Research Article
Covert Communication Scheme Based on Bitcoin Transaction Mechanism
Algorithm 2
Secret information embedding.
Input: Key K, symmetric key k, secret information m. | Output: The ID of the special transaction ID_Ts. | (1) | ; | (2) | ; /∗K and k are negotiated in advance ∗/ | (3) | ; /∗Random generation∗/ | (4) | ; | (5) | ; | (6) | ; | (7) | ; | (8) | ; | (9) | ; | (10) | return ID_Ts; | (11) | end; |
|