期刊文献+

基于矢量空间秘密共享的阈下信道 被引量:3

Subliminal channel based on vector space secret sharing
下载PDF
导出
摘要 通过引入矢量空间秘密共享技术和指定接受者签名加密技术,提出一种新的阈下信道方案,并对该方案进行了安全性分析。在该方案中,任何人都可以对签名进行验证,而只有授权者子集才能提取出阈下信息,阈下信息发送者不需要与接受者的共享私钥,也不需要为接受者生成提取阈下信息的密钥对。 A new subliminal channel is proposed ignated based on vector space secret sharing scheme and desverifier signature encryption scheme. The security of this scheme is analyzed. The receiver can verify the validity of the signature but only the an authorized subset of participants can recover the subliminal message. The sender needs not to generate key pairs for the participants. The sender and the participants need not share their private keys.
出处 《陕西理工学院学报(自然科学版)》 2008年第4期34-37,共4页 Journal of Shananxi University of Technology:Natural Science Edition
关键词 阈下信道 矢量空间秘密共享 指定接受者签名 subliminal channel vector space secret sharing designated verifier signature
  • 相关文献

参考文献13

  • 1G J Simmons. The prisoner's channel and the subliminal channel[ C]. Proc. CRYPTO_83,1984:51-67.
  • 2G J Simmons. Subliminal communication is easy using the DSA[ C]. Eurocrypt'93 ,1994 :218-232.
  • 3L Harn,G Gong. Digital signature with a subliminal channel[J]. IEEE Proc. Comput. Digit. Tech. ,1997,144(6) :387-389.
  • 4J K Jan, Y M Tseng. New digital signature with subliminal channels based on the discrete logarithm problem[ J ]. Proceedings of the 1999 International Workshops on Parallel Processing, 1999,198-203.
  • 5N Y Lee, D R Lin. Robust digital signature scheme with subliminal channels [ J ]. IEICE Trans. Fundament. E86-A 2003 ( 1 ) : 187-188.
  • 6Zhang Fangguo,Lee B ,Kim K. Exploring Signature Schemes with Subliminal Channel[ C ]. SCIS 2003 ,The 2003 Symposium on Cryptography and Information Security vol 1/2 ,Itaya,Japan,2003. 245-250.
  • 7Narn-Yih Lee, Shu-Ya Yang. The design of integrating subliminal channel with access control [ J ]. Applied Mathematics and Computation,2005,171 ( 1 ) :573-580.
  • 8Chuan-Kun Wu. Hash channels[ J]. Computers & Security,2005,24( 1 ) :653-661.
  • 9Lee N Y, Ho P H. Digital Signature with a Threshold Subliminal Channel [ J ]. IEEE Transactions on Consumer Electronics,2003,49 (4) :1240-1242.
  • 10SU Li CUI Guohua YANG Muxiang CHEN Jing.Threshold Subliminal Channel Based on Designated Verifier Signature[J].Wuhan University Journal of Natural Sciences,2006,11(6):1485-1488. 被引量:1

二级参考文献21

  • 1NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81.
  • 2LIN C C, LAIH C S. Cryptanalysis of nyberg-rueppel's message recovery scheme[J]. IEEE Communications Letters, 2000, 4(7):231-232.
  • 3MIYAJI A. Another countermeasure to forgeries over message recovery signature[J].IEEE Trans Fundamentals, 1997, E80-A(11):2191-2200.
  • 4SHAMIR A. How to share a secret[J]. Commun ACM, 1979, 24(11): 612-613.
  • 5GENNARO R JARECKI S, KRAWCZYK H, RABIN T. Robust threshold DSS signatures[A]. Advances in Cryptology -Eurocrypt'96, Lecture Notes in Computer Science 1070[C]. Springer-Verlag, 1996. 354-371.
  • 6PEDERSEN T P. A threshold cryptosystem without a Uusted party[A]. Advances in Cryptology- Eurocrypt'91, Lecture Notes in Computer Science 547[C]. Springer-Verlag, 1991. 522-526.
  • 7HSU C L, WU T C. Authenticated encryption scheme with (t, n) shared verification[J]. IEE-Computer Digital Technology, 1998,145(2): 117-120.
  • 8WANG C T, CHANG C C, LIN C H. Genev-aliTation of threshold signature and authenticated encxyption for group communications[J].IEEE Trans Fundamentals, 2000, E83-A (6): 1228-1236.
  • 9Lee N Y,Ho P H.Digital Signature with a Threshold Sub- li minal Channel[].IEEE Transactions on Consumer Elec- tronics.2003
  • 10Lee N Y,Lin D R.Robust Digital Signature Scheme with Subli minal Channels[].IEICE Transaction Fundamentals.2003

共引文献21

同被引文献43

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部