Broadcast Encryption Scheme and Its Implementation on Conditional Access System

نویسندگان

  • Yi-Chun Zhang
  • Cheng Yang
  • Jian-Bo Liu
  • Jia-Yin Tian
چکیده

Broadcast encryption schemes are suitable for one-way content distribution and protection applications. In this paper, we give a concrete implementation framework for how to introduce BE schemes into Conditional Access Systems(CAS). And then we compare the transmission performance of four highly efficient broadcast encryption schemes with traditional CAS system. Based on these experimental results and some reference experiences, we analysis the advantages and challenges of broadcast encryption scheme implementation. At last, some research suggestions are given for further research on this subject.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

A Fully Secure Attribute Based Broadcast Encryption Scheme

Besides traditional functionality of broadcast encryption, attribute based broadcast encryption (ABBE) provides more flexible assess control mechanism over encrypted data. In this paper, a ciphertext-policy ABBE (CPABBE) scheme is proposed. In such scheme, user’s private key is attached with attributes and an index while ciphertext is associated with an access structure and a broadcast set. A k...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt...

متن کامل

Video Casting Application Oriented Key Exchange

Within video stateless receivers, a central server should deliver information securely to the authorized users, over a public channel, even if receivers do not update their state from session to session. This is the case of a multimedia conditional access systems based on one way broadcasting. This paper suggests a new approach to assure a secure communication in such environments. The proposed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009