Skip to main content
Log in

Threshold subliminal channel based on designated verifier signature

  • Trusted Software
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The subliminal channel is used to send a secret message to an authorized receiver; the message cannot be discovered by any unauthorized receivers. Designated verifier signature(DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation oft or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Simmons G J. The Prisoner's Channel and the Subliminal Channel[C]//Proceedings of CRYPYO'83. Berlin: Springer-Verlag, 1983:51–67.

    Google Scholar 

  2. Lee N Y, Ho P H. Digital Signature with a Threshold Subliminal Channel[J].IEEE Transactions on Consumer Electronics, 2003,49(4):1240–1242.

    Article  Google Scholar 

  3. Lee N Y, Lin D R. Robust Digital Signature Scheme with Subliminal Channels[J].IEICE Transaction Fundamentals, 2003,E86-A(1):187–188.

    Google Scholar 

  4. Simmons G J. Subliminal Communication is Easy Using the DSA[C]//Proceeding of Eurocrypt'93. Berlin: Springer-Verlag, 1994:218–232.

    Google Scholar 

  5. Harn L, Gong G. Digital Signature with a Subliminal Channel[C]//IEE Proceedings of Computers and Digital Techniques. Rome: IEEE Press, 1997:387–389.

    Google Scholar 

  6. Jan J K, Tseng Y M. New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem[C]//Proceedings of the 1999International Workshops on Parallel Processing. Wakamatsu: IEEE Press, 1999:198–203.

    Google Scholar 

  7. Huang Z J, Chen D, Wang Y M. Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environment[C]//Proceedings of the 19th international conference on advanced in formation networking and applications. Taipei: IEEE Press, 2005:67–71.

    Google Scholar 

  8. Jakobsson M, Sako K, Impagliazzo R. Designated Verifier Proofs and Their Applications[C]//Proceedings of Eurocrypt'96. Berlin: Springer-Verlag, 1996:143–154.

    Google Scholar 

  9. Jakobsson M, Sako K, Impagliazzo R. Designated Verifier Proofs and their Applications[C].Proccess of Eurocrypt'96. Berlin: Springer-Verlag, 1996:142–154.

    Google Scholar 

  10. Laguillaumie F, Vergnaud D. Efficient and Provably Secure Designated Verifier Signature Schemes from Bilinear Maps [C]//Proccess of Crypto'03rump session. Berlin: Springer-Verlag, 2003:16–25.

    Google Scholar 

  11. Laguillaumie F, Vergnaud D. Designated Verifier Signatures Anonymity and Efficient Construction from any Bilinear Map [C]//4th International Conference on Security in Communication Networks, Berlin: Springer-Verlag, 2003:105–109.

    Google Scholar 

  12. Cao Z F, Li J G, Li J Z. A New (t,n) Threshold Signature Encryption Scheme with the Specified Receiver [J].Journal of china institute of communications, 2003,24(3):8–13(Ch).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cui Guohua.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60403027)

Biography: SU Li(1981-), male, Ph. D. candidate, research direction: network security and digital signature.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, S., Guohua, C., Muxiang, Y. et al. Threshold subliminal channel based on designated verifier signature. Wuhan Univ. J. Nat. Sci. 11, 1485–1488 (2006). https://doi.org/10.1007/BF02831803

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831803

Key words

CLC number

Navigation