A method for tracing traitor receivers in a broadcast encryption system. The method includes using a false key to encode plural subsets representing receivers in the system. The subsets are derived from a tree using a Subset-Cover system, and the traitor receiver is associated with one or more compromised keys that have been obtained by a potentially cloned pirate receiver. Using a clone of the pirate receiver, the identity of the traitor receiver is determined, or the pirate receiver clones are rendered useless for decrypting data using the compromised key by generating an appropriate set of subsets.

 
Web www.patentalert.com

< Location dependent key for decrypting copy protected material on a recording medium

< Managing database for reliably identifying information of device generating digital signatures

> Account-based digital signature (ABDS) system

> Method for synchronizing a plurality of chaotic systems and method for multichannel communication using synchronized chaotic systems

~ 00243