We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. This is particularly important for broadcast and database access systems, where the data should be accessible only to authorized users. Such schemes are very relevant in the context of pay television, and easily combine with and complement the Broadcast Encryption schemes of [6].
CITATION STYLE
Chor, B., Fiat, A., & Naor, M. (1994). Tracing traitors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 839 LNCS, pp. 257–270). Springer Verlag. https://doi.org/10.1007/3-540-48658-5_25
Mendeley helps you to discover research relevant for your work.