Journal of Computer Applications
• Information security • Previous Articles Next Articles
Xue-jun ZHANG
Received:
Revised:
Online:
Published:
Contact:
张学军
通讯作者:
Abstract: A complete asymmetric public-key traitor tracing scheme was proposed by Wang Qing-long et al., which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. The scheme and its obvious defect were carefully analyzed, and then a attack was given. And traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Finally, an improved scheme was proposed in which traitors still could play the above attack, but they can be traced.
Key words: traitor tracing, cryptanalysis, collusion-resistant, collusion attack
摘要: 王青龙等人提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。对此进行详细分析发现它存在明显缺陷,提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法对它们进行追踪。最后提出一种改进方案,在改进方案中,叛逆者虽然仍能实施上面提到的攻击,但是会被追踪者追踪到。
关键词: 叛逆者追踪, 密码学分析, 抗共谋, 共谋攻击
Xue-jun ZHANG. Cryptanalysis and improvement of complete asymmetric public-key traitor tracing scheme[J]. Journal of Computer Applications.
张学军. 一种完整的非对称公钥叛逆者追踪方案的密码学分析与改进[J]. 计算机应用.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/
http://www.joca.cn/EN/Y2008/V28/I11/2808