{"title":"BCDH:基于区块链的隐蔽Diffie-Hellman密钥交换方案","authors":"Qinghua Hu , Chunxiang Xu , Wanpeng Li","doi":"10.1016/j.dt.2025.06.004","DOIUrl":null,"url":null,"abstract":"<div><div>The purpose of the covert communication scheme is to conceal the communication behavior entirely. In such schemes, the sender and receiver rely on secret keys to establish a covert channel. However, conventional key exchange protocols would expose the key exchange process between them. An adversary who observes the key exchange would be aware of the existence of communication behavior. The keys used in covert communication are not suitable to be generated through conventional key exchange schemes. To address this, we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme (BCDH) to conceal the process of the key exchange in blockchain transactions. Following a straightforward setup, BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication. Furthermore, we expand the BCDH approach to operate across multiple blockchains, further enhancing its covertness and stability. We analyze BCDH from several perspectives, including covertness, security, randomness, etc. Additionally, we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance. Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications.</div></div>","PeriodicalId":58209,"journal":{"name":"Defence Technology(防务技术)","volume":"52 ","pages":"Pages 24-31"},"PeriodicalIF":5.9000,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BCDH: Blockchain-based covert Diffie-Hellman key exchange scheme\",\"authors\":\"Qinghua Hu , Chunxiang Xu , Wanpeng Li\",\"doi\":\"10.1016/j.dt.2025.06.004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The purpose of the covert communication scheme is to conceal the communication behavior entirely. In such schemes, the sender and receiver rely on secret keys to establish a covert channel. However, conventional key exchange protocols would expose the key exchange process between them. An adversary who observes the key exchange would be aware of the existence of communication behavior. The keys used in covert communication are not suitable to be generated through conventional key exchange schemes. To address this, we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme (BCDH) to conceal the process of the key exchange in blockchain transactions. Following a straightforward setup, BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication. Furthermore, we expand the BCDH approach to operate across multiple blockchains, further enhancing its covertness and stability. We analyze BCDH from several perspectives, including covertness, security, randomness, etc. Additionally, we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance. Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications.</div></div>\",\"PeriodicalId\":58209,\"journal\":{\"name\":\"Defence Technology(防务技术)\",\"volume\":\"52 \",\"pages\":\"Pages 24-31\"},\"PeriodicalIF\":5.9000,\"publicationDate\":\"2025-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Defence Technology(防务技术)\",\"FirstCategoryId\":\"1087\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214914725001874\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defence Technology(防务技术)","FirstCategoryId":"1087","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214914725001874","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
The purpose of the covert communication scheme is to conceal the communication behavior entirely. In such schemes, the sender and receiver rely on secret keys to establish a covert channel. However, conventional key exchange protocols would expose the key exchange process between them. An adversary who observes the key exchange would be aware of the existence of communication behavior. The keys used in covert communication are not suitable to be generated through conventional key exchange schemes. To address this, we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme (BCDH) to conceal the process of the key exchange in blockchain transactions. Following a straightforward setup, BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication. Furthermore, we expand the BCDH approach to operate across multiple blockchains, further enhancing its covertness and stability. We analyze BCDH from several perspectives, including covertness, security, randomness, etc. Additionally, we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance. Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications.
Defence Technology(防务技术)Mechanical Engineering, Control and Systems Engineering, Industrial and Manufacturing Engineering
CiteScore
8.70
自引率
0.00%
发文量
728
审稿时长
25 days
期刊介绍:
Defence Technology, a peer reviewed journal, is published monthly and aims to become the best international academic exchange platform for the research related to defence technology. It publishes original research papers having direct bearing on defence, with a balanced coverage on analytical, experimental, numerical simulation and applied investigations. It covers various disciplines of science, technology and engineering.