The Community for Technology Leaders
Green Image
Issue No. 07 - July (2003 vol. 36)
ISSN: 0018-9162
pp: 47-53
Dalit Naor , IBM Haifa Research Lab
Moni Naor , Weizmann Institute of Science
<p>Technology can offer options that apply any combination of content protection, hardware and software tamper resistance, or cryptographic keys to achieve content-ownership protection. The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users and uses a tracing algorithm to uncover the compromised key?s owner. The other method updates user keys to resecure a compromised network.</p><p></p>

D. Naor and M. Naor, "Protecting Cryptographic Keys: The Trace-and-Revoke Approach," in Computer, vol. 36, no. , pp. 47-53, 2003.
82 ms
(Ver 3.3 (11022016))