作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (20): 165-166. doi: 10.3969/j.issn.1000-3428.2009.20.058

• 安全技术 • 上一篇    下一篇

叛逆者追踪方案的密码学分析

张建中1,王永峰1,王翠玲2   

  1. (1. 陕西师范大学数学与信息科学学院,西安 710062;2. 哈尔滨理工大学测控技术与通信工程学院,哈尔滨 150080)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-10-20 发布日期:2009-10-20

Cryptanalysis of Traitor Tracing Scheme

ZHANG Jian-zhong1, WANG Yong-feng1, WANG Cui-ling2   

  1. (1. College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062;2. School of Measurement-Control Tech. & Communications Engineering, Harbin University of Science & Technology, Harbin 150080)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-10-20 Published:2009-10-20

摘要: 对一种叛逆者追踪方案提出安全性分析,指出它存在的安全缺陷有被撤销的叛逆者可以在合法用户的帮助下继续解密新密文及合法用户可以合谋伪造有效的解密密钥。提出伪造攻击方案,并给出方案被攻击的原因。指出方案的一个设计错误,说明该方案在实际操作上是不可行的。

关键词: 叛逆者追踪, RSA算法, 合谋攻击

Abstract: Cryptanalysis of a traitor tracing scheme shows that it exists follow security deficiencies: the revoked traitor can decrypt new ciphertext under the help of legitimate user; legitimate users can forge effective decryption key if they conspire. This paper proposes forgery attack scheme and gives the reason why it is attacked. This paper points out one mistake in designation of the scheme, which explains it is not feasible in the actual operation.

Key words: traitor racing, RSA algorithm, colluding attack

中图分类号: