期刊文献+

Schnorr类有序多重签名中的阈下信道的封闭协议 被引量:1

Free protocol for the subliminal channels in the Schnorr-type ordinal multi-signature schemes
下载PDF
导出
摘要 设计了一个新的交互式阈下信道的封闭协议.利用整体代换的思想,完全封闭了Schnorr类有序多重签名中由参数的随机性引入的阈下信道.新协议在签名者和看守之间交互式进行,并确保了签名者的签名权力.必须由看守和所有签名者合作才能对给定的消息进行签名.新协议的安全性基于求解离散对数问题的困难性和哈希函数的无碰撞性.在计算复杂度和通信量方面,新方案比已有方案效率更高. A new interactive subliminal-free protocol is designed. It is shown that the proposed protocol can completely close the subliminal channels by the whole substitution existing in the random parameters in the Schnorr-type ordinal multi-signature schemes. The new protocol is an interactive process between the signers and the warden, and it ensures that the signature authority of the signer is guaranteed. To sign a given message, it is necessary for the warden to cooperate with all signers. The security of the proposed protocol is based on both the discrete logarithm intractability assumption and the existence of collision-free hash functions. In computational complexity and communications cost, the proposed protocol is more efficient than the existing schemes.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2011年第3期140-144,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(60803149)
关键词 密码学 数字签名 阈下封闭协议 通信安全 信息隐藏 cryptography digital signature subliminal-free protocol communication security information hiding
  • 相关文献

参考文献14

  • 1Ham L,Ren Jian,Lin Changlu.Design of DL-Based Certificateless Digital Signatures[J].The Journal of Systems and Software,2009(82):789-793.
  • 2贾晓芸,罗守山,袁超伟.一种新的基于离散对数的签名方案[J].西安电子科技大学学报,2008,35(2):351-355. 被引量:5
  • 3Wu T C,Chou S L,Wu T S.Two-based Multisignature Protocols for Sequential and Broadcasting Architectures[J].Computer Communications,1996,19(9):851-856.
  • 4卢建朱,陈火炎,林飞.ElGamal型多重数字签名算法及其安全性[J].计算机研究与发展,2000,37(11):1335-1339. 被引量:32
  • 5Simmons G J.The ‘Prisioners' Problem and the Subliminal Channel[C] //Advances in Cryptology,Proc.Crypto'83.New York:Springer-Verlag,1984:51-66.
  • 6Simmons G J.Subliminal Channels:Past and Present[J].European Transactions on Telecommunications,1994,4(4):459-473.
  • 7Simmons G J.Subliminal Communication is Easy Using the DSA[C]//Proc of Eurocrypt'93.Heidelberg:Springer-Verlag,1994:218-232.
  • 8Simmons G J.The Subliminal Channel in the U S Digital Signature Algorithm (DSA)[C] //Proceedings of the 3rd Symposiumon State and Progress of Researc in Cryptography-SPRC'93.Rome:[s.n.],1993:35-54.
  • 9Meng Tao,Wang Jianfeng,Sun Shenghe.Cover Communication Based on Subliminal Channel in Broadcast Multi Signature[C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin:IEEE Computer Press,2008:1309-1311.
  • 10张彤,杨波,王育民,李真富.抵御分割选择法的阈下信道及其带宽分析[J].西安电子科技大学学报,2000,27(3):344-347. 被引量:5

二级参考文献28

共引文献47

同被引文献17

  • 1Kinoshita H. An Image Digital Signature System with ZKIP for the Graph Isomorphism Problem [C]//Proceedings of the 3rd IEEE Conference on Image Processing. New York: IEEE, 1996: 247-250.
  • 2Gopalakrishnan K, Memon N, Vora P L. Protocols for Watermark Verification: Multimedia and Security [J]. IEEE Multimedia, 2001, 8(4): 66-70.
  • 3Cox I J, Kilian J, Leighton F T, et al. Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
  • 4Craver S. Zero Knowledge Watermark Detection [C]//Proceedings of the 3rd International Workshop on Information Hiding—Lecture Notes in Computer Science: 1768. Berlin: Springer-Verlag, 2000: 101-116.
  • 5Adelsbach A, Sadeghi A R. Zero Knowledge Watermark Detection and Proof of Ownership [C]//Proceedings of the 4th International Workshop on Information Hiding—Lecture Notes in Computer Science: 2137. Berlin: Springer-Verlag, 2001: 273-287.
  • 6Adelsbach A, Katzenbeisser S, Sadeghi A R. Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure [C]//Proceedings of 11th European Signal Processing Conference. Piscataway: IEEE, 2002: 446-449.
  • 7Shi Y Q, Sutthiwan P, Chen L. Textural Features for Steganalysis[C]//Proceedings of the 14th Intemational Workshop on Information Hiding—Lecture Notes in Computer Science: 7692. Berlin: Springer-Verlag, 2013: 63-77.
  • 8Feng B, Wang Z H, Wang D, et al. A Novel, Reversible, Chinese Text Information Hiding Scheme Based on Lookalike Traditional and Simplified Chinese Characters[J]. KSII Transactions on Internet and Information Systems (TIIS), 2014, 8(1): 269-281.
  • 9Wang X T, Chang C C, Nguyen T S, et al. Reversible Data Hiding for High Quality Images Exploiting Interpolation and Direction Order Mechanism[J]. Digital Signal Processing, 2013, 23(2): 569-577.
  • 10Srinivasan A, Kolli S, Wu J. Steganographic Information Hiding That Exploits a Novel File System Vulnerability[J]. International Journal of Security and Networks, 2013, 8(2): 82-93.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部