Their construction relies on the Isomorphism of Polynomials (IP) problem. We here show how to strengthen this construction against algebraic attacks by concealing the underlying IP problems. Our modification is such that our description of the block cipher now does not give the expected results all the time and parallel executions are used to obtain the correct value.
Category / Keywords: public-key cryptography / Traitor tracing, Isomorphism of Polynomials (IP) problem, perturbation. Date: received 20 Feb 2006 Contact author: julien bringer at sagem com Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20060223:223232 (All versions of this report) Short URL: ia.cr/2006/064 Discussion forum: Show discussion | Start new discussion