Novel Secure Communication Protocol for Conditional Access System

نویسندگان

  • Yongliang Liu
  • Xiaolin Yang
  • Hongxun Yao
  • Wen Gao
چکیده

A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to achieve the authentication of smart card to settop box and uses an asymmetric cryptosystem to achieve the authentication of set-top box to smart card. Both security and performance of the proposed protocol are analyzed and a comparison between the proposed protocol and a previous protocol is provided. The result shows that the protocol is more secure at the cost of a little more computation spending and very applies to smart card with limited processing power. Moreover, the protocol makes it possible that various conditional access systems use the same set-top box because it is not necessary for set-top box to store any secret proprietary data of conditional access system in advance in the protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication in Digital TV Broadcasting

To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the control words and accordingly to enable the STB to descramble the scrambled signal. Therefore, s...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Secure Anonymous Communication with Conditional Traceability

A new anonymous secure communication protocol with conditional traceability is proposed to provide personal anonymity and privacy protection, in which a secure mapping function is introduced to provide anonymity and personal information protection, when necessary, only authority principal part can act as arbitrator for communication validation. The proposed protocol has 3 advantages: 1) mutual ...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007