2011 13th Asia-Pacific Network Operations and Management Symposium 2011
DOI: 10.1109/apnoms.2011.6077025
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems

Abstract: Pay-TV has become a popular subscribed-based service in recent years. To prevent unauthorized access from non-paid users over a broadcast channel, the TV server usually encrypts TV programs into ciphertexts such that only the legal members can decrypt them. The way of maintaining the common decryption key of a TV program to a dynamic subscription group of members is called the group key management.In this paper, we propose a secure and efficient tree-based group key management scheme that is very suitable for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…The proposed protocol satisfies the specific requirements for a Pay-TV system as discussed in [1] and [2], have less computational overheads than others existing protocols and free from the bilinear pairing, which is identified as a more complex mathematical operation. The present paper also gives the security justification of proposed protocol which shows that it is secure against various attacks.…”
Section: Introductionmentioning
confidence: 89%
“…The proposed protocol satisfies the specific requirements for a Pay-TV system as discussed in [1] and [2], have less computational overheads than others existing protocols and free from the bilinear pairing, which is identified as a more complex mathematical operation. The present paper also gives the security justification of proposed protocol which shows that it is secure against various attacks.…”
Section: Introductionmentioning
confidence: 89%
“…KDC uses a tree called Logical Key Hierarchy (LKH) or key tree for group key management. The tree based scheme in [6] uses KDC. Research on group key agreement protocols started in 1982.…”
Section: Introductionmentioning
confidence: 99%
“…The number of users is often large in cloud-based services. One solution to deal with this issue is to apply a treebased group key management (GKM) scheme [10,11,28] to maintain the common distribution-key among a dynamic set of users at each class. The GKM scheme reduces the computation and communication cost from O(n i ) to O(lg n i ), where n i is the number of users in SC i .…”
Section: Scalable Rekey Mechanism For Large Number Of Usersmentioning
confidence: 99%
“…The GKM scheme reduces the computation and communication cost from O(n i ) to O(lg n i ), where n i is the number of users in SC i . In particular, the GKM schemes in [10,11] have an efficient rekey mechanism for a user who may miss key update messages in his off-line period. The methods are suitable in handing frequent rekey operations.…”
Section: Scalable Rekey Mechanism For Large Number Of Usersmentioning
confidence: 99%