CN114244562B - Information transmission method, apparatus, computer device and storage medium - Google Patents
Information transmission method, apparatus, computer device and storage medium Download PDFInfo
- Publication number
- CN114244562B CN114244562B CN202111335513.4A CN202111335513A CN114244562B CN 114244562 B CN114244562 B CN 114244562B CN 202111335513 A CN202111335513 A CN 202111335513A CN 114244562 B CN114244562 B CN 114244562B
- Authority
- CN
- China
- Prior art keywords
- information
- transmitted
- node
- channel
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 101
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000004044 response Effects 0.000 claims abstract description 14
- 238000004590 computer program Methods 0.000 claims description 22
- 239000013598 vector Substances 0.000 claims description 15
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application relates to an information transmission method, an information transmission device, computer equipment and a storage medium, wherein the method comprises the following steps: responding to an information transmission request, and acquiring information to be transmitted and key information; encrypting information to be transmitted according to the key information to obtain encrypted information; transmitting the encrypted information to a receiving node through a first channel; transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information. According to the application, the information to be transmitted is encrypted by utilizing the key information in response to the information transmission request, and the encrypted information and the key information are respectively transmitted by utilizing the two channels, so that the information to be transmitted and the key information are respectively transmitted, and the safety and the transmission efficiency of the information transmission are improved.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to an information transmission method, an information transmission device, a computer device, and a storage medium.
Background
The comprehensive arrival of the information age makes the information security transmission become a more outstanding problem, and as the network code for bearing information receiving and transmitting, whether the security performance is guaranteed is not only a big problem related to the technical field, but also is paid attention to the public.
Cryptographic techniques are a key technique in ensuring user information security, and technicians basically use related methods in the field of cryptography to ensure data security, and the most common methods are data encryption, hash functions and ways of message recognition; however, the technology support is not available, so that technicians need to perform huge data operation in the traditional operation mode, and the labor cost is high; at the same time, the efficiency of the existing information transmission method is also low.
Disclosure of Invention
Based on this, it is necessary to provide an information transmission method, apparatus, computer device and storage medium in order to solve the above-mentioned technical problems.
An information transmission method, comprising:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
encrypting the information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
Transmitting the key information to the receiving node through a second channel; and the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
In one embodiment, the obtaining, in response to the information transmission request, information to be transmitted and key information includes:
determining a next hop node identification according to the information transmission request;
And respectively acquiring the information to be transmitted and the key information from a preset finite field according to the next hop node identification.
In one embodiment, the obtaining the information to be transmitted from a preset finite field according to the next hop node identifier includes:
determining a time node corresponding to the information transmission request;
and selecting a corresponding row vector from the preset finite field as the information to be transmitted according to the time node.
In one embodiment, encrypting the information to be transmitted to obtain encrypted information includes:
Acquiring the information quantity of the information to be transmitted;
And if the information quantity is not the preset information quantity, converting the information to be transmitted into the preset information quantity, and then encrypting to obtain the encrypted information.
In one embodiment, the first channel is a common channel; the second channel is a private channel corresponding to the receiving node.
An information receiving method, comprising:
an information transmission request carrying identification information is sent to a server; the server sends the information transmission request to a corresponding source node according to the identification information;
receiving encryption information returned by the source node in a first channel and receiving key information returned by the source node in a second channel;
and decrypting the encrypted information according to the key information to obtain the information to be transmitted.
