Proceedings of the Korea Institutes of Information Security and Cryptology Conference (한국정보보호학회:학술대회논문집)
- 2002.11a
- /
- Pages.99-101
- /
- 2002
Cryptanalysis of Kim et al.'s Traitor Tracing Scheme on ACISP02
- Fangguo Zhang (International Research center for Information Security(IRIS) Information and Communications Univ.(ICU)) ;
- Kim, Kwangjo (International Research center for Information Security(IRIS) Information and Communications Univ.(ICU))
- Published : 2002.11.01
Abstract
At ACISP'02, H.J. Kim et al.[1] proposed a new traitor tracing scheme. However, this paper show that the proposed scheme is to be insecure by presenting a conspiracy attack. Using our attack, any two subscribers can collaborate to derive the secret key of the data supplier and tell or sell it to any body. Thus, the unauthorized user can always decrypt the encrypted session key with the decrypted session key. Also the two subscribers cannot be traced by the data supplier