Further analysis of pairing-based traitor tracing schemes for broadcast encryption

被引:3
作者
Wu, Tsu-Yang [1 ]
Tseng, Yuh-Min [2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[2] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
关键词
traitor tracing; bilinear pairing; linear attack; broadcast encryption; AUTHENTICATION;
D O I
10.1002/sec.522
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pairing-based public key systems have recently received much attention because bilinear property contributes to the designs of many cryptographic schemes. In 2002, Mitsunari et al. proposed the first pairing-based traitor tracing scheme with constant-size ciphertexts and private keys. However, their scheme has been shown to be insecure for providing traitor tracing functionality. Recently, many researches still try to propose efficient pairing-based traitor tracing schemes in terms of ciphertext and private key sizes. In this paper, we present a security claim for the design of pairing-based traitor tracing schemes. For a pairing-based traitor tracing scheme with constant-size ciphertexts and private keys, if the decryption key is obtained by some pairing operations in pairing-based public key systems, the scheme will suffer from a linear attack and cannot provide the traitor tracing functionality. Finally, we apply our security claim to attack a pairing-based traitor tracing scheme proposed by Yang et al. to demonstrate our result. Our security claim can offer a notice and direction for designing pairing-based traitor tracing schemes. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:28 / 32
页数:5
相关论文
共 14 条
[1]  
Abdalla M, 2007, LECT NOTES COMPUT SC, V4450, P361
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], 1994, LNCS
[4]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[5]  
[Anonymous], 297 2006 1 INT C
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]  
Boneh D, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P501
[9]  
Chabanne H, 2005, LECT NOTES COMPUT SC, V3494, P542
[10]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241