An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem

Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yu-pu Hu
{"title":"An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem","authors":"Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yu-pu Hu","doi":"10.1109/CAIDCD.2006.329336","DOIUrl":null,"url":null,"abstract":"Analyses were made on the security threats of present subliminal channel schemes, and an anonymous subliminal channel scheme based on (t, n) threshold cryptosystem was presented. The threshold secret sharing of the scheme enables the subliminal message to be recoverable only by no less than t members of the n receivers. The identity blindness algorithm makes the subliminal message sender indistinguishable with other signers for secrecy protection, and the anonymity can also be revoked conveniently if necessary. The scheme avoids the misuse of subliminal message producing and recovering, prevents coalition attack and generalized signature forgery. Further detailed analyses also justify its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application","PeriodicalId":272580,"journal":{"name":"2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIDCD.2006.329336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Analyses were made on the security threats of present subliminal channel schemes, and an anonymous subliminal channel scheme based on (t, n) threshold cryptosystem was presented. The threshold secret sharing of the scheme enables the subliminal message to be recoverable only by no less than t members of the n receivers. The identity blindness algorithm makes the subliminal message sender indistinguishable with other signers for secrecy protection, and the anonymity can also be revoked conveniently if necessary. The scheme avoids the misuse of subliminal message producing and recovering, prevents coalition attack and generalized signature forgery. Further detailed analyses also justify its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于椭圆曲线密码体制的匿名阈值阈下信道方案
分析了现有阈下信道方案的安全威胁,提出了一种基于(t, n)阈值密码体制的匿名阈下信道方案。该方案的阈值秘密共享使潜意识消息只能被n个接收者中的不少于t个成员恢复。身份盲算法使潜意识消息发送者与其他签名者无法区分,以保护其机密性,并且可以在必要时方便地撤销匿名性。该方案避免了潜意识信息生成和恢复的滥用,防止了联合攻击和广义签名伪造。进一步的详细分析也证明了它的简洁性、安全性、高效性,并因此在软件和硬件应用方面对系统开销有了相当大的改进
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Creational design for traditional culture vision Researching identity language of product family Product conceptual design and innovation engineering research present situation and development direction An online sketching and gesture editing system for conceptual design Distributed web geographic information system application based on component
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1