, and after inserting the 16-ary random character into the ciphertext, calculation is performed, for example, each adjacent 16-ary ciphertext character and 16-ary random character are subjected to operations such as addition, subtraction, multiplication, division, and the like, and then the operation result is inserted into the current position, and the adjacent 16-ary ciphertext character and 16-ary random character can also be replaced by the operation result.
The foregoing several mixed splicing processing manners are merely illustrative, and those skilled in the art can know that when inserting random characters into ciphertext, n mixed splicing processing manners can be obtained by setting different insertion positions, the number of random characters inserted each time, the calculation processing manner, the processing manner of calculation results, and the like, which are not described herein.
In step S14, when the intermediate information is to be steganographically displayed in the multimedia file, which is a digital asset representation, there are a plurality of steganographically displayed modes, and the selection method is the same as the selection method of the hybrid splicing mode, that is, the value of the steganographically displayed parameter j corresponding to the current steganographically displayed mode is randomly designated, and the corresponding steganographically displayed mode is determined based on the value of the steganographically displayed parameter j. In this embodiment, the digital asset representation may be a picture, audio or video. Taking a picture as an example, when intermediate information is steganographically displayed in the picture, steganographically processing is performed as follows.
First, the intermediate information is converted into binary.
And then, reading RGB three channel values of each pixel in the picture, and respectively converting the RGB channel values into binary values to obtain R channel binary values, G channel binary values and B channel binary values of each pixel.
Finally, the last bit in the three channel binary values of each pixel is changed according to the binary intermediate information. In one embodiment, the last bit of the RGB three channels of each pixel may be sequentially added/subtracted by 0 or 1 in the order of the binary numbers in the intermediate information. In another embodiment, the last bit of the original channel may be replaced by the result of adding the binary number in the intermediate information to the last bit of the RGB three channels for each pixel. Various steganographic processing schemes may be derived by changing the algorithm used in the computation, changing the number of binary numbers in the intermediate information used in the computation, changing any one or more of the three alternate RGB channels in the selected pixel values, changing the selected pixels, and so forth. In order to determine the steganography processing mode used in each steganography, the steganography processing method is provided with steganography parameters j, wherein the value of each steganography parameter j corresponds to one steganography processing mode, and the value of the steganography parameter j can be randomly determined.
When the digital asset is represented by an audio file, the same method as the steganography processing method of the picture can be adopted to steganographically, and the difference is that the 16-bit sampling point value of the time domain waveform of the audio file is obtained first, then the last bit of the 16-bit sampling point value is changed, and the value changing method can be the steganography processing method used when steganographically performed by the method. In addition, there are many audio steganography methods, such as echo hiding method, phase encoding method, spread spectrum method, etc., which are not described in detail herein.
When the digital asset is in the form of video, the digital asset can be regarded as a combination of the picture and the audio, so that the video can be hidden by adopting the method for hiding the picture, the method for hiding the audio or the method obtained by combining the picture and the audio, and the corresponding hidden processing mode is more than that of the single method for hiding the picture or the audio, so that the cracking difficulty is higher.
After the steganography is completed, in step S15, the private key generated by the anti-quantum key algorithm in step S11 is used to sign the steganographically-written multimedia file, so as to obtain a digital signature of the steganographically-written multimedia file. The specific process is as follows.
First, a digital digest of the steganographically composed multimedia file is calculated using an algorithm such as MD5, SHA-1, or SHA-256.
And then carrying out three mapping calculations on the digital abstract according to S, T good F in sequence according to the following formula.
Wherein m is the digital digest of the steganographically multimedia file, and x is the digital signature of the steganographically multimedia file.
The digital signature of the hidden multimedia file and the corresponding public key P may be added to the hidden multimedia file, for example, added at the tail of a picture, an audio file, or a video file, or may store Yu Gong a letter database. Meanwhile, establishing the association relation between a public key for digital signature verification, the right-confirming information, a private key for decrypting the encrypted right-confirming information, a mixed splicing processing mode and a steganography processing mode and a new multimedia file in the uplink, and storing the public key for signature verification, the right-confirming information, the private key for decrypting the encrypted original right-confirming information, the mixed splicing processing mode and the steganography processing mode as right-confirming basic data in a public database so as to be used in right-confirming.
In this embodiment, in the process of signing a digital asset, content capable of proving the ownership of the digital asset is embedded in the digital asset, and in order to protect the content from being obtained by a person other than the holder, the embodiment firstly encrypts the content capable of proving the ownership of the digital asset to obtain ciphertext, then splices a random number, embeds the encrypted ciphertext into the digital asset in a steganographic manner, and signs the steganographically-signed digital asset. If the signature is to be forged, firstly, the anti-quantum key algorithm is to be cracked, then a private key of the signature is obtained according to the cracked anti-quantum key algorithm, then correct anti-steganography is needed to obtain steganography intermediate information, ciphertext is needed to be correctly split from the intermediate information, and finally, the ciphertext is needed to be cracked. In the embodiment, an NP-hard problem is constructed in each process of splicing intermediate information, steganography and the like, and the anti-quantum key algorithm is not broken by the Shor algorithm at present, so that the complexity of breaking the digital asset obtained by signature processing in the embodiment is extremely high, and the digital asset has non-breaking property under the current limited condition and after future quantum computers are mature.
