Tracing Traitors

  • Authors:
  • Benny Chor;Amos Fiat;Moni Naor

  • Affiliations:
  • -;-;-

  • Venue:
  • CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. This is particularly important for broadcast and database access systems, where the data should be accessible only to authorized users. Such schemes are very relevant in the context of pay television, and easily combine, with and complement the Broadcast Encryption schemes of [6].