Abstract

ZHANG Xue-jun et al.presented two multi-oriented traitor tracing schemes with full collusion resistance.They asserted that it was computationally infeasible for any number of users to get a different key by collusion.Here,these two schemes were cryptographically analyzed and a concrete collusion attack method was proposed based on simple linear combination which three or more traitors can build more than one valid decryption key.Further,these traitors cannot be identified by using black box tracing method.The result show that neither of the two traitor tracing schemes accomplish the full collusion resistance because of their intrinsic flaws.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.