An information transmission apparatus, the apparatus comprising:
The request response module is used for responding to the information transmission request and acquiring information to be transmitted and key information;
the information encryption module is used for encrypting the information to be transmitted according to the key information to obtain encrypted information;
The first sending module is used for sending the encrypted information to a receiving node through a first channel;
The second sending module is used for sending the key information to the receiving node through a second channel; and the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
An information receiving apparatus, the apparatus comprising:
The request sending module is used for sending an information transmission request carrying identification information to the server; the server sends the information transmission request to a corresponding source node according to the identification information;
The information receiving module is used for receiving the encryption information returned by the source node in the first channel and receiving the key information returned by the source node in the second channel;
And the information decryption module is used for obtaining information to be transmitted after decrypting the encrypted information according to the key information.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
encrypting the information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
Transmitting the key information to the receiving node through a second channel; and the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
encrypting the information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
Transmitting the key information to the receiving node through a second channel; and the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
The information transmission method, the information transmission device, the computer equipment and the storage medium, wherein the method comprises the following steps: responding to an information transmission request, and acquiring information to be transmitted and key information; encrypting information to be transmitted according to the key information to obtain encrypted information; transmitting the encrypted information to a receiving node through a first channel; transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information. According to the application, the information to be transmitted is encrypted by utilizing the key information in response to the information transmission request, and the encrypted information and the key information are respectively transmitted by utilizing the two channels, so that the information to be transmitted and the key information are respectively transmitted, and the safety and the transmission efficiency of the information transmission are improved.
Drawings
FIG. 1 is an application environment diagram of a method of information transmission in one embodiment;
FIG. 2 is a flow chart of a method of information transmission according to an embodiment;
FIG. 3 is a flowchart illustrating steps for acquiring information to be transmitted and key information according to an embodiment;
FIG. 4 is an application environment diagram of a method of information reception in one embodiment;
FIG. 5 is a block diagram of an information transmission device in one embodiment;
FIG. 6 is a block diagram of an information receiving apparatus in one embodiment;
fig. 7 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The information transmission method provided by the application can be applied to an application environment shown in figure 1. The terminal 11 communicates with the server 12 and the receiving node 13 via a network. The terminal 11 obtains information to be transmitted and key information in response to an information transmission request sent by the server 12; the terminal 11 encrypts information to be transmitted according to the key information to obtain encrypted information; the terminal 11 transmits the encrypted information to the receiving node 13 through the first channel; the terminal 11 transmits the key information to the receiving node 13 through the second channel; the receiving node 13 is configured to decrypt the encrypted information according to the key information to obtain information to be transmitted.
The terminal 11 and the receiving node 13 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers and portable wearable devices, and the server 12 may be implemented by a stand-alone server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, there is provided an information transmission method, which is described by taking the terminal 11 in fig. 1 as an example, including the following steps:
And step 21, obtaining information to be transmitted and key information in response to the information transmission request.
The channel is a communication channel used in the transmission process of the information to be transmitted, and is a medium for transmitting the information to be transmitted; the channels can be divided into public channels and private channels according to types, and the public channels can be accessed by any terminal and any object when the public channels are not limited; the private channel is usually only opened and connected to a certain number of objects, and the outside is not known or authorized to access, so that the private channel has higher security.
The key information is a parameter which is input in an algorithm for converting a plaintext into a ciphertext or converting a ciphertext into a plaintext, and is generally classified into a symmetric key and an asymmetric key.
Specifically, the terminal receives an information transmission request sent by the server, and determines information to be transmitted and corresponding key formation key information according to the information transmission request.
And step 22, encrypting the information to be transmitted according to the key information to obtain encrypted information.
Specifically, after acquiring the key information and the information to be transmitted, the terminal encrypts the information to be transmitted by using the key information, and takes the encrypted information to be transmitted as encryption information.
Step 23, the encrypted information is sent to the receiving node via the first channel.
Wherein the first channel refers to a channel having a common channel attribute, that is, the first channel may be accessed by other nodes, terminals, etc. except the receiving node; the receiving node is another terminal communicatively connected to the terminal via the first channel.
Specifically, the terminal initiates communication connection with the receiving node through a first channel; after the communication connection is established, the encrypted information is sent to the receiving node over the first channel.
Step 24, the key information is sent to the receiving node through the second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
The second channel is a channel with a private channel attribute.
