首页 | 本学科首页   官方微博 | 高级检索  
     

Pirate decoder for the broadcast encryption schemes from Crypto 2005
作者单位:WENG Jian(Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240,China) ;LIU ShengLi(Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240,China) ;CHEN KeFei(Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240,China) ;
摘    要:
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.'s broadcast encryption schemes in ISPEC'06.

收稿时间:2006-07-15
修稿时间:2007-02-15

Pirate decoder for the broadcast encryption schemes from Crypto 2005
Weng Jian,Liu ShengLi,Chen KeFei. Pirate decoder for the broadcast encryption schemes from Crypto 2005[J]. Science in China(Information Sciences), 2007, 50(3): 318-323. DOI: 10.1007/s11432-007-0031-8
Authors:Weng Jian  Liu ShengLi  Chen KeFei
Affiliation:Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240,China
Abstract:
In Crypto’05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.’s broadcast encryption schemes in ISPEC’06. Supported by the National Natural Science Foundation of China (Grant Nos. 60303026, 60573030, and 60673077)
Keywords:broadcast encryption  pirate decoder  traitor tracing
本文献已被 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号