Fig. 3 is a flowchart of a digital asset processing method based on an anti-quantum key before a digital asset is booted according to another embodiment of the present invention, and the digital asset processing method based on an anti-quantum key of the present embodiment specifically includes the following steps.
Step S21, generating a random number with preset digits, and generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number.
Step S22, encrypting the right information recorded with the digital asset attribution right into ciphertext.
And S23, mixing and splicing the ciphertext and the generated random number with the preset digits to obtain intermediate information.
Step S24, embedding the intermediate information in a steganographic manner in a multimedia file as a digital asset.
And S25, carrying out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm to obtain a digital signature of the hidden multimedia file.
And step S26, splicing the steganographic multimedia file subjected to the signature processing to the multimedia file data serving as the digital asset.
Step S27, disturbing the data block at the splice, where the data block includes a partial data block at the tail of the multimedia file as the digital asset and a partial data block at the head of the steganographically signed multimedia file.
And step S28, publishing the steganographically-processed multimedia file which is spliced after the multimedia file data serving as the digital asset and has the data blocks at the spliced position disturbed, namely publishing the spliced file.
The processing procedure in steps S21 to S25 is the same as the processing procedure in steps S11 to S15 in fig. 2, and will not be described here again. The digital signature generated in step S25 may be added to the steganographically-written multimedia file or stored in a public database; the public key used to verify the digital signature may also be stored Yu Gong as a trusted database.
The signature-processed steganographic multimedia file is spliced in step S26 to the multimedia file (or called the original multimedia file) as the digital asset to obtain a new file, and then in step S27, a certain data amount of data blocks is obtained at the splicing position, where the data blocks include a certain byte amount of data, such as 16 bytes, at the tail of the original multimedia file, and the data blocks also include a certain byte amount of data, such as 16 bytes, in the head of the signature-processed steganographic multimedia file, and of course, 8, 12, 24, etc. are also possible. That is, the acquired data block is composed of partial data of the tail of the original multimedia file and partial data of the head of the steganographically-written multimedia file. In another embodiment, the 16 bytes of data at the tail of the original multimedia file in the data block may be continuous data or interval data, and the data at the head of the multimedia file after steganography in the data block may be continuous data or interval data.
The header identifiers of the files of different types are fixed and different, for example, the header identifier of the PNG format is 89504E47, the header identifier of the GIF format is 47494638, the header identifier of the AVI format is 41564920, and the header identifier of the wave (wav) format is 57415645, so, in order to obtain the data block at the splice of the two files, in one embodiment, the data is traversed from the spliced header to find the hidden multimedia header identifier, when the hidden multimedia header identifier is found, the tail of the original multimedia file is also obtained, that is, the splice position is accurately located, and then the data block including the two file data is obtained in the foregoing manner.
In step S27, the data blocks at the splice of the two files are scrambled, so as to further enhance the difficulty of obtaining the ciphertext. In one embodiment, the tail data of the original multimedia file and the data of the head of the hidden multimedia file can be interchanged, and various methods for determining the interchange position can be used. If the two-to-two interchange is started from the connecting place, or the two-to-one interchange is performed in a front-to-back sequence, or the position of the tail data is an independent variable a, the position of the head data is a variable b, a function of the independent variable a and the variable b is constructed, the position interchange is performed according to the function, and the function is, for example, a primary function, such as: b=a+1, b=a+2, and so on. In another embodiment, splice marks of the spliced file are disturbed in a manner that other data is added to the current data block. In one embodiment, a random number is generated, inserted into the current data block, and there are various ways to change the number of bits of the random number, the insertion position, and the number of characters that can be inserted at one insertion position. In summary, each method of scrambling the data blocks at the spliced portion of the spliced file in the foregoing embodiment is one of scrambling processing manners, and the value of the scrambling parameter p corresponds to one of the scrambling processing manners, where the value range of the value of the scrambling parameter p is [1, … …, n ], and n is the sequence number of the nth scrambling processing manner. The scrambling processing pattern is determined by the value of the scrambling parameter p in step S27, which may be randomly specified in 1-n. Similarly, when the scrambling method is used, the currently used scrambling method is also used as a kind of right basic data to be stored in the public information database.
In this embodiment, after the steganography is completed on the multimedia file in the digital asset representation, in order to prevent the steganographically identified multimedia file from being processed, the original multimedia file data is spliced before the steganographically identified multimedia file data, so that the original multimedia file is still displayed when being displayed on the chain, and the situation that other people identify the displayed file as the steganographically identified multimedia file through a machine learning method and the like is avoided.
In another embodiment, after the steganographically obtained multimedia file is obtained according to steps S21 to S24 in the foregoing embodiment, the original multimedia file is spliced to the steganographically new multimedia file, and then the spliced file is digitally signed, so that the difficulty of forging the digital signature is further improved.
In another embodiment, the intermediate information obtained in step S23 is subjected to signature processing. Then, the steganography processing is carried out, and the original multimedia file can be spliced after the new steganography. The related process may refer to the foregoing embodiments, and will not be described herein.
