Arjen Lenstra, Alexandre Karlov, Pascal Junod
Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of l legitimate users, then all traitors can be identified given the pirate key ...
Springer Verlag2009