期刊文献+

基于完全式公钥的叛徒追踪方案的密码分析

Cryptanalysis of Traitor-tracing Schemes Based on Fully Public Keys
下载PDF
导出
摘要 由于广播加密容易受到串谋攻击,叛徒追踪方案已成为版权保护的一个重要工具。利用中国剩余定理让用户自己生成私钥,Lyuu和Wu提出了面向无状态接收者的ElGamal类广播加密算法及黑盒可追踪方案。本文首先从群编码和参数配置的角度考察对该方案的几种安全威胁。接着,利用解密预言机发起一种适应性选择密文攻击。最后,针对其密钥管理与追踪算法的特点提出一种串谋攻击方法,使其不能追踪出所有的叛徒和真正的盗版者,表明在实际应用中完全式公钥方法存在冤枉无辜用户的安全风险。 As broadcast encryption is prone to collusion attacks, traitor-tracing schemes have become an important tool for copyright protection. Using the Chinese remainder theorem Lyuu and Wu proposed an ElGamal-type broadcast encryption algorithm and a black-box traceable scheme for stateless receivers, each of which generates its own private key. We first investigate several security threats to the scheme from the perspectives of group encoding and parameter configuration. Then an adaptive chosen-ciphertext attack is launched via a decryption oracle. Finally, in accordance with the characteristics of the key management and tracing algorithm a method of collusion attack is presented so that the scheme can trace down neither all traitors nor the factual pirate, indicating that there exists the security risk of wrongly accusing innocent users when applying the approach of fully public keys in the real world.
作者 杨军 周贤伟
出处 《计算机科学》 CSCD 北大核心 2007年第9期80-82,共3页 Computer Science
基金 国家自然科学基金(60573050)资助
关键词 广播加密 密钥管理 叛徒追踪 公钥密码学 群编码 Broadcast encryption, Key management, Traitor tracing, Public-key cryptography, Group encoding
  • 相关文献

参考文献16

  • 1Fiat A,Tassa T.Dynamic Traitor Tracing.In:Proc.Advances in Cryptology-Crypto'99[C],LNCS.Springer-Verlag,1999,1666:388-397.
  • 2Dodis Y,Fazio N.Public-key broadcast encryption for stateless receivers.In:Feigenbaum J,ed.ACM Workshop in Digital Rights Management-DRM 2002[C].LNCS.Springer-Verlag,2003,2696:61-80.
  • 3屈劲,葛建华,蒋铭.基于用户概率分组模型的密钥分发方法研究[J].电子学报,2003,31(8):1266-1268. 被引量:1
  • 4Adelsbach A, Greveler U. A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. In: First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems [C]. Sydney, Australia, 31 October - 2 November 2005.
  • 5Boneh D,Franklin M.An efficient public key traitor tracing scheme.In:Proc.of Crypto'99[C],LNCS.Springer-Verlag,1999,1666:338-353.
  • 6Lyuu Y,Wu M.A fully public-key traitor-tracing scheme.WSEAS Transactions on Circuits[J],2002,1 (1):88-93.
  • 7谭作文,刘卓军,肖红光.一个安全公钥广播加密方案(英文)[J].软件学报,2005,16(7):1333-1343. 被引量:10
  • 8张学军,周利华,王育民.一种抗共谋的非对称公钥叛逆者追踪方案[J].计算机科学,2006,33(8):118-120. 被引量:4
  • 9Challal Y,Bouabdallah A,Seba H.A Taxonomy of Group Key Management Protocols:Issues and Solutions.Transactions on Engineering,Computing and Technology[J],2005,6:5-17.
  • 10Stinson D R著.密码学原理与实践.第二版.冯登国译[M].北京:电子工业出版社,2003.

二级参考文献43

  • 1吴文玲.Pseudorandomness of Camellia-Like Scheme[J].Journal of Computer Science & Technology,2006,21(1):82-88. 被引量:5
  • 2CKWong M G Gouda S S Lam.Secure group communications usingkey graphs [A]..Proceedings of ACM SIGCOMM′98 [C].New York:ACM Press,1998.68-79.
  • 3Ecruselles J Luís M Soriano.An overview of security in eurocrypt conditional access system [A]..Proc IEEE GLOBECOM′93 [C].Houston,1993.188-193.
  • 4周炯磐 丁小明.信源编码理论(M)[M].北京:人民邮电出版社,1996.9-27.
  • 5The European Commission Green Paper. Legal protection for encrypted services in the internal market [Z].1996.
  • 6V Lenoir. EUROCRYPT, a successful conditional access system[ J ].IEEE Trans Consumer Electronics, Aug. 1991,37(3):432- 436.
  • 7E Cruselles, J Lois, M Soriano. An overview of security in eurocrypt conditional access system[ A ]. Prcc. IEEE GLOBECOM' 93 [C].Houston, 1993:188 - 193.
  • 8F K Tu,C S Laih, H H Tung. On key distribution management for conditional access system on pay-TV system[J]. IEEE Trans. Consumer Electronics, Feb. 1999,45( 1 ) : 151 - 158.
  • 9C K Wong, M G Gouda, S S Lam. Secure group communications using key graphs [A] .Proceedings of ACM SIC, COMM'98 [C] .New York:ACM Press, 1998.68 - 79.
  • 10Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPT0'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1994. 480-491.

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部