Multimedia files are easily imitated to pirate due to the presentation of digital assets in the form of pictures, audio, video, etc. during and after the uplink presentation. Rights authentication and authentication of disputed digital assets can be performed by a validation process when necessary. Since the multimedia file, which is a digital asset in the prior art, is not specifically processed at the time of creation, the right cannot be confirmed from the multimedia file itself, and thus the right can be very difficult. When the processing method provided by the invention is adopted to process the multimedia file before the multimedia file is linked, rights identification and authentication can be carried out on the disputed digital asset through the processing of the multimedia file during rights confirmation.
FIG. 4 is a flow chart of a digital asset processing method based on anti-quantum keys when digital asset validation according to one embodiment of the invention. The digital asset processing method of the present embodiment specifically includes the following steps.
Step S31, the digital signature of the multimedia file to be authenticated is obtained, and the public key generated by the anti-quantum key algorithm is adopted to verify the digital signature of the multimedia file to be authenticated.
Step S32, judging whether the verification of the digital signature is passed or not, if the verification is passed, performing anti-steganography processing on the multimedia file to be authenticated in step S33. If the verification is not passed, it is determined in step S42 that the multimedia file to be authenticated is not authenticated by the attribution, i.e. the multimedia file to be authenticated is not a legal digital asset purported by the bearer.
Step S34, judging whether intermediate information is obtained after the anti-steganography processing, if the intermediate information is not obtained, determining that the multimedia file to be authorized is not authorized by the attribution right in step S42. If intermediate information is obtained after the anti-steganography process, the intermediate information is subjected to a splitting process in step S35.
Step S36, judging whether the ciphertext is split from the intermediate information, if the ciphertext is not split from the intermediate information, determining that the multimedia file to be authenticated is not authenticated by the attribution right in step S42. If the ciphertext is split from the intermediate information, the ciphertext is decrypted at step 37.
Step S38, judging whether the information for the right is decrypted or not, if the information for the right is not decrypted, determining that the multimedia file to be determined to be right is not determined to be right through the attribution right in step S42. If the information for the right is decrypted, the decrypted information for the right is compared with the digital asset attribution right (i.e., the real right information) corresponding to the multimedia file to be validated at step S39.
Step S40, judging whether the two are consistent, if so, determining that the multimedia file to be authenticated passes through the attribution right in step S41, and if not, determining that the multimedia file to be authenticated does not pass through the attribution right in step S42.
Wherein a private key generated by an anti-quantum key algorithm corresponding to a public key used in signature verification is configured to generate a digital signature of a multimedia file to be authenticated when the multimedia file to be authenticated is issued.
For a digital asset of legal origin, the new holder at the time of the transaction includes the validation base data of the multimedia file in addition to the multimedia file obtained from the original holder. Therefore, when the rights are confirmed, according to the to-be-confirmed multimedia file provided by the new holder, corresponding right confirming basic data can be obtained from the public information base, wherein the right confirming basic data comprises right confirming information for recording the digital asset attribution rights and a private key for decryption, a mixed splicing processing mode (such as a value of a splicing parameter k) used when a ciphertext and a random number are mixed, a steganography processing mode (such as a value of a steganography parameter j), a public key for digital signature and digital signature verification and the like. When the original multimedia file is adopted to splice the hidden multimedia file, a scrambling processing mode (for example, the value of the scrambling parameter p) used when scrambling the data at the file data splice is also included. Thus, when a multimedia file to be authenticated is known, it necessarily includes the aforementioned authentication base data for a legitimate multimedia file, and in the authentication process, the required data is read from the authentication base data according to the processing requirement for processing.
When verifying the digital signature by adopting the corresponding public key for verifying the digital signature in the step S31, firstly, calculating the digital signature x by adopting the public key for verifying the digital signature in the right-determining basic data to obtain a digital digest m 1, then calculating the other digital digest m 2 of the multimedia file to be right-determining, and then comparing whether the two digital digests are consistent; and when the two parts of the word digests are consistent, determining that the digital signature passes the verification, and when the two parts of the word digests are inconsistent, determining that the digital signature does not pass the verification. When the digital signature x is calculated, the digital signature is calculated according to a public key P obtained by an anti-quantum key algorithm, namely P (x) is calculated, wherein x is the digital signature, and the digital digest m 1 is obtained after the P (x) is calculated. When the file subjected to signature processing is intermediate information, during right confirmation processing, when intermediate information is obtained through anti-steganography processing, a digital abstract of the intermediate information is calculated and is used for comparing with a digital abstract m 1 obtained through P (x) calculation. When the multimedia file to be authenticated is a spliced file, during authentication processing, when the steganographic multimedia file is extracted from the multimedia file to be authenticated, calculating a digital abstract of the steganographic multimedia file for comparison with the digital abstract m 1 obtained after calculation by P (x).
When the anti-steganography process is performed on the multimedia file to be validated in step 33, the value of the steganography parameter j is read from the validation base data, the steganography processing mode corresponding to the steganography parameter j is determined according to the value of the steganography parameter j, and the anti-steganography is performed according to the step opposite to the steganography processing mode.
When the intermediate information is split in step S35, the value of the splicing parameter k of the hybrid splicing processing mode is first read from the basic data of the right determination, the hybrid splicing processing mode corresponding to the splicing parameter k is determined according to the value of the splicing parameter k, and then the ciphertext and the random number are split from the intermediate information one by one according to the hybrid splicing processing mode.
