Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/393 https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1392 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-13922022-02-18T02:11:35Z Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme WU, Yongdong BAO, Feng DENG, Robert H. In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage. 2007-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/393 info:doi/10.1007/978-3-540-73458-1_14 https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security |
spellingShingle |
Information Security WU, Yongdong BAO, Feng DENG, Robert H. Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
description |
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage. |
format |
text |
author |
WU, Yongdong BAO, Feng DENG, Robert H. |
author_facet |
WU, Yongdong BAO, Feng DENG, Robert H. |
author_sort |
WU, Yongdong |
title |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
title_short |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
title_full |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
title_fullStr |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
title_full_unstemmed |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme |
title_sort |
forgery attack to an asymptotically optimal traitor tracing scheme |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2007 |
url |
https://ink.library.smu.edu.sg/sis_research/393 https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf |
_version_ |
1770570408159870976 |