Specifically, the terminal initiates communication connection with the receiving node through a second channel; after the communication connection is established, the key information is transmitted to the receiving node over the second channel. After the receiving node acquires the encryption information and the key information at the same time, the receiving node can decrypt the encryption information by using the key information, so that information to be transmitted in the encryption information is acquired, and information transmission from the terminal to the receiving node is completed.
The information transmission method comprises the following steps: responding to an information transmission request, and acquiring information to be transmitted and key information; encrypting information to be transmitted according to the key information to obtain encrypted information; transmitting the encrypted information to a receiving node through a first channel; transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information. According to the application, the information to be transmitted is encrypted by utilizing the key information in response to the information transmission request, and the encrypted information and the key information are respectively transmitted by utilizing the two channels, so that the information to be transmitted and the key information are respectively transmitted, and the safety and the transmission efficiency of the information transmission are improved.
In one embodiment, as shown in fig. 3, step 21, in response to the information transmission request, acquiring information to be transmitted and key information includes:
Step 31, determining the next hop node identification according to the information transmission request;
and step 32, respectively acquiring information to be transmitted and key information from a preset finite field according to the next hop node identification.
The next-hop node (next-hop) is a node corresponding to the address of the output transmission determined by the route in the field of data transmission, namely the next-hop node; and the next-hop node identification can identify the next-hop node.
Wherein the finite field is a field containing only a limited number of elements.
Specifically, the terminal acquires corresponding information to be transmitted and key information from a preset finite field according to the next hop node identification; the manner of acquisition may be a random acquisition manner.
According to the embodiment, the information to be transmitted and the key information are respectively acquired from the preset finite field through the next hop node identification, so that the randomness of acquiring the information to be transmitted and the key information is improved, and the safety of the information to be transmitted is further improved.
In one embodiment, obtaining information to be transmitted from a preset finite field according to a next hop node identifier includes: determining a time node corresponding to the information transmission request; and selecting a corresponding row vector from a preset finite field as information to be transmitted according to the time node.
Wherein the preset finite field contains n-dimensional row vectors.
Specifically, assuming that the preset finite field is F q, letFor the n-dimensional row vector on the preset finite field F q, the information X to be transmitted is sent in unit time of the source node, thereby meeting the requirements ofIs a relationship of (3).
According to the method and the device, the information to be transmitted is determined through the row vectors in the preset finite field, and the randomness of the determination of the information to be transmitted is improved.
In one embodiment, encrypting information to be transmitted to obtain encrypted information includes: acquiring information quantity of information to be transmitted; if the information quantity is not the preset information quantity, the information to be transmitted is converted into the preset information quantity and then encrypted, so that encrypted information is obtained.
Specifically, the terminal encrypts the information to be transmitted and can change the original information quantity of the information to be transmitted; for example, when the terminal needs to send k bits of message X to be transmitted, the terminal may first encode k bits of message X to be transmitted into n bits.
The embodiment realizes recoding of the information to be transmitted and adjustment of the information amount of the encrypted information by changing the information amount of the information to be transmitted.
In one embodiment, another information transmission method is provided, and the method can be applied to a security anti-eavesdropping scene based on an identification algorithm; the terminal is used as a source node, the receiving node is used as a new sink node, the first channel is used as a common channel, and the second channel is used as a safety channel. The method comprises the following steps:
Step S1, two nodes and two links are arranged in a terminal network, wherein the two nodes are an information source node and an information destination node respectively, and the two links are a safety channel and a public channel respectively;
step S2, the information source node can send information to the information sink node through the safety channel and the public channel;
Step S3, assuming that the source node selects a message X from the finite field F q, and then selects a key K independently of the message X;
Step S4, the secret key K is uniformly distributed in the finite field F q;
s5, the information source node adopts an identity identification algorithm to encrypt the coding coefficient of the message X by using the key K of the next hop node;
S6, generating a ciphertext E, and sending the ciphertext E out by the source node through a public channel and sending out the secret key K through a secure channel;
In step S7, when the sharer recognizes the key K, a message X may be received.
