Cryptanalysis of Kim et al.'s Traitor Tracing Scheme on ACISP02

  • Fangguo Zhang (International Research center for Information Security(IRIS) Information and Communications Univ.(ICU)) ;
  • Kim, Kwangjo (International Research center for Information Security(IRIS) Information and Communications Univ.(ICU))
  • Published : 2002.11.01

Abstract

At ACISP'02, H.J. Kim et al.[1] proposed a new traitor tracing scheme. However, this paper show that the proposed scheme is to be insecure by presenting a conspiracy attack. Using our attack, any two subscribers can collaborate to derive the secret key of the data supplier and tell or sell it to any body. Thus, the unauthorized user can always decrypt the encrypted session key with the decrypted session key. Also the two subscribers cannot be traced by the data supplier

Keywords