A survey on Traitor Tracing Schemes
When intellectual properties are distributed over a broadcast network, the content is usually encrypted in a way such that only authorized users who have a certain set of keys, can decrypt the content. Some authorized users may be willing to disclose their keys in constructing a pirate decoder whi...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
University of Waterloo
2006
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/1108 |