Research on Digital TV Anonymous Authentication

Article Preview

Abstract:

Now many television operators are providing subscribers with more and more value-added service. When people use these services they will have the risk of leaking personal information, such as the watching habit, the privacy problem has become a hot topic to the public. This paper proposes a scheme of CAS anonymous authentication in two-way network, and the scheme uses group signatures based on the elliptic curve. It meets both efficient authentication and transaction tracking needs, and can also protect user's privacy in a certain extent.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2555-2559

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lu Guan-Ming, Zong Fang. The theory of digital TV [M]. Beijing: Mechanical Industry Press, 2004. (in Chinese)

Google Scholar

[2] F. Coutrot. V. Michon. A single conditional access system for satellite-cable and terrestrial TV. IEEE Transactions on Consumer electronics, 1989, Vol. 35, No. 3, 464-68.

DOI: 10.1109/30.44305

Google Scholar

[3] ITU-R Rec. 810. Conditional-Access Broadcasting System, 1992.

Google Scholar

[4] N. Lee, C. Chang, C. Lin, T. Hwang. Privacy and non-repudiation on pay-TV systems. IEEE Transactions on Consumer Electronics, 2000, Vol. 46, No. 1, 20-27.

DOI: 10.1109/30.826376

Google Scholar

[5] D. Chaum,E. van Heyst. Group signatures [C].In: Advances in Cryptology-EUROCRYPT'91, LNCS 547,Springer- Verlag, 1991, 257-265.

DOI: 10.1007/3-540-46416-6_22

Google Scholar

[6] R. K. Nichols. ICSA Guide to Cryptography[M]. Computing McGraw-Hill, first edition, December 1999.

Google Scholar

[7] Li Feng-Yin, Yu ji-Guo, Ju Hong-Wei. A group signature scheme based on RSA [J]. Computer Engineering and Design, 2006, 27(16): 2955-2957. (in Chinese).

Google Scholar

[8] G. Ateniese, J. Camenisch, M. Joye, et a1.A practical and provably secure coalition-resistant group signature scheme[C].In: Advances in Cryptology-CRYPTO00, LNCS 1880,Heidelberg: Springer-Verlag, 2000, 255-270.

DOI: 10.1007/3-540-44598-6_16

Google Scholar

[9] D. Song.Practical forward secure group signature schemes[C].In: Proc of the 8th ACM Conf on Computer and Communication Security-CCS01, ACM, 2001, 225-234.

DOI: 10.1145/501983.502015

Google Scholar

[10] Wang Ze-Cheng, Zhang Ya-Jun, Wang Jing-Ming. A group signature scheme based on elliptic curves[J], Tian-Zhong Journal, 2002, 17(5): 22-23. (in Chinese)

Google Scholar

[11] Z. T. Jiang, Y. B. Wang, Y. Wang, Y. M. Wang. Investigations on smart card-based secure protocols for authenticated key establishment in digital pay-TV systems. Proceedings of the 8th IEEE International Conference on Cognitive Informatics-ICCI09, 2009, 538-541.

DOI: 10.1109/coginf.2009.5250680

Google Scholar

[12] Xueming Wang, Yurong Dong. Threshold Group Signature Scheme with Privilege Subjects Based on ECC[C]. Communications and Intelligence Information Security-ICCIIS10, 2010, 84-87.

DOI: 10.1109/icciis.2010.64

Google Scholar