Cryptography Reference
In-Depth Information
is using the broadcast encryption keys of the second user which will remain
uninidentified).
A trace and revoke scheme able to guard against pirate rebroadcasts is
implemented as part of the AACS standard [ 1 ]. The scheme is presented and
its security and performance analysed in Jin and Lotspiech[ 58 ], with further
analysis in [ 64 ] that revealed some limitations of that construction. In [ 65 ,
64 ] tracing and revoking pirate rebroadcasting was formally modelled and a
scheme for tracing and revoking an unlimited number of users was shown. We
outlined this scheme in Section 4.3 .
Search WWH ::




Custom Search