Sciweavers

CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 11 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor