Abstract
A variety of subscriptions in Conditional Access System (CAS) of DTV broadcasting network bring complexity to the key distribution scheme. In this paper, an innovation of hierarchical key distribution scheme for CAS in DTV broadcasting is proposed to reduce the computation of encryption and the number of messages for key refreshment. Compared with the conventional key distribution schemes, no encrypted message is distributed for key refreshment when a subscriber leaves. Further more, our hierarchical tree of key can provide a lot more dynamic management, from which broadcasters can improve efficiency in managing program channels.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ITU-R Rec. 810: Conditional-Access Broadcasting Systems (1992)
Lee, J.W.: Key Distribution and Management for Conditional Access System on DBS. In: Proc. Int. Conf. Cryptology and Information Security, pp. 82–86 (1996)
Tu, F., Laih, C., Tung, H.: On Key Distribution Management for Conditional Access System on Pay-TV System. IEEE Transactions on Consumer Electronics 45(1), 151–158 (1999)
Jiang, T., Zheng, S., Liu, B.: Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast. IEEE Transactions on Consumer Electronics 50(1), 225–230 (2004)
Huang, Y., Shieh, S., Ho, F., Wang, J.: Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems. IEEE Transactions On Multimedia 6(5), 760–769 (2004)
Liu, B., Zhang, W., Jiang, T.: A Scalable Key Distribution Scheme for Conditional Access System in Digital Pay-TV System. IEEE Transactions on Consumer Electronics 50(2), 632–637 (2004)
Akl, S.G., Taylor, P.D.: Cryptographic Solution to A Multilevel Security Problem. In: Proc. Crypto-82, Santa Barbara, CA, August 23-25, pp. 237–249 (1982)
Yang, C., Li, C.: Access Control in A Hierarchy Using One-Way Hash Functions. In: Computers & Security, pp. 659–664 (2004)
Hua, M., Zheng-wen, C.: A Traitor Tracing Scheme Based on RSA. Journal of Xidian University 31(4), 611–613 (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of the ACMÂ 21(2) (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, M., Zhang, M., Chen, X., Zhang, D., Huang, Z. (2007). A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_88
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)