Specifically, two nodes and two links are set in a terminal network, wherein the two nodes are an information source node and an information destination node respectively, and the two links are a safety channel and a public channel respectively; the source node can send information to the sink node through the secure channel and the public channel; assuming that the source node selects a message X from the finite field F q, and then selects a key K independently of the message X; the secret key K is uniformly distributed in the finite field F q; the information source node adopts an identity identification algorithm to encrypt the coding coefficient of the information X by using a key K of the next hop node; generating a ciphertext E, and sending the ciphertext E out by the source node through a public channel and sending out a secret key K through a secure channel; when the sharer recognizes the key K, a message X may be received. An attacker can acquire messages transmitted in the common channel but cannot acquire messages transmitted in the secure channel. The safety channel and the public channel are noiseless, so that the information sink node can recover the information X sent by the information source node. During transmission by the intermediate transmission node, the data messages transmitted to the next hop node all have a different randomized encryption value.
Specifically, under the finite field F q, letFor n-dimensional row vectors over finite field F q, message X is sent per unit time by the source node, and
Specifically, in a secret sharing system provided in the above scenario, the secret sharing system includes a message X randomly selected from a finite field F q and n sharers, where the sharers are represented by [ n ] = {1,2, …, n }; message X may be shared by n sharers as follows: only a subset of the grants in [ n ] can recover message X; the unauthorized subset of the other [ n ] cannot obtain any information in message X. Further, the sharer uses a (r, n) threshold secret sharing mechanism to realize the sharing of the message X, wherein r is the number of medium authority subsets, and r < n; of the n sharers, any r sharers can recover message X from the information they obtain, while any r-1 sharers cannot recover message X. Let s= (S 1,s2,…sk) be the k-bit message that the channel node needs to send, let x= (X 1,x2,…xn) be the n-bit message after the code, when n-bit message is sent to the information sink node, it is assumed that the attacker can steal r-bit message in message X, when the attacker reads r-bit message, immediately identify, make the attacker unable to obtain any message of message X through eavesdropping through the linear coding scheme based on (n, n-k) MDS code C. The linear coding scheme performs linear network coding randomly, the intermediate transmission node only needs to randomly select a local coding vector on the finite field F q, the selected coding vector and the data message received by the intermediate transmission node are combined linearly, and then the combined data message is sent to the downstream link to be transmitted to the information sink node.
It should be noted that, the source node can encrypt the coding coefficient by using an IBC (Identity-Based Cryptography, code based on the Identity) algorithm based on the next hop node Identity, and append the coding coefficient to the coded data packet; at the same time, the source node signs the encoded data packet. Secondly, the intermediate coding node verifies the received coded data packet, and recodes the data packet meeting the coding conditions after the verification is passed. Likewise, the next hop node identification is used to encrypt the encoding coefficients and to sign the transmitted encoded data packet. And finally, checking the received coded data packet by the destination node, and decoding the coded data packet to obtain the original data only if the coded data packet passes through the checking. In addition, key pre-distribution and Message Authentication Codes (MACs) may also be utilized. Based on the multicast characteristics, the legitimate node generates multiple MACs for each data using the destination node key. Each MAC is appended to the source data. Thus, each node can verify the received data using its own key and can filter the contaminated data with a high probability. The security of the linear network code is ensured by a security network coding scheme of anti-eavesdropping attacks and anti-pollution attacks.
In one embodiment, as shown in fig. 4, there is provided an information receiving method including the steps of:
Step 41, sending an information transmission request carrying identification information to a server; the server sends an information transmission request to a corresponding source node according to the identification information;
step 42, receiving encryption information returned by the source node in the first channel and receiving key information returned by the source node in the second channel;
and step 43, decrypting the encrypted information according to the key information to obtain the information to be transmitted.
