Title of article :
Protecting cryptographic keys: the trace-and-revoke approach
Author/Authors :
D.، Naor, نويسنده , , M.، Naor, نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2003
Abstract :
The authors describe two methods for protecting content by creating a legitimate distribution channel. One method broadcasts encrypted data to a selected set of users, and a tracing algorithm uncovers a compromised keyʹs owner. The other method updates user keys to resecure a compromised network.
Keywords :
black hole physics , gravitational waves