Efficient and secure conditional access system for pay-TV systems

  • Om PalEmail author
  • Bashir Alam


In Digital TV service, subscribers get the access of channels of their interest. In Conditional Access Systems (CAS), multimedia content is delivered securely using the Control Word (CW). To frequent update of the CW, a large number of messages are exchanged in the conventional key distribution systems. In this paper, a centralized key distribution scheme based on dynamicity of the groups and with freedom of channel package composition is proposed. Scheme has also efficient mechanism of load balancing at Group Controller (GC) side. To speed up the search of the channel package in the existing database, Optimal Binary Search Tree (OBST) data structure and Finite State Machine (FSM) are used. Scheme also provides the efficient leaving and joining mechanism for single user as well as batch users.


Key distribution Key management Conditional access system Digital TV broadcasting Pay-TV system 



  1. 1.
    Conditional Access Broadcasting Systems, ITU-R Rec. 810, 1992.!!PDF-E.pdf. Accessed 18 November 2018
  2. 2.
    Cremers C, Horvat M (2015) Improving the ISO/IEC 11770 standard for key management techniques. Int J Inf SecurGoogle Scholar
  3. 3.
    Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans Multimed 6(5):760–769. CrossRefGoogle Scholar
  4. 4.
    Jiang T, Zheng S, Liu B (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50(1).
  5. 5.
    Kim JY, Choi HK (2010) Improvements on Sun et al.’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimed 12(4).
  6. 6.
    Lee JW (1996) Key Distribution and Management for conditional access system on DBS. International Conference on Cryptology and Information Security pp. 82–86Google Scholar
  7. 7.
    Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(1):632–637. CrossRefGoogle Scholar
  8. 8.
    Macq BM, Quisquater JJ (1995) Cryptology for digital TV broadcasting. Proc IEEE 83:944–957CrossRefGoogle Scholar
  9. 9.
    Mapoka TT, Shepherd SJ, Abd-Alhameed RA (2014) A new multicast service key management scheme for secure wireless Mobile multicast. IEEE Trans Mob Comput 14(8):1545–1559. CrossRefGoogle Scholar
  10. 10.
    Naranjo JAM, Antequera N, Casado LG, Lopez-Ramos JA (2012) A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J Comput Appl Math 236(12):3042–3051. MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. Proc CISIS 2011 Lect Notes Comput Sci 6694:177–182Google Scholar
  12. 12.
    Sun CY, Chang CC (2016) Cryptanalysis of a secure and efficient authentication scheme for access control in Mobile pay-TV systems. Int J Netw Sec 18(3):594–596Google Scholar
  13. 13.
    Sun HM, Chen CM, Shieh CZ (2008) Flexible-pay-Per-Channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimed 10(6).
  14. 14.
    Trappe W, Washington LC (2013) Introduction to cryptography with coding theory, 2nd edn. Pearson Education, India, pp 66–70zbMATHGoogle Scholar
  15. 15.
    Trappe W, Song J, Poovendran R, Liu KJR (2003) Key management and distribution for secure multimedia multicast. IEEE Trans Multimed 5(4):544–557. CrossRefGoogle Scholar
  16. 16.
    Tu FK, Laih CS, Tough SH On Key Distribution management for conditional access system on Pay-TV System. In: 1998 I.E. Int. Symp Consumer Electronics(ISCE's98), vol. 45. Taipei, Taiwan, R.O.C., pp 151-159Google Scholar
  17. 17.
    Varalakshmi R, RhymendUthariaraj V (2013) Huffman based conditional access system for key distribution in digital TV multicast. Multimed Tools Appl 74(9):2899–2912. CrossRefGoogle Scholar
  18. 18.
    Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralized group key management for secure multicast communication. IET Inf Secur 8(3):179–187. CrossRefGoogle Scholar
  19. 19.
    VijayKumar P, Bose S, Kannan A (2012) Centralized key distribution protocol using the greatest common divisor method. Comput Math Appl 65(9):1360–1368. MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Wang SJ, Tsai YR, Shen CC, Chen PY (2010) Hierarchical key derivation scheme for group-oriented communication systems. Int J Inf Technol Commun Converg 1(1):66–76. CrossRefGoogle Scholar
  21. 21.
    Yeh LY, Huang JL (2013) A conditional access system with efficient key distribution and revocation for Mobile pay-TV systems. ACM Trans Multimed Comput Commun Appl 9(3).

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Ministry of Electronics and Information TechnologyGovernment of IndiaNew DelhiIndia
  2. 2.Department of Computer Engineering, Faculty of Engineering & TechnologyJamia Millia IslamiaNew DelhiIndia

Personalised recommendations