Advertisement

Provably Secure and Subliminal-Free Variant of Schnorr Signature

  • Yinghui Zhang
  • Hui Li
  • Xiaoqing Li
  • Hui Zhu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7804)

Abstract

Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. Hence, the signing rights of the signer is guaranteed. In particular, our scheme can completely close the subliminal channels existing in the random session keys of Schnorr signature scheme under the intractability assumption of the discrete logarithm problem. Also, the proposed scheme is proved to be existentially unforgeable under the computational Diffie-Hellman assumption in the random oracle model.

Keywords

Digital signature Information hiding Subliminal channel Subliminal-freeness Provable security 

References

  1. 1.
    Simmons, G.J.: The prisoner’ problem and the subliminal channel. In: Advances in Cryptology-Crypto 1983, pp. 51–67. Plenum Press (1984)Google Scholar
  2. 2.
    Gupta, P.: Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research 3(9), 1–4 (2012)Google Scholar
  3. 3.
    Danezis, G., Kohlweiss, M., Rial, A.: Differentially Private Billing with Rebates. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148–162. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    Claycomb, W.R., Huth, C.L., Flynn, L., McIntire, D.M., Lewellen, T.B.: Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(4), 4–20 (2012)Google Scholar
  5. 5.
    Choi, B., Cho, K.: Detection of insider attacks to the web server. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(4), 35–45 (2012)MathSciNetGoogle Scholar
  6. 6.
    Lee, K., Lee, K., Byun, J., Lee, S., Ahn, H., Yim, K.: Extraction of platform-unique information as an identifier. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(4), 85–99 (2012)Google Scholar
  7. 7.
    Chen, C.-L., Liao, J.-J.: A fair online payment system for digital content via subliminal channel. Electronic Commerce Research and Applications 10(3), 279–287 (2011)CrossRefGoogle Scholar
  8. 8.
    Zhou, X., Yang, X., Wei, P., Hu, Y.: An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem. In: Computer-Aided Industrial Design and Conceptual Design, CAIDCD 2006, pp. 1–5 (November 2006)Google Scholar
  9. 9.
    Kim, K., Zhang, F., Lee, B.: Exploring signature schemes with subliminal channel. In: Symposium on Cryptography and Information Security 2003, pp. 245–250 (2003)Google Scholar
  10. 10.
    Yang, T.H.C.-L., Li, C.-M.: Subliminal channels in the identity-based threshold ring signature. International Journal of Computer Mathematics 86(5), 753–770 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Lin, D.-R., Wang, C.-I., Zhang, Z.-K., Guan, D.J.: A digital signature with multiple subliminal channels and its applications. Computers & Mathematics with Applications 60(2), 276–284 (2010); Advances in Cryptography, Security and Applications for Future Computer Science.MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B.: Pripayd: Privacy-friendly pay-as-you-drive insurance. IEEE Transactions on Dependable and Secure Computing 8(5), 742–755 (2011)CrossRefGoogle Scholar
  13. 13.
    Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)Google Scholar
  14. 14.
    Desmedt, Y.: Simmons’ protocol is not free of subliminal channels. In: Proceedings of 9th IEEE Computer Security Foundations Workshop, pp. 170–175 (1996)Google Scholar
  15. 15.
    Simmons, G.J.: Subliminal Communication Is Easy Using the DAS. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 218–232. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  16. 16.
    Xiangjun, X., Qingbo, L.: Construction of subliminal channel in id-based signatures. In: WASE International Conference on Information Engineering, ICIE 2009, vol. 2, pp. 159–162 (2009)Google Scholar
  17. 17.
    Xie, Y., Sun, X., Xiang, L., Luo, G.: A security threshold subliminal channel based on elliptic curve cryptosystem. In: Processing of IIHMSP 2008 International Conference on Intelligent Information Hiding and Multimedia Signal 2008, pp. 294–297 (2008)Google Scholar
  18. 18.
    Simmons, G.J.: The subliminal channels of the us digital signature algorithm (DSA). In: Advances in Cryptology-Cryptography, SPRC 1993, pp. 15–16 (1993)Google Scholar
  19. 19.
    Simmons, G.J.: An introduction to the mathematics of trust in security protocols. In: Proceedings of Computer Security Foundations Workshop VI, 1993, pp. 121–127 (June 1993)Google Scholar
  20. 20.
    Simmons, G.J.: Results concerning the bandwidth of subliminal channels. IEEE Journal on Selected Areas in Communications 16(4), 463–473 (1998)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Qingjun, C., Yuli, Z.: Subliminal channels in the NTRU and the subliminal-free methods. Wuhan University Journal of Natural Sciences 11, 1541–1544 (2006)CrossRefzbMATHGoogle Scholar
  22. 22.
    Sun, Y., Xu, C., Yu, Y., Yang, B.: Improvement of a proxy multi-signature scheme without random oracles. Computer Communications 34(3), 257–263 (2011); Special Issue of Computer Communications on Information and Future Communication Security.CrossRefGoogle Scholar
  23. 23.
    Jadhav, M.V.: Effective detection mechanism for TCP based hybrid covert channels in secure communication. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT, pp. 1123–1128 (2011)Google Scholar
  24. 24.
    Yanai, N., Tso, R., Mambo, M., Okamoto, E.: A certificateless ordered sequential aggregate signature scheme secure against super adverssaries. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(1), 30–54 (2012)Google Scholar
  25. 25.
    Simmons, G.J.: Subliminal channels: past and present. European Transactions on Telecommunications 5(4), 459–474 (1994)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Yinghui Zhang
    • 1
  • Hui Li
    • 1
  • Xiaoqing Li
    • 1
  • Hui Zhu
    • 1
    • 2
  1. 1.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anP.R. China
  2. 2.Network and Data Security Key Laboratory of Sichuan ProvinceXidian UniversityChengduP.R. China

Personalised recommendations