2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2015
DOI: 10.1109/icacci.2015.7275902
|View full text |Cite
|
Sign up to set email alerts
|

Design of efficient ID-based group key agreement protocol suited for Pay-TV application

Abstract: Pay-TV application is one of the challenging home appliances where a TV program is delivered to a group of customers. The broadcaster of the Pay-TV system needs to assure that only legitimate subscribers/customers can watch the subscribed TV program. To deliver a TV program confidentially to its subscribers, the broadcaster may encrypt the program by a group key shared by all subscribers. Thus the Pay-TV system often requires a group key establishment protocol to establish a symmetric key among all the subscri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2025
2025

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…There are many key distribution protocols existing in the literature. In these protocols, different types of group members obtain a new group‐key for encrypting the multimedia data for every session.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are many key distribution protocols existing in the literature. In these protocols, different types of group members obtain a new group‐key for encrypting the multimedia data for every session.…”
Section: Literature Surveymentioning
confidence: 99%
“…The protocols generally requires O (n) or O (log n 2 ) communication rounds for n number of participants. The issue of key management can be simplified by ID-based cryptosystem which overcomes the burden of heavy public key certificate managements [4]. In ID-based system user's unique identifiers itself functioned as its public key and often requires an offline trusted authority for generating their private key [5].Existing key management systems are implemented with two approaches called group key management and key distribution system [6].Group key agreement allows a group of users to negotiate a common secret key via open networks [7].…”
Section: State-of-the-art On Key Managementmentioning
confidence: 99%