Specifically, the receiving node sends an information transmission request carrying identification information to a server, and the server sends the information transmission request to a corresponding source node according to the identification information; the source node responds to the information transmission request and acquires information to be transmitted and key information; the source node encrypts information to be transmitted according to the key information to obtain encrypted information; the source node sends the encrypted information to the receiving node through a first channel; the source node sends the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information. The application improves the safety and the transmission efficiency of information transmission.
It should be understood that, although the steps in the flowcharts of fig. 2-4 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-4 may include multiple steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the steps or stages in other steps or other steps.
In one embodiment, as shown in fig. 5, there is provided an information transmission apparatus, the apparatus including:
a request response module 51, configured to obtain information to be transmitted and key information in response to an information transmission request;
The information encryption module 52 is configured to encrypt information to be transmitted according to the key information to obtain encrypted information;
A first transmitting module 53, configured to transmit the encrypted information to the receiving node through a first channel;
A second transmitting module 54, configured to transmit the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
In one embodiment, the request response module 51 is further configured to determine a next hop node identifier according to the information transmission request; and respectively acquiring information to be transmitted and key information from a preset finite field according to the next hop node identification.
In one embodiment, the request response module 51 is further configured to determine a time node corresponding to the information transmission request; and selecting a corresponding row vector from a preset finite field as information to be transmitted according to the time node.
In one embodiment, the information encryption module 52 is further configured to obtain an information amount of the information to be transmitted; if the information quantity is not the preset information quantity, the information to be transmitted is converted into the preset information quantity and then encrypted, so that encrypted information is obtained.
The specific limitation of the information transmission device may be referred to as limitation of the information transmission method hereinabove, and will not be described herein. Each of the modules in the information transmission apparatus described above may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, as shown in fig. 6, there is provided an information receiving apparatus including:
A request sending module 61, configured to send an information transmission request carrying identification information to a server; the server sends an information transmission request to a corresponding source node according to the identification information;
An information receiving module 62, configured to receive encryption information returned by the source node in the first channel, and receive key information returned by the source node in the second channel;
the information decryption module 63 is configured to decrypt the encrypted information according to the key information to obtain information to be transmitted.
The specific limitation of the information receiving apparatus may be referred to the limitation of the information receiving method hereinabove, and will not be described herein. Each of the modules in the information receiving apparatus described above may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of information transfer. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 7 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
Encrypting information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
In one embodiment, the processor when executing the computer program further performs the steps of: determining the next hop node identification according to the information transmission request; and respectively acquiring information to be transmitted and key information from a preset finite field according to the next hop node identification.
In one embodiment, the processor when executing the computer program further performs the steps of: determining a time node corresponding to the information transmission request; and selecting a corresponding row vector from a preset finite field as information to be transmitted according to the time node.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring information quantity of information to be transmitted; if the information quantity is not the preset information quantity, the information to be transmitted is converted into the preset information quantity and then encrypted, so that encrypted information is obtained.
In one embodiment, the processor when executing the computer program further performs the steps of: an information transmission request carrying identification information is sent to a server; the server sends an information transmission request to a corresponding source node according to the identification information; receiving encryption information returned by a source node in a first channel and receiving key information returned by the source node in a second channel; and decrypting the encrypted information according to the key information to obtain the information to be transmitted.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
Encrypting information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining the next hop node identification according to the information transmission request; and respectively acquiring information to be transmitted and key information from a preset finite field according to the next hop node identification.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining a time node corresponding to the information transmission request; and selecting a corresponding row vector from a preset finite field as information to be transmitted according to the time node.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring information quantity of information to be transmitted; if the information quantity is not the preset information quantity, the information to be transmitted is converted into the preset information quantity and then encrypted, so that encrypted information is obtained.
