DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, CH | - |
dc.contributor.author | Hwang, YH | - |
dc.contributor.author | Lee, PJ | - |
dc.date.accessioned | 2016-04-01T02:14:44Z | - |
dc.date.available | 2016-04-01T02:14:44Z | - |
dc.date.created | 2009-03-20 | - |
dc.date.issued | 2005-01 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.other | 2005-OAK-0000004917 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/24741 | - |
dc.description.abstract | A Pay-TV scheme broadcasts a set of services or streams instead of one. That is, a pay-TV scheme is a specific application of a broadcast encryption scheme in which the secret to be broadcast is associated with a number of services. For example, a pay-TV broadcaster offers various channels such as a sports channel, a movie channel, and so on. A traitor tracing scheme is a variant of a broadcast encryption scheme, so can be applied to construct a pay-TV scheme. However, because most known traitor tracing schemes deal with the broadcast of a single stream, a direct extension to multiple streams is too inefficient, i.e., direct extension to an m-stream case would involve an m-fold increase in the user's secret keys. In other words, if the number of streams to be sent increases, the number of secret keys each user must store in a secure memory also linearly increases. Therefore, we require a specific traitor tracing scheme which can be efficiently applied to a pay-TV scheme. We propose a new traitor tracing scheme for multiple channels and its application to a pay-TV scheme. The number of secret keys each user must store in a secure memory is just one regardless of the number of channels and it cannot be changed. Our scheme has a revocation property, i.e., we can revoke some users without redistributing a new secret key to other un-revoked users. Our scheme also provides a so called holding property - we can revoke some users and un-revoke them without redistribution of new keys after some period. This is very useful in a pay-TV scheme since a user may wish to un-subscribe from a channel for some periods and resubscribe again later. Moreover, our pay-TV scheme is based on a public key traitor tracing scheme. Therefore, any content provider can send encrypted data to users with the public key the system manager provides. Our scheme can also be extended to provide asymmetric property and be secure against the adaptive chosen ciphertext attack. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.relation.isPartOf | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.subject | CHOSEN CIPHERTEXT ATTACK | - |
dc.subject | SECURE | - |
dc.subject | TRACEABILITY | - |
dc.title | Practical pay-TV scheme using traitor tracing scheme for multiple channels | - |
dc.type | Article | - |
dc.contributor.college | 전자전기공학과 | - |
dc.identifier.doi | 10.1007/978-3-540-31815-6_22 | - |
dc.author.google | Kim, CH | - |
dc.author.google | Hwang, YH | - |
dc.author.google | Lee, PJ | - |
dc.relation.volume | 3325 | - |
dc.relation.startpage | 264 | - |
dc.relation.lastpage | 277 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Conference Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.264 - 277 | - |
dc.identifier.wosid | 000227471900022 | - |
dc.date.tcdate | 2019-02-01 | - |
dc.citation.endPage | 277 | - |
dc.citation.startPage | 264 | - |
dc.citation.title | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.citation.volume | 3325 | - |
dc.contributor.affiliatedAuthor | Lee, PJ | - |
dc.identifier.scopusid | 2-s2.0-23944432365 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 2 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.