Traitor Tracing

Part of the Advances in Information Security book series (ADIS, volume 52)


A three word description for what traitor tracing aims to achieve is key leakage deterrence. Arguably the single most important problem in the application of cryptography is key management. Keys that are lost imply loss of data and keys that are exposed imply loss of privacy. In the context of digital content distribution the problem is heavily exacerbated by the fact that cryptographic keys reside within a possibly adversarial environment.


Expense Encapsulation Sudan 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Department of Informatics and Telecommunications PanepistimiopolisNational and Kapodistrian University of AthensAthensGreece
  2. 2.Division of Mathematical Sciences School of Physical and Mathematical SciencesNanyang Technological UniversitySingaporeSingapore

Personalised recommendations