Security weaknesses of certain broadcast encryption schemes

被引:0
|
作者
Mihaljevic, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade 11001, Serbia
[2] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
broadcast encryption; key management; cryptanalysis; time-memory-data trade-off;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper points out to a generic vulnerability of certain broadcast encryption schemes. This vulnerability can be effectively explored assuming chosen plaintext attacks, and in some cases even under ciphertext only attack. The developed methods for cryptanalysis are based on an attacking approach not taken into account in the security evaluations of the reported broadcast encryption schemes. The proposed attacks are based on employment of a dedicated time-data-memory trade-off approach for cryptanalysis. Two algorithms for cryptanalysis are proposed (both in the basic and the generalized versions) and their main characteristics regarding the complexity and required sample are pointed out. The algorithms are applied for cryptanalysis of particular recently reported broadcast encryption schemes implying that their security is far below the claimed ones.
引用
收藏
页码:228 / 245
页数:18
相关论文
共 50 条
  • [31] Reducing storage at receivers in SD and LSD broadcast encryption schemes
    Asano, T
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 317 - 332
  • [32] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [33] One-way chain based broadcast encryption schemes
    Jho, NS
    Hwang, JY
    Cheon, JH
    Kim, MH
    Lee, DH
    Yoo, ES
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 559 - 574
  • [34] On broadcast encryption with random key pre-distribution schemes
    Ramkumar, M
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 304 - 316
  • [35] Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
    Acharya, Kamalesh
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 191 - 213
  • [36] Pirate decoder for the broadcast encryption schemes from Crypto 2005
    Jian Weng
    ShengLi Liu
    KeFei Chen
    Science in China Series F: Information Sciences, 2007, 50 : 318 - 323
  • [37] Pirate decoder for the broadcast encryption schemes from Crypto 2005
    Weng Jian
    Liu ShengLi
    Chen Kefei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 318 - 323
  • [38] Cryptanalysis of BGW broadcast encryption schemes for DVD content protection
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    Qin, Bo
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 32 - +
  • [39] An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors
    Mihaljevic, Miodrag J.
    Wang, Lianhai
    Xu, Shujiang
    ENTROPY, 2022, 24 (03)
  • [40] Ciphertext verification security of symmetric encryption schemes
    HU ZhenYuSUN FuChun JIANG JianChun National Laboratory of Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua UniversityBeijing China Institute of SoftwareChinese Academy of SciencesBeijing China
    Science in China(Series F:Information Sciences), 2009, 52 (09) : 1617 - 1631