DocumentCode :
1243278
Title :
Protecting cryptographic keys: the trace-and-revoke approach
Author :
Naor, Dalit ; Naor, Moni
Volume :
36
Issue :
7
fYear :
2003
fDate :
7/1/2003 12:00:00 AM
Firstpage :
47
Lastpage :
53
Abstract :
The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users, and a tracing algorithm uncovers a compromised key´s owner. The other method updates user keys to resecure a compromised network.
Keywords :
broadcasting; computer crime; copy protection; cryptography; content protection; cryptographic keys; encrypted data broadcasting; legitimate distribution channel; security; selected users; trace-and-revoke approach; tracing algorithm; user key updating; Cable TV; Computer crime; Cryptography; Fingerprint recognition; Hardware; Legislation; Privacy; Protection; TV broadcasting; Watermarking;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2003.1212690
Filename :
1212690
Link To Document :
بازگشت