Abstract
In any conditional access system, the broadcast content is encrypted with the secret key to protect it from unauthorized users. The secret key is shared by server and a authorized user and a key transport protocol is used to transfer the secret key securely to these users. In this paper we introduce a scalable key transport protocol based on Chinese remainder theorem for single as well as multiple access control. In this protocol, user or user device has to carry only two keys. To decode the broadcast message, only one modular division and one decryption is sufficient. The main advantage of our scheme is that, a server can update the scrambling key or group key in one message, without changing user’s key. The proposed protocol is scalable and it can be used for multiple access control, which is useful in Pay TV, without increasing communication and computation overhead on user as well as the server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Chiou, G.H., Chen, W.T.: Secure broadcast using secure lock. IEEE Trans. Software Engineering 15(8), 929–934 (1989)
Shamir: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Eskicioglu, A.M., Delp, E.J.: A Key Transport Protocol based on secret sharing, Application to information security. IEEE Transactions on Consumer Electronics 48(4), 816–824 (2002)
Wang, S.-Y., Laih, C.-S.: Efficient Key Distribution for Access Control in Pay-TV Systems. IEEE Transactions on Multimedia 10(3), 480–491 (2008)
Liu, B., Zhang, W., Jiang, T.: A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans. Consumer Electron. 50(2), 632–637 (2004)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architecture. National Security Agency, RFC 2627 (June 1999)
Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison- Wesley, Reading (2001)
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Daemen, J., Rijmen, V.: Rijndael: The Advanced Encryption Standard. Dr. Dobb’s Journal (March 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joshi, M.Y., Bichkar, R.S. (2013). Scalable Key Transport Protocol Using Chinese Remainder Theorem. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)