Cryptanalysis of BGW broadcast encryption schemes for DVD content protection

  • Authors:
  • Qianhong Wu;Willy Susilo;Yi Mu;Bo Qin

  • Affiliations:
  • Centre for Computer and Information Security Research, University of Wollongong, Wollongong, Australia;Centre for Computer and Information Security Research, University of Wollongong, Wollongong, Australia;Centre for Computer and Information Security Research, University of Wollongong, Wollongong, Australia;National Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China and Department of Mathematics, School of Science, Xi'an University of Technology, Xi'an, China

  • Venue:
  • ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security systems should not only be correctly devised but also be correctly used. In Crypto 2005, Boneh, Gentry and Waters (BGW) proposed two efficient broadcast encryption schemes proven secure in their security definition. They also suggested for a number of applications of their schemes including satellite TV subscription services and DVD content protections. In contrast to this suggestion, we show that any legitimate decoder(s) can collude with the revoked decoders to produce exponentially many equivalent decryption keys, and moreover, this activity cannot be traced by the dealer. Our results remind of abuse that their schemes are not suitable for the satellite TV subscription services or DVD content protection applications, although their schemesmay be applicable in trusted environments such as conference key distribution.