A traceable E-cash transfer system against blackmail via subliminal channel
نویسندگان
چکیده
Due to the development of Internet communication technology, E-Commerce is becoming popular. Because crime is thriving, avoiding malicious behavior and protecting property becomes an important issue. To prevent malicious behavior, many proposals have been put forth. The subliminal channel is the most popular method, which notifies the designated receiver to transmit secret messages. Simmons was the first to propose this concept in 1983. Now, more and more digital signature applications use a subliminal channel to transfer secret messages. In this paper, we propose a traceable E-cash transfer system against blackmail via subliminal channel. 2009 Elsevier B.V. All rights reserved.
منابع مشابه
Mediated Traceable Anonymous Encryption
The notion of key privacy for asymmetric encryption schemes was formally de ned by Bellare, Boldyreva, Desai and Pointcheval in 2001: it states that an eavesdropper in possession of a ciphertext is not able to tell which speci c key, out of a set of known public keys, is the one under which the ciphertext was created. Since anonymity can be misused by dishonest users, some situations could requ...
متن کاملAn Off-Line Electronic Payment Scheme based on Publicly Verifiable Secret Sharing
In this paper, we introduce a new efficient technique allowing to render an off-line e-cash system traceable without need to a trusted party. The main idea is the use of the publicly verifiable secret sharing technique in order to revoke the anonymity of double spending users. The anonymity of honest users is still provided. Security analysis shows that the proposed technique does not undermine...
متن کاملA Subliminal Channel in EdDSA:
Subliminal channels in digital signatures provide a very effective method to clandestinely leak information from inside a system to a third party outside. Information can be hidden in signature parameters in a way that both, network operators and legitimate receivers, would not notice any suspicious traces. Subliminal channels have previously been discovered in other signatures, such as ElGamal...
متن کاملMaking Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context
[Sim84] introduced th e concept of subliminal channel in the contezt of signature systems. [Des88b] presented a solution against subliminal channels and eztended in [Des88a] the solution to abuse-free coin-flipping, abuse-free genemtion of public keys, and abuse-free zero-knowledge. In this paper we demonstrate that a whole family of systems (genemlized Arthur-Merlin games) can be made abuse-fm...
متن کاملError-correcting codes for authentication and subliminal channels
The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based on algebraic codes and provide high protection against an intruder's impersonation and substitution attacks. It is shown that a subliminal channel can be embedded into these systems and that there is a trade-off between the authentication capability, subliminal capacity and er...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Commerce Research and Applications
دوره 8 شماره
صفحات -
تاریخ انتشار 2009