Forgery attack to an asymptotically optimal traitor tracing scheme

  • Authors:
  • Yongdong Wu;Feng Bao;Robert H. Deng

  • Affiliations:
  • Institute for Infocomm Research, A-Star, Singapore;Institute for Infocomm Research, A-Star, Singapore;School of Information Systems, Singapore Management University

  • Venue:
  • ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the forgery attack, two traitors can collude to forge all valid decryption keys. The forged keys appear as perfect genuine keys, can decrypt all protected content, but are untraceable by the tracer. Fortunately, we can patch this weakness with increasing the decoder storage.