Cryptanalysis of BGW broadcast encryption schemes for DVD content protection

被引:0
|
作者
Wu, Qianhong [1 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
Qin, Bo [2 ,3 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Xian Univ Technol, Sch Sci, Dept Mat, Xian, Peoples R China
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security systems should not only be correctly devised but also be correctly used. In Crypto 2005, Boneh, Gentry and Waters (BGW) proposed two efficient broadcast encryption schemes proven secure in their security definition. They also suggested for a number of applications of their schemes including satellite TV subscription services and DVD content protections. In contrast to this suggestion, we show that any legitimate decoder(s) can collude with the revoked decoders to produce exponentially many equivalent decryption keys, and moreover, this activity cannot be traced by the dealer. Our results remind of abuse that their schemes are not suitable for the satellite TV subscription services or DVD content protection applications, although their schemes may be applicable in trusted environments such as conference key distribution.
引用
收藏
页码:32 / +
页数:2
相关论文
共 50 条
  • [1] Unifying Broadcast Encryption and Traitor Tracing for Content Protection
    Jin, Hongxia
    Lotspiech, Jeffrey
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 139 - 148
  • [2] A Comparison on Broadcast Encryption Schemes: A New Broadcast Encryption Scheme
    Bodur, Huseyin
    Kara, Resul
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2020, 20 (04) : 69 - 80
  • [3] Cryptanalysis of some multimedia encryption schemes
    Jakimoski, Goce
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) : 330 - 338
  • [4] Linear broadcast encryption schemes
    Padró, C
    Gracia, I
    Martín, S
    Morillo, P
    DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 223 - 238
  • [5] A closer look at broadcast encryption and traitor tracing for content protection
    Jin, Hongxia
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 295 - 298
  • [6] Cryptanalysis of adaptive arithmetic coding encryption schemes
    Lim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 216 - 227
  • [7] Hybrid Multimedia Broadcast Encryption Schemes
    Li, Tao
    Guo, Huaqun
    Ma, Maode
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [8] BROADCAST ENCRYPTION SCHEMES: A COMPARATIVE STUDY
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 700 - 703
  • [9] Broadcast encryption schemes based on RSA
    MU, Ning-bo
    HU, Yu-pu
    OU, Hai-wen
    Journal of China Universities of Posts and Telecommunications, 2009, 16 (01): : 69 - 75