Exploring Subliminal Channels in Pairing-Based Signatures
نویسنده
چکیده
The prisoners’ problem, introduced by Simmons in 1983, describes how two individuals attempt to communicate covertly by exploiting subliminal channels without alerting a ”warden” who controls the communication. Via subliminal channels it is possible to transmit covert messages by embedding them into cryptographic digital data (traditionally by exploiting randomness that is used in probabilistic signature schemes). In this paper, we propose a formal framework to analyze the so called subliminal-freeness requirement. We explore some well known pairing-based probabilistic digital signatures and check their subliminal freeness in our proposed framework.
منابع مشابه
A Subliminal Channel in EdDSA:
Subliminal channels in digital signatures provide a very effective method to clandestinely leak information from inside a system to a third party outside. Information can be hidden in signature parameters in a way that both, network operators and legitimate receivers, would not notice any suspicious traces. Subliminal channels have previously been discovered in other signatures, such as ElGamal...
متن کاملThe History of Subliminal Channels
In 1978 the United States was considering adopting a national security protocol designed to enable the U.S.S.R. to verify how many Minuteman missiles the United States had emplaced in a field of 1000 silos without revealing which silos actually contained missiles. For this protocol to have been acceptable to the U.S.S.R., the messages would have had to be digitally signed with signatures which ...
متن کاملOn the Channel Capacity of Narrow-Band Subliminal Channels
Subliminal channels, discovered by Simmons, yield a possibility to transmit covert messages by embedding them in cryptographic digital data, such as (EC)DSA signatures. The embedded messages are used for transmitting important information, or as watermarks or imprints of the data. Anyone can use or abuse these channels very easily because most cryptographic digital data widely used in the Inter...
متن کاملExploring Signature Schemes with Subliminal Channel
The subliminal channel in a cryptographic protocol such as an authentication system or a signature scheme provides an additional channel from the sender to an authorized receiver and can’t be read by any unauthorized receiver. In this paper, we firstly show that Hess’s ID-Based signature scheme in SAC’02 can provide digital signature with the broadband and narrowband subliminal channels. Second...
متن کاملExploring Gene Signatures in Different Molecular Subtypes of Gastric Cancer (MSS/ TP53+, MSS/TP53-): A Network-based and Machine Learning Approach
Gastric cancer (GC) is one of the leading causes of cancer mortality, worldwide. Molecular understanding of GC’s different subtypes is still dismal and it is necessary to develop new subtype-specific diagnostic and therapeutic approaches. Therefore developing comprehensive research in this area is demanding to have a deeper insight into molecular processes, underlying these subtypes. In this st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009