I'm doing a project on Broadcast Encryption and need some help with the implementation details...

The project involves implementing a simple broadcast encryption scheme on a LAN. Once this is done, I plan to experiment with some traitor tracing schemes....I'm expecting the traitor-tracing part to be more fun and hence wud like to get over with the implementation part as soon as possible....

I have been told to refer to Wallner et al. and Wong et. al. for the implementation details..any one's got any more ideas or simpler methods in mind..let me know plz as soon as possible..

NulTraX