Abstract
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot be discovered by any unauthorized receivers. Designated verifier signature(DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation oft or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.
Similar content being viewed by others
References
Simmons G J. The Prisoner's Channel and the Subliminal Channel[C]//Proceedings of CRYPYO'83. Berlin: Springer-Verlag, 1983:51–67.
Lee N Y, Ho P H. Digital Signature with a Threshold Subliminal Channel[J].IEEE Transactions on Consumer Electronics, 2003,49(4):1240–1242.
Lee N Y, Lin D R. Robust Digital Signature Scheme with Subliminal Channels[J].IEICE Transaction Fundamentals, 2003,E86-A(1):187–188.
Simmons G J. Subliminal Communication is Easy Using the DSA[C]//Proceeding of Eurocrypt'93. Berlin: Springer-Verlag, 1994:218–232.
Harn L, Gong G. Digital Signature with a Subliminal Channel[C]//IEE Proceedings of Computers and Digital Techniques. Rome: IEEE Press, 1997:387–389.
Jan J K, Tseng Y M. New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem[C]//Proceedings of the 1999International Workshops on Parallel Processing. Wakamatsu: IEEE Press, 1999:198–203.
Huang Z J, Chen D, Wang Y M. Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environment[C]//Proceedings of the 19th international conference on advanced in formation networking and applications. Taipei: IEEE Press, 2005:67–71.
Jakobsson M, Sako K, Impagliazzo R. Designated Verifier Proofs and Their Applications[C]//Proceedings of Eurocrypt'96. Berlin: Springer-Verlag, 1996:143–154.
Jakobsson M, Sako K, Impagliazzo R. Designated Verifier Proofs and their Applications[C].Proccess of Eurocrypt'96. Berlin: Springer-Verlag, 1996:142–154.
Laguillaumie F, Vergnaud D. Efficient and Provably Secure Designated Verifier Signature Schemes from Bilinear Maps [C]//Proccess of Crypto'03rump session. Berlin: Springer-Verlag, 2003:16–25.
Laguillaumie F, Vergnaud D. Designated Verifier Signatures Anonymity and Efficient Construction from any Bilinear Map [C]//4th International Conference on Security in Communication Networks, Berlin: Springer-Verlag, 2003:105–109.
Cao Z F, Li J G, Li J Z. A New (t,n) Threshold Signature Encryption Scheme with the Specified Receiver [J].Journal of china institute of communications, 2003,24(3):8–13(Ch).
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60403027)
Biography: SU Li(1981-), male, Ph. D. candidate, research direction: network security and digital signature.
Rights and permissions
About this article
Cite this article
Li, S., Guohua, C., Muxiang, Y. et al. Threshold subliminal channel based on designated verifier signature. Wuhan Univ. J. Nat. Sci. 11, 1485–1488 (2006). https://doi.org/10.1007/BF02831803
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831803