计算机应用

• 信息安全(Information security) • 上一篇    下一篇

一种完整的非对称公钥叛逆者追踪方案的密码学分析与改进

张学军   

  1. 西北师范大学教育技术与传播学院
  • 收稿日期:2008-05-19 修回日期:1900-01-01 发布日期:2008-11-01 出版日期:2008-11-01
  • 通讯作者: 张学军

Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme

Xue-jun ZHANG   

  • Received:2008-05-19 Revised:1900-01-01 Online:2008-11-01 Published:2008-11-01
  • Contact: Xue-jun ZHANG

摘要: 王青龙等人提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。对此进行详细分析发现它存在明显缺陷,提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法对它们进行追踪。最后提出一种改进方案,在改进方案中,叛逆者虽然仍能实施上面提到的攻击,但是会被追踪者追踪到。

关键词: 叛逆者追踪, 密码学分析, 抗共谋, 共谋攻击

Abstract: A complete asymmetric public-key traitor tracing scheme was proposed by Wang Qing-long et al., which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. The scheme and its obvious defect were carefully analyzed, and then a attack was given. And traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Finally, an improved scheme was proposed in which traitors still could play the above attack, but they can be traced.

Key words: traitor tracing, cryptanalysis, collusion-resistant, collusion attack