期刊文献+

基于分解困难性的潜信道构造

Construction of Subliminal Channel Based on Factoring Difficulty
下载PDF
导出
摘要 基于分解困难性及离散对数问题,给出一个在Schnorr签名中构造潜信道的方案.方案中,被Schnorr签名所掩盖的潜信息的安全性依赖于分解困难性,签名的不可伪造性依赖于Schnorr签名的安全性.同时,潜信息的接收者伪造一个签名者有效的签名是困难的. Based on the factoring difficulty and discrete logarithm problem, a way to construct subliminal channel in the Schnorr signature scheme is proposed. In this scheme, the security of the subliminal message covered by the Schnorr signature depends on the factoring difficulty, and the security of the signature against forgery depends on the security of Schnorr signature. At the same time, it is hard for the subliminal receiver to forge a valid signature of the signer.
出处 《微计算机信息》 2009年第6期117-118,40,共3页 Control & Automation
基金 基金申请人:董庆宽 阈下信道及其封闭技术的新理论与应用技术研究 基金颁发部门:国家自然科学基金委(60603010) 郑州轻工业学院校基金(2006XXJ18) 郑州轻工业学院博士科研基金资助
关键词 密码学 数字签名 潜信道 安全 Cryptography digital signature subliminal channel security
  • 相关文献

参考文献10

  • 1Simmons, G. J. The prisoner's channel and the subliminal channel. Proc.CRYFFO'83, Berlin: Springer-Verlag, 1984:51-67.
  • 2Simmons, G. J. Subliminal communication is easy using the DSA. EUROCRYPT'93. Berlin: Springer-Verlag, 1994: 218-232.
  • 3Simmons, G. J. The subliminal channels in the US digital signalure algorithm. Proc. of the 3rd symposium on state and process of research in cryptography, Rome, Italy, 1993.
  • 4Simmons, G. J. The history of subliminal channels. IEEE Jour. On sel. Areas comm., Vo. 16 (4), 1998: 456-462.
  • 5Zhang F., Lee B., Kim K. Exploring signature schemes with subliminal channel. The 2003 symposium on cryptography and in formation security, ttamamastu, Japan, Jan.26-29, 2003.
  • 6Harn L, Gong G. Digital signature with a subliminal channel. IEE Porc. Comput. Digit. Tech. Vol. 144(6), 1997: 387-389.
  • 7Jan J. K., Tseng Y. M. New digital signature with subliminal channels based on discrete logarithm problem. ICPP Workshop, pp.198-203, 1999.
  • 8Schnorr C. P. Efficient signature generation for smart cards. Journal of Cryptology, 4(3), , 1991: 161-174.
  • 9Pointcheval D., Stern J. Security arguments for digital signatures and Mind signatures. Journal of Cryptology, Vol.13 (3), 2000: 361- 396.
  • 10辛向军,李用江,张宏伟.对一种匿名代理签名方案的安全性分析[J].微计算机信息,2007(33):71-72. 被引量:1

二级参考文献5

  • 1谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18
  • 2张守忠.代理签名者身份保护的代理签名体制[J].微计算机信息,2006(09X):74-75. 被引量:7
  • 3Mambo,M,Usuda,K.and Okamoto,E.Proxy Signatures:Delegation of the power to sign messages.IEICE Trans.Fundam.1996,E79-A-5:1338-1354.
  • 4Chen T S,Liu T P,Chung Y F.A proxy-protected proxy signature scheme based on elliptic curve cryptosystem.Proc.Of IEEE TENCON'02,2002,184-187.
  • 5Wang G.Designated-verifier proxy signatures for E-commerce.Multimedia and Expo,2004,ICME'04.2004 IEEE International Conference,Vol.3,June 27-30,2004:1731-1734.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部