期刊文献+

广播多重签名方案中阈下信道的封闭协议 被引量:1

Free Protocol for Subliminal Channel in Broadcast Multi-signature Scheme
下载PDF
导出
摘要 在ElGamal类广播多重签名方案中,参数的随机性会引入阈下信道,造成安全隐患。针对该问题,设计一个新的交互式阈下信道封闭协议。其中,看守和每个签名者合作生成部分签名,签名中心生成总签名。哈希函数的无碰撞性使看守不能伪造签名,由此保证签名者的签名权力。理论分析证明,与同类协议相比,该协议可以完全封闭阈下信道,且计算复杂度更低,通信效率更高。 In the broadcast multi-signature scheme like ElGamal,the random parameters can introduce the subliminal channels and cause potential safety problems.Aiming at the problem,a new interactive subliminal-free protocol is designed.The warden cooperates with each signer for generating part signature,and signature center generates multi-signature.The collision-free performance of hash function ensures that the warden can not forge the signatures,so the signature authority of the signer is guaranteed.Compared with the similar protocol,theoretical analysis shows that the proposed protocol is closing the subliminal channel completely and lower in computation complexity and higher in communications efficiency.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第22期102-104,共3页 Computer Engineering
关键词 密码学 广播多重签名 阈下信道 封闭协议 信息隐藏 cryptography broadcast multi-signature subliminal channel free protocol information hiding
  • 相关文献

参考文献3

二级参考文献36

  • 1李恕海,王育民.封闭阈下信道的理论模型[J].中山大学学报(自然科学版),2004,43(A02):34-37. 被引量:5
  • 2张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 3杨军,周贤伟,覃伯平.On the Selection of Random Numbers in the ElGamal Algorithm[J].Journal of Electronic Science and Technology of China,2006,4(1):55-58. 被引量:4
  • 4杜海涛,张青坡,钮心忻,杨义先.一个新的离散对数有序多重签名方案[J].计算机工程与应用,2007,43(2):148-150. 被引量:6
  • 5SIMMONS G J. The 'prisoners' problem and the subliminal channel[C]//Advanees in Cryptology, Proc Crypto'83. Berlin: Springer-Verlag, 1984:51-66.
  • 6LI Wei, LI Gang, XIN Xiang-jun. Digital signature scheme with a (t,1) threshold subliminal channel based on RSA signature seheme[C]//Proeeedings 2008 International Conference on Computational Intelligence and Security. Suzhou: IEEE, 2008: 342-346.
  • 7ONG H, SCHNORR C P, SHAMIR A. An efficient signature scheme based on quadratic equations[C]// Proceedings of the 16th Annual ACM Symposium on Theory of Computing. Washington: ACM, 1984: 208-216.
  • 8SIMMONS G J. Thesubliminal channel and digitalsignature [C]//Advances in Cryptograph-Eurocrypt'84. Berlin: Springer-Verlag, 1985: 364-378.
  • 9SIMMONS G J. The subliminal channel in the U. S. digital signature algorithm (DSA)[C]//Proceedings of the 3rd Symposiumon State and Progress of Research in Cryptography-SPRC'93. Rome, Italy: [s.n.], 1993: 35-54.
  • 10KOBARA K, IMAI H. On the channel capacity of narrowband subliminal channels[C]//Proc of the Second International Conference on Information and Communication Security. Berlin: Springer-Verlag, 1999: 309-324.

共引文献4

同被引文献12

  • 1杨建萍,周贤伟,杨军.基于阈下信道技术的身份认证机制研究[J].微电子学与计算机,2004,21(12):195-197. 被引量:4
  • 2粟栗,崔国华,李俊,郑明辉.基于签密的分布式安全门限阈下信道方案[J].小型微型计算机系统,2007,28(12):2153-2157. 被引量:1
  • 3SIMMONS G J. The prisoner's problem and the subliminal channel[C]ffProceedings IEEE Workshop Communica-tions Security CRYPTO. New York: [s. n. ], 1983..51-67.
  • 4SIMMONS G J. The history of subliminal channels[J]. IEEE Journal on Selected Areas in Communication, 1998,16 (4) : 452-462.
  • 5LEE S W, KIM W H, KIM H S, et al. Efficient password-based authenticated key agreement protocolLC ]///Interna- tional Conference on Computer Science and Applications. Perugia.. Springer-Verlag, 2004:617-626.
  • 6KWON J O, SAKURAI K, LEE D H. One-round protocol for two-party verifier-based password-authenticated key exchange[C]//Communications and Multimedia Security. Heraklion. Es. n. ] ,2006: 87-96.
  • 7POINTCHEVAL D. Password-based authenticated key exchange[C]//Proceedings of 15th IACR International Con- ference on Practice and Theory of Public-Key Cryptography. Darmstadt, Springer-Verlag, 2012:390-397.
  • 8FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]//Proceedings of 15th IACR International Conference on Practice and Theory of Public-Key Cryp- tography. Darmstadt. Springer-Verlag, 2012 .. 467-484.
  • 9HUANG Zhen-jie,CHEN Dan,WANG Yu-min. Multi-signature with anonymous threshold subliminal channel for ad-hoc environments[C]//19th International Conference on Advanced Information Networking and Applications. Tamshui, IEEE Press, 2005,67-71.
  • 10谭示崇,张宁,王育民.新的口令认证密钥协商协议[J].电子科技大学学报,2008,37(1):17-19. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部