Efficient key Distribution Schemes for Secure Media Delivery in Pay-TV Systems Source: IEEE TRANS. ON MULTIMEDIA, VOL. 6,NO. 5, OCTOBER 2004 Authors: Yu-Lun.

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Multimedia Broadcast/Multicast Service (MBMS)
Secure Data Aggregation in Wireless Sensor Networks: A Survey Yingpeng Sang, Hong Shen Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Proceedings of the Seventh.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
Pay-TV System with Strong Privacy and Non-Repudiation Protection Ronggong Song, Larry Korba IEEE Transactions on Consumer Electronics Vol.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Group Key Distribution Scheme in Digital Pay-TV Systems Adviser: Min-Shiang Hwang Reporter: Chun-Ta Li ( 李俊達 ) Date: 2006/06/13.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Lightweight Mutual Authentication for IoT and Its Applications
Proxy Blind Signature Scheme
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Efficient Time-Bound Hierarchical Key Assignment Scheme
Chair Professor Chin-Chen Chang Feng Chia University
Privacy Preserving Ranked Multi-Keyword
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Source : IEEE Access, Vol. 6, pp , Jan. 2018
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Secret Image Sharing Based on Encrypted Pixels
Authors: Y.L. Huang, S.P. Shieh, F.S. Ho, and J.C. Wang
Privacy Protection for E-Health Systems by
Rich QR Codes With Three-Layer Information Using Hamming Code
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

Efficient key Distribution Schemes for Secure Media Delivery in Pay-TV Systems Source: IEEE TRANS. ON MULTIMEDIA, VOL. 6,NO. 5, OCTOBER 2004 Authors: Yu-Lun Huang, Shiuhpyng Shieh, Fu-Shen Ho, and Jian-Chyuan Wang Speaker: LIN, KENG-CHU

Outline Introduction Preliminary Protocol Conclusion

Introduction Pay-TV systems Problem in Pay-TV systems. Channel protection Goal for this paper: Correct for authorized Efficient

Preliminary CAS (Control Access System) Member: Service provider, Subscribers Method: scramble function Mode: Subscription channel and PPV

Preliminary Related Work: Three-level key hierarchy CW, AK, DK Four-level key hierarchy (1)UK is added. (2)CW, DEK, DK, MPK …1996

Protocol Four-level key hierarchy CW,AK,DK,SK Schemes for subscription channel Group-oriented key distribution scheme. Rating-oriented key distribution scheme. Scheme for PPV Dynamic key distribution

Protocol- Group-oriented key distribution scheme Smart Card Initial Phase SP ( Service Provider) =[dk 1, dk 2,…, dk m ] where ak 1 =D ⊕ dk 1 Ak j =ak j-1 ⊕ dkj S i Subscriber dk j i randomly choose if G j SG i otherwise dk j i = (dk 1 ⊕ dk2 ⊕ … ⊕ dkj ) ⊕ (dk 1 i ⊕ … ⊕ dk j i ) for G SG i ak 1 i =D ⊕ dk j i ak j i =ak j-1 i ⊕ dk j i

Protocol- Group-oriented key distribution scheme Update Phase

Protocol- Rating-oriented key distribution scheme Smart Card Initial Phase

Protocol- Rating-oriented key distribution scheme Update Phase

S1S1 (GP 1 ) Protocol- dynamical key distribution for PPV S2S2 S3S3 S4S4 S5S5 S6S6 S7S7 SP (GP 1,GP 2 ) {ak current } sk1 {ak current } sk2 {ak current } sk3 {GP 1,ak current } sk4 {GP 2 } akcurrent {GP 1,GP 2,ak current } sk7 {GP 3,ak current } sk6 {GP 3,ak current } sk5 {GP3} akcurrent GP 2 GP 1 GP 1,GP 2 GP 1,GP 3 GP 2,GP 3 GP 1,GP 3 (GP 1,GP 2,GP 3 ) ak new =H(ak current,GP 2 ) (ak new )sk 5 (ak new )sk 6

Protocol- Analysis SubscriptionPPV AK updateJoinLeave Message Transmitted Group-Oriented12k Rating-Oriented1 Computation Cost Group-Orientedp XOR2 encrypt1 hash (k-1) encrypt Rating-Orientedq encrypt m: subscriber groups p: channel groups k: max number of subscribers in each subscriber group in PPV channel q: channel rating

Conclusion It is not efficient for malicious participant. Still can be improved Propose a easy way to arrive part of the goal.

Pay-TV systems

Protocol- Notation Group-oriented key distribution scheme

Protocol- Notation Rating-oriented key distribution scheme