When the secret key is used to decrypt the ciphertext in step 37, the corresponding secret key is used to decrypt when the encryption is performed by using DES, 3DES or AES series algorithms or some asymmetric encryption algorithms (such as RSA, ECC elliptic curve encryption correlation algorithm). If the public key used in encryption is generated by a multivariate (Multivariate-based) based algorithm, the private key used in decryption is calculated S, T and F for the three mappings. The decryption process is thus three mapping calculations S, T and F, respectively.
If the basis number of the right contains a disturbing parameter p value, firstly recovering the data at the splicing position in the multimedia file to be right according to a disturbing processing mode corresponding to the disturbing parameter p value; then extracting the hidden multimedia file from the head data in the spliced data backwards; then, the extracted hidden multimedia file is subjected to anti-hidden writing, splitting, decryption, signature verification and other treatments.
If any step in the processing procedures of digital signature verification, restoration of data at the splice, anti-steganography, splitting, decryption and comparison of the right-confirming information is problematic, the fact that the current multimedia file to be confirmed is inconsistent with the uplink multimedia file can be determined, so that the current holder of the multimedia file to be confirmed cannot be proved to be the legal holder of the multimedia file.
In another aspect, the invention also provides a digital asset processing device based on the anti-quantum key.
Fig. 5 is a functional block diagram of a first digital asset processing device based on an anti-quantum key according to one embodiment of the invention. As shown in fig. 5, the first digital asset processing device 10 in the present embodiment includes a key unit 11, an encryption unit 12, a concatenation unit 13, a steganography unit 14, a signature unit 15, and a distribution unit 16.
The key unit 11 is configured to generate a random number with a preset bit number, and generate a pair of a first private key and a first public key for signing by adopting an anti-quantum key algorithm based on the random number, wherein the first private key and the first public key are respectively configured to perform digital signature processing and verify digital signatures when validating the issued multimedia file. The key unit 11 generates a pair of a second private key and a second public key for encryption based on any one of encryption algorithms. The encryption algorithm may be a symmetric encryption algorithm of DES, 3DES or AES series, an asymmetric encryption algorithm such as RSA or ECC elliptic curve, an anti-quantum key algorithm such as Lattice-based algorithm, code-based algorithm, multivariate (Multivariate-based) algorithm or Hash-based algorithm. For example, another random number, for example 256 bits, is generated, based on which a second private key and a second public key for encryption are generated using a multivariate (Multivariate-based) based algorithm. The second public key and the second private key are respectively configured to encrypt the rights information recorded with the digital asset attribution rights and decrypt ciphertext split from intermediate information obtained by anti-steganography when the rights are confirmed for the issued multimedia file.
The encryption unit 12 encrypts the right-determining information recorded with the digital asset ownership right into ciphertext using a second public key for encryption. The right determining information can be a specific content set by the current digital asset holder, the specific content represents the attribution right of the digital asset, and the expression form of the right determining information can be text, picture, audio or video, or a digital digest obtained by carrying out hash calculation on the text, picture, audio or video recorded with the specific content.
The concatenation unit 13 mixes and concatenates the ciphertext and the random number together to obtain intermediate information. As an example, the concatenation unit 13 may determine a hybrid concatenation processing manner by randomly specifying the value of the concatenation parameter k, and mix-concatenate the ciphertext generated by the encryption unit 12 and the random number generated by the key unit 11 to obtain the intermediate information.
The steganographic unit 14 steganographically embeds the intermediate information in a multimedia file that is a digital asset. As an example, the steganography unit 14 may determine the steganography process by randomly specifying a value of the steganography parameter j to steganographically embed the intermediate information in the multimedia file as a digital asset.
The signature unit 15 performs signature processing on the steganographically-written multimedia file by adopting a first private key to obtain a digital signature of the steganographically-written multimedia file; or the signature unit 15 performs signature processing on the intermediate information by using the first private key to obtain a digital signature. The generated digital signature may be added to the steganographically-written multimedia file or stored in a public database.
The distribution unit 16 distributes the steganographically processed multimedia file.
In another embodiment, the first digital asset processing device 10 may further comprise a file splicing unit 17, as indicated by a dotted line in the figure, for splicing the steganographically written multimedia file data to the multimedia file (or called original multimedia file) data as a digital asset and then disturbing the data blocks at the two file splices in a disturbing manner. In this embodiment, the publishing unit 16 publishes the steganographically-written multimedia file spliced after the multimedia file data as a digital asset and where the data blocks at the splice are scrambled. Or the signature unit 15 performs signature processing on the steganographic multimedia file spliced after the multimedia file data as the digital asset and with the data block at the splice being disturbed, and the publishing unit 16 publishes the steganographic multimedia file spliced after the multimedia file data as the digital asset and with the data block at the splice being disturbed after the signature processing.
Fig. 6 is a functional block diagram of a second digital asset processing device based on an anti-quantum key according to one embodiment of the invention. As shown in fig. 6, the second digital asset processing device 20 in the present embodiment includes a signature verification unit 21, an anti-steganography unit 22, a splitting unit 23, a decryption unit 24, and a comparison unit 25 and an authentication unit 26.
