Forgery attack to an asymptotically optimal traitor tracing scheme

被引:0
|
作者
Wu, Yongdong [1 ]
Bao, Feng [1 ]
Deng, Robert H. [2 ]
机构
[1] ASTAR, Inst Infocomm Res I2R, Singapore, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage.
引用
收藏
页码:171 / +
页数:3
相关论文
共 50 条
  • [1] New traitor tracing scheme against anonymous attack
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +
  • [2] New scheme of dynamic traitor tracing against the immediate rebroadcast attack
    苏加军
    王新梅
    [J]. Journal of Beijing Institute of Technology, 2015, 24 (01) : 128 - 132
  • [3] A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
    Chen, Yi-Ruei
    Tzeng, Wen-Guey
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 121 - 134
  • [4] A traitor tracing scheme based on the RSA scheme
    Yang Bo
    Mao Jane
    Zhu Shenglin
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 625 - +
  • [5] Cryptanalysis and modification of a traitor tracing scheme
    [J]. Wang, X. (wxmsq@eyou.com), 1600, Science Press (50):
  • [6] Improved algebraic traitor tracing scheme
    Bai, CY
    Feng, GL
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 217 - 227
  • [7] Traitor tracing for anonymous attack in content protection
    Jin, Hongxia
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 331 - 336
  • [8] Traitor tracing with optimal transmission rate
    Fazio, Nelly
    Nicolosi, Antonio
    Phan, Duong Hieu
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 71 - 88
  • [9] An asymptotically optimal structural attack on the ABC multivariate encryption scheme
    National Institute of Standards and Technology, Gaithersburg
    MD, United States
    不详
    KY, United States
    [J]. Lect. Notes Comput. Sci, (180-196):
  • [10] An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
    Moody, Dustin
    Perlner, Ray
    Smith-Tone, Daniel
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 180 - 196