期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
BCDH:Blockchain-based covert Diffie-Hellman key exchange scheme
1
作者 Qinghua Hu Chunxiang Xu Wanpeng Li 《Defence Technology(防务技术)》 2025年第10期24-31,共8页
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha... The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications. 展开更多
关键词 Diffie-Hellman key exchange Digital signature Covert communication Blockchain Blockchain-based covert communication
在线阅读 下载PDF
母语表层显性迁移和深层隐性迁移
2
作者 周红红 徐蔚 《江苏社会科学》 CSSCI 北大核心 2010年第S1期183-187,共5页
一、研究设计(一)研究问题笔者在本研究中提出了母语迁移可分为"表层显性迁移"和"深层隐性迁移"的假说。所谓显性迁移。
关键词 second LANGUAGE WRITING NATIVE LANGUAGE TRANSFER overt TRANSFER in surface covert TRANSFER in depth
在线阅读 下载PDF
Frame-bitrate-change based steganography for voice-over-IP 被引量:4
3
作者 刘进 田晖 周可 《Journal of Central South University》 SCIE EI CAS 2014年第12期4544-4552,共9页
Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on fr... Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication. 展开更多
关键词 covert communication steganography multi-rate speech codec voice-over-IP(VOIP)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部