期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Subliminal Channels in the NTRU and the Subliminal-Free Methods 被引量:2
1
作者 CAI Qingjun ZHANG Yuli 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1541-1544,共4页
The construetion and destruction of subliminal channel are important problems in the information hiding. The subliminal channel can send secret information without notice. Two subliminal-free methods named weak (str... The construetion and destruction of subliminal channel are important problems in the information hiding. The subliminal channel can send secret information without notice. Two subliminal-free methods named weak (strong) subliminal-free on public-key cryptosystem (PKC) are proposed in this paper using the combinatorial method. The first method can only free the subliminal information with any minor probability and the second can free all. Moreover, the "traitor problem" which is same as the model of the subliminal channel in PKC is given. Two subliminal channels are embedded in N-th degree truncated polynomial ring (NTRU) cryptosystem, and their subliminal-free methods are also be obtained by the action of surveillant. 展开更多
关键词 N-th degree truncated polynomial ring (NTRU) cryptosystem subliminal channel subliminal-free
下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
2
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部