In one embodiment, the computer program when executed by the processor further performs the steps of: an information transmission request carrying identification information is sent to a server; the server sends an information transmission request to a corresponding source node according to the identification information; receiving encryption information returned by a source node in a first channel and receiving key information returned by the source node in a second channel; and decrypting the encrypted information according to the key information to obtain the information to be transmitted.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (10)
1. An information transmission method, comprising:
Responding to an information transmission request, and acquiring information to be transmitted and key information;
encrypting the information to be transmitted according to the key information to obtain encrypted information;
transmitting the encrypted information to a receiving node through a first channel;
Transmitting the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information;
the responding to the information transmission request, obtaining the information to be transmitted and the key information, includes:
determining a next hop node identification according to the information transmission request;
And respectively acquiring the key information from a preset finite field according to the next hop node identification, determining a time node corresponding to the information transmission request, and selecting a corresponding row vector from the preset finite field as the information to be transmitted according to the time node.
2. The method according to claim 1, wherein encrypting the information to be transmitted to obtain encrypted information comprises:
Acquiring the information quantity of the information to be transmitted;
And if the information quantity is not the preset information quantity, converting the information to be transmitted into the preset information quantity, and then encrypting to obtain the encrypted information.
3. The method according to any of claims 1-2, wherein the first channel is a common channel; the second channel is a private channel corresponding to the receiving node.
4. An information receiving method, comprising:
an information transmission request carrying identification information is sent to a server; the server sends the information transmission request to a corresponding source node according to the identification information;
receiving encryption information returned by the source node in a first channel and receiving key information returned by the source node in a second channel;
the encryption information is decrypted according to the key information, and then information to be transmitted is obtained;
The source node is used for determining the next hop node identification according to the information transmission request; respectively acquiring the key information from a preset finite field according to the next hop node identification, determining a time node corresponding to the information transmission request, and selecting a corresponding row vector from the preset finite field as the information to be transmitted according to the time node; and encrypting the information to be transmitted according to the key information to obtain the encrypted information.
5. An information transmission apparatus, characterized in that the apparatus comprises:
The request response module is used for responding to the information transmission request and acquiring information to be transmitted and key information;
the information encryption module is used for encrypting the information to be transmitted according to the key information to obtain encrypted information;
The first sending module is used for sending the encrypted information to a receiving node through a first channel;
the second sending module is used for sending the key information to the receiving node through a second channel; the receiving node is used for obtaining the information to be transmitted after decrypting the encrypted information according to the key information;
The request response module is further used for determining a next hop node identifier according to the information transmission request; and respectively acquiring the key information from a preset finite field according to the next hop node identification, determining a time node corresponding to the information transmission request, and selecting a corresponding row vector from the preset finite field as the information to be transmitted according to the time node.
6. The apparatus of claim 5, wherein the information encryption module is further configured to obtain an information amount of the information to be transmitted; and if the information quantity is not the preset information quantity, converting the information to be transmitted into the preset information quantity, and then encrypting to obtain the encrypted information.
7. The apparatus of claim 5, wherein the first channel is a common channel; the second channel is a private channel corresponding to the receiving node.
