首页> 外文会议>Applied cryptography and network security >Breaking Two fc-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
【24h】

Breaking Two fc-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size

机译:使用亚线性密文大小突破两个fc-弹性叛逆者跟踪方案

获取原文
获取原文并翻译 | 示例

摘要

In 2004, Matsushita and Imai proposed a fc-resilient public-key traitor tracing scheme which has sublinear ciphertext size 4A; + 2 + (n/2k) with efficient black-box tracing against self-defensive pirates, where n, k are the total number of subscribers and the maximum number of colluders. After that, in 2006, they presented a hierarchical key assignment method to reduce the ciphertext size into 4k 4- 5 + log(n/2/c) by combining a complete binary tree with the former scheme. In this paper, we show that the proposed schemes are vulnerable to our attack which makes pirate keys able to avoid the black-box tracing. Their schemes are based on multiple polynomials and our attack use a combination between different polynomials. The latter scheme can be broken by other attacks which use secret values of the key generation polynomial or use partial keys.
机译:2004年,松下和今井提出了一种fc弹性的公钥叛徒追踪方案,该方案具有亚线性密文大小4A。 + 2 +(n / 2k),可以针对自卫海盗进行有效的黑匣子跟踪,其中n,k是订户总数和合谋最多。此后,在2006年,他们提出了一种分层密钥分配方法,通过将完整的二叉树与前一种方案结合起来,将密文大小减小为4k 4- 5 + log(n / 2 / c)。在本文中,我们证明了所提出的方案容易受到我们的攻击,这使得盗版密钥能够避免黑匣子跟踪。他们的方案基于多个多项式,我们的攻击使用了不同多项式之间的组合。后一种方案可能会受到使用密钥生成多项式的秘密值或使用部分密钥的其他攻击的破坏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号