Efficient and Secure Key Management for Conditional Access Systems

被引:7
|
作者
Pal, Om [1 ]
Alam, Bashir [2 ]
机构
[1] Govt India, Minist Elect & Informat Technol, New Delhi 110003, India
[2] Jamia Millia Islamia, Dept Comp Engn, Fac Engn & Technol, New Delhi 110025, India
关键词
Key distribution; key management; conditional access system; digital TV; pay-TV system; AUTHENTICATION SCHEME; PROTOCOL;
D O I
10.1109/TCE.2019.2959629
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Digital TV service, subscribers get the access of channels of their interest. In conditional access systems (CAS), Control Word is used to deliver the multimedia content to legitimate subscribers securely. In order to update the Control Word frequently, a large number of messages are exchanged in the conventional key distribution systems. This article analyzes the strengths and weaknesses of the existing key distribution protocols for CAS and presents an efficient key distribution protocol for CAS based on Elliptic Curve Cryptography. The proposed protocol minimizes the storage cost and communication cost of subscribers. In addition to this, the proposed protocol facilitates the unrestricted channel package composition and minimum communication cost on rekeying. The proposed protocol also provides perfect forward and backward secrecy. As a result, the proposed protocol is well suited for Pay-TV systems.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [1] Efficient and secure conditional access system for pay-TV systems
    Om Pal
    Bashir Alam
    Multimedia Tools and Applications, 2019, 78 : 18835 - 18853
  • [2] Efficient and secure conditional access system for pay-TV systems
    Pal, Om
    Alam, Bashir
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18835 - 18853
  • [3] An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
    Rajesh, K. V.
    Harini, P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (10): : 123 - 129
  • [4] A secure and lightweight cloud data deduplication scheme with efficient access control and key management
    Tang, Xinyu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Jiang, Xueru
    Liu, Yining
    COMPUTER COMMUNICATIONS, 2024, 222 : 209 - 219
  • [5] Key Management in Efficient and Secure Group Communication
    Yadav, Manisha
    Singh, Karan
    Pandey, Ajay Shekhar
    2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 196 - 203
  • [6] Efficient algorithms for secure multicast key management
    Khabiri, Elham
    Bettayeb, Said
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 787 - +
  • [7] Efficient Key Management for Secure Wireless Multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1131 - 1136
  • [8] Secure and efficient group key management with shared key derivation
    Lin, Jen-Chiun
    Huang, Kuo-Hsuan
    Lai, Feipei
    Lee, Hung-Chang
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 192 - 208
  • [9] A Conditional Access System with Efficient Key Distribution and Revocation for Mobile Pay-TV Systems
    Yeh, Lo-Yao
    Huang, Jiun-Long
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2013, 9 (03)
  • [10] Hierarchical Key Management Scheme with Multilevel Secure Access
    Ma, Mingxin
    Yang, Xiaotong
    Shi, Guozhen
    Li, Fenghua
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 97 - 102