Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.2.075

Key Generation and Management Scheme for Efficient Interoperability among Different Downloadable Conditional Access Systems  

Lee, Hoonjung (한양대학교 컴퓨터공학과)
Eun, Hasoo (한양대학교 컴퓨터공학과)
Oh, Heekuck (한양대학교 컴퓨터공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.2, 2013 , pp. 75-82 More about this Journal
Abstract
CAS (Conditional Access System) is a content protection solution that restricts access to the system according to user's standing and only authorized users can access the content in a pay-TV system. DCAS (Downloadable Conditional Access System) can download CAS client which is a software implemented via network. In recent years, research and development has been carried out on DCAS to solve the problems of compatibility among heterogeneous devices and internetworking with other services. In this paper, we propose key generation and management scheme for efficient interoperability among different DCASs based on PBC (Pairing Based Cryptography).
Keywords
Downloadable Conditional Access System (DCAS); Interoperability; Key Management Scheme;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Y. Jeong, S. Kim, H. Kim, H. Koo and E. Kwon, "A Novel Protocol for Downloadable CAS," IEEE Transaction on Consumer Electronics, Vol.54, No.3, pp.1236-1243, art. No.65, 2008.   DOI   ScienceOn
2 H. Jeong, S. Kim and D. Won, "On the Security of an Novel Protocol for Downloadable CAS," International Conference on Ubiquitous Information Management and Communication (ICUIMC), art. No.65, 2012.
3 S. Kang,, J. Park, E. Paik, C. Park, and J. Ryou, "Technique and Implementation of Secure Downloadable Conditional Access System," Journal of The Korea Institute of Information Security & Cryptology (KIISC), Vol.19, No.6, pp.161-174. 2009.   과학기술학회마을
4 H. Choi, D. Yeo, J. Jang, and H. Youm, "Proposal of a Mutual Authentication and Key Management scheme based on SRP protocol," Journal of The Korea Institute of Information Security & Cryptology (KIISC), Vol.20, No.3, pp.53-65, 2010.   과학기술학회마을
5 D. Cho, B. Koh, and S. Yeo, "Secure D-CAS System for Digital Contetns Downloading Service," The Journal of Supercomputing, pp.1-15, 2011.
6 H. Koo, O. Kwon, and S. Lee, "Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices," ETRI Journal, Vol.32, No.2, pp.204-213, 2010.   과학기술학회마을   DOI   ScienceOn
7 S. Kim, Y. Jeong, O. Kwon, and J. Chung, "Method for Efficient CA Software Provisioning in Downloadable Conditional Access System," IEEE International Symposium on Comsumer Electronics (ISCE), pp.335-338, 2011.
8 Y. Jeong, S. Kim, O. Kwon, C. Ahn and J. Hong, "Design and Implementation of Headend Servers for Downloadable CAS," IEEE International Conference on Comsumer Electronics (ICCE), pp.727-728, 2011.
9 EBU Project Group B/CA, "Functional model of a conditional access system," EBU Technical Review, pp.64-77, 1995.
10 J.Y. Moon, B.J. Oh, and E.H. Park, "Trends on Technologies for Interoperability of Various Conditional Access Systems," ETRI Electronics and Telecommunications Trends, Vol.21, No.5, pp.21-29, 2006.
11 ETSI TS 103 197 v1.4.1, Digital Video Broadcasting(DVB) Head-end implementation of DVB Simulcrypt, 2004.
12 Common Interface Specification for Conditional Access and Other Digital Video Broadcasting Applications, EN50221, 1997.
13 Cable Television Labortories, Inc., "OpenCable DCAS System Overview Technical Report," OC-TR-DCAS-D01-060 206, 2006.
14 F. Kamperman and B. Rijnsoever, "Conditional Access System Interoperability Through Software Downloading," IEEE Transaction on Consumer Electronics, Vol.47, No.1, pp.47-54, 2001.   DOI   ScienceOn
15 W. You, J. Lee, Y. Cho, O. Kwon, and S. Lee, "Design and Implementation of DCAS User Terminal," IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, (BMSB), pp.1-5, 2011.
16 J. Moon, J. Kim, J. Park, and E. Paik, "Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System," International Conference on Convergence and Hybrid Information Technology (ICCHIT), pp.380-385, 2008.
17 D. Boneh and M. Franklin, "Identity-based Encryption from the Weil Pairing," Advances in Cryptology, Crypto '01, LNCS Vol.2139, pp.213-229, 2001.
18 W. Shin, K. Fukushima, S. Kiyomoto, and Y. Miyake, "AMY: Use your cell phone to create a protected personal network over devices," IEEE Transactions on Consumer Electronics, Vol.57, No.1, pp.99-104, 2011.   DOI   ScienceOn