8. An information receiving apparatus, characterized in that the apparatus comprises:
The request sending module is used for sending an information transmission request carrying identification information to the server; the server sends the information transmission request to a corresponding source node according to the identification information;
The information receiving module is used for receiving the encryption information returned by the source node in the first channel and receiving the key information returned by the source node in the second channel;
The information decryption module is used for obtaining information to be transmitted after decrypting the encrypted information according to the key information;
The source node is used for determining the next hop node identification according to the information transmission request; respectively acquiring the key information from a preset finite field according to the next hop node identification, determining a time node corresponding to the information transmission request, and selecting a corresponding row vector from the preset finite field as the information to be transmitted according to the time node; and encrypting the information to be transmitted according to the key information to obtain the encrypted information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111335513.4A CN114244562B (en) | 2021-11-11 | 2021-11-11 | Information transmission method, apparatus, computer device and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111335513.4A CN114244562B (en) | 2021-11-11 | 2021-11-11 | Information transmission method, apparatus, computer device and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114244562A CN114244562A (en) | 2022-03-25 |
| CN114244562B true CN114244562B (en) | 2024-10-11 |
Family
ID=80749079
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111335513.4A Active CN114244562B (en) | 2021-11-11 | 2021-11-11 | Information transmission method, apparatus, computer device and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114244562B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119485290B (en) * | 2025-01-15 | 2025-04-25 | 北京简网科技有限公司 | Wireless encryption communication method for information security |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101197674A (en) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | Encrypted communication method, server and encrypted communication system |
| CN209265678U (en) * | 2018-11-20 | 2019-08-16 | 国家电网有限公司 | Power information collection and transmission system based on quantum encryption |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2509276B1 (en) * | 2011-04-05 | 2013-11-20 | F. Hoffmann-La Roche AG | Method for secure transmission of electronic data over a data communication connection between one device and another |
| US11647006B2 (en) * | 2018-05-10 | 2023-05-09 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
| CN111970244B (en) * | 2020-07-20 | 2022-06-03 | 北京邮电大学 | The Construction of Anonymous Communication Network Based on Ring Architecture and the Method of Message Forwarding |
| CN113328851B (en) * | 2021-04-21 | 2022-01-14 | 北京连山科技股份有限公司 | Method and system for randomly transmitting secret key under multilink condition |
| CN113572727B (en) * | 2021-06-08 | 2023-04-28 | 深圳市国电科技通信有限公司 | Data security hidden transmission method and system based on P2P network routing node |
-
2021
- 2021-11-11 CN CN202111335513.4A patent/CN114244562B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101197674A (en) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | Encrypted communication method, server and encrypted communication system |
| CN209265678U (en) * | 2018-11-20 | 2019-08-16 | 国家电网有限公司 | Power information collection and transmission system based on quantum encryption |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114244562A (en) | 2022-03-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10979221B2 (en) | Generation of keys of variable length from cryptographic tables | |
| KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques | |
| US9203610B2 (en) | Systems and methods for secure peer-to-peer communications | |
| CN113572743B (en) | Data encryption and decryption methods and devices, computer equipment and storage medium | |
| KR20180119201A (en) | Electronic device for authentication system | |
| US11128455B2 (en) | Data encryption method and system using device authentication key | |
| CN111294203B (en) | Information transmission method | |
| CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
| CN108183791A (en) | Applied to the Intelligent terminal data safe processing method and system under cloud environment | |
| CN113874857A (en) | Method and apparatus for encryption key management for optimal information theory security | |
| CN114844688A (en) | Data transmission method, device, equipment and computer storage medium | |
| Gupta et al. | A privacy-preserving model for cloud data storage through fog computing | |
| Somaiya et al. | Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed | |
| KR101812311B1 (en) | User terminal and data sharing method of user terminal based on attributed re-encryption | |
| CN114244562B (en) | Information transmission method, apparatus, computer device and storage medium | |
| CN112954388B (en) | A method, device, terminal device and storage medium for obtaining data files | |
| CN111277605B (en) | Data sharing method and device, computer equipment and storage medium | |
| CN111953480B (en) | Key generation device and method, operation key generation device and method | |
| CN118487837A (en) | Revocable broadcast proxy re-encryption method based on SM9 in zero-trust network | |
| CN109120589B (en) | Terminal information protection method and device based on encryption password | |
| CN104660720A (en) | Security storage method based on identity authentication | |
| CN116599771B (en) | Data hierarchical protection transmission method and device, storage medium and terminal | |
| CN118764199B (en) | A quantum key-based encryption method for IoT terminals | |
| CN115378666B (en) | Public key encryption method and system supporting outsourced ciphertext data equality test | |
| Wang et al. | Lattice-based Revocable IBEET Scheme for Mobile Cloud Computing |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |