A three word description for what traitor tracing aims to achieve is key leakage deterrence. Arguably the single most important problem in the application of cryptography is key management. Keys that are lost imply loss of data and keys that are exposed imply loss of privacy. In the context of digital content distribution the problem is heavily exacerbated by the fact that cryptographic keys reside within a possibly adversarial environment.
KeywordsExpense Encapsulation Sudan
Unable to display preview. Download preview PDF.