Key management for encrypted broadcast

  • Authors:
  • Avishai Wool

  • Affiliations:
  • Lucent Technologies, Murray Hill, NJ

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider broadcast applications where the transmissions need to be encrypted, such as direct broadcast digital TV networks or Internet multicast. In these applications the number of encrypted TV programs may be very large, but the secure memory capacity at the set-top terminals (STT) is severely limited due to the need to withstand pirate attacks and hardware tampering. Despite this, we would like to allow the service provider to offer different packages of programs to the users. A user who buys a package should be able to view every program belonging to that package, but nothing else. A flexible scheme should allow for packages of various sizes to be offered, from a single program up to all the programs. We suggest two novel schemes to manage the encryption keys for these applications. The schemes are highly flexible, and understandable to users, yet require very few keys to be stored in the STTs' secure memory. The computational power required of the STTs is very low. The security of these schems is as good or better than that offered by current technology.