[1] Harn L, Ren Jian, Lin Changlu. Design of DL-Based Certificateless Digital Signatures [J]. The Journal of Systems and Software, 2009(82): 789-793.
[2] 贾晓芸, 罗守山, 袁超伟. 一种新的基于离散对数的签名方案[J]. 西安电子科技大学学报, 2008, 35(2): 351-355.
Jia Xiaoyun, Luo Shoushan, Yuan Chaowei. New Digital Signature Scheme Base on the Discrete Logarithm [J]. Journal of Xidian University, 2008, 35(2): 351-355.
[3] Wu T C, Chou S L, Wu T S. Two-based Multisignature Protocols for Sequential and Broadcasting Architectures [J]. Computer Communications, 1996, 19(9): 851-856.
[4] 卢建朱, 陈火炎, 林飞. ElGamal型多重数字签名算法及其安全性[J]. 计算机研究与发展, 2000, 37(11): 1335-1339.
Lu Jianzhu, Chen Huoyan, Lin Fei. ElGamal Type Digital Multisignature Schemes and Its Security [J]. Journal of Computer Research and Development, 2000, 37(11): 1335-1339.
[5] Simmons G J. The ‘Prisioners’ Problem and the Subliminal Channel [C]//Advances in Cryptology, Proc. Crypto'83. New York: Springer-Verlag, 1984: 51-66.
[6] Simmons G J. Subliminal Channels: Past and Present [J]. European Transactions on Telecommunications, 1994, 4(4): 459-473.
[7] Simmons G J. Subliminal Communication is Easy Using the DSA [C]//Proc of Eurocrypt'93. Heidelberg: Springer-Verlag, 1994: 218-232.
[8] Simmons G J. The Subliminal Channel in the U S Digital Signature Algorithm (DSA) [C]//Proceedings of the 3rd Symposiumon State and Progress of Research in Cryptography-SPRC'93. Rome: [s.n.], 1993: 35-54.
[9] Meng Tao, Wang Jianfeng, Sun Shenghe. Cover Communication Based on Subliminal Channel in Broadcast Multi Signature [C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Harbin: IEEE Computer Press, 2008: 1309-1311.
[10] 张彤, 杨波, 王育民, 等. 抵御分割选择法的阈下信道及其带宽分析[J]. 西安电子科技大学学报, 2000, 27(3): 344-347.
Zhang Tong, Yang Bo, Wang Yumin, et al. Subliminal Channel that Defeats the Cut-and-Choose Method and the Analysis of Its Bandwidth [J]. Journal of Xidian University, 2000, 27(3): 344-347.
[11] Xie Y H, Sun X M, Xiang LY, et al. A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem [C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Harbin: IEEE Computer Press, 2008: 294-297.
[12] Simmons G J. An Introduction to the Mathematics of Trust in Security Protocols [C]//Proceedings of Computer Security Foundations Workshop. Franconia: IEEE Computer Society Press, 1993: 121-127.
[13] 董庆宽, 牛志华, 肖国镇. ELGamal类签名中的阈下信道封闭问题研究[J]. 计算机学报, 2004, 27(6): 845-848.
Dong Qingkuan, Niu Zhihua, Xiao Guozhen. Research on the Freeness of Subliminal Channels in ElGamal-Type Signatures [J]. Chinese Journal of Computers, 2004, 27(6): 845-848.
[14] 孟涛, 王建峰, 孙圣和. 有序多重签名体制中阈下信道通信方法的研究[J]. 电子学报, 2007, 35(6A): 112-114.
Meng Tao, Wang Jianfeng, Sun Shenghe. Covert Communication Based on Subliminal Channel in Ordinal Digital Multi-signature [J]. Acta Electronica Sinica, 2007, 35(6A): 112-114. |