期刊文献+

NSS中的潜信道及其封闭方法

The subliminal channel in the NSS and the subliminal-free method
在线阅读 下载PDF
导出
摘要 NSS是2001年提出的一个新的签名体制.文章首次给出了封闭潜信道的强和弱方法的定义,强方法可以完全阻止潜信息的发送,而弱方法只能以某个概率防止潜信息的传送.随后在NSS数字签名体制中建立了一个潜信道,并给出了封闭它的弱方法. Two subliminal-free methods named weak (strong) subliminal-free have been proposed in this paper for the first time. The first method can only free the subliminal information on some probability, and the second can free all . Moreover, we have embedded a subliminal channel in NSS system, and also give its subliminalfree method . The NSS is a new digital signature scheme introduced in 2001. The paper is also the first one on the construction of subliminal channel in NSS.
出处 《广州大学学报(自然科学版)》 CAS 2006年第6期23-26,共4页 Journal of Guangzhou University:Natural Science Edition
基金 国家自然科学基金资助项目(64073017) 广州大学博士科研启动基金资助项目(100101)
关键词 NSS 数字签名体制 潜信道 NSS digital signature subliminal channel
作者简介 蔡庆军(1976-),男,博士,主要从事密码理论、信息安全研究.
  • 相关文献

参考文献10

  • 1G J Simmons. The subliminal channel and digital signature. [ C]//Proc. of Eurocrypt '84, LNCS 209. Springer Verlag,1996:364-375.
  • 2Simmons G J. Subliminal communication is easy using the DSA[ C ]//Advances in Cryptograph-Eurocrypt'93. Springer-Verlag, 1994:218-232.
  • 3L Harn, G Gong. Digital signature with a subliminal channel[J]. IEE Proc Comput Digit Tech, 1997,144(6) :387-389.
  • 4张键红,伍前红,王继林,王育民.一种改进的具有潜信道的签名(英文)[J].中国科学院研究生院学报,2004,21(2):259-262. 被引量:3
  • 5冯登国,裴定一.关于SN-S认证系统中潜信道的实现[C]//Advances in Cryptology-Chinacrypt’98.北京:科学出版社,94-97.
  • 6Desmedt Y. Subliminal-free authentication and signature [ C ]//Advances in Cryptology -Eurocrypt ' 88. Berlin : Springer-Verlag, 1988:23-33.
  • 7祁明,毛玲梅.无阈下信道签名方案及其应用[J].计算机应用研究,2002,19(1):53-55. 被引量:4
  • 8董庆宽,张串绒,肖国镇.数字签名中的阈下信道封闭协议研究[J].西安电子科技大学学报,2004,31(1):87-90. 被引量:5
  • 9Y Desmedt. Abuses in cryptography and how to fight them[ C]//Proceedings of Crypto 1988. Santa Barbara, California,1988,403:375-389.
  • 10J Hoffstein, J Pipher, J H Silverman. NSS: An NTRU lattice-based signature scheme[ C] //Advances in Cryptology-Eurocrypt. Innsbrack, Austria, 2001:221-228.

二级参考文献16

  • 1张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 2Simmons G J. The Prisonner's Problem and the Subliminal Channel[A]. Advances in Cryptology: Proceedings of CRYPTO'83[C]. NewYork: Plenum Press, 1984. 51-67.
  • 3Desmedt Y, Yung M. Minimal Cryptosystems and Defining Subliminal-freeness[A]. In Proceedings 1994 IEEE International Symposium on Information Theory[C]. Trondheim:IEEE. 1994. 347.
  • 4Kobara K,Imai H. On the Channel Capacity of Narrow-hand Subliminal Channels[A]. Proc of the Second International Conference on Information and Communication Security[C]. Berlin: Sprlnger-Verlag, 1999. 309-324.
  • 5Simmons G J. An Introduction to the Mathematics of Trust in Security Protocols[ A ]. In Proceedings: Computer Security Foundations Workshop VI[C]. New York: IEEE Computer Society Press, 1993. 121-127.
  • 6Desmedt Y. Abuses in Cryptography and How to Fight Them[A]. Advances in Cryptology-Proc of Crypto'88[C]. Berlin: Springer-Verlag, 1990. 375-389.
  • 7Desmedt Y. Simmons' Protocol is Not Free of Subliminal Channels[ A ]. Proceedings of the 9th IEEE Computer Security Fonndations Worlushop[C]. New York: IEEE Press, 1996. 170-175.
  • 8ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Trans on Information Theory,1985, 31(4) : 469-472.
  • 9Simmons G J. Cryptarutlysis and Protocol Failures[J]. Commun ACM, 1994, 37(11): 56-65.
  • 10L Harn, G Gong. Digital signature with a subliminal channel. IEE Proc. Comput. Digit. Tech., 1997,144(6):387-389

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部