Skip to main content

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation

  • Conference paper
Book cover Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

Abstract

The distribution of keys in a Conditional Access System (CAS) takes large computation time, since the number of keys to be updated is high. Moreover, it is necessary to send the keys securely to the authorized group members. In this paper, we propose a new Key Distribution Protocol that reduces the computation time taken to compute the re-keying information whenever there is a change in the group membership. In the proposed system, when the Group Centre needs to refresh a new group key, only few encryption/decryption operations are needed. Two primary operations that are performed by the service providers and members are XOR and multiplication, in which computation load is very less. From the experiments carried out in this work, it has been observed that the computation time is reduced in this work when compared with the existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, M., Poovendran, R., McGrew, D.A.: Minimizing Center Key Storage in Hybrid One-Way Function based Group Key Management with Communication Constraints: Elsevier. Information Processing Letters, 191–198 (2004)

    Google Scholar 

  2. Huang, Y.L., Shieh, S., Ho, F.S., Wang, J.C.: Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems. IEEE Transactions on Multimedia 6(5), 760–769 (2004)

    Article  Google Scholar 

  3. Sun, H.M., Chen, C.M., Shieh, C.Z.: Flexible-Pay-Per-Channel: A new model for Content Access Control in pay-TV Broadcasting Systems. IEEE Transactions on Multimedia 10(6), 1109–1120 (2008)

    Article  Google Scholar 

  4. Wang, S.Y., Laih, C.S.: Efficient Key Distribution for Access Control in Pay-TV Systems. IEEE Transactions on Multimedia 10(3), 480–492 (2008)

    Article  Google Scholar 

  5. Macq, B.M., Quisquater, J.J.: Cryptology for Digital TV Broadcasting. Proc. IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  6. Liu, B., Zhang, W., Jiang, T.: A Scalable Key Distribution Scheme for Conditional Access System in Digital Pay-TV System. IEEE Transactions on Consumer Electronics 50(2), 632–637 (2004)

    Article  Google Scholar 

  7. Sakarindr, P., Ansari, N.: Security Services in Group Communications over Wireless Infrastructure, Mobile Adhoc, and Wireless Sensor Networks. IEEE Wireless Communication 14(5), 8–20 (2007)

    Article  Google Scholar 

  8. Jiang, T., Zheng, S., Liu, B.: Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast. IEEE Transactions on Consumer Electronics 50(1), 225–230 (2004)

    Article  Google Scholar 

  9. Vijayakumar, P., Bose, S., Kannan, A., Himesh, P.H.: Key Distribution Protocol for Secure Multicast with Reduced Communication Delay. In: Zhong, N., Callaghan, V., Ghorbani, A.A., Hu, B. (eds.) AMT 2011. LNCS, vol. 6890, pp. 312–323. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Trappe, W., Song, J., Poovendran, R., Liu, K.J.R.: Key Management and Distribution for Secure Multimedia Multicast. IEEE Transactions on Multimedia 5(4), 544–557 (2003)

    Article  Google Scholar 

  11. Blaum, M., Bruck, J., Vardy, A.: MDS Array Codes with Independent Parity Symbols. IEEE Transactions on Information Theory 42(2), 529–542 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  12. Xu, L., Huang, C.: Computation-Efficient Multicast Key Distribution. IEEE Transactions on Parallel and Distributed Systems 19(5), 1–10 (2008)

    Article  MathSciNet  Google Scholar 

  13. Vijayakumar, P., Bose, S., Kannan, A., Subramanian, S.S.: A Secure Key Distribution Protocol for Multicast Communication. In: Balasubramaniam, P. (ed.) ICLICC 2011. CCIS, vol. 140, pp. 249–257. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Wong, C., Gouda, M., Lam, S.: Secure Group Communications using Key Graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  15. Vijayakumar, P., Bose, S., Kannan, A.: Rotation based secure multicast key management for batch rekeying operations. Networking Science (2011), doi:10.1007/s13119-011-0001-8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vijayakumar, P., Bose, S., Kannan, A. (2012). Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics