The subliminal channel and digital signatures
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Subliminal-free authentication and signature
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Subliminal communication is easy using the DSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password authentication with insecure communication
Communications of the ACM
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Self-synchronized message randomization methods for subliminal channels
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
On the Channel Capacity of Narrow-Band Subliminal Channels
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On the Efficiency of One-Time Digital Signatures
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem
ICPP '99 Proceedings of the 1999 International Workshops on Parallel Processing
A one-time signature using run-length encoding
Information Processing Letters
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics
Construction of Subliminal Channel in ID-Based Signatures
ICIE '09 Proceedings of the 2009 WASE International Conference on Information Engineering - Volume 02
A traceable E-cash transfer system against blackmail via subliminal channel
Electronic Commerce Research and Applications
Error-correcting codes for authentication and subliminal channels
IEEE Transactions on Information Theory
Digital signature with a threshold subliminal channel
IEEE Transactions on Consumer Electronics
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
Information Sciences: an International Journal
Provably secure and subliminal-free variant of schnorr signature
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Hi-index | 0.09 |
In this paper, we present two schemes for embedding multiple subliminal messages into one-time signature schemes (OTSSs) proposed by Lamport (1971, 1981) [35,36]. Our schemes have the advantage that the subliminal receivers cannot forge a valid signature since they do not share the signer's secret key. Our schemes can also provide more than one independent subliminal message, and the numbers of subliminal messages and receivers are larger than that of the subliminal messages in previous schemes.