A three word description for what traitor tracing aims to achieve is key leakage deterrence. Arguably the single most important problem in the application of cryptography is key management. Keys that are lost imply loss of data and keys that are exposed imply loss of privacy. In the context of digital content distribution the problem is heavily exacerbated by the fact that cryptographic keys reside within a possibly adversarial environment.
KeywordsEncryption Scheme Success Probability Random String Bibliographic Note Broadcast Encryption
Unable to display preview. Download preview PDF.