Cryptography Reference
In-Depth Information
is using the broadcast encryption keys of the second user which will remain
uninidentified).
A trace and revoke scheme able to guard against pirate rebroadcasts is
implemented as part of the AACS standard [
1
]. The scheme is presented and
its security and performance analysed in Jin and Lotspiech[
58
], with further
analysis in [
64
] that revealed some limitations of that construction. In [
65
,
64
] tracing and revoking pirate rebroadcasting was formally modelled and a
scheme for tracing and revoking an unlimited number of users was shown. We