Sciweavers

CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 8 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor