|
[1] “Advanced Encryption Standard (AES)”, FIPS 197, Nov. 2001. [2] R. J Anderson and F. A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Areas in Communication, 16(4), pp. 474-481, 1998. [3] S.G. Akl and P.D. Taylor, “Cryptographic solution to a problem of access control in a hierarchy”, ACM Trans. On Computer System, Vol. 1, No. 3, pp. 239-247, 1983. [4] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, Advances in Cryptology-Crypto’2001, LNCS 2139, Springer-Verlag, pp. 213-229, 2001. [5] D. Boneh, “The decision Diffie-Hellman”, In Proceedings of the Third Algorithmic Number Theory Symposium, LNCS, Springer-Verlag, Vol. 1423, pp. 48-63, 1998 [6] W. Beder, D. Gruhl and A. Lu, “Techniques for Data Hiding”, IBM Systems Journal, Vol. 35, (3 and 4), pp. 313-336, 1996. [7] J. C. Cha and J. H. Cheon, “An identity-based signature from gap Diffie-Hellman groups”, Public Key Cryptography—PKC 2003, LNCS 2139, Springer-Verlag, pp. 18-30, 2003. [8] “Digital Signature Standard”, Federal Information Processing Standard, Publication 186, NIST, 1994. [9] W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transaction on Information Theory, Vol. IT-22, No. 6, pp. 644-654, Nov. 1976. [10] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. on Information Theory, Vol. IT-31, No. 4, pp. 469-472, 1985. [11] F. Hess, “Efficient identity based signature schemes based on pairings”, Proc. 9th Workshop in Selected Areas in Cryptography—SAC 2002, LNCS, Springer-Verlag, pp. 310-324, 2002. [12] L. Harn and G. Gong, “Digital Signature with a Subliminal Channel”, IEE Proc. Comput. Digit. Tech., Vol. 144, No. 6, pp. 387-389, 1997. [13] P. Horster, M. Michels and H. Petersen, “Meta-ElGamal Signature Schemes”, Proceedings of the 2nd Annual ACM Conference on Computer and Communications Security, ACM Press, pp. 96-107, 1994. [14] J.K. Jan and Y.M. Tseng, “New Digital Signature with Subliminal Channel Based on the Discrete Logarithm Problem”, Proceedings of the 1999 International Workshops on Parallel Processing, pp. 198-203, 1999. [15] H.J. Knobloch, “A remark on the size of ElGamal-type digital signatures”, E.I.S.S.-Report 94-1, University of Karlsruhe, Germany, 5 pages, 1994. [16] N.Y. Lee and D.R. Lin, “Robust Digital Signature Scheme with Subliminal Channels”, IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp. 187-188, 2003. [17] N.Y. Lee and T.L. Hwang, “Comments on ‘dynamic key management schemes for access control in a hierarchy’”, Computer Communications, Vol. 22, pp. 87-89, 1999. [18] W.P. Lu and M.K. Sundarehan, “A model for multilevel security in computer networks”, Proceedings 1988 INFCOM, New Orleans, LA, pp. 1095-1104, March 1988. [19] R.C. Merkle, “A Fast Software One-way Hash Function”, in Journal of Cryptology, Vol. 3, No. 1, pp. 43-58, 1990. [20] National Institute of Standards and Technology, “Data Encryption Standard”, FIPS 46-2, 1993. [21] NIST FIPS PUB 180, “Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993. [22].T. Okamoto and D. Pointcheval, “The gap-problem: a new class of problems for the security of cryptographic schemes”, Proc. of PKC''01, LNCS, Spring-Verlag, Vol. 1992, pp. 104-118, 2001. [23] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn, “Information Hiding — A Survey”, Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, July 1999. [24] A Shamir, “Identity-based cryptosystems and signature schemes”, Proc. of Crypto''84, LNCS, Springer-Verlag, Vol. 196, pp. 47-53, 1985. [25] C.P. Schnorr, “FFT-Hash II, Efficient Cryptographic Hash”, in Proceeding of Eurocrypt’92, Springer Verlag, Berlin, pp. 45-54, 1993. [26] G..J. Simmons, “The Prisoner’s Channel and the Subliminal Channel”, Proc. CRYPTO’83, pp. 51-67, 1984. [27] G..J. Simmons, “Subliminal Communication is Easy Using the DSA”, Eurocrypt’93, pp. 218-232, 1994. [28] G..J. Simmons, “A secure subliminal channel”, in Advances in Cryptology, Crypto’85 LNCS 218, Springer-Verlag, pp. 33-41, 1985. [29] G..J. Simmons,, “The history of subliminal channels”, IEEE Jour. on sel. Areas Comm., Vol. 16, No. 4, pp. 452-462, 1998. [30] R. Sakai, K. Ohgishi, and M. Kasahara, “Cryptosystems based on pairing”, SCIS 2000-C20, Okinawa, Japan, pp. 26-28, Jan. 2000. [31] R.S. Sandhu, “Cryptographic implementation of a tree hierarchy for access control”, Information Processing Letters, 27, pp. 95-98, 1988. [32] William Stallings, “Cryptography and Network Security Principles and Practices”, Third Edition, Prentice Hall, 2003. [33] H.M. Tasi and C.C. Chang, “A cryptographic implementation for dynamic access control in a user hierarchy”, Computer and Security, Vol. 14, pp. 159-166, 1995. [34] F. Zhang and K. Kim, “ID-Based Blind Signature and Ring Signature from Pairings”, Advances in Cryptology-Asiacrypt’2002, pp. 354-368, 2002. [35] F. Zhang, B. Lee and K. Kim, “Exploring Signature Schemes with Subliminal Channel”, SCIS 2003, Itaya, Japan, Vol. 1/2, pp. 245-250, Jan. 26-29, 2003.
|