摘要
王青龙等人提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点。对此进行详细分析发现它存在明显缺陷,提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法对它们进行追踪。最后提出一种改进方案,在改进方案中,叛逆者虽然仍能实施上面提到的攻击,但是会被追踪者追踪到。
A complete asymmetric public-key traitor tracing scheme was proposed by Wang Qing-long et al, which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. The scheme and its obvious defect were carefully analyzed, and then a attack was given. And traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Finally, an improved scheme was proposed in which traitors still could play the above attack, but they can be traced.
出处
《计算机应用》
CSCD
北大核心
2008年第11期2808-2810,2826,共4页
journal of Computer Applications
基金
国家自然科学基金资助项目(60573043)
中国博士后科学基金资助项目(20060400035)
西北师大青年教师科研基金资助项目(NWNU-QN-07-03)
关键词
叛逆者追踪
密码学分析
抗共谋
共谋攻击
traitor tracing
cryptanalysis
collusion-resistant
collusion attack
作者简介
xjzhang99@163.com张学军(1968-),男,甘肃兰州人,副教授,博士,主要研究方向:密码学及应用。