J4 ›› 2013, Vol. 35 ›› Issue (6): 78-81.
• 论文 • Previous Articles Next Articles
WANG Qinglong1,2,XU Li1
Received:
Revised:
Online:
Published:
Abstract:
ZHANG Xuejun et al presented a multioriented traitor tracing scheme with fully collusion resistance. They asserted that it was computationally infeasible for any number of users to get a different key by collusion. Here, this scheme was cryptographically analyzed. We found that it does not meet the collusion resistance. Also, we proposed a concrete attack in which the three or more traitors can build more than one valid decrypt key unidentified by black box tracing method. MA Hua et al also proposed a traitor tracing scheme that can trace all traitors undoubtedly. However, we presented a simple attack in which traitors can easily avoid tracing by changing their keys.
Key words: traitor tracing;collusion resistance;RSA;collusion attack;broadcast encryption
WANG Qinglong1,2,XU Li1. Security analysis of two traitor tracing schemes [J]. J4, 2013, 35(6): 78-81.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2013/V35/I6/78