| 研究生: |
洪嘉駿 Hung, Jia-Jung |
|---|---|
| 論文名稱: |
環簽章潛隱通道之設計 Subliminal Channels in the Ring Signature |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 中文 |
| 論文頁數: | 56 |
| 中文關鍵詞: | 潛隱通道 、環簽章 |
| 外文關鍵詞: | ring signature, subliminal channel |
| 相關次數: | 點閱:88 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在這個資訊爆炸的時代,人們使用電腦已經成為生活中不可或缺的一部分,許多以往需要當面完成的動作,如今都只要在電腦前面便可以完成。也由於電腦和網路所帶來的便利性,使得許多原本現實生活中需要當面完成的識別動作,在網路上實行起來就格外的重要。而可以輕易達成確認雙方身份的數位簽章也就因應而生。
然而,現今在網路世界中潛藏著許多的危機,使得人們在網路上交換訊息或資料的時候格外地注重隱秘性,在一般的情況下,可用加密演算法來達成,但是有的時候需要秘密地把某些重要的資料透過一個安全的管道傳送出去;近年來有許多學者提出了將秘密資訊隱藏在數位簽章中,這樣的簽章就外表而言和一般的數位簽章相同,但對於某些知情的人而言,卻可以得到藏在數位簽章內的秘密資訊,也可同時達成身份確認的動作,這種秘密資訊傳遞的方式即稱為潛隱通道(Subliminal Channel)。在本篇論文中,我們將探討在環簽章中這類的做法,並提出二個新的做法,並以數學的方法來証明其不可分辨性(Indistinguishableness)。
none
[1] G.J. Simmons, “A secure subliminal channel”, in Advances in Cryptology, Proceedings CRYPTO’85 LNCS 218, Springer-Verlag, pp. 33-41, 1985.
[2] L. Harn and G. Gong, “Digital Signature with a Subliminal Channel”, IEE Proceedings Computer Digital Technology, Vol. 144, No.6, pp. 387-389, 1997.
[3] J.K. Jan and Y.M. Tseng, “New Digital Signature with Subliminal Channel Based on the Discrete Logarithm Problem”, Proceedings of the 1999 International Workshops on Parallel Processing, pp. 198-203, 1999.
[4] N.Y. Lee and D.R. Lin, “Robust Digital Signature Scheme with Subliminal Channels”, IEICE Transaction Fundamentals, Vol. E86-A, No. 1, pp. 187-188, 2003.
[5] N.Y. Lee and Pei-Hsiu Ho, “Convertible undeniable signature with subliminal channels”, Applied mathematics and computation, Vol. 158, No. 1, pp. 169-175, 2004.
[6] M. Michels, H. Petersen and P. Horster, “Breaking and Repairing a Convertible Undeniable Signature Scheme”, ACM, pp. 148-152, 1996.
[7] J. Boyar, D. Chaum, I. Damgard and T Pedersen, “Convertible undeniable signatures”, in: Advances in Cryptology, Proceedings of CRYPTO’90, Lecture Notes in Computer Science, pp. 189-205, 1991.
[8] G.J. Simons, “Subliminal communication is easy using the DSA”, in: EUROCRYPT’93, pp. 218-232, 1994.
[9] H. Kuwakado and H. Tanaka, “New subliminal channel embedded in the ESIGN”, IEICE Transaction Fundamentals E82-A(10), pp. 2167-2171, 1999.
[10] W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transaction on Information Theory, Vol.IT-22, No. 6, pp. 644-654, 1976.
[11] R. Rivest, A. Shamir and L. Adleman, “A Method for Sbtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[12] T ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Transaction on Information Theory, Vol.IT-31, No. 4, pp. 469-472, 1985.
[13] C.P. Schnorr, “Efficient Signature Generation by Smart Cards”, Journal of Cryptology, Vol. 4, pp. 161-174, 1991.
[14] R.L. Rivest, A. Shamir and Y. Tauman, “How to leak a secret”, Advances in Cryptology-ASIACRYPT’01, LNCS 2248, Springer-Verlag, pp. 552-565, 2001.
[15] Javier Herranz and German Saez, “Forking Lemmas for ring signature schemes”, Progress in Cryptology - INDOCRYPT 2003: 4th International Conference on Cryptology, December 8-10, pp. 266-279, 2003.
[16] F. Zhang and K. Kim “ID-based blind signature and ring signature form pairings”, Advances in Cryptology-ASIACRYPT’02, LNCS 2501, Springer-Verlag, pp. 533-547, 2002.
[17] Javier Herranz and German Saez, “New id-based ring signature schemes”, proceedings in Information and Communications Security, 6th International Conference, ICICS 2004, Vol. 3269 of Lecture Notes in Computer Science, pp. 27-39, Springer-Verlag, October 27-29, 2004.
[18] Chih-Yin Lin and Tzong-Chen Wu, “An id-based ring signature scheme from bilinear pairings”, Cryptology ePrint Archive, Report 2003/117, 2003.
[19] Chunming Tang, Zhuojun Liu and Mingsheng Wang, “An improved identity-based ring signature scheme from bilinear pairings”, MM Research Preprints, MMRC, AMSS, No. 22, pp. 231-234, 2003.
[20] G. J. Simmons, “Subliminal communication is easy using the DSA”, in Proc. EUROCRYPT’93, pp. 218-232, 1994.
[21] Chia F. Chang, “Public-key based subliminal and subliminal-free channel”, master thesis of Computer Science and Information Engineering in National Cheng Kung University, 2004.