Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme

In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we...

Full description

Saved in:
Bibliographic Details
Main Authors: WU, Yongdong, BAO, Feng, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2007
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/393
https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1392
record_format dspace
spelling sg-smu-ink.sis_research-13922022-02-18T02:11:35Z Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme WU, Yongdong BAO, Feng DENG, Robert H. In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage. 2007-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/393 info:doi/10.1007/978-3-540-73458-1_14 https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
WU, Yongdong
BAO, Feng
DENG, Robert H.
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
description In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage.
format text
author WU, Yongdong
BAO, Feng
DENG, Robert H.
author_facet WU, Yongdong
BAO, Feng
DENG, Robert H.
author_sort WU, Yongdong
title Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
title_short Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
title_full Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
title_fullStr Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
title_full_unstemmed Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
title_sort forgery attack to an asymptotically optimal traitor tracing scheme
publisher Institutional Knowledge at Singapore Management University
publishDate 2007
url https://ink.library.smu.edu.sg/sis_research/393
https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf
_version_ 1770570408159870976