Security weaknesses of certain broadcast encryption schemes

被引:0
|
作者
Mihaljevic, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade 11001, Serbia
[2] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
broadcast encryption; key management; cryptanalysis; time-memory-data trade-off;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper points out to a generic vulnerability of certain broadcast encryption schemes. This vulnerability can be effectively explored assuming chosen plaintext attacks, and in some cases even under ciphertext only attack. The developed methods for cryptanalysis are based on an attacking approach not taken into account in the security evaluations of the reported broadcast encryption schemes. The proposed attacks are based on employment of a dedicated time-data-memory trade-off approach for cryptanalysis. Two algorithms for cryptanalysis are proposed (both in the basic and the generalized versions) and their main characteristics regarding the complexity and required sample are pointed out. The algorithms are applied for cryptanalysis of particular recently reported broadcast encryption schemes implying that their security is far below the claimed ones.
引用
收藏
页码:228 / 245
页数:18
相关论文
共 50 条
  • [1] Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (06) : 1248 - 1251
  • [2] Improved broadcast encryption schemes with enhanced security
    Ke, Lishan
    Yi, Zongxiang
    Ren, Yan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (01) : 121 - 129
  • [3] Improved broadcast encryption schemes with enhanced security
    Lishan Ke
    Zongxiang Yi
    Yan Ren
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 121 - 129
  • [4] A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
    Bodur, Huseyin
    Kara, Resul
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2020, 20 (04) : 69 - 80
  • [5] Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    IEEE COMMUNICATIONS LETTERS, 2007, 11 (12) : 988 - 990
  • [6] Linear broadcast encryption schemes
    Padró, C
    Gracia, I
    Martín, S
    Morillo, P
    DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 223 - 238
  • [7] Security Notions for Broadcast Encryption
    Duong Hieu Phan
    Pointcheval, David
    Strefler, Mario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 377 - 394
  • [8] Hybrid Multimedia Broadcast Encryption Schemes
    Li, Tao
    Guo, Huaqun
    Ma, Maode
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [9] BROADCAST ENCRYPTION SCHEMES: A COMPARATIVE STUDY
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 700 - 703
  • [10] Broadcast encryption schemes based on RSA
    MU, Ning-bo
    HU, Yu-pu
    OU, Hai-wen
    Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 69 - 75