The signature verification unit 21 is configured to verify the digital signature of the multimedia file to be authenticated using the public key generated by the anti-quantum key algorithm. When the digital signature verification is performed, when the multimedia file to be authenticated is processed before being released, if the signature is performed on the multimedia file after steganography when the multimedia file to be authenticated is processed before being released, the signature verification unit 21 firstly calculates the digital signature x by adopting a public key for verifying the digital signature in the authentication basic data to obtain a digital abstract m 1, then calculates the multimedia file to be authenticated to obtain another digital abstract m 2, and then compares whether the two digital abstracts are consistent; and when the two parts of the word digests are consistent, determining that the digital signature passes the verification, and when the two parts of the word digests are inconsistent, determining that the digital signature does not pass the verification. When the digital signature x is calculated, the digital signature is calculated according to a public key P obtained by an anti-quantum key algorithm, namely P (x) is calculated, wherein x is the digital signature, and the digital digest m 1 is obtained after the P (x) is calculated.
If the intermediate information formed by the mixed splicing of the ciphertext and the random number is encrypted when the multimedia file to be validated is processed before being published, firstly, carrying out anti-steganography processing by an anti-steganography unit 22 according to a steganography processing mode, when the intermediate information is obtained, calculating the intermediate information to obtain a digital digest m 3, comparing the digital digest m 1 obtained by calculating the digital signature x with the intermediate information to obtain a digital digest m 3, and determining whether the two parts of the digital digests are consistent or not, and determining that the verification of the digital signature is not consistent when the two parts of the digital digests are inconsistent.
The anti-steganography unit 22 performs anti-steganography processing on the multimedia file to be authenticated. The splitting unit 23 performs splitting processing on the intermediate information in response to performing anti-steganography processing on the multimedia file to be authenticated to obtain the intermediate information. Decryption unit 24 decrypts the ciphertext using the private key in response to splitting the intermediate information to obtain the ciphertext. The comparing unit 25 obtains the right-confirming information in response to decrypting the ciphertext, and compares the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed. The right confirming unit 26 responds to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, the right confirming unit 26 confirms the right through attribution right, the right confirming unit 26 responds to the fact that the digital signature of the to-be-confirmed multimedia file is not verified, or intermediate information is not obtained through anti-steganography processing of the to-be-confirmed multimedia file, or ciphertext is not obtained through splitting processing of the intermediate information, or the ciphertext is decrypted, or when the decrypted right confirming information is inconsistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, the to-be-confirmed multimedia file is not confirmed through attribution right.
In another embodiment, the second digital asset processing device 20 further comprises a file extraction unit 27, as indicated by the dashed line in fig. 6. When the rights basic number contains a scrambling parameter p value, the file extracting unit 27 firstly restores the data at the splicing position of the multimedia file serving as the digital asset and the steganographically-written multimedia file in the multimedia file to be rights according to a scrambling processing mode corresponding to the scrambling parameter p value; and then extracting the hidden multimedia file backwards based on the file header data in the spliced data, and sending the extracted hidden multimedia file to the anti-steganography unit 22, wherein the anti-steganography unit 22 carries out anti-steganography processing on the extracted hidden multimedia file. When the file extraction unit 27 fails to extract a file, a notification is sent to the validation unit 26, and the validation unit 26 may determine that the multimedia file to be validated is not validated by the attribution. If the multimedia file to be authenticated signs the steganographically-written multimedia file before distribution, the file extraction unit 27 sends the extracted steganographically-written multimedia file to the signature verification unit 21 when the steganographically-written multimedia file data is spliced after the multimedia file data as a digital asset. The signature verification unit 21 performs signature verification with the extracted steganographically multimedia file as a processing object.
The first digital asset processing device 10 and the second digital asset processing device 20 may be provided in the same system or may be provided separately in different systems.
Fig. 7 is a system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
As shown in fig. 7, the first digital asset creation system 101 includes a first digital asset processing device 10 and a digital asset content creation device 100, the digital asset content creation device 100 creates a multimedia file as a digital asset, and the first digital asset processing device 10 processes the created multimedia file, such as setting and encrypting right information in which right of ownership of the digital asset is recorded; generating a pair of private key and public key by adopting an anti-quantum key algorithm based on the random number; mixing and splicing the ciphertext and the random number together to obtain intermediate information; embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset; the digital signature is obtained by signing the hidden multimedia file by adopting the private key, the validation basic data in the processing process is stored in the public database 300, and then the processed multimedia file is issued to the blockchain 400. The second digital asset processing device 20 for authenticating digital assets is located in the first platform 201, and when the multimedia files as digital assets need to be authenticated, the second digital asset processing device 20 in the first platform 201 performs authentication processing on the multimedia files to be authenticated. The specific confirmation process is referred to in the foregoing description and will not be described in detail herein. In addition, the validation base data required in the validation process may also be provided by the holder of the multimedia file to be validated.
Fig. 8 is another system block diagram of a digital asset processing device employing anti-quantum key in accordance with the present invention.
