Cryptanalysis of BGW broadcast encryption schemes for DVD content protection

被引:0
|
作者
Wu, Qianhong [1 ]
Susilo, Willy [1 ]
Mu, Yi [1 ]
Qin, Bo [2 ,3 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Xian Univ Technol, Sch Sci, Dept Mat, Xian, Peoples R China
来源
AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS | 2007年 / 4610卷
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security systems should not only be correctly devised but also be correctly used. In Crypto 2005, Boneh, Gentry and Waters (BGW) proposed two efficient broadcast encryption schemes proven secure in their security definition. They also suggested for a number of applications of their schemes including satellite TV subscription services and DVD content protections. In contrast to this suggestion, we show that any legitimate decoder(s) can collude with the revoked decoders to produce exponentially many equivalent decryption keys, and moreover, this activity cannot be traced by the dealer. Our results remind of abuse that their schemes are not suitable for the satellite TV subscription services or DVD content protection applications, although their schemes may be applicable in trusted environments such as conference key distribution.
引用
收藏
页码:32 / +
页数:2
相关论文
共 50 条
  • [31] Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme
    Cao, Weiwei
    Nie, Xinyun
    Hu, Lei
    Tang, Xiling
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 41 - +
  • [32] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [33] Cryptanalysis of two similar chaos-based image encryption schemes
    Mastan, J. Mohamedmoideen Kader
    Pandian, R.
    CRYPTOLOGIA, 2021, 45 (06) : 541 - 552
  • [34] Cryptanalysis of observer based discrete-time chaotic encryption schemes
    Solak, E
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (02): : 653 - 658
  • [35] Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05) : 1301 - 1302
  • [36] Cryptanalysis of optical encryption schemes based on joint transform correlator architecture
    Qin, Wan
    Peng, Xiang
    Meng, Xiangfeng
    OPTICAL ENGINEERING, 2011, 50 (02)
  • [38] Reducing storage at receivers in SD and LSD broadcast encryption schemes
    Asano, T
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 317 - 332
  • [39] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [40] One-way chain based broadcast encryption schemes
    Jho, NS
    Hwang, JY
    Cheon, JH
    Kim, MH
    Lee, DH
    Yoo, ES
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 559 - 574