Research Article
Covert Communication Scheme Based on Bitcoin Transaction Mechanism
Algorithm 2
Secret information embedding.
| Input: Key K, symmetric key k, secret information m. | | Output: The ID of the special transaction ID_Ts. | | (1) | ; | | (2) | ; /∗K and k are negotiated in advance ∗/ | | (3) | ; /∗Random generation∗/ | | (4) | ; | | (5) | ; | | (6) | ; | | (7) | ; | | (8) | ; | | (9) | ; | | (10) | return ID_Ts; | | (11) | end; |
|