Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
5-2007
Abstract
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage.
Discipline
Information Security
Research Areas
Cybersecurity
Publication
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4: Proceedings
Volume
4586
First Page
171
Last Page
183
ISBN
9783540734581
Identifier
10.1007/978-3-540-73458-1_14
Publisher
Springer
City or Country
Berlin
Citation
WU, Yongdong; BAO, Feng; and DENG, Robert H..
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. (2007). Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4: Proceedings. 4586, 171-183.
Available at: https://ink.library.smu.edu.sg/sis_research/393
Copyright Owner and License
Publisher
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/978-3-540-73458-1_14