Key Management Schemes with Traitor Tracing Mechanism