Issue No. 07 - July (2003 vol. 36)
Dalit Naor , IBM Haifa Research Lab
Moni Naor , Weizmann Institute of Science
<p>Technology can offer options that apply any combination of content protection, hardware and software tamper resistance, or cryptographic keys to achieve content-ownership protection. The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users and uses a tracing algorithm to uncover the compromised key?s owner. The other method updates user keys to resecure a compromised network.</p><p></p>
D. Naor and M. Naor, "Protecting Cryptographic Keys: The Trace-and-Revoke Approach," in Computer, vol. 36, no. , pp. 47-53, 2003.