Authors: Y.L. Huang, S.P. Shieh, F.S. Ho, and J.C. Wang

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Efficient key Distribution Schemes for Secure Media Delivery in Pay-TV Systems Source: IEEE TRANS. ON MULTIMEDIA, VOL. 6,NO. 5, OCTOBER 2004 Authors: Yu-Lun.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMPT771 Presentation Xu Cheng Internet Protocol Television (IPTV)
IPTV Internet Protocol Television Chris Hall. Two Major Providers Of IPTV.
Multimedia Broadcast/Multicast Service (MBMS)
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
W EB R ESOURCES Michelle Stabile. PODCAST Video podcast is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Digital Addressable Systems
Michael Marino.  Video podcast is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures. The term is an.
Delivering Video over IP
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Internet Protocol Television. Table of Contents IPTV – Definition History IPTV services in the World IPTV - in numbers What Is IPTV TV distribution methods.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Internet Protocol TeleVision
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 4, APRIL 2012 Citation:42.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
A Cooperative Multicast Scheduling Scheme for Multicast Services in IEEE Networks Fen Hou, Pin-Han Ho, and Lin X Cai Dept. of Electrical and Computer.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Electronic Commerce: An Overview John R. Durrett ISQS 6343.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
A Secure and Efficient Application Download Architecture in 3G Mobile Environment Speaker: Kuo-Zhe Chiou Laboratory of Cryptography and Information Security.
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
INTERNET PROTOCOL TELEVISION (IP-TV)
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Non-PKI Methods for Public Key Distribution
Lightweight Mutual Authentication for IoT and Its Applications
Proxy Blind Signature Scheme
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Control of the Press.
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Digital Addressable Systems
A Novel Group Key Transfer Protocol
Efficient Time-Bound Hierarchical Key Assignment Scheme
Key agreement in wireless sensor network
Source: IEEE Transactions on Information Forensics and Security, Vol
Unit 7: National Media- Sky
INTERNET PROTOCOL TELEVISION (IP-TV)
DIGITAL TERRESTRIAL TELEVISION PRESENTATION TO PORTFOLIO COMMITTEE ON COMMUNICATIONS: PAY TV TRIAL 17 JUNE 2008.
The Vast Majority of US Households, Nearly 100 Million, Subscribe To A Cable, Satellite, Or Telco Service Cable+ Households (000) 85% of Total TV HHs 84%
A new two-level QR code with visual cryptography scheme
A Novel Latin Square-based Secret Sharing for M2M Communications
Secure Electronic Transactions (SET)
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Enhanced Mobility Management Approach for Wireless IP Networks
Electronic Payment Security Technologies
Privacy Protection for E-Health Systems by
A Model For Network Security
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems Authors: Y.L. Huang, S.P. Shieh, F.S. Ho, and J.C. Wang Source: accepted for publication on IEEE Transactions on Multimedia Data: 2003/06/19 Speaker: Iuon-Chang Lin

Service Provider /Broadcaster (SP) Set-top-box (STB) Service Request Service Response Customer Service Provider /Broadcaster (SP) Television Subscription channel : a subscriber subscribes a channel for a period of a time. Pay-per-view channel : a subscriber pays for each single program

Key Distribution Scheme for Subscription Channel Protection Goal : only authorized subscribers can descramble the programs correctly Four-key Hierarchy : CW: Control Word AK: Authentication Key AK={ak1, ak2, … ,akm} DK: Distribution Key DK={dk1, dk2, … ,dkm} SK: Secret Key

Subscription Channel Groups G1ABC G2BBS G3ESPN G4HBO G5Discovery G6 Sunmovie . . . SG1: {ABC, HBO, Discovery} SG2: {BBC, Sunmovie, Discovery} SGn: {ESPN, HBO, Discovery} AK1, DK1 AK2, DK2 AKn, DKn SG1={G1, G4, G5} AK1={ak1, ak2, ak3, ak4, ak5, ak6} DK1={dk1, dk2, dk3, dk4, dk5, dk6}

Subscription Channel Based Protocol-Initial Phase ak1=Ddk1 ak2=ak1dk2 ak3=ak2dk3 ak4=ak3dk4

Subscription Channel Based Protocol-Update Phase

Key Distribution Scheme for Pay-Per-View Channel Protection Three-key Hierarchy : CW: Control Word AK: Authentication Key AK={ak1, ak2, … ,akm} SK: Secret Key

PPV Based Protocol

Comparisons (1) Comparison in terms of number of message transmissions M: # of subscriber groups P: # of channel groups K: max # of subscribers in each subscriber group in PPV channel

Comparison in terms of computational cost Comparisons (2) Comparison in terms of computational cost M: # of subscriber groups P: # of channel groups K: max # of subscribers in each subscriber group in PPV channel

Conclusions