Tracing traitors

511Citations
Citations of this article
67Readers
Mendeley users who have this article in their library.

Abstract

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. This is particularly important for broadcast and database access systems, where the data should be accessible only to authorized users. Such schemes are very relevant in the context of pay television, and easily combine with and complement the Broadcast Encryption schemes of [6].

Cite

CITATION STYLE

APA

Chor, B., Fiat, A., & Naor, M. (1994). Tracing traitors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 839 LNCS, pp. 257–270). Springer Verlag. https://doi.org/10.1007/3-540-48658-5_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free