logo

SCIENCE CHINA Information Sciences, Volume 59 , Issue 5 : 052108(2016) https://doi.org/10.1007/s11432-015-5469-5

One-to-many authentication for access control in mobile pay-TV systems

More info
  • ReceivedMay 31, 2015
  • AcceptedJul 7, 2015
  • PublishedApr 11, 2016

Abstract


Funded by

Basic Science Research Program and Next-Generation Information Computing Development Program through the National Research Foundation of Korea(NRF)

funded by the Ministry of Science ICT and Future Planning(NRF-2014R1A1A1006770)

funded by the Ministry of Science ICT and Future Planning(NRF-2014M3C4A7030648)


Acknowledgment

Acknowledgments

The work of D. He was supported in part by the National Natural Science Foundation of China (Grant Nos. 61373169, 61572379, 61501333), National High Technology Research and Development Program of China (863 Program) (Grant No. 2015AA016004), Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund through Fujian Normal University (Grant No. 15011), and Natural Science Foundation of Hubei Province of China (Grant No. 2015CFB257). The work of J.-H. Lee was supported by Basic Science Research Program and Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (Grant Nos. NRF-2014R1A1A1006770, NRF-2014M3C4A7030648).


References

[1] Shirazi H, Cosmas J, Cutts D. IEEE Trans Broadcast, 2011, 56: 44-56 Google Scholar

[2] Diaz-Sanchez D, Marin A, Almenarez F, et al. IEEE Trans Consum Electron, 2009, 55: 88-96 Google Scholar

[3] ITU-R. Conditional-Access Broadcasting System. BT.810. https://www.itu.int/rec/R-REC-BT.810/en. 1992. Google Scholar

[4] Huang Y, Shish S, Ho F, et al. IEEE Trans Multimedia, 2004, 6: 760-769 Google Scholar

[5] Wang S, Laih C. IEEE Trans Multimedia, 2008, 10: 480-492 Google Scholar

[6] Sun H, Chen C, Shieh C. IEEE Trans Multimedia, 2008, 10: 1109-1120 Google Scholar

[7] Zhu W. IEEE Trans Multimedia, 2008, 10: 1214-1220 Google Scholar

[8] Digital Video Broadcasting (DVB). IP Datacast over DVB-H: Service Purchase and Protection. ETSI TS 102 474 v1.1.1 Std. https://www.etsi.org/deliver/etsi\_ts/102400\_102499/102474/01.02.01\_60/ts\_102474v010201p.pdf. 2007. Google Scholar

[9] Lee N, Chang C, Lin C, et al. IEEE Trans Consum Electron, 2000, 46: 20-27 Google Scholar

[10] Song R, Korba L. IEEE Trans Consum Electron, 2003, 49: 408-413 Google Scholar

[11] Yeung S, Lui J, Yau D. IEEE Trans Multimedia, 2005, 7: 330-338 Google Scholar

[12] Roh D, Jung S. An authentication scheme for consumer electronic devices accessing mobile IPTV service from home networks. In: Proceedings of the 29th International Conference on Consumer Electronics, Las Vegas, 2011. 717-718. Google Scholar

[13] Sun S, Leu M. IEEE Trans Multimedia, 2009, 11: 947-959 Google Scholar

[14] Koblitz N. Math Comput, 1987, 48: 203-209 Google Scholar

[15] Wang H, Qin B. IET Inform Secur, 2012, 6: 281-290 Google Scholar

[16] Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology-EUROCRYPT. Berlin: Springer, 2000. 139-155. Google Scholar

[17] Cha J, Cheon J. An identity-based signature from gap diffie-Hellman groups. In: Proceedings of International Conference on Practice and Theory in Public-Key Cryptography, Miami, 2003. 18-30. Google Scholar

[18] Pointcheval D, Stern J. J Cryptol, 2000, 13: 361-396 Google Scholar

[19] Ren Y, Shen J, Wang J, et al. J Internet Techno, 2015, 16: 317-323 Google Scholar

[20] He D, Kumar N, Chilamkurti N. Inf Sci, 2015, 321: 263-277 Google Scholar

[21] He D, Zeadally S. IEEE Commun Mag, 2015, 35: 71-77 Google Scholar

[22] Guo P, Wang J, Li B, et al. J Internet Techno, 2014, 15: 929-936 Google Scholar

[23] Shen J, Tan H, Wang J, et al. J Internet Techno, 2015, 16: 171-178 Google Scholar

[24] He D, Zhang Y, Chen J. Wirel Pers Commun, 2014, 74: 229-243 Google Scholar

[25] Scott M, Costigan N, Abdulwaha W. Implementing cryptographic pairings on smartcards. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006. 134-147. Google Scholar