An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem

Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yu-pu Hu
{"title":"An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem","authors":"Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yu-pu Hu","doi":"10.1109/CAIDCD.2006.329336","DOIUrl":null,"url":null,"abstract":"Analyses were made on the security threats of present subliminal channel schemes, and an anonymous subliminal channel scheme based on (t, n) threshold cryptosystem was presented. The threshold secret sharing of the scheme enables the subliminal message to be recoverable only by no less than t members of the n receivers. The identity blindness algorithm makes the subliminal message sender indistinguishable with other signers for secrecy protection, and the anonymity can also be revoked conveniently if necessary. The scheme avoids the misuse of subliminal message producing and recovering, prevents coalition attack and generalized signature forgery. Further detailed analyses also justify its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application","PeriodicalId":272580,"journal":{"name":"2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIDCD.2006.329336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Analyses were made on the security threats of present subliminal channel schemes, and an anonymous subliminal channel scheme based on (t, n) threshold cryptosystem was presented. The threshold secret sharing of the scheme enables the subliminal message to be recoverable only by no less than t members of the n receivers. The identity blindness algorithm makes the subliminal message sender indistinguishable with other signers for secrecy protection, and the anonymity can also be revoked conveniently if necessary. The scheme avoids the misuse of subliminal message producing and recovering, prevents coalition attack and generalized signature forgery. Further detailed analyses also justify its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application
一种基于椭圆曲线密码体制的匿名阈值阈下信道方案
分析了现有阈下信道方案的安全威胁,提出了一种基于(t, n)阈值密码体制的匿名阈下信道方案。该方案的阈值秘密共享使潜意识消息只能被n个接收者中的不少于t个成员恢复。身份盲算法使潜意识消息发送者与其他签名者无法区分,以保护其机密性,并且可以在必要时方便地撤销匿名性。该方案避免了潜意识信息生成和恢复的滥用,防止了联合攻击和广义签名伪造。进一步的详细分析也证明了它的简洁性、安全性、高效性,并因此在软件和硬件应用方面对系统开销有了相当大的改进
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信