Skip to main content

Practical Pay TV Schemes

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

Abstract

We propose an efficient and robust Pay TV scheme for the case when there are a number of streams, as opposed to just one. In our model, the broadcast is divided into billing periods; during each billing period the entitlement of the users does not change. We achieve full flexibility with only a constant factor data redundancy. Our scheme has very little secure memory requirements and does not require the users’ secure keys to be changed once they have been written into the secure memory. There is also no upper limit on the number of subscribers. We extend this scheme to have the cracker identification property: If a collusion of less than t users crack their set-top terminals and produce a new decryption key, the exact set of crackers can be efficiently identified with high probability. This property is similar to but different from the traitor tracing schemes of Chor et al [5].

Financial support from Ministry of Information Technology, Government of Korea is acknowledged.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abdalla, Y. Shavitt, and A. Wool. Towards making broadcast encryption practical. In Financial Cryptography, volume 1648 of LNCS, pages 140–157, 1999.

    Chapter  Google Scholar 

  2. C. Blundo and A. Cresti. Space requirements for broadcast encryption. In Advances in Cryptology, Eurocrypt’ 94, volume 950 of LNCS, pages 287–298, 1994.

    Chapter  Google Scholar 

  3. C. Blundo, L. A. Frotta Mattos, and D. R. Stinson. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Advances in Cryptography, CRYPTO’ 96, LNCS, pages 387–400, 1996.

    Google Scholar 

  4. D. Boneh and M. Franklin. An efficient public key traitor tracing scheme. In Proc. 19th International Advances in Cryptology Conference — CRYPTO’ 99, pages 338–353, 1999.

    Google Scholar 

  5. B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in cryptology — CRYPTO’ 94, volume 839 of LNCS, pages 257–270, 1994.

    Google Scholar 

  6. J. L. Cohen, M. H. Etzel, D. W. Faucher, and D. N. Heer. Security for broadband digital networks. In Communications Technology, pages 58–69, 1995.

    Google Scholar 

  7. A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology, CRYPTO’ 93, volume 773 of LNCS, 1994.

    Google Scholar 

  8. M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Advances in Cryptology, Eurocrypt’ 98, volume 1403 of LNCS, pages 512–526, 1998.

    Chapter  Google Scholar 

  9. J. McCormac. European scrambling systems 5. Waterford University Press, Waterford, Ireland, 1996.

    Google Scholar 

  10. Y. Mu and V. Varadharajan. Robust and secure broadcast. In Progress In Cryptology — Indocrypt 2001, volume 2247 of LNCS, pages 223–231, 2001.

    Chapter  Google Scholar 

  11. M. Naor and B. Pinkas. Threshold traitor tracing. In Advances in cryptology — CRYPTO’98, volume 1462 of Lecture Notes in Computer Science (LNCS), pages 502–517, 1998.

    Chapter  Google Scholar 

  12. A. Wool. Key management for encrypted broadcast. In 5th ACM conference on Computer and Communications Security, pages 7–16, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Narayanan, A., Rangan, C.P., Kim, K. (2003). Practical Pay TV Schemes. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-45067-X_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40515-3

  • Online ISBN: 978-3-540-45067-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics