Netinfo Security ›› 2025, Vol. 25 ›› Issue (8): 1302-1312.doi: 10.3969/j.issn.1671-1122.2025.08.010
Previous Articles Next Articles
SHE Wei1,2,3,4, MA Tianxiang1,4, FENG Haige3,4, LIU Wei1,4(
)
Received:2024-05-28
Online:2025-08-10
Published:2025-09-09
CLC Number:
SHE Wei, MA Tianxiang, FENG Haige, LIU Wei. Tracing-Free Blockchain Covert Communication Method Based on RBF Mechanism[J]. Netinfo Security, 2025, 25(8): 1302-1312.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2025.08.010
| 码值 | 字符 | 码值 | 字符 | 码值 | 字符 | 码值 | 字符 |
|---|---|---|---|---|---|---|---|
| 0 | A | 16 | Q | 32 | g | 48 | w |
| 1 | B | 17 | R | 33 | h | 49 | x |
| 2 | C | 18 | S | 34 | i | 50 | y |
| 3 | D | 19 | T | 35 | j | 51 | z |
| 4 | E | 20 | U | 36 | k | 52 | 0 |
| 5 | F | 21 | V | 37 | l | 53 | 1 |
| 6 | G | 22 | W | 38 | m | 54 | 2 |
| 7 | H | 23 | X | 39 | n | 55 | 3 |
| 8 | I | 24 | Y | 40 | o | 56 | 4 |
| 9 | J | 25 | Z | 41 | p | 57 | 5 |
| 10 | K | 26 | a | 42 | q | 58 | 6 |
| 11 | L | 27 | b | 43 | r | 59 | 7 |
| 12 | M | 28 | c | 44 | s | 60 | 8 |
| 13 | N | 29 | d | 45 | t | 61 | 9 |
| 14 | O | 30 | e | 46 | u | 62 | + |
| 15 | P | 31 | f | 47 | v | 63 | / |
| 参数 | 值 |
|---|---|
| PSK | 76438561322594816937592661675008834131284340043820951912939840865026908677795 |
| pk1 | X:73442749537236419893675063490678586239136868616312090663972655544918591719861 |
| Y:51439161098480415867844876072863013710639021169466611798444914279677986184605 | |
| addr1 | mnNZGSuwStubRDumjDTr7Jgdu64j9xBhqc |
| pk2 | X:44167725728286626423507031731064295266930000403734932314255429566860271285632 |
| Y:41552797760144518979373303401903505428033605608469850166436936337431722181384 | |
| addr2 | mimtNz1vYFnxzf6GFeX4153eoH4zVYP5qE |
| pk3 | X:70382021197554170460884922229825554099758891352679201990718096667486893308080 |
| Y:59170546560708766210752917907066594932387772256704441115142735642473816628444 | |
| addr3 | n3VQ3fCvoEM7rMgJbNEMQGhcwjfZ6JSTPq |
| pk4 | X:101011145969842785069698398671332317973937492068109339606340767344578450439906 |
| Y:11067298237285078033656396816366755687742255597163549082791846567176847571705 | |
| addr4 | n4cycgTYNKvRd3NjyNmz6kf95ra95Qfrcj |
| 序号 | 载密交易ID | 手续费率 |
|---|---|---|
| 1 | c5613a06739045b40439e87f8e67a2091e32fca4c49e7654f51e74223f30f4f7 | 3.0 sat/vB |
| 2 | ed8785b332e90a158c31224a427eb2a4128cdb7cf4ed5388bca9408c1eaf98ce | 3.9 sat/vB |
| 3 | 9ed66d81f8eb67e10a55d0779536dbbfe184283f40d7489d77362b151e679646 | 4.1 sat/vB |
| 4 | 76f0919ee2dc9e29c24f486ec4328631dc4d6c5c4ef993005fc29a7fced15e19 | 5.3 sat/vB |
| 序号 | 替代交易ID | 手续费率 |
|---|---|---|
| 1 | 60126b06b40b76e926f69010ee638c4152af38ed588c9fb3599a11289134f223 | 20.1 sat/vB |
| 2 | fbb75772873feded5c2f9760a0d70cc0d78b7eaabaa580623788dc2ec662b62f | 18.1 sat/vB |
| 3 | 0511343117d77bd816afb8e4643de634e7f72d4b3331963534de73e4bb5e7049 | 18.7 sat/vB |
| 4 | c512a278b968860c38917b6ac30765a1dbd3a7473fd78bc7f8bb78d74f4eb878 | 17.3 sat/vB |
| [1] | LAMPSON B W. A Note on the Confinement Problem[J]. Communications of the ACM, 1973, 16(10): 613-615. |
| [2] | SIMMONS G J. The Prisoners' Problem and the Subliminal Channel[C]// Springer. The Advances in Cryptology. Heidelberg: Springer, 1984: 51-67. |
| [3] |
LI Leixiao, DU Jinze, LIN Hao, et al. Research Progress of Blockchain Network Covert Channel[J]. Journal on Communications, 2022, 43(9): 209-223.
doi: 10.11959/j.issn.1000-436x.2022146 |
|
李雷孝, 杜金泽, 林浩, 等. 区块链网络隐蔽信道研究进展[J]. 通信学报, 2022, 43(9): 209-223.
doi: 10.11959/j.issn.1000-436x.2022146 |
|
| [4] | SANKA A I, IRFAN M, HUANG I, et al. A Survey of Breakthrough in Blockchain Technology: Adoptions, Applications, Challenges and Future Research[J]. Computer Communications, 2021, 169: 179-201. |
| [5] | ALI O, JARADAT A, KULAKLI A, et al. A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities[J]. IEEE Access, 2021, 9: 12730-12749. |
| [6] | CHEN Lei, ZHOU Yanqiu. Blockchain Development Trends, Security Risk Prevention, and Top-Level Institutional Design[J]. Reform, 2020(6): 44-57. |
| 陈蕾, 周艳秋. 区块链发展态势、安全风险防范与顶层制度设计[J]. 改革, 2020(6): 44-57. | |
| [7] | YUAN Wenxin, CHEN Xingshu, ZHU Yi, ZENG Xuemei. HTTP Payload Covert Channel Detection Method Based on Deep Learning[J]. Netinfo Security, 2023, 23(7): 53-63. |
| 苑文昕, 陈兴蜀, 朱毅, 曾雪梅. 基于深度学习的HTTP负载隐蔽信道检测方法[J]. 信息网络安全, 2023, 23(7): 53-63. | |
| [8] | PARTALA J. Provably Secure Covert Communication on Blockchain[J]. Cryptography, 2018, 2(3): 18-29. |
| [9] | SONG Shang, PENG Wei. BLOCCE+: An Improved Blockchain-Based Covert Communication Approach[J]. Journal of Chongqing University of Technology (Natural Science), 2020, 34(9): 238-244. |
| 宋上, 彭伟. BLOCCE+:一种改进的基于区块链的隐蔽通信方法[J]. 重庆理工大学学报(自然科学), 2020, 34(9): 238-244. | |
| [10] |
SHE Wei, HUO Lijuan, TIAN Zhao, et al. Blockchain Covert Communication Model for Plain Text Information Hiding[J]. Computer Science, 2022, 49(1): 345-352.
doi: 10.11896/jsjkx.201000112 |
|
佘维, 霍丽娟, 田钊, 等. 面向纯文本信息隐藏的区块链隐蔽通信模型[J]. 计算机科学, 2022, 49(1): 345-352.
doi: 10.11896/jsjkx.201000112 |
|
| [11] |
SHE Wei, HUO Lijuan, LIU Wei, et al. A Blockchain-Based Covert Communication Model for Hiding Sensitive Documents and Sender Identity[J]. Acta Electronica Sinica, 2022, 50(4): 1002-1013.
doi: 10.12263/DZXB.20211021 |
|
佘维, 霍丽娟, 刘炜, 等. 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型[J]. 电子学报, 2022, 50(4): 1002-1013.
doi: 10.12263/DZXB.20211021 |
|
| [12] |
XIONG Lizhi, ZHU Rong, FU Zhangjie. Covert Communication Method of Blockchain Network Based on Transaction Construction and Forwarding Mechanism[J]. Journal on Communications, 2022, 43(8): 176-187.
doi: 10.11959/j.issn.1000-436x.2022161 |
|
熊礼治, 朱蓉, 付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022, 43(8): 176-187.
doi: 10.11959/j.issn.1000-436x.2022161 |
|
| [13] | GUO Rui, YANG Xin, WANG Junming. Verifiable and Revocable Attribute Encryption Scheme Based on Blockchain[J]. Netinfo Security, 2024, 24(6): 863-878. |
| 郭瑞, 杨鑫, 王俊茗. 基于区块链的可验证可撤销属性加密方案[J]. 信息网络安全, 2024, 24(6): 863-878. | |
| [14] | NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[J]Decentralized Business Review, 2008: 21260-21268. |
| [15] | LIU Haifang, WU Yuxin. Overview of the Bitcoin System[J]. Modern Computer, 2020(19): 45-51. |
| 刘海房, 吴雨芯. 比特币系统综述[J]. 现代计算机, 2020(19): 45-51. | |
| [16] | ZHANG Lihua, HUANG Yang, JIANG Tengfei. High-Speed Railway Environmental Monitoring Data Identity Authentication Scheme Based on Consortium Blockchain[C]// ACM.The 2nd International Conference on Blockchain Technology and Applications. New York: ACM, 2019: 7-13. |
| [17] |
ZENG Shiqin, HUO Ru, HUANG Tao, et al. Survey of Blockchain: Principle, Progress and Application[J]. Journal on Communications, 2020, 41(1): 134-151.
