Practical pay TV schemes

  • Authors:
  • Arvind Narayanan;C. Pandu Rangan;Kwangjo Kim

  • Affiliations:
  • Department of Computer Science and Engineering, Indian Institute of Technology, Madras, Chennai, India;Department of Computer Science and Engineering, Indian Institute of Technology, Madras, Chennai, India;IRIS, ICU, Taejon, South Korea

  • Venue:
  • ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
  • Year:
  • 2003
  • Broadcast encryption

    CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology

  • Key management for encrypted broadcast

    CCS '98 Proceedings of the 5th ACM conference on Computer and communications security

  • Tracing Traitors

    CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology

  • Threshold Traitor Tracing

    CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology

  • Robust and Secure Broadcasting

    INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose an efficient and robust Pay TV scheme for the case when there are a number of streams, as opposed to just one. In our model, the broadcast is divided into billing periods; during each billing period the entitlement of the users does not change. We achieve full flexibility with only a constant factor data redundancy. Our scheme has very little secure memory requirements and does not require the users' secure keys to be changed once they have been written into the secure memory. There is also no upper limit on the number of subscribers. We extend this scheme to have the cracker identification property: If a collusion of less than t users crack their set-top terminals and produce a new decryption key, the exact set of crackers can be efficiently identified with high probability. This property is similar to but different from the traitor tracing schemes of Chor et al [5].