{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:23:29Z","timestamp":1745987009529,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_42","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T16:14:54Z","timestamp":1362413694000},"page":"383-391","source":"Crossref","is-referenced-by-count":6,"title":["Provably Secure and Subliminal-Free Variant of Schnorr Signature"],"prefix":"10.1007","author":[{"given":"Yinghui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoner\u2019 problem and the subliminal channel. In: Advances in Cryptology-Crypto 1983, pp. 51\u201367. Plenum Press (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"9","key":"42_CR2","first-page":"1","volume":"3","author":"P. Gupta","year":"2012","unstructured":"Gupta, P.: Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research\u00a03(9), 1\u20134 (2012)","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"42_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-24178-9_11","volume-title":"Information Hiding","author":"G. Danezis","year":"2011","unstructured":"Danezis, G., Kohlweiss, M., Rial, A.: Differentially Private Billing with Rebates. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.\u00a06958, pp. 148\u2013162. Springer, Heidelberg (2011)"},{"issue":"4","key":"42_CR4","first-page":"4","volume":"3","author":"W.R. Claycomb","year":"2012","unstructured":"Claycomb, W.R., Huth, C.L., Flynn, L., McIntire, D.M., Lewellen, T.B.: Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a03(4), 4\u201320 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"4","key":"42_CR5","first-page":"35","volume":"3","author":"B. Choi","year":"2012","unstructured":"Choi, B., Cho, K.: Detection of insider attacks to the web server. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a03(4), 35\u201345 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"4","key":"42_CR6","first-page":"85","volume":"3","author":"K. Lee","year":"2012","unstructured":"Lee, K., Lee, K., Byun, J., Lee, S., Ahn, H., Yim, K.: Extraction of platform-unique information as an identifier. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a03(4), 85\u201399 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"3","key":"42_CR7","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.elerap.2010.09.001","volume":"10","author":"C.-L. Chen","year":"2011","unstructured":"Chen, C.-L., Liao, J.-J.: A fair online payment system for digital content via subliminal channel. Electronic Commerce Research and Applications\u00a010(3), 279\u2013287 (2011)","journal-title":"Electronic Commerce Research and Applications"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, X., Yang, X., Wei, P., Hu, Y.: An anonymous threshold subliminal channel scheme based on elliptic curves cryptosystem. In: Computer-Aided Industrial Design and Conceptual Design, CAIDCD 2006, pp. 1\u20135 (November 2006)","DOI":"10.1109\/CAIDCD.2006.329336"},{"key":"42_CR9","unstructured":"Kim, K., Zhang, F., Lee, B.: Exploring signature schemes with subliminal channel. In: Symposium on Cryptography and Information Security 2003, pp. 245\u2013250 (2003)"},{"issue":"5","key":"42_CR10","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1080\/00207160701663315","volume":"86","author":"T.H.C.-L. Yang","year":"2009","unstructured":"Yang, T.H.C.-L., Li, C.-M.: Subliminal channels in the identity-based threshold ring signature. International Journal of Computer Mathematics\u00a086(5), 753\u2013770 (2009)","journal-title":"International Journal of Computer Mathematics"},{"issue":"2","key":"42_CR11","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.camwa.2010.01.001","volume":"60","author":"D.-R. Lin","year":"2010","unstructured":"Lin, D.-R., Wang, C.-I., Zhang, Z.-K., Guan, D.J.: A digital signature with multiple subliminal channels and its applications. Computers & Mathematics with Applications\u00a060(2), 276\u2013284 (2010); Advances in Cryptography, Security and Applications for Future Computer Science.","journal-title":"Computers & Mathematics with Applications"},{"issue":"5","key":"42_CR12","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TDSC.2010.71","volume":"8","author":"C. Troncoso","year":"2011","unstructured":"Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B.: Pripayd: Privacy-friendly pay-as-you-drive insurance. IEEE Transactions on Dependable and Secure Computing\u00a08(5), 742\u2013755 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"42_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Simmons\u2019 protocol is not free of subliminal channels. In: Proceedings of 9th IEEE Computer Security Foundations Workshop, pp. 170\u2013175 (1996)","DOI":"10.1109\/CSFW.1996.503702"},{"key":"42_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-48285-7_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"G.J. Simmons","year":"1994","unstructured":"Simmons, G.J.: Subliminal Communication Is Easy Using the DAS. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 218\u2013232. Springer, Heidelberg (1994)"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Xiangjun, X., Qingbo, L.: Construction of subliminal channel in id-based signatures. In: WASE International Conference on Information Engineering, ICIE 2009, vol.\u00a02, pp. 159\u2013162 (2009)","DOI":"10.1109\/ICIE.2009.90"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Xie, Y., Sun, X., Xiang, L., Luo, G.: A security threshold subliminal channel based on elliptic curve cryptosystem. In: Processing of IIHMSP 2008 International Conference on Intelligent Information Hiding and Multimedia Signal 2008, pp. 294\u2013297 (2008)","DOI":"10.1109\/IIH-MSP.2008.147"},{"key":"42_CR18","unstructured":"Simmons, G.J.: The subliminal channels of the us digital signature algorithm (DSA). In: Advances in Cryptology-Cryptography, SPRC 1993, pp. 15\u201316 (1993)"},{"key":"42_CR19","unstructured":"Simmons, G.J.: An introduction to the mathematics of trust in security protocols. In: Proceedings of Computer Security Foundations Workshop VI, 1993, pp. 121\u2013127 (June 1993)"},{"issue":"4","key":"42_CR20","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/49.668970","volume":"16","author":"G.J. Simmons","year":"1998","unstructured":"Simmons, G.J.: Results concerning the bandwidth of subliminal channels. IEEE Journal on Selected Areas in Communications\u00a016(4), 463\u2013473 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"42_CR21","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1007\/BF02831816","volume":"11","author":"C. Qingjun","year":"2006","unstructured":"Qingjun, C., Yuli, Z.: Subliminal channels in the NTRU and the subliminal-free methods. Wuhan University Journal of Natural Sciences\u00a011, 1541\u20131544 (2006)","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"3","key":"42_CR22","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.comcom.2010.02.002","volume":"34","author":"Y. Sun","year":"2011","unstructured":"Sun, Y., Xu, C., Yu, Y., Yang, B.: Improvement of a proxy multi-signature scheme without random oracles. Computer Communications\u00a034(3), 257\u2013263 (2011); Special Issue of Computer Communications on Information and Future Communication Security.","journal-title":"Computer Communications"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Jadhav, M.V.: Effective detection mechanism for TCP based hybrid covert channels in secure communication. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT, pp. 1123\u20131128 (2011)","DOI":"10.1109\/ICETECT.2011.5760288"},{"issue":"1","key":"42_CR24","first-page":"30","volume":"3","author":"N. Yanai","year":"2012","unstructured":"Yanai, N., Tso, R., Mambo, M., Okamoto, E.: A certificateless ordered sequential aggregate signature scheme secure against super adverssaries. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a03(1), 30\u201354 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"4","key":"42_CR25","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1002\/ett.4460050408","volume":"5","author":"G.J. Simmons","year":"1994","unstructured":"Simmons, G.J.: Subliminal channels: past and present. European Transactions on Telecommunications\u00a05(4), 459\u2013474 (1994)","journal-title":"European Transactions on Telecommunications"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:54:21Z","timestamp":1745967261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}