Subliminal Channels in Discrete Logarithm Based Signature Schemes and How to Avoid Them Subliminal Channels in Discrete Logarithm Based Signature Schemes and How to Avoid Them

نویسندگان

  • Patrick Horster
  • Markus Michels
  • Holger Petersen
چکیده

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by reprints or legally obtained copies of the article. Abstract A great disadvantage of the ElGamal and the DSA signature scheme is the existence of various subliminal channels as shown previously by Simmons. We demonstrate that these channels also exist in the Meta-ElGamal and Meta-Message recovery schemes, suggest further narrowband subliminal channels and give a solution how to avoid these subliminal channels assuming that the special receiver can't eavesdrop the channel used by the signer and the warden to generate the signature. Without this assumption we show how to avoid broadband subliminal channels in a reenement of the scheme presented before.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital signature with a subliminal channel - Computers and Digital Techniques, IEE Proceedings-

A subliminal channel is a covert communication chsnnel to send a message to an authorised receiver; this message cannot be discovered by any unauthorised receiver. There are some applications that can take advantage of this by hiding secr1:t messages in this subliminal channel. For example, a credit card provider can hide the card holder’s credit history and credit limit in a digital signature ...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Elliptic Curve Digital Signatures and Accessories

Digital signatures have been used in Internet applications to provide data authentication and non-repudiation services. Digital signatures will keep on playing an important role in future Internet applications. There are two most well-known public-key cryptosystems, the RSA scheme and the ElGamal scheme, which can provide both digital signature and data encryption. More recently, the...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994