[1] |
SIMMONS G J. The Prisoners’ Problem and the Subliminal Channel [C]//Proceedings of the CRYPTO’83. Heidelberg: Springer, 1984: 51-67.
|
[2] |
董庆宽. 阈下信道技术研究[D]. 西安: 西安电子科技大学, 2003.
|
[3] |
SIMMONS G J. Subliminal Communication is Easy Using the DSA [C]//Lecture Notes in Computer Science: 765. Heidelberg: Springer Verlag, 1994: 218-232.
|
[4] |
JAN J K, TSENG Y M. New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem [C]//Proceedings of the 1999 IEEE International Conference on Parallel Processing. Piscataway: IEEE, 1999: 198-203.
|
[5] |
BOHLI J M, STEINWANDT R. On Subliminal Channels in Deterministic Signature Schemes [C]//Lecture Notes in Computer Science:3506. Heidelberg: Springer Verlag, 2005: 182-194.
|
[6] |
BOHLI J M, VASCO M I G, STEINWANDT R. Subliminal-free Variant of ECDSA [C]//Lecture Notes in Computer Science: 4437. Heidelberg: Springer Verlag, 2007: 375-387.
|
[7] |
HARTL A, ANNESSI R, ZSEBY T. A Subliminal Channel in EdDSA: Information Ieakage with High-speed Signatures [C]//Proceedings of the 2017 International Workshop on Managing Insider Security Threats. New York: ACM, 2017: 67-78.
|
[8] |
ZHANG F, LEE B, KIM K. Exploring Signature Schemes with Subliminal Channel[C/OL]. [2019-11-16]. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=146573D7A01B6E6E4E0E38650D97752C?doi=10.1.1.13.1990&rep=rep1&type=pdf.
|
[9] |
RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret [C]//Lecture Notes in Computer Science: 2248. Heidelberg: Springer Verlag, 2001: 552-565.
|
[10] |
DONG Q, LI X, LIU Y. Two Extensions of the Ring Signature Scheme of Rivest-Shamir-Taumann[J]. Information Sciences, 2012,188:338-345.
|
[11] |
WANG B, ZHANG Z, ZHANG F. Subliminal Channels in the Code-based Ring Signature Scheme [C]//Proceedings of the 2019 14th Asia Joint Conference on Information Security. Piscataway: IEEE, 2019: 146-150.
|
[12] |
NAKAMOTO S. Bitcoin: a Peer-to-peer Electronic Cash System[J/OL]. [2019-11-16].https://www.coindesk.com/bitcoin-peer-to-peer-electronic-cash-system.
|
[13] |
PARTALA J. Provably Secure Covert Communication on Blockchain[J]. Cryptography, 2018,2(3):18.
|
[14] |
TIAN J, GOU G, LIU C, et al. DLchain: a Covert Channel over Blockchain Based on Dynamic Labels [C]// Lecture Notes in Computer Science: 11999. Heidelberg: Springer, 2020: 814-830.
|
[15] |
张方国, 刘志杰, 李会格. 基于区块链的隐蔽传输系统: CN109257346A[P]. 2019-01-22.
|
[16] |
ALONSO K M. Monero-privacy in the Blockchain[J/OL]. [2019-11-16]. http://hal.handle.net/10609/75205.
|
[17] |
NOETHER S. Ring Confidential Transactions[J/OL]. [2019-11-16]. http://diyhpl.us/~bryan/papers2/bitcoin/Ring%20confidential%20transactions.pdf.
|
[18] |
ZHOU X. Threshold Cryptosystem and Its Application in Subliminal Channel Scheme [C]//Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application. Washington:IEEE Computer Society, 2008: 687-691.
|