期刊文献+

牛顿信道的带宽研究

Research on the Bandwidth of Newton Channel
下载PDF
导出
摘要 Anderson于 1996年研究发现了ELGamal签名中的一类结合宽带和窄带信道优点的阈下信道 ,称为牛顿信道 .该文在考虑签名安全性的前提下深入研究了牛顿信道的带宽 ,主要是签名作用子群与牛顿信道带宽的关系 .文章的后面给出了DSA中一个带宽不太大 ,实用性强 ,计算复杂度小的牛顿信道设计方案 . Anderson discovered a new subliminal channel in ElGamal signature, called Newton channel in 1996. The channel has a large bandwidth and does not require the sender to compromise the security of her signing key. In this paper, considering the signature's security, the bandwidth of Newton channel is deeply researched with the emphasis on the relation between the subgroup of generating signature and the bandwidth of Newton channel. Finally a Newton channel scheme in DSA is given. Its bandwidth is not very large, but it has a good practicability and a low computational complexity.
出处 《计算机学报》 EI CSCD 北大核心 2004年第6期849-853,共5页 Chinese Journal of Computers
基金 国家自然科学基金重大项目 ( 90 10 40 0 5 ) 国家"九七三"重点基础研究发展规划项目基金 (G19990 3 5 80 4)资助
关键词 阈下信道 牛顿信道 信道带宽 签名安全性 ELGAMAL签名 DSA Bandwidth Network protocols Security of data
  • 相关文献

参考文献10

  • 1Simmons G.J.. The Prisoner's problem and the subliminal channel. In:Proceedings of CRYPTO'83, New York, 1984, 51~67
  • 2Simmons G.J.. Subliminal communication is easy using the DSA. In:Proceedings of EUROCRYPT'93, 1993, 218~232
  • 3Anderson R., Vandeney S., Preneel B. et al.. The Newton channel. In: Proceedings of Information Hiding:First International Workshop, Cambridge, UK, 1996, 151~156
  • 4Desmedt Y.,Yung M.. Minimal cryptosystems and defining subliminal-freeness. In: Proceedings of the 1994 IEEE International Symposium on Information Theory, Trondheim, Norway, 1994, 347
  • 5张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 6Kobara K., Imai H.. On the channel capacity of narrow-band subliminal channels. In: Proceedings of the 2nd International Conference on Information and Communication Security, Sydney, Australia, 1999, 309~324
  • 7Desmedt Y.. Abuses in cryptography and how to fight them. In: Proceedings of Crypto'88, 1990, 375~389
  • 8ElGamal T.. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469~472
  • 9Paul C. van Oorschot*Michael J. Wiener. On Diffie-Hellman key agreement with short exponents. In:Proceedings of EUROCRYPT'96, 1996, 332~343
  • 10Digital Signature Standard(DSS). A Proposed Federal Information Processing Standard (FIPS) Publication 186, 1994

二级参考文献5

  • 1[1]Simmons G J. Subliminal channels:past and present.European Transactions on Telecommunications,July/August,1994; 4(4):459~473
  • 2[2]Anderson R,et al. The Newton channel.Lecture Notes in Computer Science 1174,Springer-Verlag,1996:151~156
  • 3[3]Simmons G J. Results concerning the bandwidth of subliminal channels.IEEE Journal on Selected Areas in Communications, May 1998;16(4):463~473
  • 4[4]Bleichenbacher Daniel.Generating EIGamal signatures without knowing the secret key.Eurocrypt’96 Proceedings,LNCS 1170, Springer-Verlag,1997:10~18
  • 5[5]Pohlig S C, Hellman M E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transaction on Information Theory,January 1978;24(1):106~110

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部