Subliminal communication is easy using the DSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem
ICPP '99 Proceedings of the 1999 International Workshops on Parallel Processing
Investigator's Guide to Steganography
Investigator's Guide to Steganography
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
A Forward-Secure Public-Key Encryption Scheme
Journal of Cryptology
Escrowed linkability of ring signatures and its applications
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Digital signature with a threshold subliminal channel
IEEE Transactions on Consumer Electronics
A digital signature with multiple subliminal channels and its applications
Computers & Mathematics with Applications
Provably secure and subliminal-free variant of schnorr signature
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Hi-index | 0.00 |
Subliminal signature schemes enable senders to hide subliminal messages in a digital signature such that no one besides the authorised subliminal message receiver (called designated receiver) can extract subliminal messages from that signature. This paper is the first to construct subliminal channels on the identity-based threshold ring signature scheme. Two types of subliminal channels are proposed. The first is the unknown-sender subliminal channel, wherein the sender is anonymously sending the subliminal message through an identity-based threshold ring signature. Although the designated receiver can extract the subliminal message and confirm that it is from the known ring of signers, he/she cannot identify the real sender. The other proposed subliminal channel is the known-sender subliminal channel in which the designated receiver can identify the actual sender. Furthermore, the proposed unknown-sender subliminal channel can be extended to permit the sender to send multiple subliminal messages to multiple designated receivers via a single threshold ring signature.