Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Scrambling and Key Distribution Scheme for Digital Television
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
A Secure YS-Like User Authentication Scheme
Informatica
On key distribution management for conditional access system on pay-TV system
IEEE Transactions on Consumer Electronics
Conditional access system interoperability through software downloading
IEEE Transactions on Consumer Electronics
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
IEEE Transactions on Consumer Electronics
Secure communication between set-top box and smart card in DTV broadcasting
IEEE Transactions on Consumer Electronics
A hybrid user authentication protocol for mobile IPTV service
Multimedia Tools and Applications
Hi-index | 0.00 |
Secure communication between set-top boxes (STBs) and smart cards is directly related to the benefit of the service providers and the legal rights of users, while key exchange is the essential part of a secure communication. In 2004, Jiang et al. proposed a key exchange protocol for STBs and smart cards based upon Schnorr's digital signature protocol and a one-way hash function. This paper, however, demonstrates that Jiang et al.'s protocol is vulnerable to an impersonation attack and does not provide perfect forward secrecy. In addition, in order to isolate such problems, we present a new secure key exchange protocol based on a one-way hash function and Diffie-Hellman key exchange algorithm.