Title :
Protecting cryptographic keys: the trace-and-revoke approach
Author :
Naor, Dalit ; Naor, Moni
fDate :
7/1/2003 12:00:00 AM
Abstract :
The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users, and a tracing algorithm uncovers a compromised key´s owner. The other method updates user keys to resecure a compromised network.
Keywords :
broadcasting; computer crime; copy protection; cryptography; content protection; cryptographic keys; encrypted data broadcasting; legitimate distribution channel; security; selected users; trace-and-revoke approach; tracing algorithm; user key updating; Cable TV; Computer crime; Cryptography; Fingerprint recognition; Hardware; Legislation; Privacy; Protection; TV broadcasting; Watermarking;
DOI :
10.1109/MC.2003.1212690