首页 | 本学科首页   官方微博 | 高级检索  
     

两个抗共谋叛逆者追踪方案的密码学分析
引用本文:张学军. 两个抗共谋叛逆者追踪方案的密码学分析[J]. 西北师范大学学报(自然科学版), 2008, 44(1): 26-30
作者姓名:张学军
作者单位:西北师范大学教育技术与传播学院,甘肃兰州730070
基金项目:中国博士后科学基金 , 甘肃省教育厅科研项目
摘    要:王青龙等人提出了一种免共谋公钥叛逆者追踪方案,并称该方案具有抗共谋和更高的传输效率等优点.对此方案进行详细分析,发现它存在明显缺陷,提出了一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法进行追踪.王青龙等人还提出了一种完整的非对称公钥叛逆者追踪方案,并称该方案具有完善的撤销性和更高的传输效率等优点.对这个方案进行分析后发现它也存在明显缺陷,亦提出一种攻击方案,使得叛逆者可以进行共谋攻击,但是管理者却无法使用黑盒叛逆者追踪方法进行追踪.

关 键 词:叛逆者追踪  密码学分析  抗共谋  共谋攻击  抗共谋  叛逆者追踪方案  密码学分析  schemes  tracing  完善  非对称  追踪方法  黑盒  使用  管理者  共谋攻击  缺陷  存在  发现  传输效率  公钥  青龙
文章编号:1001-988X(2008)01-0026-05
收稿时间:2007-10-10
修稿时间:2007-12-24

Cryptanalysis of two collusion-resistant traitor tracing schemes
ZHANG Xue-jun. Cryptanalysis of two collusion-resistant traitor tracing schemes[J]. Journal of Northwest Normal University Natural Science (Bimonthly), 2008, 44(1): 26-30
Authors:ZHANG Xue-jun
Abstract:Wang Qing-long et al proposed a collusion-free public-key traitor tracing scheme, which claimed that it had some advantages such as collusion-resistant and higher transmission efficiency. This paper carefully analyzed the scheme and found obvious defect, then gave a attack, and traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method. Wang Qing-long et al proposed a complete asymmetric public-key traitor tracing scheme, which claimed that it had some advantages such as revoking unlimited traitors and higher transmission efficiency. This paper carefully analyzed the scheme and found obvious defect, then gave a attack, and traitors can perform a collusion attack, but the manager can not trace the traitors by the black-box traitor tracing method.
Keywords:traitor tracing   cryptanalysis   collusion-resistant   collusion attack
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号