Efficient and Secure Key Management for Conditional Access Systems

被引:7
|
作者
Pal, Om [1 ]
Alam, Bashir [2 ]
机构
[1] Govt India, Minist Elect & Informat Technol, New Delhi 110003, India
[2] Jamia Millia Islamia, Dept Comp Engn, Fac Engn & Technol, New Delhi 110025, India
关键词
Key distribution; key management; conditional access system; digital TV; pay-TV system; AUTHENTICATION SCHEME; PROTOCOL;
D O I
10.1109/TCE.2019.2959629
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Digital TV service, subscribers get the access of channels of their interest. In conditional access systems (CAS), Control Word is used to deliver the multimedia content to legitimate subscribers securely. In order to update the Control Word frequently, a large number of messages are exchanged in the conventional key distribution systems. This article analyzes the strengths and weaknesses of the existing key distribution protocols for CAS and presents an efficient key distribution protocol for CAS based on Elliptic Curve Cryptography. The proposed protocol minimizes the storage cost and communication cost of subscribers. In addition to this, the proposed protocol facilitates the unrestricted channel package composition and minimum communication cost on rekeying. The proposed protocol also provides perfect forward and backward secrecy. As a result, the proposed protocol is well suited for Pay-TV systems.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [31] Efficient key management for secure group communications with bursty behavior
    Zou, XK
    Ramamurthy, B
    Magliveras, S
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2002, : 148 - 153
  • [32] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [33] Efficient and secure group key management for high delay networks
    Wang, Wei
    Li, Fenghua
    Ma, Jianfeng
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04): : 721 - 726
  • [34] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [35] Secure and Efficient Key Management Protocol in Ad hoc Networks
    Zhang Chuanrong
    Zhang Yuqing
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 986 - +
  • [36] Efficient key management for cryptographically enforced access control
    Zych, Anna
    Petkovic, Milan
    Jonker, Willem
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 410 - 417
  • [37] An efficient key exchange protocol for cryptographically secure CDMA systems
    Shepherd, SJ
    Barton, SK
    Kemp, AH
    PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, 1997, : 480 - 484
  • [38] Java']Javacard-based two-level user key management for IP conditional access systems
    Moon, Jinyoung
    Park, Jongyoul
    Paik, Euihyun
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 495 - 499
  • [39] On key distribution management for conditional access system on Pay-TV System
    Tu, FK
    Laih, CS
    Tung, HH
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (01) : 151 - 158
  • [40] A secure group key management scheme for wireless cellular systems
    Um, Hwayoung
    Delp, Edward J.
    International Journal of Network Security, 2008, 6 (01) : 40 - 52