Open Access System for Information Sharing

Login Library

 

Article
Cited 2 time in webofscience Cited 8 time in scopus
Metadata Downloads

Practical pay-TV scheme using traitor tracing scheme for multiple channels SCIE SCOPUS

Title
Practical pay-TV scheme using traitor tracing scheme for multiple channels
Authors
Kim, CHHwang, YHLee, PJ
Date Issued
2005-01
Publisher
SPRINGER-VERLAG BERLIN
Abstract
A Pay-TV scheme broadcasts a set of services or streams instead of one. That is, a pay-TV scheme is a specific application of a broadcast encryption scheme in which the secret to be broadcast is associated with a number of services. For example, a pay-TV broadcaster offers various channels such as a sports channel, a movie channel, and so on. A traitor tracing scheme is a variant of a broadcast encryption scheme, so can be applied to construct a pay-TV scheme. However, because most known traitor tracing schemes deal with the broadcast of a single stream, a direct extension to multiple streams is too inefficient, i.e., direct extension to an m-stream case would involve an m-fold increase in the user's secret keys. In other words, if the number of streams to be sent increases, the number of secret keys each user must store in a secure memory also linearly increases. Therefore, we require a specific traitor tracing scheme which can be efficiently applied to a pay-TV scheme. We propose a new traitor tracing scheme for multiple channels and its application to a pay-TV scheme. The number of secret keys each user must store in a secure memory is just one regardless of the number of channels and it cannot be changed. Our scheme has a revocation property, i.e., we can revoke some users without redistributing a new secret key to other un-revoked users. Our scheme also provides a so called holding property - we can revoke some users and un-revoke them without redistribution of new keys after some period. This is very useful in a pay-TV scheme since a user may wish to un-subscribe from a channel for some periods and resubscribe again later. Moreover, our pay-TV scheme is based on a public key traitor tracing scheme. Therefore, any content provider can send encrypted data to users with the public key the system manager provides. Our scheme can also be extended to provide asymmetric property and be secure against the adaptive chosen ciphertext attack.
Keywords
CHOSEN CIPHERTEXT ATTACK; SECURE; TRACEABILITY
URI
https://oasis.postech.ac.kr/handle/2014.oak/24741
DOI
10.1007/978-3-540-31815-6_22
ISSN
0302-9743
Article Type
Article
Citation
LECTURE NOTES IN COMPUTER SCIENCE, vol. 3325, page. 264 - 277, 2005-01
Files in This Item:
There are no files associated with this item.

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse