Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we...
Saved in:
Main Authors: | WU, Yongdong, BAO, Feng, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/393 https://ink.library.smu.edu.sg/context/sis_research/article/1392/viewcontent/Wu2007_ForgeryAttackToAnAsymptotically_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A Multi-key Pirate Decoder against Traitor Tracing Schemes
by: WU, Yongdong, et al.
Published: (2010) -
A deep learning framework supporting model ownership protection and traitor tracing
by: XU, Guowen, et al.
Published: (2020) -
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
by: WU, Yongdong, et al.
Published: (2003) -
A Pollution Attack to Public-key Watermarking Schemes
by: WU, Yongdong, et al.
Published: (2012) -
Security of an ill-posed operator based scheme for image authentication
by: WU, Yongdong, et al.
Published: (2005)