As shown in fig. 8, both the first digital asset processing device 10 and the second digital asset processing device 20 are located in a second platform 202. The second digital asset creation system 102 includes the digital asset content creation apparatus 100, the digital asset content creation apparatus 100 creates a multimedia file as a digital asset, and when it is required to issue onto the blockchain 400, the second digital asset creation system 102 transmits the multimedia file as a digital asset created by the digital asset content creation apparatus 100 to the second platform 202, performs processing such as encryption, splicing, steganography, signing, and the like by the first digital asset processing apparatus 10, issues to the blockchain 400 after the processing is completed, and stores the validation base data generated in the processing in the public database 300. When the rights are required, the second digital asset processing device 20 in the second party platform 202 performs the rights-determining process on the multimedia file to be determined, and the rights-determining basic data required in the rights-determining process is provided by the public database 300 or the holder of the multimedia file to be determined.
In another aspect, the invention also provides an electronic device comprising a processor and a memory storing computer program instructions; the electronic device implements the digital asset processing method based on the quantum key when executing the computer program instructions.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention. As shown in fig. 9, the electronic device may include a processor 601 and a memory 602 storing computer program instructions.
In particular, the processor 601 may include a Central Processing Unit (CPU), or an Application SPECIFIC INTEGRATED Circuit (ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present invention.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a hard disk drive (HARD DISK DRIVE, HDD), a floppy disk drive, flash memory, optical disk, magneto-optical disk, magnetic tape, or a universal serial bus (Universal Serial Bus, USB) drive, or a combination of two or more of these. The memory 602 may include removable or non-removable (or fixed) media, where appropriate. Memory 602 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 602 is a non-volatile solid state memory.
In one example, the electronic device may also include a communication interface 603 and a bus 610. As shown in fig. 9, the processor 601, the memory 602, and the communication interface 603 are connected to each other through a bus 610 and perform communication with each other. The communication interface 603 is mainly used to implement communications between modules, apparatuses, units, and/or devices in the embodiments of the present invention. Bus 610 includes hardware, software, or both, coupling components of the online data flow billing device to each other. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 610 may include one or more buses, where appropriate. Although embodiments of the invention have been described and illustrated with respect to a particular bus, the invention contemplates any suitable bus or interconnect.
The processor 601 implements the above-described anti-quantum key based digital asset processing method by reading and executing computer program instructions stored in the memory 602.
The electronic device in embodiments of the invention may be a server, a personal computer, or other form of computing device.
On the other hand, the embodiment of the invention also provides a computer readable storage medium, and the computer storage medium is stored with computer program instructions which when executed by a processor realize the digital asset processing method based on the quantum-resistant key.
In another aspect, embodiments of the present invention provide a computer program product comprising computer program instructions which, when executed by a processor, implement the above-described anti-quantum key based digital asset processing method. The computer program product is for example an application installation package, a plug-in or the like.
In the foregoing, only the specific embodiments of the present invention are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present invention is not limited thereto, and any equivalent modifications or substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and they should be included in the scope of the present invention.
Claims (14)
1. A digital asset processing method based on an anti-quantum key, comprising:
generating a random number with preset digits, and generating a pair of first private keys and first public keys by adopting an anti-quantum key algorithm based on the random number;
encrypting the right confirming information recorded with the digital asset attribution right into a ciphertext;
mixing and splicing the ciphertext and the random number together to obtain intermediate information;
Embedding the intermediate information in a steganographic manner in a multimedia file that is a digital asset;
signing the steganographically-written multimedia file by adopting a first private key generated by an anti-quantum key algorithm to generate a digital signature of the steganographically-written multimedia file; and
Issuing a steganographic multimedia file subjected to signature processing;
Wherein a first public key corresponding to the first private key generated using an anti-quantum key algorithm is configured to verify a digital signature of the published multimedia file when the published multimedia file is authenticated.
2. The anti-quantum key based digital asset processing method of claim 1, wherein the representation of the validation information comprises at least one of text, picture, audio, video and digital digest.
3. The quantum key-based digital asset processing method of claim 1, wherein the step of publishing the signed steganographic multimedia file comprises:
Splicing the hidden multimedia file data to the multimedia file data as the digital asset;
Disturbing the data blocks at the splice, wherein the data blocks comprise partial data blocks serving as the tail part of the multimedia file of the digital asset and partial data blocks of the head part of the multimedia file after steganography; and
A steganographically-written multimedia file spliced after the multimedia file data as a digital asset and with data blocks at the splice being scrambled is published.
4. The quantum key-based digital asset processing method of claim 1, wherein the step of encrypting the right information recorded with the right of ownership of the digital asset into ciphertext comprises:
Generating another random number of the preset bit number, and generating a pair of second private key and second public key by adopting an anti-quantum key algorithm based on the other random number; and
Encrypting the right-determining information recorded with the digital asset attribution right by adopting a second public key generated by an anti-quantum key algorithm;
The second private key corresponding to the second public key generated by adopting the anti-quantum key algorithm is configured to decrypt ciphertext mixed and spliced in intermediate information embedded in the released multimedia file in a steganographic manner when the released multimedia file is authorized.
5. The anti-quantum key based digital asset processing method of claim 1, wherein the anti-quantum key algorithm comprises at least one of a lattice-based algorithm, an encoding-based algorithm, a multivariate-based algorithm, and a hash-based algorithm.
