Protecting Cryptographic Keys: The Trace-and-Revoke Approach

  • Authors:
  • Dalit Naor;Moni Naor

  • Affiliations:
  • -;-

  • Venue:
  • Computer
  • Year:
  • 2003

Quantified Score

Hi-index 4.10

Visualization

Abstract

Technology can offer options that apply any combination of content protection, hardware and software tamper resistance, or cryptographic keys to achieve content-ownership protection. The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users and uses a tracing algorithm to uncover the compromised key's owner. The other method updates user keys to resecure a compromised network.