期刊文献+

数字签名中的阈下信道封闭协议研究 被引量:5

Research on the protocol of the subliminal-free channelin digital signatures
下载PDF
导出
摘要 对G.J.Simmons的阈下信道封闭协议进行了研究,发现了该协议中存在的缺陷,并给出了基于该协议构造的两个窄带阈下信道,一个是基于无害消息的构造,另一个是Y.Desmedt基于ElGamal签名(r,s)中因子r的构造.经深入讨论表明,不可能完全封闭数字签名中的阈下信道.文中同时讨论了阈下信道的最低传输效率问题. Some defects of G.J.Simmons' subliminal-free protocol are discovered during our study. In this paper two narrow-band subliminal channels are given based on the protocol. One is the channel we have constructed based on harmless messages, and the other is the channel constructed by Y.Desmedt based on the component r of ElGamal signature (r, s). Then a sound discussion shows that it is impossible to construct a complete subliminal-free channel in digital signatures. At the same time the lowest transmission efficiency is discussed.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期87-90,共4页 Journal of Xidian University
基金 国家自然科学基金重大项目资助(90104005) 国家973项目资助(G1999035804)
关键词 信息隐藏 数字签名 阀下信道封闭协议 传输效率 information hiding digital signature subliminal channel subliminal-free protocol
  • 相关文献

参考文献10

  • 1张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 2张彰,王培春,肖国镇.基于离散对数的有向签名方案及其应用[J].西安电子科技大学学报,2002,29(4):510-512. 被引量:5
  • 3Simmons G J. The Prisonner's Problem and the Subliminal Channel[A]. Advances in Cryptology: Proceedings of CRYPTO'83[C]. NewYork: Plenum Press, 1984. 51-67.
  • 4Desmedt Y, Yung M. Minimal Cryptosystems and Defining Subliminal-freeness[A]. In Proceedings 1994 IEEE International Symposium on Information Theory[C]. Trondheim:IEEE. 1994. 347.
  • 5Kobara K,Imai H. On the Channel Capacity of Narrow-hand Subliminal Channels[A]. Proc of the Second International Conference on Information and Communication Security[C]. Berlin: Sprlnger-Verlag, 1999. 309-324.
  • 6Simmons G J. An Introduction to the Mathematics of Trust in Security Protocols[ A ]. In Proceedings: Computer Security Foundations Workshop VI[C]. New York: IEEE Computer Society Press, 1993. 121-127.
  • 7Desmedt Y. Abuses in Cryptography and How to Fight Them[A]. Advances in Cryptology-Proc of Crypto'88[C]. Berlin: Springer-Verlag, 1990. 375-389.
  • 8Desmedt Y. Simmons' Protocol is Not Free of Subliminal Channels[ A ]. Proceedings of the 9th IEEE Computer Security Fonndations Worlushop[C]. New York: IEEE Press, 1996. 170-175.
  • 9ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Trans on Information Theory,1985, 31(4) : 469-472.
  • 10Simmons G J. Cryptarutlysis and Protocol Failures[J]. Commun ACM, 1994, 37(11): 56-65.

二级参考文献6

  • 1[1]Simmons G J. Subliminal channels:past and present.European Transactions on Telecommunications,July/August,1994; 4(4):459~473
  • 2[2]Anderson R,et al. The Newton channel.Lecture Notes in Computer Science 1174,Springer-Verlag,1996:151~156
  • 3[3]Simmons G J. Results concerning the bandwidth of subliminal channels.IEEE Journal on Selected Areas in Communications, May 1998;16(4):463~473
  • 4[4]Bleichenbacher Daniel.Generating EIGamal signatures without knowing the secret key.Eurocrypt’96 Proceedings,LNCS 1170, Springer-Verlag,1997:10~18
  • 5[5]Pohlig S C, Hellman M E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transaction on Information Theory,January 1978;24(1):106~110
  • 6伊丽江,肖鸿.一个高效的带有脱线半可信第三方的多方公平交换协议[J].西安电子科技大学学报,2000,27(6):745-748. 被引量:6

共引文献6

同被引文献45

  • 1董庆宽,牛志华,肖国镇.EL Gamal类签名中的阈下信道封闭问题研究[J].计算机学报,2004,27(6):845-848. 被引量:7
  • 2李恕海,王育民.封闭阈下信道的理论模型[J].中山大学学报(自然科学版),2004,43(A02):34-37. 被引量:5
  • 3CAI Qingjun ZHANG Yuli.Subliminal Channels in the NTRU and the Subliminal-Free Methods[J].Wuhan University Journal of Natural Sciences,2006,11(6):1541-1544. 被引量:2
  • 4G J Simmons.The prisoner's channel and the subliminal channel[C].in:Proc.CRYPTO_83,1984,pp.51-67.
  • 5G J Simmons.Subliminal communication is easy using the DSA[C].in:Eurocrypt_93,1994,pp.218-232.
  • 6L Harn,G Gong.Digital signature with a subliminal channel[J].IEE Proc.Comput.Digit.Tech.1997:144(6):387-389.
  • 7J K Jan,Y M Tseng.New digital signature with subliminal channels based on the discretelogarithm problem[J].in:Proceedings of the 1999 International Workshops on Parallel Processing,1999,pp.198-203.
  • 8Anderson R.The Newton channel[A].Lecture Notes in Computer Science 1174[C].Springer-Verlag,1996:151-156.
  • 9Zhang Fang-guo,Lee B,Kim K.Exploring Signature Schemes with Subliminal Channel[A].SCIS 2003,The 2003 Symposium on Cryptography and Information Security vol 1/2[C].Itaya,Japan,2003.pp.245-250.
  • 10Narn-Yih Lee,Shu-Ya Yang.The design of integrating subliminal channel with access control[J].Applied Mathematics and Computation,2005,171(1):573-580.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部