6. A digital asset processing method based on an anti-quantum key, comprising:
Verifying the digital signature of the multimedia file to be authenticated by adopting a first public key generated by an anti-quantum key algorithm;
Responding to the digital signature of the multimedia file to be authenticated to pass the verification, and performing anti-steganography processing on the multimedia file to be authenticated;
responding to the multimedia file to be validated and carrying out anti-steganography processing to obtain intermediate information, and splitting the intermediate information;
responding to the intermediate information to obtain a ciphertext through splitting treatment, and decrypting the ciphertext;
Responding to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and comparing the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; and
Determining that the multimedia file to be authenticated is authenticated through the attribution right in response to the fact that the decrypted and obtained authentication information is consistent with the digital asset attribution right corresponding to the multimedia file to be authenticated;
The first private key corresponding to the first public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
7. The quantum key-based digital asset processing method of claim 6, further comprising:
determining that the multimedia file to be authenticated does not pass the attribution right in response to the digital signature of the multimedia file to be authenticated not passing the verification; or alternatively
Responding to the fact that the multimedia file to be determined is subjected to anti-steganography processing and does not obtain intermediate information, and determining that the multimedia file to be determined does not pass through attribution right determination; or alternatively
Responding to the fact that the intermediate information is split and does not obtain ciphertext, and determining that the multimedia file to be determined is not determined by attribution right; or alternatively
Responding to the decryption of the ciphertext without obtaining the right-confirming information, and confirming that the multimedia file to be confirmed does not pass the attribution right; or alternatively
And determining that the multimedia file to be authenticated does not pass the attribution right in response to the fact that the decrypted right determining information is inconsistent with the digital asset attribution right corresponding to the multimedia file to be authenticated.
8. The method for quantum key resistant based digital asset processing of claim 6, the method is characterized in that the step of decrypting the ciphertext comprises the following steps:
decrypting the ciphertext by adopting a second private key generated by adopting an anti-quantum key algorithm, wherein the second public key corresponding to the second private key generated by adopting the anti-quantum key algorithm is configured to encrypt the right-determining information into the ciphertext which is mixed and spliced in the intermediate information embedded in the right-determining multimedia file in a steganographic manner when the right-determining multimedia file is issued.
9. The quantum key-based digital asset processing method of claim 6, wherein the step of performing the anti-steganographic process on the multimedia file to be authenticated comprises:
Restoring the data at the splicing position in the multimedia file to be authorized; and
Extracting the steganographically-written multimedia file backwards based on header data in the spliced data;
and carrying out anti-steganography processing on the extracted steganography multimedia file.
10. A digital asset processing device based on an anti-quantum key, comprising:
A key unit configured to generate a random number of a preset number of bits, and to generate a pair of private key and public key by an anti-quantum key algorithm based on the random number;
An encryption unit configured to encrypt the right information recorded with the digital asset attribution right into a ciphertext;
the splicing unit is configured to mix and splice the ciphertext and the random number together to obtain intermediate information;
A steganography unit configured to steganographically embed the intermediate information in a multimedia file that is a digital asset;
The signature unit is configured to carry out signature processing on the hidden multimedia file by adopting a private key generated by an anti-quantum key algorithm so as to generate a digital signature of the hidden multimedia file; and
A publishing unit configured to publish the steganographically-processed multimedia file;
Wherein the public key corresponding to the private key generated using the anti-quantum key algorithm is configured to verify the digital signature of the published multimedia file when the published multimedia file is authenticated.
11. A digital asset processing device based on an anti-quantum key, comprising:
the signature verification unit is configured to verify the digital signature of the multimedia file to be authenticated by adopting a public key generated by an anti-quantum key algorithm;
The anti-steganography unit is configured to respond to the verification of the digital signature of the multimedia file to be authenticated, and perform anti-steganography processing on the multimedia file to be authenticated;
the splitting unit is configured to respond to the multimedia file to be validated and perform anti-steganography processing to obtain intermediate information, and split the intermediate information;
The decryption unit is configured to respond to the intermediate information to obtain ciphertext through splitting processing, and decrypt the ciphertext;
the comparison unit is configured to respond to the ciphertext to decrypt the ciphertext to obtain the right-confirming information, and compare the right-confirming information obtained by decryption with the digital asset attribution right corresponding to the multimedia file to be right-confirmed; and
The right confirming unit is configured to respond to the fact that the decrypted right confirming information is consistent with the digital asset attribution right corresponding to the to-be-confirmed multimedia file, and confirm that the to-be-confirmed multimedia file passes through the attribution right;
The private key corresponding to the public key generated by adopting the anti-quantum key algorithm is configured to generate a digital signature of the multimedia file to be authenticated when the multimedia file to be authenticated is issued.
12. The anti-quantum key based digital asset processing device of claim 11, wherein the validation unit is further configured to:
determining that the multimedia file to be authenticated does not pass the attribution right in response to the digital signature of the multimedia file to be authenticated not passing the verification; or alternatively
Responding to the fact that the multimedia file to be determined is subjected to anti-steganography processing and does not obtain intermediate information, and determining that the multimedia file to be determined does not pass through attribution right determination; or alternatively
Responding to the fact that the intermediate information is split and does not obtain ciphertext, and determining that the multimedia file to be determined is not determined by attribution right; or alternatively
Responding to the decryption of the ciphertext without obtaining the right-confirming information, and confirming that the multimedia file to be confirmed does not pass the attribution right; or alternatively
And determining that the multimedia file to be authenticated does not pass the attribution right in response to the fact that the decrypted right determining information is inconsistent with the digital asset attribution right corresponding to the multimedia file to be authenticated.
