95
Views
5
CrossRef citations to date
0
Altmetric
Section A

Subliminal channels in the identity-based threshold ring signature

, &
Pages 753-770 | Received 14 Aug 2006, Accepted 02 Sep 2007, Published online: 23 Apr 2009

References

  • Barua , R. , Dutta , R. and Sarkar , P. 2003 . Extending Joux's protocol to multi party key agreement . Indocrypt 2003 , : 205 – 217 . LNCS 2904
  • Boneh , D. and Boyen , X. 2004 . Efficient selective-ID identity based encryption without random oracles . Advances in Cryptology – Eurocrypt'04 , : 223 – 238 . LNCS 3027
  • Boneh , D. and Franklin , M. 2001 . Identity-based encryption from the weil pairing . Advance in Cryptology-Crypto’01 , : 213 – 229 . LNCS 2139
  • Bresson , E. , Stern , J. and Szydlo , M. 2002 . Threshold ring signatures and applications to ad-hoc groups . Advance in Cryptology-Crypto’02 , : 465 – 480 . LNCS 2442
  • Chang , C. F. , Hwang , T. and Li , C. M. 2004 . “ Asymmetric subliminal channel signature scheme ” . NCKU . Master thesis
  • Canetti , R. , Halevi , S. and Katz , J. 2003 . A forward-secure public-key encryption scheme . Advances in Cryptology – Eurocrypt'03 , : 255 – 271 . LNCS 2656
  • Chow , S. S.M. , Hui , L. C.K. and Yiu , S. M. 2004 . Identity based threshold ring signature . International Conference on Information Security and Cryptology – ICISC 2004 . 2004 . pp. 218 – 232 . LNCS 3506
  • Chow , S. S.M. , Yiu , S. M. and Hui , L. C.K. 2005 . Efficient identity based ring signature . 3rd International Conference – ACNS 05 . 2005 . Applied Cryptography and Network Security , pp. 499 – 512 . Springer . LNCS 3531
  • Chow , S. S.M. , Lui , R. W.C. , Hui , L. C.K. and Yiu , S. M. 2005 . Identity based ring signature: why, how and what next . EuroPKI 2005 , : 144 – 161 . LNCS 3545
  • Chow , S. S.M. , Susilo , W. and Yuen , T. H. 2006 . Escrowed linkability of ring signatures and its applications . Vietcrypt 2006, LNCS 4341 , : 175 – 192 .
  • Harn , L. and Gong , G. 1997 . Digital signature with a subliminal channel . IEE Proc. Comput. Digit. Tech. , 144 : 387 – 389 .
  • Huang , Z. , Chen , D. and Wang , Y. 2005 . Multi-signature with anonymous threshold subliminal channel for ad-hoc environments . 19th International Conference on Advanced Information Networking and Applications . 2005 . Vol. 1 , pp. 67 – 71 .
  • Herranz , J. and Saez , G. 2003 . Forking lemmas for ring signature schemes . 4th International Conference on Cryptology . 2003 . Advances in Indocrypt'03 , pp. 266 – 279 .
  • Jan , J. K. and Tseng , Y. M. 1999 . New digital signature with subliminal channel based on the discrete logarithm problem . Proceedings of the 1999 International Workshops on Parallel Processing . 1999 . pp. 198 – 203 .
  • Kipper , G. 2003 . Investigator's Guide to Steganography , CRC Press .
  • Lee , N. Y. 2003 . Digital signature with a threshold subliminal channel . IEEE Trans. Consum. Electron. , 49 : 1240 – 1242 .
  • Lee , N. Y. and Lin , D. R. 2003 . Robust digital signature scheme with subliminal channels . IEICE Trans. Fundam. , E86-A : 187 – 188 .
  • Lee , N. Y. and Yang , S. Y. 2005 . The design of integrating subliminal channel with access control . Appl. Math. Comput. , 171 : 573 – 580 .
  • Li , C. M. , Hung , C. C. and Hwang , T. 2005 . “ Multiple subliminal channels in the ring signature ” . NCKU . Master thesis
  • Rivest , R. , Shamir , A. and Tauman , Y. 2001 . “ How to leak a secret ” . In Advances in Cryptology-Asiacrypt 2001 Edited by: Boyd , C. 552 – 562 . LNCS 2248
  • Shoup , V. 2005 . Sequences of games: a tool for taming complexity in security proofs . Available at www.shoup.net
  • Simmons , G. J. 1984 . The prisoner's problem and the subliminal channel . Advance in Cryptology-CRYPTO'83 , : 51 – 67 .
  • Simmons , G. J. 1994 . Subliminal communication is easy using the DSA . Advance in Cryptology-Eurocrypt' , 93 : 218 – 232 .
  • Wu , C. 2005 . Hash channels . Comput. Secur. , 24 : 653 – 661 .
  • Zahng , J. , Zou , J. and Wang , Y. 2005 . A group-oriented anonymous signature scheme with subliminal channel . Processings of IEEE Networking, Sensing and Control , : 49 – 53 .
  • Zhang , F. , Lee , B. and Kim , K. Exploring signature schemes with subliminal channel . Proceedings of SCIS2003 . Vol. 1/2 , pp. 245 – 250 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.