This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Protecting Cryptographic Keys: The Trace-and-Revoke Approach
July 2003 (vol. 36 no. 7)
pp. 47-53
Dalit Naor, IBM Haifa Research Lab
Moni Naor, Weizmann Institute of Science

Technology can offer options that apply any combination of content protection, hardware and software tamper resistance, or cryptographic keys to achieve content-ownership protection. The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users and uses a tracing algorithm to uncover the compromised key?s owner. The other method updates user keys to resecure a compromised network.

Citation:
Dalit Naor, Moni Naor, "Protecting Cryptographic Keys: The Trace-and-Revoke Approach," Computer, vol. 36, no. 7, pp. 47-53, July 2003, doi:10.1109/MC.2003.1212690
Usage of this product signifies your acceptance of the Terms of Use.