• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (6): 78-81.

• 论文 • Previous Articles     Next Articles

Security analysis of two traitor tracing schemes   

WANG Qinglong1,2,XU Li1   

  1. (1.School of Information Engineering,Chang’an University,Xi’an 710064;
    2.Shaanxi Road Traffic Detection and Equipment Engineering Technology Research Center,Xi’an 710064,China)
  • Received:2011-11-17 Revised:2012-06-20 Online:2013-06-25 Published:2013-06-25

Abstract:

ZHANG Xuejun et al presented a multioriented traitor tracing scheme with fully collusion resistance. They asserted that it was computationally infeasible for any number of users to get a different key by collusion. Here, this scheme was cryptographically analyzed. We found that it does not meet the collusion resistance. Also, we proposed a concrete attack in which the three or more traitors can build more than one valid decrypt key unidentified by black box tracing method. MA Hua et al also proposed a traitor tracing scheme that can trace all traitors undoubtedly. However, we presented a simple attack in which traitors can easily avoid tracing by changing their keys.

Key words: traitor tracing;collusion resistance;RSA;collusion attack;broadcast encryption