Tracing traitors

Benny Chor, Amos Fiat, Moni Naor

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. This is particularly important for broadcast and database access systems, where the data should be accessible only to authorized users. Such schemes are very relevant in the context of pay television, and easily combine with and complement the Broadcast Encryption schemes of [6].

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings
EditorsYvo G. Desmedt
PublisherSpringer Verlag
Pages257-270
Number of pages14
ISBN (Print)9783540583332
DOIs
StatePublished - 1994
Event14th Annual International Cryptology Conference, CRYPTO 1994 - Santa Barbara , United States
Duration: 21 Aug 199425 Aug 1994

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume839 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th Annual International Cryptology Conference, CRYPTO 1994
Country/TerritoryUnited States
CitySanta Barbara
Period21/08/9425/08/94

Fingerprint

Dive into the research topics of 'Tracing traitors'. Together they form a unique fingerprint.

Cite this