Abstract
There is an increasing demand of securely selling pay-TV channels to large organizations such as chained hotels. Most solutions usually employ a key generation authority to distribute secret access credentials for all users, which would cause the single-point problem of inefficient key management. Further, there is a risk of the leakage of users’ access credentials while countermeasures to find out the leaked credentials are lacking. To address such issues, we propose a leakage traceable hierarchical key distribution (LTHKD) framework with the key delegation and the key-leakage tracing. The key delegation allows the key generation authority to apportion the tasks of access credential generation to a number of group authorities; the tracing mechanism provides an efficient method to find out the leaked access credentials. We present a concrete LTHKD scheme by extending hierarchical identity-based encryption to groups with users’ access credentials elegantly encoded by unique fingerprint codes. We formally prove the security of the proposed scheme in a rigorous definition and conduct thorough theoretical and experimental analyses to evaluate the system performance. Surprisingly, the results show that the added key-leakage tracing mechanism has little affection on data encryption and decryption procedures.
Similar content being viewed by others
References
Abdalla, M., Dent, A.W., Malone-Lee, J., Neven, G., Phan, D.H., Smart, N.P.: Identity-based traitor tracing. In: Proceeding of the Public Key Cryptography-PKC 2007, pp. 361–376. Beijing, China (2007)
Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 501–510. Alexandria, USA (2008)
Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), pp. 425–434. Kyoto, Japan (2014)
Deng, H., Wu, Q., Qin, B., Liu, J., Mao, J.: Securely selling TV programs to chained hotels: leakage traceable hierarchical key distribution. In: Proceedings of the 2014 Communications Security Conference (CSC 2014), pp. 156–161. IET Press, Beijing, China (2014)
Fatemi, M., Salimi, S., Salahi, A.: Anonymous roaming in universal mobile telecommunication system mobile networks. IET Inf. Secur. 4(2), 93–103 (2010)
Fiat, A., Naor, M.: Broadcast encryption. In: Proceedings of the Advances in Cryptology-CRYPTO 1993, p. 480C491. Santa Barbara, USA (1993)
Gritti, C., Susilo, W., Plantard, T., Liang, K., Wong, D.S.: Broadcast encryption with dealership. J. Inf. Secur. Int. (2015). doi:10.1007/s10207-015-0285-x
Guo, F., Mu, Y., Susilo, W.: Identity-based traitor tracing with short private key and short ciphertext. In: Proceedings of the European Symposium on Research in Computer Security, pp. 609–626. Pisa, Italy (2012)
Kogan, N., Shavitt, Y., Wool, A.: A practical revocation scheme for broadcast encryption using smart cards. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 225–235. Berkeley, USA (2003)
Kogan, N., Tassa, T.: Improved efficiency for revocation schemes via newton interpolation. ACM Trans. Inf. Syst. Secur. 9(4), 461–486 (2006)
Lee, J.W.: Key distribution and management for conditional access system on DBS. In: Proceedings of the International Conference on Cryptology and Information Security, p. 82C86 (1996)
Lee, N., Chang, C., Lin, C., Hwang, T.: Privacy and non-repudiation on pay-TV systems. IEEE Trans. Consum. Electron. 46(1), 20–27 (2000)
Liu, Z., Wang, D.S.: Practical attribute-based encryption: traitor tracing, revocation and large universe. Comput. J. (2015). doi:10.1093/comjnl/bxv101
Liu, B., Zhang, W., Jiang, T.: A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans. Consum. Electron. 50(2), 632–637 (2004)
Sun, H.-M., Leu, M.-C.: An efficient authentication scheme for access control in mobile pay-tv Systems. IEEE Trans. Multimedia 11(5), 947–959 (2009)
Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the ACM Symposium on Theory of Computing 2003, pp. 116–125. San Diego, USA (2003)
Tu, F.-K., Laih, C.-S., Tung, H.-H.: On key distribution management for conditional access system on pay-TV system. IEEE Trans. Consum. Electron. 45(1), 151–158 (1999)
Wang, H.: Insecurity of ’Improved anonymous multi-receiver identity-based encryption’. Comput. J. 57(4), 636–638 (2013)
Waters, B.: Efficient identity-based encryption without random oracles. In: Proceedings of the Advances in Cryptology-EUROCRYPT 2005, pp. 114–127. Aarhus, Denmark (2005)
Wan, Z., Liu, J., Zhang, R., Deng, R.H.: A collusion-resistant conditional access system for flexible-pay-per-channel pay-tv broadcasting. IEEE Trans. Multimedia 15(6), 1353–1364 (2013)
Wang, S.-Y., Laih, C.-S.: Efficient key distribution for access control in pay-tv systems. IEEE Trans. Multimedia 10(3), 480–492 (2008)
Wang, H., Qin, B.: Improved one-to-many authentication scheme for access control in pay-tv systems. IET Syst. Secur. 6(4), 281–290 (2012)
Acknowledgements
Funding was provided by National Key Basic Research Program (973 program) (grant no. 2012CB315905), National Natural Science Foundation of China (CN) (grant no. 61370190), Natural Science Foundation of Jilin Province (CN) (grant no. 61472429), Natural Science Foundation of China (grant no. 61472083), Beijing Natural Science Foundation (grant nos. 4132056, 4122041), and Research Funds of Renmin University of China (grant no. 14XNLF02).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Deng, H., Zhou, Y., Wu, Q. et al. Secure pay-TV for chained hotels. Int. J. Inf. Secur. 17, 33–42 (2018). https://doi.org/10.1007/s10207-016-0354-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-016-0354-9