13. An electronic device comprising a processor and a memory storing computer program instructions; a processor, when executing computer program instructions, implements the anti-quantum key based digital asset processing method as claimed in any one of claims 1 to 9.
14. A computer readable storage medium, having stored thereon computer program instructions which, when executed by a processor, implement the anti-quantum key based digital asset processing method of any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310296844.4A CN116366232B (en) | 2023-03-24 | 2023-03-24 | Digital asset processing method, device, equipment and medium based on quantum-resistant key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310296844.4A CN116366232B (en) | 2023-03-24 | 2023-03-24 | Digital asset processing method, device, equipment and medium based on quantum-resistant key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116366232A CN116366232A (en) | 2023-06-30 |
CN116366232B true CN116366232B (en) | 2024-10-11 |
Family
ID=86918418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310296844.4A Active CN116366232B (en) | 2023-03-24 | 2023-03-24 | Digital asset processing method, device, equipment and medium based on quantum-resistant key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116366232B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916238A (en) * | 2014-04-01 | 2014-07-09 | 北京工业大学 | Digital audio signal encryption/decryption method based on quanta |
CN110011790A (en) * | 2019-02-14 | 2019-07-12 | 中国科学院信息工程研究所 | A kind of anti-quantum key agreement method based on coding |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100367295C (en) * | 2006-03-07 | 2008-02-06 | 华中科技大学 | Intelligent image steganalysis system based on three-layer architecture |
US20220224532A1 (en) * | 2018-12-21 | 2022-07-14 | 01 Communique Laboratory Inc. | Systems and Methods for Hiding Private Cryptographic Keys in Multimedia Files |
CN113129001B (en) * | 2019-12-31 | 2023-02-17 | 上海证锘信息科技有限公司 | Anti-quantum attack threshold signature method for block chain cross-chain and asset hosting |
US20220020018A1 (en) * | 2020-02-28 | 2022-01-20 | Polymath Inc. | Cryptographic encryption protocol for data types and values |
CN111340494B (en) * | 2020-05-15 | 2020-08-28 | 支付宝(杭州)信息技术有限公司 | Asset type consistency evidence generation, transaction and transaction verification method and system |
CN114362971B (en) * | 2022-03-21 | 2022-06-21 | 南京大学 | Digital asset right confirming and tracing method based on Hash algorithm |
CN115733651B (en) * | 2022-08-29 | 2024-08-23 | 景德镇陶瓷大学 | Transaction privacy protection method and device, electronic equipment and storage medium |
-
2023
- 2023-03-24 CN CN202310296844.4A patent/CN116366232B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916238A (en) * | 2014-04-01 | 2014-07-09 | 北京工业大学 | Digital audio signal encryption/decryption method based on quanta |
CN110011790A (en) * | 2019-02-14 | 2019-07-12 | 中国科学院信息工程研究所 | A kind of anti-quantum key agreement method based on coding |
Also Published As
Publication number | Publication date |
---|---|
CN116366232A (en) | 2023-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103348623B (en) | Termination, checking device, key distribution device, content reproducing method and cryptographic key distribution method | |
US5995625A (en) | Electronic cryptographic packing | |
US7831831B2 (en) | Authentication communication system, authentication communication apparatus, and authentication communication method | |
CN101377837A (en) | Method for generating and checking electronic check two-dimension code credence | |
CN109274644B (en) | Data processing method, terminal and watermark server | |
CN111177666A (en) | Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark | |
CN113837875A (en) | Transaction method, node and medium based on blockchain network | |
Frattolillo | A buyer-friendly and mediated watermarking protocol for web context | |
Chang et al. | An enhanced buyer seller watermarking protocol | |
CN115955308B (en) | Digital asset processing method, device, equipment and medium based on quantum-resistant key | |
JP2002176551A (en) | Method and device for contents data supply, and output device controller | |
CN114915809B (en) | Video file copyright protection method and transaction method based on blockchain | |
CN114119332A (en) | Block chain-based digital watermark writing and reading method and device | |
KR101967855B1 (en) | Method and system for verifying electronic document security using 2D barcode block division | |
Cheung et al. | Rights protection for digital contents redistribution over the Internet | |
CN116366232B (en) | Digital asset processing method, device, equipment and medium based on quantum-resistant key | |
JP2008500671A (en) | Access authorization across multiple devices | |
CN116842482A (en) | Block chain-based data sharing method and equipment | |
CN113793149B (en) | Off-line transaction authentication system, method, central server and client | |
Das | Buyer-seller watermarking protocol for an anonymous network transaction | |
CN114329564B (en) | Method for processing privatized format files, electronic equipment and medium | |
Laxmi et al. | Buyer seller watermarking protocol for digital rights management | |
US20230410072A1 (en) | Systems and methods for enhanced non-fungible tokens | |
KR20080019863A (en) | Asymmetric Code Insertion Method for Contents and Its Apparatus | |
JP2005175652A (en) | Content distribution system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |