期刊文献+

阈下信道分类及边信息协商问题研究 被引量:1

Research on the Classification of Subliminal Channels and Side Information Exchange
下载PDF
导出
摘要 在本文中我们首先给出了阈下信道的一般模型和含有阈下信道的密码系统的定义,讨论了信任度和安全度两个指标。然后我们对目前的构造技术进行了系统的分类,对各类方案的容量、计算复杂度及边信息量等进行较为深入的研究,并讨论了认证码中的阈下信道与一般阈下信道的差别。我们首次提出了边信息协商的概念,并给出了几个实现方案。 A definition of cryptosystem with subliminal channels and a model of subliminal channels are given in this paper. And two index, confiding degree and security degree, are also discussed. Then a systemic classification of subliminal channels techniques is given. And a sound research on capacity, computational complexity and side information has also been done- We then discuss the difference between the subliminal channels in authentication codes and the one in other system. Finally,a concept of side information exchange is first presented and some schemes are given.
出处 《计算机科学》 CSCD 北大核心 2004年第5期103-106,共4页 Computer Science
基金 国家自然科学基金重大项目(No.90104005) 97-3项目(No.G1999035804)
关键词 阈下信道 边信息协商 密码系统 信任度 安全度 认证码 潜信道 数字签名 Digital signature,Subliminal channel,Side information,Information hiding
  • 相关文献

参考文献19

  • 1[1]Simmons G J. The prisonner's problem and the subliminal channel. Advances in Cryptology: Proceedings of CRYPTO' 83,Plenum Press,N. Y. ,1984. 51~67
  • 2[2]Simmons G J. The History of Subliminal Channels. IEEE Journal On Selected Areas In Communication,1998,16(4) :452~462
  • 3[3]Simmons G J. Subliminal communication is easy using the DSA.Advances in Cryptology: Proceedings of EUROCRYPT' 93,Berlin ,Springer-Verlag, 1993. 218~232
  • 4[4]Simmons G J. The subliminal channeal in the U. S. Digital Signature Algorithm (DSA). In: Proc. of 3rd Symposium on State and Progress of Research in Cryptography-SPRC' 93,Rome,Italy,Feb. 1993.35~54
  • 5[5]Anderson R, Vandeney S, Preneel B,et al. the Newton Channel.Lecture Notes in Computer Science 1174. In:Proc. of Information Hiding: First International Workshop, Cambridge, UK, May 30-June 1,1996, Berlin: Springer-Verlag, 1996.151 ~ 156
  • 6[6]Simmons G J. A secure subliminal channel(?) *. Crypto' 85 Santa Barbara, CA, August 18-22,1985, Advance in Cryptology, Ed. by H. C. Williams, Springer-Verlag, Berlin, 1986.34~ 41
  • 7[7]Jan J K, Tseng Y M. New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. In: 1999 Intl.Worshops on Parallel Processing, Wakamatsu, Japan, 1999. 198 ~203
  • 8[8]Hain L,Gong G. Digital signature with a subliminal channel. IEE.Proc. Comput. Digit,Tec. , 1997,144(6): 387~389
  • 9[9]Zhang Fangguo,Lee B,Kim K. Exploring Signature Schemes with Subliminal Channel. SCIS 2003, The 2003 Symposium on Cryptography and Information Security vol 1/2, Itaya, Japan,2003.245~250
  • 10[10]Cachin C. An Information-Theoretic Model for Steganography. In:Proc. 1998 Workshop on Information Hiding Porland, Oregon,Lecture Notes in Computer Sciences,Springer-Verlag, 1998

同被引文献10

  • 1陈伟东,冯登国,谭作文.指定验证方的门限验证签名方案及安全性证明[J].软件学报,2005,16(11):1967-1974. 被引量:8
  • 2Simmons G J.The 'prisoners' Problem and the SubliminalChannel[C] ∥Advances in Cryptology,Proc.Crypto'83.SpringerVerlag,1984:51-66.
  • 3Simmons G J.Subliminal Channels:Past and Present[J].European Transactions on Telecommunications,1994,4(4):459-473.
  • 4Simmons G J.Subliminal Communication Is Easy Using theDSA[C] ∥Proc.of Eurocrypt 93.1994:218-232.
  • 5Simmons G J.The Subliminal Channel and Digital Signature[C] ∥Advances in Cryptograph-Eurocrypt'84.Springer-Verlag,1985:364-378.
  • 6Xie Yuhua,Sun Xingming,Xiang Lingyun,et al.A SecurityThreshold Subliminal Channel Based on Elliptic Curve Cryptosystem[C] ∥Proceedings-2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Proces-sing,IIH-MSP.2008:294-297.
  • 7Kobara K,Imai H.On the Channel Capacity of NarrowbandSubliminal Channels[C] ∥Proc.of the Second International Conference on Information and Communication Security.Berlin:Springer-Verlag,1999:309-324.
  • 8Goh EJ,Jarecki S.A Signature Scheme as Secure as the Diffie-Hellman Problem[C] ∥Biham E,ed.Advances in Cryptology-EUROCRYPT 2003.LNCS 2656.Berlin:Springer-Verlag Publishers,2003:401-415.
  • 9Meng Tao,Wang Jianfeng,Sun Shenghe.Cover Communication Based on Subliminal Channel in Broadcast Multi Signature[C] ∥Proceedings-2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,IIH-MSP.2008:309-1311.
  • 10Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C] ∥Proc.of the 1st ACM Conf.on Computer and Communications Security.New York:ACM Press,1993:62-73.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部