publication . Conference object . 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Zhang, Yinghui; Li, Hui; Li, Xiaoqing; Zhu, Hui;
Open Access English
  • Published: 25 Mar 2013
  • Publisher: Springer
Abstract
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. Hence, the signing rights of the signer is guaranteed. In particular, our scheme can completely close the subliminal channels existing in the random session keys of Schnorr ...
Subjects
free text keywords: Digital signature, [INFO]Computer Science [cs], [ INFO ] Computer Science [cs], [ SHS.INFO ] Humanities and Social Sciences/Library and information sciences, Information hiding, [SHS.INFO]Humanities and Social Sciences/Library and information sciences, Subliminal channel, Subliminal-freeness, Provable security
26 references, page 1 of 2

1. Gustavus J. Simmons. The prisoner' problem and the subliminal channel. In Advances in Cryptology-Crypto 1983, pages 51-67. Plenum Press, 1984.

2. Preeti Gupta. Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research, 3(9):1-4, 2012.

3. George Danezis, Markulf Kohlweiss, and Alfredo Rial. Differentially private billing with rebates. Information Hiding, volume 6958 of Lecture Notes in Computer Science, pages 148-162. Springer Berlin Heidelberg, 2011. [OpenAIRE]

4. William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire, and Todd B. Lewellen. Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4): 4-20, 2012.

5. Byungha Choi and Kyungsan Cho. Detection of insider attacks to the web server. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4): 35-45, 2012.

6. Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn and Kangbin Yim. Extraction of platform-unique information as an identifier. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4): 85-99, 2012.

7. Chin-Ling Chen and Jyun-Jie Liao. A fair online payment system for digital content via subliminal channel. Electronic Commerce Research and Applications, 10(3):279-287, 2011.

8. Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, and Yupu Hu. An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem. In ComputerAided Industrial Design and Conceptual Design, CAIDCD '06, pages 1-5, nov. 2006.

9. K. Kim F. Zhang, B. Lee. Exploring signature schemes with subliminal channel. In Symposium on Cryptography and Information Security'03, pages 245-250, 2003.

10. Tzonelih Hwang Chao-Lin Yang, Chuan-Ming Li. Subliminal channels in the identity-based threshold ring signature. International Journal of Computer Mathematics, 86(5):753-770, 2009.

11. Dai-Rui Lin, Chih-I Wang, Zhi-Kai Zhang, and D.J. Guan. A digital signature with multiple subliminal channels and its applications. Computers & Mathematics with Applications, 60(2):276-284, 2010. Advances in Cryptography, Security and Applications for Future Computer Science.

12. C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B. Preneel. Pripayd: Privacyfriendly pay-as-you-drive insurance. IEEE Transactions on Dependable and Secure Computing, 8(5):742-755, 2011.

13. C.P. Schnorr. Efficient identification and signatures for smart cards. In Gilles Brassard, editor, Advances in Cryptology-CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 239-252. Springer New York, 1990.

14. Y. Desmedt. Simmons' protocol is not free of subliminal channels. In Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996, pages 170-175, 1996.

15. Gustavus J. Simmons. Subliminal communication is easy using the dsa. In Tor Helleseth, editor, Advances in Cryptology-EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 218-232. Springer Berlin Heidelberg, 1994.

26 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Zhang, Yinghui; Li, Hui; Li, Xiaoqing; Zhu, Hui;