doi: 10.11959/j.issn.1000-436x.2020027 |
| [18] | TIAN Jing, GOU Gaopeng, LIU Chang, et al. DLchain: A Covert Channel Overblockchain Based on Dynamic Labels[C]// Springer. Information and Communications Security:21st International Conference, ICICS 2019. Heidelberg: Springer, 2020: 814-830. |
| [19] | WOOD G. Ethereum: A Secure Decentralised Generalised Transaction Ledger[J]. Ethereum Project Yellow Paper, 2014, 151: 1-32. |
| [20] | ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains[C]// ACM.The Thirteenth EuroSys Conference. New York: ACM, 2018: 1-15. |
| [21] | GAD I, ABDELKADER H, HAROUN A. Double Spending Attacks in Decentralized Digital Currencies: Challenges and Countermeasures[J]. International Journal of Computers and Information, 2023, 10(3): 142-146. |
| [22] | MASTEIKA S, REBZDYS E, DRIAUNYS K, et al. Bitcoin Double-Spending Risk and Countermeasures at Physical Retail Locations[J]. International Journal of Information Management, 2024, 79: 727-738. |
| [23] | SHI Chunhong. Information Steganalysis Based on Base64 Encoding[J]. Information and Computer (Theoretical Edition), 2020, 32(1): 118-119. |
| 石春宏. 基于Base64编码实现信息隐写分析[J]. 信息与电脑(理论版), 2020, 32(1): 118-119. | |
| [24] | TANG Wusheng, TIAN Lihong, CAO Wei. Research on Implementation and Application of Base64 Encoding[J]. Journal of Changchun University, 2006(4): 69-72. |
| 唐武生, 田立红, 曹伟. Base64编码的实现与应用研究[J]. 长春大学学报, 2006(4): 69-72. |
| [1] | LIU Feng, HUANG Hao. A Decentralized Regulatory Architecture Based on Smart Contracts and Prophecy Machines with Active Sensor Networks [J]. Netinfo Security, 2025, 25(6): 898-909. |
| [2] | YE Jiajun, GAO Cuifeng, XUE Yinxing. Research on Price Oracle Manipulation Source Code Detection Method Based on Static Analysis [J]. Netinfo Security, 2025, 25(5): 732-746. |
| [3] | QIN Jinlei, KANG Yimin, LI Zheng. Lightweight Fine-Grained Multi-Dimensional Multi-Subset Privacy-Preserving Data Aggregation for Smart Grid [J]. Netinfo Security, 2025, 25(5): 747-757. |
| [4] | ZHU Xiaoqiang, ZHANG Haowen, LIN Yanzi, LIU Jiqiang. Lightweight Distributed Authentication Scheme Based on Trusted Digital Identity [J]. Netinfo Security, 2025, 25(5): 817-827. |
| [5] | YANG Yatao, DING Yucheng, LIU Peihe, SANG Peng. Research on Blockchain-Based Privacy Preservation and Digital Authentication [J]. Netinfo Security, 2025, 25(4): 640-653. |
| [6] | ZHANG Yuxuan, HUANG Cheng, LIU Rong, LENG Tao. Smart Contract Vulnerability Detection Method Combining Prompt Tuning [J]. Netinfo Security, 2025, 25(4): 664-673. |
| [7] | WANG Yong, WU Yifan, WAN Qiancheng. Research on Redactable Blockchain Scheme Based on the Chinese Remainder Theorem [J]. Netinfo Security, 2025, 25(1): 36-47. |
| [8] | YU Lisu, LI Biao, YAO Yuanzhi, WEN Jiajin, LI Zipeng, WANG Zhen. Performance Optimization of Blockchain-Assisted Unmanned Aerial Vehicle Mobile Edge Computing System [J]. Netinfo Security, 2024, 24(9): 1432-1443. |
| [9] | LYU Qiuyun, ZHOU Lingfei, REN Yizhi, ZHOU Shifei, SHENG Chunjie. A Lifecycle-Manageable Public Data Sharing Scheme [J]. Netinfo Security, 2024, 24(8): 1291-1305. |
| [10] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
| [11] | GUO Rui, YANG Xin, WANG Junming. Verifiable and Revocable Attribute Encryption Scheme Based on Blockchain [J]. Netinfo Security, 2024, 24(6): 863-878. |
| [12] | LING Zhi, YANG Ming, YU Jiangyin. Research on Power Security Trading Platform Based on IPFS and Blockchain Technology [J]. Netinfo Security, 2024, 24(6): 968-976. |
| [13] | TIAN Zhao, NIU Yajie, SHE Wei, LIU Wei. A Reputation Evaluation Method for Vehicle Nodes in V2X [J]. Netinfo Security, 2024, 24(5): 719-731. |
| [14] | SHI Runhua, YANG Jingyi, WANG Pengbo, LIU Huawei. Online/Off line Cross-Domain Identity Authentication Scheme Based on Blockchain in Vehicle to Grid [J]. Netinfo Security, 2024, 24(4): 587-601. |
| [15] | HU Haiyang, LIU Chang, WANG Dong, WEI Xu. Clean Energy Data Traceability Mechanism Based on Blockchain [J]. Netinfo Security, 2024, 24(4): 626-639. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||