Skip to main content
Log in

Secure pay-TV for chained hotels

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

There is an increasing demand of securely selling pay-TV channels to large organizations such as chained hotels. Most solutions usually employ a key generation authority to distribute secret access credentials for all users, which would cause the single-point problem of inefficient key management. Further, there is a risk of the leakage of users’ access credentials while countermeasures to find out the leaked credentials are lacking. To address such issues, we propose a leakage traceable hierarchical key distribution (LTHKD) framework with the key delegation and the key-leakage tracing. The key delegation allows the key generation authority to apportion the tasks of access credential generation to a number of group authorities; the tracing mechanism provides an efficient method to find out the leaked access credentials. We present a concrete LTHKD scheme by extending hierarchical identity-based encryption to groups with users’ access credentials elegantly encoded by unique fingerprint codes. We formally prove the security of the proposed scheme in a rigorous definition and conduct thorough theoretical and experimental analyses to evaluate the system performance. Surprisingly, the results show that the added key-leakage tracing mechanism has little affection on data encryption and decryption procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdalla, M., Dent, A.W., Malone-Lee, J., Neven, G., Phan, D.H., Smart, N.P.: Identity-based traitor tracing. In: Proceeding of the Public Key Cryptography-PKC 2007, pp. 361–376. Beijing, China (2007)

  2. Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 501–510. Alexandria, USA (2008)

  3. Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), pp. 425–434. Kyoto, Japan (2014)

  4. Deng, H., Wu, Q., Qin, B., Liu, J., Mao, J.: Securely selling TV programs to chained hotels: leakage traceable hierarchical key distribution. In: Proceedings of the 2014 Communications Security Conference (CSC 2014), pp. 156–161. IET Press, Beijing, China (2014)

  5. Fatemi, M., Salimi, S., Salahi, A.: Anonymous roaming in universal mobile telecommunication system mobile networks. IET Inf. Secur. 4(2), 93–103 (2010)

    Article  Google Scholar 

  6. Fiat, A., Naor, M.: Broadcast encryption. In: Proceedings of the Advances in Cryptology-CRYPTO 1993, p. 480C491. Santa Barbara, USA (1993)

  7. Gritti, C., Susilo, W., Plantard, T., Liang, K., Wong, D.S.: Broadcast encryption with dealership. J. Inf. Secur. Int. (2015). doi:10.1007/s10207-015-0285-x

    Google Scholar 

  8. Guo, F., Mu, Y., Susilo, W.: Identity-based traitor tracing with short private key and short ciphertext. In: Proceedings of the European Symposium on Research in Computer Security, pp. 609–626. Pisa, Italy (2012)

  9. Kogan, N., Shavitt, Y., Wool, A.: A practical revocation scheme for broadcast encryption using smart cards. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 225–235. Berkeley, USA (2003)

  10. Kogan, N., Tassa, T.: Improved efficiency for revocation schemes via newton interpolation. ACM Trans. Inf. Syst. Secur. 9(4), 461–486 (2006)

    Article  Google Scholar 

  11. Lee, J.W.: Key distribution and management for conditional access system on DBS. In: Proceedings of the International Conference on Cryptology and Information Security, p. 82C86 (1996)

  12. Lee, N., Chang, C., Lin, C., Hwang, T.: Privacy and non-repudiation on pay-TV systems. IEEE Trans. Consum. Electron. 46(1), 20–27 (2000)

    Article  Google Scholar 

  13. Liu, Z., Wang, D.S.: Practical attribute-based encryption: traitor tracing, revocation and large universe. Comput. J. (2015). doi:10.1093/comjnl/bxv101

    MATH  Google Scholar 

  14. Liu, B., Zhang, W., Jiang, T.: A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans. Consum. Electron. 50(2), 632–637 (2004)

    Article  Google Scholar 

  15. Sun, H.-M., Leu, M.-C.: An efficient authentication scheme for access control in mobile pay-tv Systems. IEEE Trans. Multimedia 11(5), 947–959 (2009)

    Article  Google Scholar 

  16. Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the ACM Symposium on Theory of Computing 2003, pp. 116–125. San Diego, USA (2003)

  17. Tu, F.-K., Laih, C.-S., Tung, H.-H.: On key distribution management for conditional access system on pay-TV system. IEEE Trans. Consum. Electron. 45(1), 151–158 (1999)

    Article  Google Scholar 

  18. Wang, H.: Insecurity of ’Improved anonymous multi-receiver identity-based encryption’. Comput. J. 57(4), 636–638 (2013)

    Article  Google Scholar 

  19. Waters, B.: Efficient identity-based encryption without random oracles. In: Proceedings of the Advances in Cryptology-EUROCRYPT 2005, pp. 114–127. Aarhus, Denmark (2005)

  20. Wan, Z., Liu, J., Zhang, R., Deng, R.H.: A collusion-resistant conditional access system for flexible-pay-per-channel pay-tv broadcasting. IEEE Trans. Multimedia 15(6), 1353–1364 (2013)

    Article  Google Scholar 

  21. Wang, S.-Y., Laih, C.-S.: Efficient key distribution for access control in pay-tv systems. IEEE Trans. Multimedia 10(3), 480–492 (2008)

    Article  Google Scholar 

  22. Wang, H., Qin, B.: Improved one-to-many authentication scheme for access control in pay-tv systems. IET Syst. Secur. 6(4), 281–290 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

Funding was provided by National Key Basic Research Program (973 program) (grant no. 2012CB315905), National Natural Science Foundation of China (CN) (grant no. 61370190), Natural Science Foundation of Jilin Province (CN) (grant no. 61472429), Natural Science Foundation of China (grant no. 61472083), Beijing Natural Science Foundation (grant nos. 4132056, 4122041), and Research Funds of Renmin University of China (grant no. 14XNLF02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Deng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deng, H., Zhou, Y., Wu, Q. et al. Secure pay-TV for chained hotels. Int. J. Inf. Secur. 17, 33–42 (2018). https://doi.org/10.1007/s10207-016-0354-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-016-0354-9

Keywords

Navigation