Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.1.039

Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System  

Lee, Hoon-Jung (한양대학교 컴퓨터공학과)
Son, Jung-Gab (한양대학교 컴퓨터공학과)
Oh, Hee-Kuck (한양대학교 컴퓨터공학과)
Abstract
In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.
Keywords
Key Distribution Scheme; Grouip Key; IPTV; Conditional Access System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Zhou and Y. Ou, "Key tree and Chinese remainder theorem based group key distribution scheme," Journal of Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers, Series A/Chungk-kuoKung Ch'eng Hsuck K'an Vol.32, Issue7, pp.967-974, 2009.
2 Y. Ren, V. Oleshchuk and F. Li, "An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs," IEEE International Conference on Information Theory and Information Security (ICITIS), pp.689-692, 2010.
3 Y. Song and Y. Zhang, "A mixed key management scheme of clustering wireless sensor network," International Conference on Computer Application and System Modeling (ICCASM), pp.v7198-v7201, 2010.
4 EBU Project Group B/CA, "Functional model of a conditional access system", EBU Technical Review, pp.64-77, 1995.
5 W. Kanjanarin and T. Amornraksa, "Scrambling and key distribution scheme for digital television", IEEE International Conference on Networks (ICN), pp.140-145, 2001.
6 T. Jiang, Y. Hou and S. Zheng, "Secure communication between set-top box and smart card in DTV broadcasting", IEEE Transaction on Consumer Electronics, Vol.50, No.3, pp.882-886, 2004.   DOI   ScienceOn
7 S. Lee, N. Park, S. Kim and J. Choi, "Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting", International Conference on Information Security and Assurance (ISA), LNCS 5576, pp.797-803, 2009.
8 T. Hou, J. Lai and C. Yeh, "Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting", TENCON 2007, IEEE Region 10 Conference, pp.1-5, 2007.
9 H. Kim, "Secure communication in digital TV broadcasting", International Journal of Computer Science and Network Security (IJCSNS), Vol.8, No.9, pp.1-5, 2008.
10 E. Yoon and K. Yoo, "Robust key exchange protocol between set-top box and smart card in DTV broadcasting", INFORMATICA, Vol.20, No.1, pp.139-150, 2009.
11 T. Comen, C. Leiserson, R. Rivest and C. Stein, "Introduction to algorithms," Second Edition. MIT Press and Mcgraw-Hill, 2001. ISBN 09262-03293-7.
12 G. Chiou and W. Chen, "Secure broadcasting using the secure lock," IEEE Transaction on Software Engineering, Vol.15, No.8, pp.929-934, 1989   DOI   ScienceOn
13 B. Hu, W. Ye, S. Feng and X. Wang, "Key distribution scheme based on two cryptosystems for hierarchical access control," IEEE International Conference on Advanced Communication Technology (ICACT), pp.1723-1728, 2006.
14 X. Zheng, C. Huang and M. Matthews, "Chinese remainder theorem based group key management," ACM Southeast Regional Conference, pp.206-271, 2007.